paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1503.04694
1
1503
2015-03-16T15:43:48
Controlled Label Propagation: Preventing Over-Propagation through Gradual Expansion
[ "cs.SI" ]
Identifying communities has always been a fundamental task in analysis of complex networks. Many methods have been devised over the last decade for detection of communities. Amongst them, the label propagation algorithm brings great scalability together with high accuracy. However, it has one major flaw; when the community structure in the network is not clear enough, it will assign every node the same label, thus detecting the whole graph as one giant community. We have addressed this issue by setting a capacity for communities, starting from a small value and gradually increasing it over time. Preliminary results show that not only our extension improves the detection capability of classic label propagation algorithm when communities are not clearly detectable, but also improves the overall quality of the identified clusters in complex networks with a clear community structure.
cs.SI
cs
Controlled Label Propagation: Preventing Over-Propagation through Gradual Expansion Aria Rezaei Saeed Mahlouji Far Mahdieh Soleymani Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering Sharif University of Technology Email: [email protected] Sharif University of Technology Email: [email protected] Sharif University of Technology Email: [email protected] 5 1 0 2 r a M 6 1 ] I S . s c [ 1 v 4 9 6 4 0 . 3 0 5 1 : v i X r a Abstract-Identifying communities has always been a funda- mental task in analysis of complex networks. Many methods have been devised over the last decade for detection of communities. Amongst them, the label propagation algorithm brings great scalability together with high accuracy. However, it has one major flaw; when the community structure in the network is not clear enough, it will assign every node the same label, thus detecting the whole graph as one giant community. We have addressed this issue by setting a capacity for communities, starting from a small value and gradually increasing it over time. Preliminary results show that not only our extension improves the detection capability of classic label propagation algorithm when communities are not clearly detectable, but also improves the overall quality of the identified clusters in complex networks with a clear community structure. I. INTRODUCTION Complex networks appear in a wide variety of domains. As a result, studying the structure of such networks has attracted a tremendous amount of attention throughout years. Real-world networks are usually comprised of communities – informally described as a group of nodes with a dense connection between themselves and a loose connection to the rest of the network. As the building blocks of complex networks, communities reveals invaluable information about key features of the network. Retrieving the community structure can help us find the functional modules in biological networks, find groups of cohesive data cubes in large-scale databases, find groups of users in online social networks with similar attributes and interests, thus enabling us to develop effective marketing strategies in such networks, predict future interactions between users or study the emergence and popularity of ideas in social media[1][2][3]. For a great survey refer to [4]. There is of no single definition communities. Radicchi et al. define communities in two senses[5]. Let node v be in community C with degree dv, then the number of links between v and other nodes within C will be din v , and the number of links between v and the rest of the network will be dout . A subgraph V of a graph G is a community in a strong sense if: v ∀v ∈ V : din v > dout v (1) Similarly a subgraph V of graph G is a community in a weak sense if: X v∈V v > X din v∈V dout v (2) There are various measures quantifying the quality of clusters. One of the most popular measures is modularity[6]. Knowing that real-world networks possess strong community structure compared to random networks, modularity measures the difference between a given partitioning in a certain graph and the same partitioning in a random graph with the same distribution of degrees. Modularity in a partitioning with C clusters can be written as below: Q = X ci∈C h mi M − ( di 2M )2i (3) Where mi is the number of edges inside partition ci, di is the total degree of nodes inside ci, C is the set of all clusters and M is the total number of edges. The growing need for retrieving communities from com- plex networks in addition to rapid growth of the size of data, highlights the importance of scalable and accurate methods to detect communities in such networks. With modularity as objective function, graph partitioning can be seen as an optimization problem. Many algorithms for community detec- tion have been proposed over the last decade, setting modu- larity optimization as their ultimate goal, which has proved in practice to retrieve communities of great quality[7][8][9]. There are a class of algorithms exploiting the power of linear algebra to detect communities using the eigenvectors of the Laplacian matrix[10][11]. Another class of algorithms use the fact that clusters have weak connection between themselves; knowing this, this class of algorithms find minimal cuts and divide the graph recursively, leading to a dendrogram of node- cluster membership[12][13]. There are also novel approaches that do not completely fit in the previous categories which are built around statistical and mechanical phenomena in real world[14][15][16]. All these methods try to optimize a global objective function or use the whole structure of a network to divide it into clusters. There is a problem with this kind of approach, especially encountered in social networks; individuals in such networks does not join communities to increase a global quality function, they rather join them to improve their own utility function, be it more enjoyment through joining a group of people with similar interests in Facebook, or following a politician in Twitter in order to stay in touch with the latest news in politics[17]. Apart from that, it is proved that algorithms based solely on modularity optimization fails to detect communities with small size as the size of the network increases, which is famously known as resolution limit of modularity[18]. All this evidence lead us to choosing a node- centred approach. As an example of node-centred approaches, some algorithms employ a game-theoretic approach to find communities. Let nodes be agents in a game with a personal utility function. A strategy in this game which leads to a nash or local equilibrium will yield a community structure in the network[17]. Another approach with near linear time is Label Propagation Algorithm(LPA)[19]. In this method, every node is assigned a unique label in the initial condition of the network. Afterwards, in each iteration, nodes are traversed using a random order and every node acquires the label which is most frequent among its neighbors. This method has one serious problem though; in some networks, one of the labels will over-propagate and sweep through other labels, leading to detection of the whole network as one giant community, which renders this method counterproductive in dense networks with unclear community structure. This phenomenon is often called flood-fills. The focus of this article is overcoming this flaw and improving the accuracy of LPA when community structure is hardly detectable. The rest of the article is structured as follows. Section II reviews potentials and flaws of LPA along with subsequent ex- tensions to overcome its flaws. Section III presents the formal definition of Controlled Label Propagation Algorithm using gradual expansion of communities and discusses the rationale behind choosing this approach. In Section IV we empirically compare our method with LPA and two of its extensions along with several state-of-the-art algorithms in real-world networks in addition to standard network benchmarks. Lastly, section V discusses further research related to our work in addition to a conclusion. II. BACKGROUND AND MOTIVATION In this section we will discuss the considerable potentials in LPA and why it is important to improve this method for further uses. We will also cover some of the flaws of this algorithm and previous efforts do deal with these flaws. A. Where label propagation prevails? it One of the biggest advantages of LPA is its time-efficiency. Raghavan et al. state that 95% of the nodes reach their final state in 5 iterations[19]. Although the experiments by various authors suggest that the number of iterations needed to reach equilibrium state, I, grows very slowly with the size of the network, is not fully understood yet. Leung et al. have created a class of networks on which I increase logarithmically with the size of the network[20]. Although this class of networks is highly unlikely to appear in natural graphs, it shows that the efforts to find an upper-bound for I has gone no further than log N in a network with size N . Since the time complexity of LPA is O(M I) in a graph with M edges, in the worst case, its time complexity will be O(M log N ) which is still considerably fast compared to other methods. Apart from its time-efficiency, LPA can be trivially ex- tended to directed and weighted graphs with negative links. It also does not need to know the number of communities a priori, so in domains with zero knowledge about the network, it can be quite useful. Leung et al. believe that since every node only requires information from its neighbors, LPA can be easily run in a distributed environment in almost constant time[20]. This is particularly important with the emergence of ubiquitous computing and mobile social networks. All the computation will be distributed into nodes and since every node has very few neighbors compared to the size of the graph, the community structure of large-scale networks can be revealed in little time. The authors also suggest that since every node updates its state from current formation of its neighbors, LPA can be used to detect communities in a dynamic environments when nodes and links might come and go[20]. Furthermore, nowadays there is growing concern regarding the privacy of information in social networks. Keep in mind that every node only receives information from nodes he is already in contact with. In addition, the topology of the whole graph is never revealed to the nodes. As a result, LPA also guarantees an acceptable level of privacy when run on social networks. Moreover, the approach adopted by LPA algorithm is completely intuitive regarding real world communities. Con- sider the following scenario; there are N people invited to a ceremony. Assuming friendship to be a zero-one relationship, in which zero means no friendship and one means friendship, their friendship status forms an undirected and unweighted graph. After the ceremony starts, people will try to form circles with their friends in order to be near them and enjoy their companionship. If we rearrange the circles with the communities retrieved from their friendship graph using LPA, the new circles will remain the same throughout the ceremony, since no one can join a better circle. In other words, there is no one dissatisfied by her community and these communities provide an equilibrium state in real life. Formally, we can call a node v in community Ci dissatisfied if there exists another community Cj such that d v , where dC v is the number of links from v to nodes within C. As an inherent characteristic of LPA, there are no dissatisfied nodes in the retrieved communities. However, this does not hold for many other algorithms. We have tested several algorithms, namely multilevel modularity optimization of Blondel et al.[7], greedy modularity optimization of Claust et al.[8] and random walk community detection of Rosvall et al.[21], to find the percentage of dissatisfied nodes in a network given a com- munity structure by these algorithms [Results are omitted]. Although our experiments did not show a considerable portion of nodes being dissatisfied (on average, less than 5% in five collaboration networks retrieved from [22]), keep in mind that this tiny portion of nodes can be considered as false positives in domains where it is crucial that nodes belong to the optimal community in their own perspective, like in social networks. Cj v > dCi B. Where label propagation fails? As we mentioned before, on certain graphs, LPA fails to de- tect the community structure of the graph and reports the whole graph as one community. This is apparently because the speed of formation for different communities in the network varies significantly. In other words, the core of stronger communities are formed in the early stages, while weaker communities has not yet reached consensus. Furthermore, when a community has not reached its final state, it is comprised of several smaller pieces with different labels, possessing a weak core which is vulnerable to propagation of foreign labels. In a nutshell, stronger communities, exploiting the lack of unity in weaker communities, often sweep through the cores of small pieces of weaker communities and attract all of their members. This usually leads into one giant community and several smaller ones. On rare cases, the situation is exacerbated when there is one label strong enough to overwhelm all other labels, leaving every node with the same label in the end. Leung et al. have addressed this issue by employing a technique called Hop Attenuation[20]. This technique is based on the observation that the diameter of communities ought to be tiny proportional to that of the whole graph. With hop attenuation, the labels lose their strength while they propagate. Meaning that after traversing away from its center, the label's strength is exhausted and will ultimately vanish. This phenomenon can be formally described as below: Sv(L) = max(Su(L) : u ∈ N (v)) − δ (4) Where Sv(L) is the strength of label L when propagated by node v, N (v) is the neighborhood set of node v and δ is a parameter used to decrease the strength of labels when they traverse a single link. The authors realized that choosing a constant δ irrespective of the network may lead to a substantial decrease in the quality of communities. Knowing this, they proposed some methods to adaptively change δ through either using the current number of iterations or simply know it a priori as a parameter given to the algorithm. Leung et al. used another powerful heuristic to avoid im- balanced propagation of the labels called Node Preference. They realized that blindly valuing every neighbor of a node the same might be an apparent reason for the over-propagation phenomenon. Given that finding maximal label in LPA is simply finding the label with maximum occurrence among neighbors, Leung et al. changed the formulation to the fol- lowing: Li+1 v = arg max Li X u∈N (v) Su(Li u) f (u)m (5) Where Li v is the label assigned to node v in iteration i, v) is the strength of v's label in iteration i, N (v) is the Sv(Li neighborhood set of v and f (v) is any comparable function on nodes, such as betweenness centrality[23], degree centrality or any other measure. Subelj and Bajec have taken advantage of both node pref- erence and hop attenuation and proposed two new strate- gies called defensive preservation and offensive expansion of communities[24]. In defensive preservation, the preference is given to nodes in the core of communities. On the other hand, in offensive expansion, the preference is given to nodes in the border of communities. The core and the border are identified using a simple random walk algorithm. They have devised two algorithms, namely DDALPA and ODALPA, for defensive and offensive strategies respectively. The authors show that DDALPA results in high recall, whereas ODALPA gives high precision. Furthermore, in an attempt to take advantage of merits in both DDALPA and ODALPA, they have created a method called BDPA which simply runs them one after another to find communities of good quality in small-size networks. Finally, exploiting the core-periphery structure of large-scale networks[25], they developed a hierarchical algorithm, called DPA, that has the efficiency of BDPA in addition to recursively finding communities in the giant core of the graph. Going into the details of these algorithms is out of the scope of this article, it suffices to say that the results of both algorithms, especially DPA, on large-scale graphs is comparable to state-of-the-art algorithms in terms of modularity measure. Barber and Clark took a different path. They realize that over-propagation stems from the objective function of LPA[26]. Let M be a matrix of N rows and C columns (C is the number of communities), then Mij is one, if node i has label j, or zero otherwise. Each row in this matrix is the mem- bership vector of a node. When a node is updated, it adopts the most frequent label among its neighbors, thus increasing the sum of dot products between its own membership vector and that of its neighbors. Formally, when we update node v, we increase: X u∈N (v) C X i=1 MviMui Applying adjacency matrix, A, to (6) yields: N C X i=1 X j=1 MvjMijAvi (6) (7) Finally, since LPA does this for every node in an iteration, the overall objective function, H, of LPA becomes: H = N N C X i=1 X j=1 X k=1 MikMjkAij (8) With a little thought, it will become clear that LPA is simply increasing the number of edges connecting two nodes within the same community. Thus, the algorithm reaches its global maximum when every node is assigned the same label. To avoid this undesirable result, Barber and Clark changed the objective function of LPA to below: H ′ = H − λG (9) Where H is the previously mentioned objective function of LPA and G is a penalty function that diverts the algorithm from its previous undesired global maximum with a coeffi- cient λ. Barber and Clark have proposed several G functions, two of them changes H into modularity of unipartite and bipartite networks[26], thus enabling LPA to locally maximize modularity. This is a very impressive approach since it keeps the potential benefits of LPA (parallelism, privacy insurance, etc.) while overcoming its flaws and retrieving communities of excellent quality. We now look at the flood-fill phenomenon from a dif- ferent angle. LPA has two modes, asynchronous and syn- chronous[19]. They both provide similar results, but the syn- chrobous mode gives a better insight about the underlying Blog-Catalog GRQ HepTh HepPh CondMat Astro 0.014 0.012 0.010 0.008 0.006 0.004 0.002 A 0.000 100 101 102 103 104 105 Labels Fig. 1: (Color online) We have calculated the attraction power (A) of labels in the six networks, which is an estimation of the number of nodes holding each label after the first iteration of LPA. As the plot suggests, attraction power is much more equally spread across nodes in the five co-authorship graphs compared to the blog-catalog network. The results show that it might be too late to prevent a label from flooding the whole graph even after the first iteration. It also shows that we can determine how likely LPA is to fail based solely on the structure of the graph reasons of flood-fills. At the first iteration of LPA, every node is assigned a unique label, thus every label in the neighborhood of a node v has the same frequency. As a result, the probability of a node v choosing a label L in its neighborhood is 1 where dv dv is the degree of node v. We can easily compute the expected number of nodes in a label after the first iteration as below: E[N (Lu)] = X v∈N (u) 1 dv (10) Where Lu is the label first assigned to node u. We call the expected number of nodes choosing a label Lv after first iteration attraction power of node v and denote it by A(v). We have calculated A for each label after the first itera- tion of LPA on five co-authorship networks[22], as examples of sparse networks with clear community structure, and a friendship network in blog-catalog[27] as an example of dense social network which LPA fails to retrieve its community structure. We have plotted the results, with nodes sorted descending by A, in Fig.1. As the plot suggests, the decrease in blog-catalog network is far more rapid compared to five co- authorship networks. The distribution of A is important for two reasons. First, it enables us to anticipate the failure of LPA in networks before the algorithm starts. Second, Fig.1 shows that imbalanced growth of communities starts from the very first iteration, meaning that any strategy to control over-propagation of labels based on the results of previous iterations may fail. This highlights the importance of monitoring growth of communities from the very first iteration. In the next section we propose a simple yet effective way to prevent over-propagation starting from the first iteration. III. CONTROLLED LABEL PROPAGATION Before we go on and talk about preventing over- propagation, there is another problem with LPA that needs to be deal with. In LPA, when there are other labels in the neigh- borhood with the same frequency as a node's current label, the existing label will not change. Meaning that if a bad decision is made in the early stages, there is no come-back mechanism to escape from it. In terms of objective function of LPA, there is no mechanism to escape from an early local maximum and we are satisfied with with the first local maximum we reach. There has been a technique proposed by Barber and Clark that randomly walks on the local maximum to escape from it[26]. This might be dangerous as it might randomly change the label of several border nodes, which decreases the defensive capabilities of a community and might lead to an avalanche effect in which nodes' labels are changed one after another because of the change in border nodes' labels, which leads to a drastic change in the community structure after some iterations. To prevent this, we have acquired a strategy inspired by Simulated Annealing[28] in which nodes tend to change a good label – a label with maximal frequency among the nodes' neighbors – for another good label in the early stages. However they lose this tendency over time, meaning that they will hold their good label if there are no better labels in the final stages, since we do not want established cores to disappear. This can be done by a decreasing probability function p(t), starting from 1 and ending in 0. If p(t) holds, we randomly choose a label among good labels; if not, we will hold the current label if there are no better labels. Now we can devise a method to prevent all nodes from ending up with the same label. We previously mentioned that the main reason behind flood-fills is the rapid formation of the core of some communities and sluggish growth of others. So the key to this problem is ensuring "fair" growth of communi- ties in each iteration. To ensure that weaker communities have a chance to grow, we put a capacity for all communities as a function C(t) where t is the current iteration. When a label's population reaches the capacity, it can no longer attract new nodes. We define C is follows: C(t) = (cid:16)h kt T i + 1(cid:17) × N k (11) Where k is the number of times we increase the capacity of communities (the maximum number of nodes a label can be assigned to), t is the current number of iteration, T is the maximum number of iterations and N is the size of network. th It is clear that this function increases the capacity every T k iteration by N k and ending in N . As a result, in the final stages there are actually no constraint on the size of communities. Furthermore, We call the iterations between two increases in capacity a cycle, so k will be the number of cycles. k , starting from N The rationale behind our strategy to stop popular labels from attracting new nodes is in fact giving a chance to weaker communities to form a core. In this way, a node v might choose a popular label L when it is not full. During the rest of the cycle, a number of nodes in v's neighborhood find L full and join a sub-optimal label L′. With enough nodes joining L′, v might change its mind and join L′ during the later iterations TABLE I: Modularity scores for eleven data sets averaged on 50 to 2 realizations based on the size of networks. We have also shown the variance of A as an indicator of unfairness of attraction power in the networks. Name GRQ HepTh HepPh CondMat Astro Enron Brightkite Gowalla DBLP Amazon Youtube N 5.24K 9.88K 12.01K 12.01K 18.77K 36.69K 58.23K 0.20M 0.32M 0.33M 1.13M M 14.48K 25.97K 0.12M 0.12M 0.20M 0.18M 0.21M 0.95M 1.05M 0.93M 2.99M var(A) 1.0 1.1 1.2 1.3 1.1 80.8 6.9 102.4 2.4 2.1 233.9 CLPA 0.797 0.671 0.497 0.633 0.450 0.473 0.623 0.618 0.697 0.786 0.682 LPA 0.735 0.627 0.488 0.578 0.323 0.338 0.557 0.503 0.622 0.709 0.555 of the current cycle and form the core of a new community along with a number of its neighbors. The cores might not be of good quality in the early cycles, but when we reach a new cycle and increase C, those nodes who are not content with their current label will join their desired label before it gets full again. However, the core nodes of a community who have acquired a label will keep their label and attract new nodes. In this way we are helping weaker communities to form their cores while still giving nodes complete freedom in the final cycles to choose their desired label. We call our method Controlled Label Propagation Algorithm (CLPA). In the next section we show the result of our tests and prove that our method is more effective than previously proposed ex- tensions to prevent flood-fills. Furthermore, the overall quality of clusters are also increased on the various datasets we tested our method on. IV. EXPERIMENTS A. Sparse Networks We have tested CPLA against LPA on a wide variety of networks. Although increasing the quality of clusters was not our primary intention, the results reveal that on certain graphs, the modularity score of clusters yielded by CLPA is on average much higher than LPA. The data sets used for this part include five co-authorship networks[22], namely GRQ, HepTh, HepPh, CondMat and Astro, retrieved from articles on different topics in Physics (for more information about these networks refer to [22]). There are two location-based online social networks[22], namely Gowalla and Brightkite and an e-mail client network named Enron[22]. There is also a graph of a piece of Youtube's social network, along with a Computer Science co-authorship network of DBLP and product co-purchased network of Amazon[22]. We ran our algorithm with three different ks, 50, 100 and 200, along with LPA on all the networks for fifty to two times, depending on size of the networks. Table.I contains the name of the network, the number of nodes N , the number of edges M and the modularity score Q achieved by two algorithms. We have used the igraph python library to compute modularity for retrieved communities[29]. Table.I reveals that letting weaker communities grow im- proves the overall quality of detected communities. In section II.B we conjectured that the failure of LPA stems from unfair distribution of attraction power (A). In order to measure unfairness of A, we have calculated the variance of this value for all nodes in each of the networks and shown the results in Table.I. Note that out of five networks which yielded the highest percentage of increase in modularity, four are also in the top five networks with highest variance in A. Also, the five networks with the lowest increase in modularity are in the bottom six networks in regard to their variance in A. The only anomaly is Astro, which is the 9th network in respect to var(A), but yields the second highest increase in modularity. This shows that the failure of LPA is not solely related to unfair wiring of the links in the networks. This calls for an in- depth analysis to broaden our understanding of the underlying reasons of LPA shortcoming in different networks. B. Dense Networks As an example of social networks with dense structure in which LPA fails completely to retrieve any community structure, we have found the Blog-Catalog social graph which we formerly analyzed in section II. In this network, the average and maximum degree (shown in Table.II) is significantly higher than previous networks we tested in section IV.b. The node with the maximum degree is connected to 38.7% of the nodes. Furthermore, there are 62 nodes connected to more than 10% of the network. The symptoms we mentioned are quite rare in social network structures. However, this shows that there exists instances of social networks, although rare, in which LPA fails to retrieve any meaningful set of communities. This means that we have legitimate concerns to stop this phenomenon. The network comes with a set of ground-truth communities, which enables us to measure the similarity between retrieved communities with the true ones. One of the popular similarity measures is Normalized Mutual Information (NMI). Due to the overlapping nature of the ground-truth communities, we have used the code provided by McDaid et al. to calculate NMI between our communities and the true ones[30]. Note that since ground-truth communities significantly overlap, the NMI score will be very low in general for any graph partitioning method, but it is still useful for the sake of comparison. We have compared our algorithm's performance to the state-of-the-art algorithms, such as the multi-level mod- ularity optimization algorithm of Blondel et al. (denoted the greedy modularity optimization of by Louvain[7]), Clauset et al. (denoted by CNM[8]) and the famous in- fomap algorithm[21] proposed by Rosvall and Bergstrom. We have also tested the data set with two of LPA's most successful extensions, namely BPA and DPA, proposed by Subelj and Bajec[24][31]. The results, shown in Table.II, show that not only our algorithm prevents a flood-fill and captures a community structure in this network, but also our communities yield relatively good results compared to other methods, except for CNM which is considerably slower than others. We believe that the relatively good resemblance between our communities and the true ones originates from the nature of LPA algorithm, which is completely intuitive regarding how social networks are formed in real world. Meaning that if one incorporates a strategy to ensure the balanced growth of communities with LPA's basic method of community detection, the results can be of great quality. TABLE II: We tested the Blog-Catalog network using the algorithms shown in the table. We have shown the average NMI over ten realization. As the results reveal, LPA and both of its extensions, BPA and DPA, fail to capture any meaningful community strucutre in this network. This highlights the importance of efficient ways to prevent the flood-fill phenomenon. Also worth noticing is the failure of the Louvain algorithm to capture the essence of ground-truth communities, resulting in a zero NMI over ten realization. Finally, note that CNM yields better results than ours with considerably higher execution time, around 50s in a network of this size, which might cause troubles if one intends to use CNM on massive graphs. N M ¯d 10.3K 333.9K 64.7 dmax 3992 CLPA 0.0006 LPA 0.0 DPA 0.0 BPA 0.0 Infomap 0.0003 CNM 0.0009 Louvain 0.0 C. Networks with planted partitions In order to realize what parameters are responsible for the failure of LPA and get a better understanding of behavior of different algorithms in networks with a vague community structure, we have used Lancichinetti et al. benchmark[32]. To challenge the detection power of these algorithms, we have set the size of the network (N ) constant, then created networks of different densities ( ¯d) and community structure clarity (mixing parameter or µ). In order to study the effects of fairness of degree distribution, we have also used networks with different maximum degree (dmax). The results are depicted in Fig.2(a), Fig.2(b) and Fig.2(c). As you can see, the algorithms based on propagation of data, including LPA and all of its extensions along with Infomap, follow a trend of giving high quality results and then abruptly falling to zero. The exception is the DPA algorithm for which the decrease in the quality of clusters start sooner than others, but it keeps giving mediocre clusterings before completely failing to identify any useful structure out of the networks. The pattern of behavior is different for two modularity optimization algorithms, namely Louvain and CNM, as they tend to have a more smooth fall. However, the smoothness is both good and bad. Good, because in networks with a vague community structure, they continue to yield communities with some degree of quality. It is also bad, since the decrease in the quality of clusters, compared to our algorithm, starts sooner. In a nutshell, even though CNM and Louvain keep on yielding non-zero NMI on later stages and hit the ground slower than us, but they give sub-optimal solutions when our algorithm results in optimal communities. All in all, our algorithm keeps giving near-perfect results, while other results suffer from an amount of inaccuracy, rendering us superior in graphs with unclear community structure. Keep in mind that we are achieving better results in higher µ while giving perfect results on lower ones. Meaning that we are not sacrificing accuracy on the start of µ spectrum to attain higher accuracy in the end. Furthermore, even though other algorithms might experience sporadic decrease in NMI even before µ = 0.5, our algorithm stays firmly on top of the chart and yield near-perfect results in any case. Looking at the landing points – the point in which NMI reaches zero – of the algorithms can give us a great insight on the impact of the density of the networks on detection power of these algorithms. There is one group of algorithms, including LPA, BPA, DPA and Infomap, that lose their detection power as the density of the network increases. In other words, the landing point of these algorithms move to the left as the density grows. Interestingly, our algorithm along with Louvain behave differently. Meaning that as the density increases, we can detect communities in networks with a more ambiguous structure. The effect of density growth on Louvain is quite different as only its curvature decreases, meaning that not only it starts to fall on later stages, but also its quality decreases less in the early stages of its fall. The CNM algorithm behaves regardless of the density of the network, as it seems to only take into account the clarity of the community structure in all three networks. Now we take a look at each algorithm's performance in the three networks individually and compare it to ours. BPA and LPA generally follow the same path. They usually yield near- perfect results in the beginning and are the first algorithms to fall to zero. Both of these networks yields results with worse quality compared to ours, in all three of the networks. To be more specific, not only they reach zero sooner than us, but also they yields equal or lower NMI compared to us on networks that they show a reasonable performance. DPA's behavior seems to be a little more complicated as it shows a smooth fall in the first network ( ¯d = 20) and a sudden fall in the last one ( ¯d = 40). The smooth fall of DPA enables it to surpass our algorithm on very high µ after it goes below our algorithm during µ = 0.55 − 0.75. This does not hold for the other two networks, as DPA completely reaches zero before we even start to fall. The case is quite clear for the Infomap algorithm, as on all three networks, our algorithm outperforms it both in point-to-point comparison and in landing point. As we mentioned earlier, the Louvain plot has a smooth fall. Due to this characteristic of Louvain, we start to surpass it on early stages, as we yield near-perfect results and the Louvain suffers an amount of decrease in the quality of its retrieved communities. But Louvain catches us in the end in all three of the networks. We will further talk about the shortcoming of our algorithm on very high µs on all three of the networks. However, you should keep in mind that even though the Louvain keeps on giving a community strucutre, on average, the resemblance between the retrieved communities and the true ones, decrease very fast to around 0.2 in terms of NMI. This means that, although Louvain does not completely miss the essence of the community structure present in a network, but it also does not detect a big portion of it. The CNM algorithm behaves regardless of the density of networks and achieves lower NMI compared to all others. Finally, to find out the cause of our algorithm's failure in very high µs, we calculated the number of dissatisfied (remem- ber from section II.A where we discussed about dissatisfaction of nodes in a given clustering) nodes on all three of the networks for each µ. The results are shown in Fig.2(d). Since there were not any dissatisfied node when µ was below 0.5, we I M N I M N 1 0.8 0.6 0.4 0.2 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 µ CLPA LPA BPA DPA Infomap CNM Louvain I M N 1 0.8 0.6 0.4 0.2 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 µ CLPA LPA BPA DPA Infomap CNM Louvain (a) a class of networks with ¯d = 20 and dmax = 100 (b) a class of networks with ¯d = 30 and dmax = 150 1 0.8 0.6 0.4 0.2 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 µ CLPA LPA BPA DPA Infomap CNM louvian s e d o n d e fi s i t a s s i d 1000 800 600 400 200 0 0.5 0.6 0.8 0.9 0.7 µ 20-100 30-150 40-200 (c) a class of networks with ¯d = 40 and dmax = 200 (d) Dissatisfaction rate in the three networks in this figure. Fig. 2: (Color online) We have tested several algorithms on Lancichinetti et al. benchmarks[32], using different ¯d and dmax. As the figures suggest, our algorithm surpass others by a big margin as the density ( ¯d) increases. In addition, on the bottom-right figure, we have shown that the number of dissatisfied nodes increases dramatically as µ grows, meaning that without significantly changing the core of LPA, it is extremely difficult to detect communities in environments with very high µ. did not plot the corresponding data. As you can see, when µ reaches the end of its spectrum, the number of unhappy nodes increases exponentially. As a result, the ground truth clustering cannot be an equilibrium state for LPA or our algorithm. This means that without altering the essence of LPA, it will be extremely difficult to detect the planted partitions in networks in the end of µ range. Besides, it is extremely rare to see a µ this high in real-world networks any way. V. FURTHER WORKS & CONCLUSION We discussed how LPA has considerable potential to be employed in massive social networks. To name a few, its ability to be utilized in distributed environments, its intuitive approach to community detection in addition to great time and memory efficiency. We then outlined its major flaw, known as the flood-fill phenomenon. We mentioned how previous works have chosen two different paths to address this issue: • Changing the objective function of LPA. • Controlling the speed of growth for all communities. We then proposed an algorithm, choosing the second option, to control over-propagation of popular labels through choosing a small capacity and gradually increasing it over time. We then experimented our algorithm on several domains, namely sparse real-life networks, a dense real-life network and standard benchmarks with planted partitions. Our results showcased the strength of our algorithm in networks with unclear community structure, compared to existing robust algorithms. Since our method tackles the problem of flood-fills in a new way (as far as we know), it can be considered as a framework for others to propose a more efficient enhancement over our method to prevent flood-fills. Also, further research can be done in the area of finding other ways to prevent flood-fills starting from the very first iteration. Also an interesting area might be analyzing the properties of real-world networks in which LPA completely fails. Moreover, our method of preventing flood-fill can be easily incorporated with the majority of LPA extensions, such as BPA and DPA, since it does not change the essence of LPA by any means. ACKNOWLEDGMENT The authors would like to thank Dr.Subelj for kindly providing us with the codes of BPA and DPA algorithms. REFERENCES [1] V. Spirin and L. A. Mirny, "Protein complexes and functional modules in molecular networks," Proceedings of the National Academy of Sciences, vol. 100, no. 21, pp. 12 123–12 128, 2003. [2] M. J. Krawczyk, "Communities in social networks," in Biometrics and Kansei Engineering, 2009. ICBAKE 2009. International Conference on. IEEE, 2009, pp. 111–116. [3] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan, "Group formation in large social networks: membership, growth, and evolution," in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discov- ery and data mining. ACM, 2006, pp. 44–54. "SNAP Datasets: collection," Stanford dataset http://snap.stanford.edu/data, Jun. 2014. network large [23] L. C. Freeman, "A set of measures of centrality based on betweenness," Sociometry, pp. 35–41, 1977. [24] L. Subelj and M. Bajec, "Unfolding communities in large complex networks: Combining defensive and offensive label propagation for core extraction," Physical Review E, vol. 83, no. 3, p. 036103, 2011. [25] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Ma- honey, "Community structure in large networks: Natural cluster sizes and the absence of large well-defined clus- ters," Internet Mathematics, vol. 6, no. 1, pp. 29–123, 2009. [26] M. J. Barber and J. W. Clark, "Detecting network communities by propagating labels under constraints," Physical Review E, vol. 80, no. 2, p. 026129, 2009. [27] R. Zafarani and H. Liu, "Social computing data [Online]. Available: 2009. repository http://socialcomputing.asu.edu at ASU," [28] S. Kirkpatrick, M. Vecchi et al., "Optimization by sim- mulated annealing," science, vol. 220, no. 4598, pp. 671– 680, 1983. [29] G. Csardi and T. Nepusz, "The igraph software package for complex network research," InterJournal, vol. Complex Systems, p. 1695, 2006. [Online]. Available: http://igraph.org [30] A. F. McDaid, D. Greene, and N. Hurley, "Normalized mutual information to evaluate overlapping community finding algorithms," Oct. 2011. [Online]. Available: http://arxiv.org/abs/1110.2515 [31] L. Subelj and M. Bajec, "Robust network community detection using balanced propagation," The European Physical Journal B-Condensed Matter and Complex Sys- tems, vol. 81, no. 3, pp. 353–362, 2011. [32] A. Lancichinetti, S. Fortunato, and F. Radicchi, "Bench- mark graphs for testing community detection algorithms," Physical review E, vol. 78, no. 4, p. 046110, 2008. [4] S. Fortunato, "Community detection in graphs," Physics [22] J. Leskovec and A. Krevl, Reports, vol. 486, no. 3, pp. 75–174, 2010. [5] F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi, "Defining and identifying communities in net- works," Proceedings of the National Academy of Sciences of the United States of America, vol. 101, no. 9, pp. 2658– 2663, 2004. [6] M. E. Newman, "Modularity and community structure in networks," Proceedings of the National Academy of Sciences, vol. 103, no. 23, pp. 8577–8582, 2006. [7] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks," Journal of Statistical Mechanics: Theory and Experiment, vol. 2008, no. 10, p. P10008, 2008. [8] A. Clauset, M. E. Newman, and C. Moore, "Finding community structure in very large networks," Physical review E, vol. 70, no. 6, p. 066111, 2004. [9] J. Duch and A. Arenas, "Community detection in com- plex networks using extremal optimization," Physical review E, vol. 72, no. 2, p. 027104, 2005. connectivity graphs," Czechoslovak Mathematical Journal, vol. 23, no. 2, pp. 298–305, 1973. "Algebraic Fiedler, of [10] M. [11] A. Pothen, H. D. Simon, and K.-P. Liou, "Partitioning sparse matrices with eigenvectors of graphs," SIAM Jour- nal on Matrix Analysis and Applications, vol. 11, no. 3, pp. 430–452, 1990. [12] G. Karypis and V. Kumar, "A fast and high quality mul- tilevel scheme for partitioning irregular graphs," SIAM Journal on scientific Computing, vol. 20, no. 1, pp. 359– 392, 1998. [13] K. Lang and S. Rao, "A flow-based method for im- proving the expansion or conductance of graph cuts," in Integer Programming and Combinatorial Optimization. Springer, 2004, pp. 325–337. [14] J. Reichardt and S. Bornholdt, "Statistical mechanics of community detection," Physical Review E, vol. 74, no. 1, p. 016110, 2006. [15] B. J. Frey and D. Dueck, "Clustering by passing messages between data points," science, vol. 315, no. 5814, pp. 972–976, 2007. [16] J. Reichardt and S. Bornholdt, "Detecting fuzzy commu- nity structures in complex networks with a potts model," Physical Review Letters, vol. 93, no. 21, p. 218701, 2004. [17] W. Chen, Z. Liu, X. Sun, and Y. Wang, "A game-theoretic framework to identify overlapping communities in so- cial networks," Data Mining and Knowledge Discovery, vol. 21, no. 2, pp. 224–240, 2010. [18] S. Fortunato and M. Barth´elemy, "Resolution limit in community detection," Proceedings of the National Academy of Sciences, vol. 104, no. 1, pp. 36–41, 2007. [19] U. N. Raghavan, R. Albert, and S. Kumara, "Near linear time algorithm to detect community structures in large- scale networks," Physical Review E, vol. 76, no. 3, p. 036106, 2007. [20] I. X. Leung, P. Hui, P. Lio, and J. Crowcroft, "Towards real-time community detection in large networks," Phys- ical Review E, vol. 79, no. 6, p. 066107, 2009. [21] M. Rosvall and C. T. Bergstrom, "Maps of random walks on complex networks reveal community structure," Proceedings of the National Academy of Sciences, vol. 105, no. 4, pp. 1118–1123, 2008.
1712.08963
1
1712
2017-12-24T19:51:10
Towards Profit Maximization for Online Social Network Providers
[ "cs.SI", "cs.DS" ]
Online Social Networks (OSNs) attract billions of users to share information and communicate where viral marketing has emerged as a new way to promote the sales of products. An OSN provider is often hired by an advertiser to conduct viral marketing campaigns. The OSN provider generates revenue from the commission paid by the advertiser which is determined by the spread of its product information. Meanwhile, to propagate influence, the activities performed by users such as viewing video ads normally induce diffusion cost to the OSN provider. In this paper, we aim to find a seed set to optimize a new profit metric that combines the benefit of influence spread with the cost of influence propagation for the OSN provider. Under many diffusion models, our profit metric is the difference between two submodular functions which is challenging to optimize as it is neither submodular nor monotone. We design a general two-phase framework to select seeds for profit maximization and develop several bounds to measure the quality of the seed set constructed. Experimental results with real OSN datasets show that our approach can achieve high approximation guarantees and significantly outperform the baseline algorithms, including state-of-the-art influence maximization algorithms.
cs.SI
cs
Towards Profit Maximization for Online Social Network Providers Jing Tang Xueyan Tang School of Comp. Sci. & Eng. Nanyang Technological University Email: [email protected] School of Comp. Sci. & Eng. Nanyang Technological University Email: [email protected] Junsong Yuan School of EEE Nanyang Technological University Email: [email protected] 7 1 0 2 c e D 4 2 ] I S . s c [ 1 v 3 6 9 8 0 . 2 1 7 1 : v i X r a Abstract-Online Social Networks (OSNs) attract billions of users to share information and communicate where viral mar- keting has emerged as a new way to promote the sales of products. An OSN provider is often hired by an advertiser to conduct viral marketing campaigns. The OSN provider generates revenue from the commission paid by the advertiser which is determined by the spread of its product information. Meanwhile, to propagate influence, the activities performed by users such as viewing video ads normally induce diffusion cost to the OSN provider. In this paper, we aim to find a seed set to optimize a new profit metric that combines the benefit of influence spread with the cost of influence propagation for the OSN provider. Under many diffusion models, our profit metric is the difference between two submodular functions which is challenging to optimize as it is neither submodular nor monotone. We design a general two- phase framework to select seeds for profit maximization and develop several bounds to measure the quality of the seed set constructed. Experimental results with real OSN datasets show that our approach can achieve high approximation guarantees and significantly outperform the baseline algorithms, including state-of-the-art influence maximization algorithms. I. INTRODUCTION Information can be disseminated widely and rapidly through Online Social Networks (OSNs) (such as Facebook, Twitter, Flickr, Google+, and LinkedIn) with "word-of-mouth" effects. Viral marketing is a typical application that leverages OSNs as the medium for information diffusion [9]. The market of OSN advertisement is growing explosively. For example, Fortune [25] reports that the online and digital advertisement spending for the 2016 election of the United States will reach 1.2 billion US dollars in which 49% is expected to go to social media. Advertisers often delegate the operation of viral marketing campaigns to OSN providers who have the complete infor- mation of their social network structures [3]. Providing viral marketing services is a potential and promising approach that OSN providers can explore for monetization. When hiring an OSN provider to conduct the viral marketing campaign, the advertiser usually pays the OSN provider a commission for each user that adopts its product or shares its ads. Thus, the revenue of the OSN provider generated from the commission is determined by the spread of the product information. Meanwhile, to propagate influence, the activities performed by users such as viewing video ads normally induce diffusion cost to the OSN provider. For example, for a cloud-based OSN running viral video marketing [20], the OSN will be charged by the cloud for each video click due to the data traffic produced. Intuitively, the number of clicks for each video is dependent on the number of connections among users that are actually used during the viral marketing campaign. Therefore, to maximize its profit, the OSN provider needs to account for both the reward of influence spread and the expense of influence propagation, both of which are dependent on the seed users selected to initialize the viral marketing campaign. In this paper, we study the problem of finding a seed set to optimize such a new profit metric that combines the benefit of influence spread with the cost of influence propagation. Our profit metric is challenging to optimize as it is signifi- cantly different from the influence metric that has been studied widely [6], [7], [12], [14], [15], [17], [22], [23], [24], [27], [28], [30], [32], [33], [34]. It is well known that the influence spread generated by a seed set is submodular and monotone under many diffusion models [1], [15], [26], which makes it easy to design influence maximization algorithms with strong approximation guarantees [21]. Some recent studies have ad- dressed profit maximization from the advertiser's perspective by putting together the benefit of influence spread and the cost of seed selection [19], [29], [31], [35]. In these studies, the cost of seed selection is modeled by the incentives (e.g., free samples) provided to seed users. Since the seed selection cost is given by the sum of the costs of individual seeds which is modular, the resultant profit metric is still submodular. In contrast, in our problem, both the revenue and cost of the OSN provider are attached to the diffusion process. As a result, our profit metric can be viewed as the difference between two submodular functions, which is neither submodular nor monotone and is thus much more difficult to deal with. In this paper, we propose a general two-phase framework to optimize profit for the OSN provider. Our framework is comprised of a pruning phase that iteratively narrows down the search space and a search phase that uses heuristics to select seed nodes within the reduced search space. We theoretically establish the advantages of our pruning technique in improving the effectiveness and efficiency of any algorithm used in the search phase. We further derive several bounds on the maxi- mum achievable profit to evaluate the quality of the seed sets obtained by any algorithm. We conduct extensive experiments with several real OSN datasets. The results demonstrate the effectiveness and efficiency of our framework. The rest of this paper is organized as follows. Section II reviews the related work. Section III defines the profit maxi- mization problem for the OSN provider. Section IV elaborates the design of our two-phase framework. Section V develops the bounds for quality measurement. Section VI presents the experimental evaluation. Finally, Section VII concludes the paper. II. RELATED WORK Influence Maximization. Kempe et al. [15] formulated an influence maximization problem for a given seed set size with two basic diffusion models, namely the Independent Cascade (IC) and Linear Threshold (LT) models. They showed that the influence spreads under these models are submodular and monotone. Thus, they proposed a simple hill-climbing greedy algorithm to address the problem, which can provide a (1−1/e)-approximation guarantee [21]. The follow-up studies have mainly concentrated on improving the efficiency of the algorithm implementation for large-scale OSNs [6], [7], [12], [14], [17], [22], [23], [24], [27], [28], [30], [32], [33], [34]. Different from the above studies, we target at maximizing the profit that accounts for both the benefit of influence spread and the cost of influence propagation in viral marketing. Profit Maximization. Maximizing the influence spread alone has been shown to be ineffective for optimizing the profit return of viral marketing [29], [31]. This is because the number of seeds selected yields a tradeoff between the expense and reward of viral marketing. To avoid pre-setting the number of seeds to select, some recent work studied profit maximization from the advertiser's perspective [19], [29], [31], [35]. These studies considered the cost of seed selection which is modular and implies that their profit metric is still submodular. They investigated heuristics to select seeds under the assumption that the social network structures are available to the advertiser. In practice, only the OSN providers have the complete information of their social graphs and they often keep the formation secret for business and privacy reasons [3], [16]. Therefore, the OSN providers are able to run viral marketing campaigns more efficiently than the advertisers. Different from the above work, we formulate a new profit maximization problem from the OSN provider's perspective that takes into account the cost of information diffusion over the social network. As shall be shown later, our profit metric is the difference between two submodular functions, which is neither submodular nor monotone. Submodular Optimization. Iyer and Bilmes [13] inves- tigated optimizing the difference between two submodular functions. They showed that this problem is multiplicatively inapproximable unless P=NP and proposed several heuristic methods to address the problem. The greedy algorithm [15], [29] is another widely used heuristic for submodular optimiza- tion. We apply these heuristic methods to the search phase of our two-phase framework. More importantly, we develop an iterative pruning technique to reduce the search space which significantly improves these heuristics in terms of not only effectiveness but also efficiency. In addition, we also derive several upper bounds of the optimum to benchmark the output of any algorithm. III. PROBLEM FORMULATION A. Preliminaries Let G = (V, E) be a directed graph modeling an OSN, where the nodes V represent users and the edges E represent the connections among users (e.g., friendships on Facebook, followships on Twitter). For each directed edge (cid:104)u, v(cid:105) ∈ E, we refer to v as a neighbor of u, and refer to u as an inverse neighbor of v. There are many diffusion models for the processes by which influence propagates in social networks. The diffusion model is normally a random process that starts with a set of seed nodes S. Initially, the seed nodes S are activated, while all the other nodes are not activated. When a node u becomes activated, it would attempt to further activate its neighbors which are not yet activated. The diffusion process terminates when no more node can be further activated. Let g ∼ G be a sample outcome of influence propagation by the diffusion process and let Vg(S) be the set of nodes activated by the seed set S in the sample outcome g. The influence spread of the seed set S, denoted by σ(S), is the expected number of nodes activated over all possible sample outcomes of influence propagation, i.e., σ(S) = E[Vg(S)]. B. The Profit Maximization Problem As discussed, the influence spread is the benefit gained by the OSN provider and the cost of influence propagation is the price to pay for viral marketing. We assume that each node v in the social network is associated with a benefit weight b(v), which represents the benefit offered by activating v (e.g., the commission received from the advertiser). The benefit β(S) of influence spread generated by a seed set S is the total benefit brought by all the nodes activated: β(S) = E(cid:104) (cid:88) v∈Vg(S) b(v) . (1) (cid:105) (cid:105) To model the cost of influence propagation, we consider the diffusion process in the social network. Recall that when a node is activated, it attempts to further activate its neighbors through the connections to them in the social network. Without loss of generality, we assume that each node v is associated with a cost weight c(v), which represents the cost of infor- mation diffusion incurred by v in attempting to activate its neighbors when it becomes activated (e.g., pushing video ads). The cost γ(S) of influence propagation introduced by a seed set S is the total cost incurred by all the nodes activated: γ(S) = E(cid:104) (cid:88) v∈Vg(S) c(v) . (2) Then, we naturally define a profit metric from OSN provider's perspective as the benefit of influence spread less the cost of influence propagation, i.e., the profit φ(S) for running a viral marketing campaign with a seed set S is given by φ(S) = β(S) − γ(S), (3) Algorithm 1: IterativePrune 1 start with A0 ← ∅, B0 ← V and t = 0; 2 repeat 3 At+1 ← At ∪ {v : β(v Bt \ {v}) − γ(v At) > 0 and v ∈ Bt \ At}; Bt+1 ← Bt \ {v : β(v At) − γ(v Bt \ {v}) < 0 and v ∈ Bt \ At}; t ← t + 1; 5 6 until converged, i.e., At = At−1 and Bt = Bt−1; 7 return At and Bt as A∗ and B∗; 4 • Pruning phase (Algorithm 1): We develop an iterative pruning technique to cut the search space. • Search phase (Algorithms 2 and 3): We use some heuristics to find the solution in the reduced search space. A. Prune Search Space To simplify the notations, we define the marginal gain of adding a node v to a seed set S for metrics φ, β and γ as φ(v S) = φ(S ∪ {v}) − φ(S), β(v S) = β(S ∪ {v}) − β(S), γ(v S) = γ(S ∪ {v}) − γ(S). We start by proposing an iterative pruning approach that can dramatically reduce the search space from the power set of V to a smaller lattice for maximizing the profit function. Algorithm 1 shows the pseudo code of the pruning algorithm. Recall that by the submodularity of the benefit and cost metrics, their marginal gains for adding a new seed node decrease with the base seed set. Thus, the largest possible benefit (cost) gain is produced by adding a node into an empty seed set, whereas the smallest possible benefit (cost) gain is generated by adding the node into an almost universal set. Note that the marginal profit gain is bounded below by the smallest benefit gain less the largest cost gain. So, it is intuitive that if the latter is positive, the node must be selected in an optimal solution. Similarly, the marginal profit gain is bounded above by the largest benefit gain less the smallest cost gain. If the latter is negative, the node cannot be selected in an optimal solution. Algorithm 1 extends this idea in an iterative manner to reduce the search space. It is easy to verify that after each iteration, the newly generated lattice is a sublattice of that in the previous iteration, i.e., At ⊆ At+1 ⊆ Bt+1 ⊆ Bt. Furthermore, it can be proved that any seed set outside the resultant lattice [A∗, B∗] delimited by the node sets A∗ and B∗ returned by Algorithm 1 can be transformed to a seed set in [A∗, B∗] with higher profit. The formal proofs of all the theoretical results in this paper are given in the appendix. Theorem 1: For any node set S and t ≥ 0, let St = S ∩ Bt ∪ At, it holds that φ(St) ≤ φ(St+1), where the "=" holds if and only if St = St+1. the pruning technique can only Theorem 1 shows that increase the profit value of the seed set St = S ∩ Bt ∪ At at every iteration. The following corollary shows how our search space reduction improves the quality of any solution. Fig. 1. An example showing the non-monotonicity and non-submodularity of the profit function φ(·). Each node is associated with a benefit weight b and a cost weight c. Our goal is to find a seed set S to maximize the profit φ(S). By defining w(v) = b(v) − c(v), we can rewrite the profit metric in (3) as φ(S) = E(cid:104) (cid:88) v∈Vg(S) (cid:0)b(v) − c(v)(cid:1)(cid:105) (cid:44) E(cid:104) (cid:88) v∈Vg(S) (cid:105) w(v) . Here, w(v) represents the profit gain of activating a node v. If the benefit offered by v outweighs its cost, w(v) is positive. Otherwise, w(v) is negative. Therefore, we can normalize the benefit and cost weights of each node v by setting ¯b(v) = (cid:105) max{0, w(v)} and ¯c(v) = max{0,−w(v)}. Then, the benefit and cost metrics become ¯b(v) ¯β(S) = E(cid:104) (cid:88) ¯γ(S) = E(cid:104) (cid:88) (cid:105) and ¯c(v) , , v∈Vg(S) v∈Vg(S) It has been proved that respectively. We show later that this normalized form can make the pruning phase of our proposed framework more effective. the influence function σ(·) is submodular under many commonly used diffusion models due to Vg(S) ⊆ Vg(T ) for any S ⊆ T [15]. Similarly, it can be shown that the benefit and cost metrics defined above are both submodular under these diffusion models. That is, for any two seed sets S and T where S ⊆ T and any node v /∈ T , it holds that β(S ∪{v})− β(S) ≥ β(T ∪{v})− β(T ) and γ(S ∪ {v}) − γ(S) ≥ γ(T ∪ {v}) − γ(T ). Likewise, the normalized ¯β(·) and ¯γ(·) are also submodular. Although both the benefit and cost metrics are monotone and submodular, the profit metric is neither monotone nor submodular (an example is given in Fig. 1). Thus, the methods used for maximizing monotone submodular functions would perform poorly for our profit maximization problem as shall be shown in our experiments. In the following, we develop heuristic algorithms to address our profit maximization problem. Example 1: Fig. 1 gives an example to illustrate that the profit function φ(·) is neither monotone nor submodular. In this example, once a node is activated, it will activate all of its neighbors. It can be seen from the figure that φ(∅) = 0, φ({v1}) = −1.5, φ({v3}) = −1 and, φ({v1, v3}) = 0.5. Thus, φ(∅) > φ({v1}) and φ({v1}) < φ({v1, v3}), which indicates that φ(·) is non-monotone. In addition, we can also get that φ({v1}) − φ(∅) = −1.5 < φ({v1, v3}) − φ({v3}) = 1.5, which indicates that φ(·) is non-submodular. IV. TWO-PHASE FRAMEWORK We propose a general two-phase framework to select seed nodes for optimizing the profit. 11v1 v2 b=1.5,c=1v3 v4 11b=2,c=1b=3,c=1b=2,c=5Vg(fg)=fg, Á (fg)=0Vg(fv1g)=fv1,v2,v4g, Á (fv1g)=-1.5Vg(fv3g)=fv3,v4g, Á (fv3g)=-1Vg(fv1,v3g)=fv1,v2,v3,v4g, Á (fv1,v3g)=0.5 3 (v2) = −0.1824 < 0, φ+ A2 = {v3} and B2 = {v1, v2, v3}. At iteration 3, φ− 3 (v1) = −0.878 < 0, φ− 3 (v1) = 0.5904 > 0, and φ+ 3 (v2) = 1.286 > 0. Thus, both A3 and B3 remain the same as in the previous iteration. As a result, A∗ = {v3} and B∗ = {v1, v2, v3} are returned. For a seed set S = {v2, v4} /∈ [A∗, B∗], we have S1 = S ∩ B1 ∪ A1 = {v2, v3, v4} and S2 = S3 = S ∩ B∗ ∪ A∗ = {v2, v3}. Then, it can be obtained that φ(S) = −2 < φ(S1) = 0 < φ(S2) = 1.68, which demonstrates Theorem 1 and Corollary 1. Moreover, it is easy to verify that the optimal seed set S∗ = {v2, v3} belongs to [A∗, B∗], which confirms Corollary 2. Finally, it can be shown that normalizing the benefit and cost weights as described in Section III-B can only increase the amount of the search space cut by our pruning technique. Theorem 2: Let ¯A∗ and ¯B∗ be the node sets returned by Algorithm 1 under the normalized form. Then, A∗ ⊆ ⊆ B∗. ¯B∗ We shall experimentally evaluate the additional reduction in ⊆ ¯A∗ the search space due to normalization in Section VI. B. Heuristic Algorithms We now present some heuristic methods to address the profit maximization problem since there does not exist any polyno- mial time algorithm with any polynomial time multiplicative approximation guarantees unless P=NP [13]. Greedy Algorithm: We apply a simple hill-climbing idea to optimize the profit function (3). Algorithm 2 describes the pseudo code. In each iteration, the greedy heuristic adds a new node u to S that has the largest marginal profit gain φ(u S) until all the remaining nodes have negative marginal gains. Algorithm 2: Greedy 1 initialize S ← A∗; 2 while True do 3 4 5 find u ← arg maxv∈B∗\S {φ(v S)}; if φ(u S) ≤ 0 then return S; S ← S ∪ {u}; Modular-Modular Algorithm: Iyer and Bilmes [13] intro- duced a modular-modular (ModMod) algorithm for optimizing the difference between submodular functions. Since we just need to search the lattice [A∗, B∗] after pruning, we adapt the ModMod algorithm as shown in Algorithm 3. In line 4 of Al- gorithm 3, hπ X t(Y ; β) is a modular lower bound of β(Y ) that X t(Y ; β) ≤ β(Y ) for any Y ⊆ V and is tight at set X t, i.e., hπ X t(X t; β) = β(X t), while mX t(X t; γ) is a modular upper hπ bound of γ(Y ) that is also tight at X t, i.e., mX t(Y ; γ) ≥ γ(Y ) the for any Y ⊆ V and mX t(X t; γ) = γ(X t). Thus, X t(Y ; β) − mX t(Y ; γ) is a lower bound of the difference hπ profit function φ(Y ). The algorithm maximizes the lower bound in each iteration. Since the lower bound is tight at Y = X t, it is guaranteed that φ(X t+1) ≥ hπ X t(X t+1; β) − X t(X t; β) − mX t(X t; γ) = φ(X t). This mX t(X t+1; γ) ≥ hπ indicates that Algorithm 3 always increases the profit value at every iteration. Examples of the modular upper and lower bounds will be given in Section V-A. Fig. 2. An example of iterative pruning under the Independent Cascade diffusion model. Each node is associated with a benefit weight b and a cost weight c. Each edge has a propagation probability p. ∪ A∗). Corollary 1: For any node set S, if S /∈ [A∗, B∗], then φ(S) < φ(S ∩ B∗ By Corollary 1, the pruning approach can always improve the quality of any seed set S outside [A∗, B∗] by transforming it to the seed set S ∩ B∗ ∪ A∗ in [A∗, B∗]. Thus, the lattice [A∗, B∗] retains all the optimal seed sets. As a result, we can reduce the search space from the lattice [∅, V ] to [A∗, B∗]. Our pruning approach can be used prior to any seed selection algorithms to improve the solution quality. Corollary 2: For any seed set S∗ producing the maximum achievable profit, it holds that A∗ ⊆ S∗ ⊆ B∗. Example 2: Fig. 2 gives an example to illustrate how the pruning algorithm works as well as the above theorem and corollaries. This example assumes the Independent Cascade (IC) diffusion model. The IC model is a representative and most widely-studied diffusion model for influence propagation [6], [7], [14], [15], [17], [22], [23], [24], [27], [28], [30], [32], [33], [34]. In the IC model, a propagation probability pu,v is associated with each edge (cid:104)u, v(cid:105), representing the probability for v to be activated by u through their connection. In the diffusion process, when a node u first becomes activated, it has a chance to activate its neighbors who are not yet activated. Each such neighbor v would become activated with probability pu,v. This process repeats until no more node can be activated. For example, in Fig. 2, when {v1, v3} are selected as seeds, v2 would be activated with probability 0.3. Meanwhile, v4 would be activated by v1 with probability 0.4, by v2 with probability 0.3×0.2 = 0.06, and by v3 with probability 0.3. Thus, overall, v4 would be activated with probability 1 − (1 − 0.4) × (1 − 0.06) × (1 − 0.3) = 0.6052. To conduct iterative pruning, A0 is initialized by ∅ and B0 is initialized by {v1, v2, v3, v4} respectively. To simplify the notations, let φ− t (v) = β(v Bt \ {v}) − γ(v At) (cid:0)1 × c(v1) + 0.3 × and φ+ t (v) = β(v At) − γ(v Bt \ {v}) describe the c(v2) + (1− (1− 0.4)× (1− 0.3× 0.2))× c(v4)(cid:1) = 1.5− (1 + calculations in Algorithm 1. At iteration 1, φ− 1 (v1) = β(v1 {v2, v3, v4}) − γ(v1 ∅) = 1 × b(v1) − 0.3 + 2.18) = 1.5 − 3.48 = −1.98 < 0. Similarly, φ− 1 (v2) = − 1 (v3) = 0.5 > 0, φ− −0.6 < 0, φ 1 (v4) = −4.328 < 0, φ+ 1 (v1) = 1.972 > 0, φ+ 1 (v3) = 2.6 > 0, and φ+ 1 (v4) = 0.32 > 0. Thus, v3 is added to A1 so that A1 = {v3} and B1 = {v1, v2, v3, v4}. At iteration 2, φ− 2 (v1) = −1.326 < 0, φ− 2 (v4) = −2.828 < 0, φ+ 2 (v2) = 1.58 > 0, and 2 (v4) = −0.28 < 0. Thus, v4 is removed from B2 so that φ+ 2 (v2) = −0.3 < 0, φ− 2 (v1) = 1.7104 > 0, φ+ 1 (v2) = 1.7 > 0, φ+ 0.30.3v1 v2 b=1.5,c=1v3 v4 0.40.2b=2,c=1b=3,c=1b=2,c=5PruneInitialization: A0=fg, B0=fv1,v2,v3,v4gIteration 1: A1=fv3g, B1=fv1,v2,v3,v4gIteration 2: A2=fv3g, B2=fv1,v2,v3gIteration 3: A3=fv3g, B3=fv1,v2,v3gConverged, return A*=A3, B*=B3 Algorithm 3: Modular-Modular (ModMod) 1 initialize X 0 ← A∗ and t ← 0; 2 repeat 3 choose the permutations of A∗, X t \ A∗, B∗ \ X t and concatenate them as π; Xt (Y ; β) − mXt (Y ; γ); X t+1 ← arg maxA∗⊆Y ⊆B∗ hπ 4 t ← t + 1; 5 6 until converged, i.e., X t = X t−1; 7 return X t; profit for the problem instance to characterize the gap between the real profit value φ(So) and the maximum achievable profit. Note that both φ(So) and µ are to be estimated by sampling. Let φ(So) and µ be their estimated values. We further study the sampling errors to bound the difference between φ(So) and φ(So) and the difference between µ and µ. In this way, we can obtain an approximation guarantee of So using the estimated values φ(So) and µ. A. Upper Bound of Maximum Achievable Profit C. Discussions Time Complexity: Evaluating the profit metric involves estimating the influence spread given a seed set. Any existing influence estimation methods, such as Monte-Carlo simulation [15], [17], [24] and reverse influence sampling [2], [22], [23], [32], [33], can be used. Suppose the time complexity for computing the marginal profit gain of adding/removing a node into/from a seed set is O(M ). For the iterative pruning process (Algorithm 1), the size of the node set Bt\At to check reduces by at least 1 in each iteration. Therefore, it takes at most A∗ and B∗. After the reduction of the search space, there are k1 = B∗ nodes to be further examined. For the Greedy algorithm, it checks k1− i + 1 nodes in the ith iteration. Thus, it takes at most O(k2 1M ) time, which means the total time O(cid:0)(V + V − 1 + ··· + 1)M(cid:1) = O(V 2M ) time to find complexity of the Greedy algorithm is O(cid:0)(V 2+k2 1)M(cid:1). Each of the ModMod algorithm is O(cid:0)(V 2 + k1k2)M(cid:1). iteration of the ModMod algorithm has a time complexity of O(k1M ). Let k2 denote the total number of iterations used for the ModMod algorithm. Then, the total time complexity Diffusion Models: Our analysis and algorithms are general frameworks that can be adapted to any diffusion models which are submodular, such as the Independent Cascade and Linear Threshold models, the triggering model [15], the continuous- time models [5], [10], and the topic-aware models [1], [4]. \ A∗ V. PERFORMANCE ANALYSIS The challenges to evaluate the quality of the seed set constructed for the profit maximization problem are two- fold. First, optimizing the difference between two submodular functions is multiplicative inapproximability unless P=NP. Thus, it is difficult to measure the gap between the seed set obtained and an optimal seed set. Second, the random pro- cesses of many diffusion models are analytically intractable. For example, computing the exact influence spread under the IC diffusion model is #P-hard [6]. Thus, the benefit brought and the cost incurred by a seed set can only be estimated via some sampling approaches [15], [2]. As a result, the sampling error also affects the quality measurement of the seed set. We propose techniques to analyze the aforementioned gap and sampling error, which enable us to evaluate the approxi- mation guarantee of the seed set obtained by any algorithm on any given instance of the profit maximization problem. Specifi- cally, let So be the seed set constructed for a problem instance. We develop an upper bound µ on the maximum achievable To derive our bounds on the maximum achievable profit, we first introduce two modular bounds for submodular functions. Modular Upper Bounds: For any submodular set function f (·), we have the following two modular upper bounds m1 and m2 X that are tight at a given set X [13]: X m1 m2 X (Y ) (cid:44) f (X) − X (Y ) (cid:44) f (X) − f (v V \ {v}) + f (v X \ {v}) + (cid:88) (cid:88) v∈X\Y v∈X\Y (cid:88) (cid:88) v∈Y \X v∈Y \X f (v X), (4) (5) f (v ∅). m4 m3 v∈X\Y v∈X\Y v∈Y \X \ {v}) + (cid:88) (cid:88) X (Y ) (cid:44) f (X) − X (Y ) (cid:44) f (X) − f (v B∗ f (v X \ {v}) + In the previous section, we have reduced the search space so that only the sets belonging to [A∗, B∗] need to be considered ⊆ X, Y ⊆ B∗, for profit maximization. As a result, for any A∗ (cid:88) the above two upper bounds can be improved to: (cid:88) f (v X), (6) f (v A∗). (7) X (Y ) remain It is easy to show that the bounds m3 X (X) = f (X), and they are tight at X, i.e., m3 tighter than m1 X (Y ) and m2 X (Y ) ≥ X (Y ) ≥ f (Y ) and m2 X (Y ) ≥ f (Y ) for any m3 A∗ ⊆ Y ⊆ B∗. Modular Lower Bounds: For any submodular set function f (·), a modular lower bound hX that is tight at a given set X can be obtained as follows [11]. Let π be any permutation of V that places all the nodes in X before the nodes in V \ X. Let Sπ i = {π(1), π(2),··· , π(i)} be a chain formed by the permutation, where Sπ X (Y ) at other sets, i.e., m1 X (Y ) ≥ m4 X (Y ) and m4 X (X) = m4 0 = ∅ and SπX = X. Define v∈Y \X i−1). i ) − f (Sπ hπ X (π(i)) = f (Sπ (8) Then, hπ X (v) is a lower bound of f (Y ), v∈Y hπ which is tight at X, i.e., hπ X (Y ) ≤ f (Y ) for any Y ⊆ V and hπ X (X) = f (X). After the search space is reduced to [A∗, B∗], we restrict π to any permutation of V in the order of A∗, X \ A∗ and B∗ Upper Bounds on Maximum Achievable Profit: Based on the above bounds, we can derive two series of upper bounds on the maximum value of the profit function φ(·) as follows. For any set X where A∗ µi(X) (cid:44) max ⊆ X ⊆ B∗, we define \ X. X (Y ; γ), (9) A∗⊆Y ⊆B∗mi X (Y ; β) − hπ X (Y ) = (cid:80) where mi on the benefit function β and hπ X (Y ; β) (i = 3, 4) denotes the modular upper bound X (Y ; γ) denotes the modular lower bound on the cost function γ respectively. For briefness, we shall use µ(X) to refer to either bound with i = 3 or 4 in the rest of the paper. Theorem 3: For any set X where A∗ ⊆ X ⊆ B∗, µ(X) ≥ max S⊆V φ(S). (10) X (Y ; β) and hπ The upper bounds established above can be computed very fast since mi X (Y ; γ) are both modular functions with respect to Y . It is much easier to find the maximum value for a modular function than that for a submodular function. We can obtain upper bounds by arbitrarily choosing the set X in µ(X). Given a seed set solution So obtained by any algorithm, we simply choose X = So. Then, the approximation guarantee of So can be estimated by φ(So)/µ(So). B. Sampling Error Definition 1 (RR Set To estimate φ(So) and µ(So), we make use of a state-of- the-art technique called reverse influence sampling [2], [22]. for Weighted Graph): A random reverse reachable (RR) set R for a weighted graph G is generated by (1) first selecting a random node v ∈ V with a probability distribution p(·) proportional to the node weights, (2) then sampling a graph g randomly from G according to the diffusion model, (3) finally taking the set of nodes in g that can reach v as R. b(v)/Υb, where Υb = b(V ) =(cid:80) Taking our benefit metric as an example, the probability for choosing a node v in a random RR set is given by p(v) = v∈V b(v) is the total benefit weight of all nodes. For a seed set S, the relation between its benefit and a random RR set R is β(S) = Υb · Pr[S ∩ R (cid:54)= ∅], where Pr[S ∩ R (cid:54)= ∅] is the probability that R contains at least one node in S [22]. Similarly, we can estimate the diffusion cost γ(S) by choosing each node in a random RR set with a probability proportional to the cost of the node, i.e., v∈V c(v) is the total cost weight of all nodes. Therefore, we generate two groups of RR sets to estimate the benefit and cost respectively for a seed set. p(v) = c(v)/Υc, where Υc = c(V ) =(cid:80) Suppose that we generate a total of θβ random RR sets to estimate the benefit brought by a seed set S. An RR set is said to be covered by S if it contains at least one node in S. Let Λβ(S) denote the number of RR sets covered by S among the θβ random RR sets. Then, the benefit brought by S can be estimated as Λβ(S)· Υb/θβ. To analyze the sampling error, we make use of the Chernoff-Hoeffding Theorem [8]. Theorem [8]): Let Z1, Z2, . . . , Zθ denote random variables that are independently and identically distributed according to Z in the interval [0, 1] with mean E[Z]. For any fixed θ > 0 and ε > 0, (Chernoff-Hoeffding Lemma 1 (cid:35) (cid:18) (cid:19) (cid:34) θ(cid:88) (cid:34) θ(cid:88) i=1 i=1 Pr Pr Zi − θ · E[Z] ≥ ε Zi − θ · E[Z] ≤ −ε ≤ exp (cid:35) − (cid:18) ≤ exp ε2 4(e − 2)θE[Z] − 4(e − 2)θE[Z] ε2 , (cid:19) . Based on Lemma 1, we can establish the following relation Theorem 4: For θβ random RR sets that are independent of between Λβ(S) and the real benefit β(S). (cid:34) S and any δ ∈ (0, 1), we have (cid:34) (cid:19)2 Λβ(S) + 0.25a − 0.5√a (cid:19)2 Λβ(S) + 0.25a + 0.5√a (cid:18)(cid:113) (cid:18)(cid:113) β(S) ≥ Pr Pr β(S) ≤ (cid:35) (cid:35) Υb θβ Υb θβ · · ≥ 1 − ≥ 1 − δ 2 δ 2 , , where a = 4(e − 2) ln(2/δ). According to Theorem 4, given Λβ(S), we can define a lower bound and an upper bound of β(S) with a probability at least 1 − δ/2 as βl(S) (cid:44)(cid:16)(cid:112)Λβ(S) + 0.25a − 0.5√a (cid:17)2 βu(S) (cid:44)(cid:16)(cid:112)Λβ(S) + 0.25a + 0.5√a (cid:17)2 · Υb/θβ, · Υb/θβ. (11) ∨ The above analysis can also be applied to the estimation of the cost. Let θγ denote the number of random RR sets generated to estimate the cost incurred by a seed set S. Let Λγ(S) denote the number of RR sets covered by S among the θγ random RR sets. Then, the cost incurred by S can be estimated as Λγ(S) · Υc/θγ. We can similarly define a lower bound γl(S) and an upper bound γu(S) on the real cost γ(S) with a probability at least 1 − δ/2. Then, given a seed set solution So obtained by any algorithm, we can derive a lower bound βl(So) − γu(So) on its real profit φ(So) such ∧ that Pr[φ(So) ≥ βl(So)− γu(So)] ≥ Pr(cid:2)(cid:0)β(So) ≥ βl(So)(cid:1) (cid:0)γ(So) ≤ γu(So)(cid:1)(cid:3) = 1− Pr(cid:2)(cid:0)β(So) < βl(So)(cid:1) (cid:0)γ(So) > γu(So)(cid:1)(cid:3) ≥ 1 − (δ/2 + δ/2) > 1 − δ. The difficulty in analyzing the sampling error for the upper bound µ(So) of the maximum achievable profit lies in that we can never find a specific seed set to achieve the upper bound. From Theorem 4, we know that the profit of any seed set S is bounded above by βu(S) − γl(S) with a high probability. By definition, βu(S) − γl(S) is a function of Λβ(S) and Λγ(S). Let φ(S) be the estimated profit of S on the RR sets generated, which is defined by φ(S) = Λβ(S) · Υb/θβ − Λγ(S) · Υc/θγ. Then, βu(S) − γl(S) can be represented as a function η of Λβ(S) and φ(S), i.e., η(cid:0)Λβ(S), φ(S)(cid:1). We can prove that η(cid:0)Λβ(S), φ(S)(cid:1) is increasing with both Λβ(S) and φ(S). Naturally, Λβ(S) is bounded above by θβ. On the other hand, thanks to the submodularity of the set coverage used to estimate the benefit and cost metrics in the reverse influence sampling approach, we can easily get the estimated upper bound µ(So) on the maximum achievable profit from the RR sets generated according to the analysis in Section V-A. As a result, for any seed set S, the upper bound η(cid:0)Λβ(S), φ(S)(cid:1) of its profit is bounded above by η(cid:0)θβ, µ(So)(cid:1). In this way, we can obtain the sampling error for the upper bound µ(So). (cid:20) Theorem 5: For any δ ∈ (0, 1), we have φ(S) ≤ µ(So) + ε(cid:0)µ(So)(cid:1)(cid:21) Pr max S⊆V ≥ 1 − δ, (12) where ε(cid:0)µ(So)(cid:1) is the sampling error that ε(cid:0)µ(So)(cid:1) = ργ (cid:114) (cid:16)(cid:0)ρβθβ − µ(So)(cid:1)/ργ + 0.25a (cid:17) (cid:112)a(θβ + 0.25a), and ρβ = Υb/θβ and for µ(So) such + a By Theorems 4 and 5, we have the approximation guarantee 0.5a(ρβ − ργ) + ρβ ργ = Υc/θγ. that φ(So) maxS⊆V φ(S) ≥ µ(So) + ε(cid:0)µ(So)(cid:1) βl(So) − γu(So) (13) with a probability at least 1 − 2δ. C. Reduce Sampling Error via Normalization ples conducted by the weights (cid:80) As discussed in Section III-B, we can normalize the benefit and cost weights by ¯b(v) and ¯c(v) for every node v ∈ V . the normalization can avoid unnecessary sam- Intuitively, v∈V min{b(v), c(v)} for the estimations of both the benefit and cost. Therefore, the normalization can reduce the sampling error by increasing the number of useful samples. Theorem 6: For any seed set S and a fixed number of samples, let εφ be the sampling error limit that can provide a probability guarantee of 1− δ, i.e., Pr[−εφ ≤ φ(S)− φ(S) ≤ εφ] ≥ 1 − δ, and let ¯εφ be the sampling error limit under the normalized form. We have ¯εφ ≤ εφ. Theorem 6 indicates that the normalization can improve the solution quality which shall be demonstrated in the experi- ments. VI. EVALUATION A. Experimental Setup Datasets. We use several real social networks available at [18] to evaluate our proposed techniques. Due to space limitations, we report here the results for two representative datasets, Google+ (108K nodes, 14M edges), and LiveJournal (5M nodes, 69M edges). Algorithms. Recall that the ModMod algorithm needs a modular lower bound of the benefit function β(·) and a modular upper bound of the cost function γ(·). In Section V-A, we have presented one such lower bound and two such upper bounds. We use ModMod-1 to refer to that using the upper X (Y ) defined in Eq. (6) and use ModMod-2 to refer bound m3 to that using the upper bound m4 X (Y ) defined in Eq. (7). We compare our two-phase methods with the following baselines. • Random: It randomly selects k nodes. We run the algo- rithm 10 times and take their average as the expected profit. • HighDegree: It selects k nodes with the highest degrees. • BenefitMax: It makes use of the reverse influence sam- pling technique to find the top-k influential nodes for influence/benefit maximization [2], [22], [23], [32], [33]. The above baselines are executed on the entire social networks without applying any pruning technique. To explore different V 2i for seed numbers, in each baseline, we iterate through k = i = 0, 1, . . . , 10 (where V is the network size) and choose the k value producing the largest profit. Parameter Settings. By default, we use the IC diffusion model (as described in Example 2 of Section IV-A), a uniform benefit distribution (where every node has a unit benefit to model the commission paid by the advertiser for each user activated), and a degree-proportional cost distribution (where the cost of each node is set proportional to its out-degree to emulate the diffusion cost for each activated user to push the product advertisement to all of his neighbors). In the IC model, we set the propagation probability pu,v of each edge (cid:104)u, v(cid:105) to the reciprocal of v's in-degree (the number of v's inverse neighbors) as widely adopted by other studies [6], [14], [22], [23], [32], [33]. By default, we normalize the benefit and cost weights as described in Section III-B. We use a scale factor r to control the ratio between the total cost and total benefit of all nodes. A higher r implies a higher cost of influence propagation relative to the benefit of influence spread. The default value of r is set to 1. We have tested a wide range of r values and observed similar performance trends. In executing our two- phase methods and the baseline BenefitMax algorithm, we vary the number of RR sets generated to study the impact of benefit and cost estimations. To evaluate the profits of the seed sets returned by different algorithms, we generate a group of validation RR sets to keep the estimation errors within 1% with a high probability at least 1 − 10−6 according to Theorem 4. B. Profits Produced by Different Algorithms Fig. 3 shows the profits produced by different algorithms. Comparing the seed selection algorithms, our heuristic algo- rithms are more effective in optimizing the profit than the three baseline algorithms (Random, HighDegree and BenefitMax) on the datasets tested. This suggests that improving the influ- ence spread or benefit alone is not effective for maximizing the profit. Our three heuristic algorithms perform quite close in terms of the profit produced. It can also be seen that with increasing number of RR sets generated for profit estimation in the seed selection process, the solution quality of our heuristics is improved due to lower estimation errors. C. Running Times of Different Algorithms Fig. 4 shows the running times of different algorithms. The algorithms are all implemented in C++ and the experiments are carried out on a machine with an Intel Xeon E5-1650 3.2GHz CPU and 16GB memory. The time spent for generating RR sets is common to all our heuristics as well as BenefitMax. We plot it as a separate curve and exclude it from the running times of all the algorithms in Fig. 4. It can be seen that generating the RR sets takes significant time. The Random and HighDegree algorithms do not need benefit and cost estimations. Thus, their running times are independent of the number of RR sets. The other four methods have running times increasing almost linearly with the number of RR sets (note that both axes are in logscale). In most cases, our heuristic methods complete execution within 100 seconds even for the LiveJournal dataset with millions of nodes. This shows the efficiency of our two- phase algorithms. (a) Google+ (b) LiveJournal (a) Google+ (b) LiveJournal Fig. 3. Profits produced by different algorithms. Fig. 4. Running times of different algorithms. (a) Google+ (b) LiveJournal (c) Google+ (d) LiveJournal Fig. 5. Impact of iterative pruning technique (algorithms with prefix "O-" do not use pruning technique). TABLE I A∗ SEARCH SPACE REDUCTION. V B∗ 108K 80.6K 82.4K 5M 2.5M 3.3M Dataset Google+ LiveJournal B∗ \ A∗ Reduction 98.3% 83.7% 1.8K 0.8M APPROXIMATION GUARANTEE OF SEED SETS OBTAINED. TABLE II Dataset Google+ LiveJournal Greedy ModMod-1 ModMod-2 98.7% 72.9% 98.8% 75.8% 98.6% 74.3% (a) With Normalization Dataset Google+ LiveJournal A∗ V B∗ 108K 62.2K 97.1K 5M 1.3M 4.3M B∗ \ A∗ Reduction 34.9K 67.6% 3.0M 38.3% (b) Without Normalization D. Iterative Pruning Technique Table I shows the amount of search space reduction by the iterative pruning technique proposed in Section IV-A. These results are for the experiments with 210 × 10, 000 RR sets generated. As can be seen, the pruning technique substantially reduces the number of nodes that need to be considered for seed selection. Specifically, the search space is reduced by 98.3% and 83.7% of the original network size for the Google+ and LiveJournal datasets respectively when the normalization is applied. On the other hand, the reduction is much less when the normalization is not applied (67.6% and 38.3% for the Google+ and LiveJournal datasets respectively). This observation confirms Theorem 2. Fig. 5 shows the impact of the search space reduction on the profit produced and the running time of our heuristics, where O-X refers to heuristic X without the search space reduction. As claimed in Corollary 1, the pruning technique can help improve all the heuristic algorithms in terms of the profit produced. This is confirmed by the experimental results. For the LiveJournal dataset (Fig. 5(b)), the Greedy algorithm even produces negative profit without pruning the search space first, and the pruning technique can bring improvements up to 24.1% and 14.3% for the ModMod-1 and ModMod-2 algorithms respectively. Furthermore, the pruning technique can also help reduce the running time considerably. By pruning the search space first, our heuristic algorithms can run up to 3 orders faster. These observations demonstrate the effectiveness of our pruning technique. E. Guarantee of Solution Quality We evaluate the quality of the seed sets returned by different algorithms using the techniques presented in Section V. In our evaluation, we always choose the tighter bound between µ3(X) and µ4(X) as defined in (9). We set δ = 10−6 so that the approximation guarantees obtained by (13) have high confidence. Table II shows the approximation guarantees derived for the seed sets constructed with 210 × 10, 000 RR sets generated. As can be seen, the seed sets constructed by our algorithms have approximation guarantees above 98% and 70% for the Google+ and LiveJournal datasets respectively. This implies that (i) our proposed upper bounds on the maximum achievable profit are quite tight, and (ii) the heuristic algorithms perform rather close to the optimal. F. Normalization In Section VI-D, we have shown that the normalization can increase the amount of search space reduction by the pruning technique. Now, we further evaluate the impact of normalization on the profit. Fig. 6 shows the profit produced by RandomHighDegreeBenefitMaxGreedyModMod-1ModMod-2GenSample20212223242526272829210No.ofRRsetsamples(×10,000)-101234567Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e620212223242526272829210No.ofRRsetsamples(×10,000)10−310−210−1100101102Runningtime(seconds)20212223242526272829210No.ofRRsetsamples(×10,000)10−1100101102103104Runningtime(seconds)O-GreedyO-ModMod-1O-ModMod-2GreedyModMod-1ModMod-2GenSample20212223242526272829210No.ofRRsetsamples(×10,000)01234567Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e620212223242526272829210No.ofRRsetsamples(×10,000)10−310−210−1100101102Runningtime(seconds)20212223242526272829210No.ofRRsetsamples(×10,000)10−1100101102103104105Runningtime(seconds) [9] P. Domingos and M. Richardson, "Mining the network value of cus- tomers," in Proc. ACM KDD, 2001, pp. 57–66. [10] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha, "Scalable influence estimation in continuous-time diffusion networks," in Proc. NIPS, 2013, pp. 3147–3155. [11] S. Fujishige, Submodular Functions and Optimization. Elsevier Sci- ence, 2005, vol. 58. [12] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan, "A data-based approach to social influence maximization," Proc. VLDB Endowment, vol. 5, no. 1, pp. 73–84, 2011. [13] R. Iyer and J. Bilmes, "Algorithms for approximate minimization of the difference between submodular functions, with applications," in Proc. UAI, 2012, pp. 407–417. [14] K. Jung, W. Heo, and W. Chen, "IRIE: Scalable and robust influence maximization in social networks," in Proc. IEEE ICDM, 2012, pp. 918– 923. [15] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of influence through a social network," in Proc. ACM KDD, 2003, pp. 137–146. [16] A. Khan, B. Zehnder, and D. Kossmann, "Revenue maximization by viral marketing: A social network host's perspective," in Proc. IEEE ICDE, 2016. [17] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, "Cost-effective outbreak detection in networks," in Proc. ACM KDD, 2007, pp. 420–429. [18] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap.stanford.edu/data, 2014. [19] W. Lu and L. V. Lakshmanan, "Profit maximization over social net- works," in Proc. IEEE ICDM, 2012, pp. 479–488. [20] A. Meyer, "Viral video marketing: What's, why's & how's of going vi- ral," http://www.marketergizmo.com/viral-video-marketing-cats-babies- and-your-company/, 2015. [21] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of ap- proximations for maximizing submodular set functions-I," Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978. [22] H. T. Nguyen, T. N. Dinh, and M. T. Thai, "Cost-aware targeted viral marketing in billion-scale networks," in Proc. IEEE INFOCOM, 2016. [23] H. T. Nguyen, M. T. Thai, and T. N. Dinh, "Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks," in Proc. ACM SIGMOD, 2016, pp. 695–710. [24] N. Ohsaka, T. Akiba, Y. Yoshida, and K. Kawarabayashi, "Fast and accurate influence maximization on large networks with pruned monte- carlo simulations," in Proc. AAAI, 2014, pp. 138–144. [25] J. J. Roberts, "Facebook and Google are big winners as political ad money moves online," Fortune, 2016. [26] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Uncovering the temporal dynamics of diffusion networks," in Proc. ICML, 2011, pp. 561–568. [27] G. Song, X. Zhou, Y. Wang, and K. Xie, "Influence maximization on large-scale mobile social network: A divide-and-conquer method," IEEE Trans. Parallel and Distributed Systems, vol. 26, no. 5, pp. 1379–1392, 2015. [28] J. Tang, X. Tang, X. Xiao, and J. Yuan, "Online processing algorithms for influence maximization," in Proc. ACM SIGMOD, 2018. [29] J. Tang, X. Tang, and J. Yuan, "Profit maximization for viral marketing in online social networks," in Proc. IEEE ICNP, 2016, pp. 1–10. [30] J. Tang, X. Tang, and J. Yuan, "Influence maximization meets effi- ciency and effectiveness: A hop-based approach," in Proc. IEEE/ACM ASONAM, 2017, pp. 64–71. [31] J. Tang, X. Tang, and J. Yuan, "Profit maximization for viral marketing in online social networks: Algorithms and analysis," IEEE Transactions on Knowledge and Data Engineering, 2018. [32] Y. Tang, Y. Shi, and X. Xiao, "Influence maximization in near-linear time: A martingale approach," in Proc. ACM SIGMOD, 2015, pp. 1539– 1554. [33] Y. Tang, X. Xiao, and Y. Shi, "Influence maximization: Near-optimal time complexity meets practical efficiency," in Proc. ACM SIGMOD, 2014, pp. 75–86. [34] C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo, "UBLF: An upper bound based approach to discover influential nodes in social networks," in Proc. IEEE ICDM, 2013, pp. 907–916. [35] Y. Zhu, Z. Lu, Y. Bi, W. Wu, Y. Jiang, and D. Li, "Influence and profit: Two sides of the coin," in Proc. IEEE ICDM, 2013, pp. 1301–1306. (a) Google+ (b) LiveJournal Fig. 6. pruning technique and with postfix "-w/o" are without normalization). Impact of normalization (algorithms with prefix "O-" do not use the Greedy algorithm with and without the normalization. The results for the ModMod algorithms are similar. As can be seen, no matter whether the pruning technique is used, the Greedy algorithm with normalization can always produce higher profit than that without normalization. This confirms Theorem 6 that the normalization can reduce the sampling error limit and thus, it can further improve the solution quality. VII. CONCLUSION In this paper, we have studied a profit maximization problem for OSN providers conducting viral marketing. The objective is to select initial seed nodes to maximize the total profit that accounts for both the benefit of influence spread and the cost of influence propagation. We have proposed a two- phase framework that first reduces the search space via an iterative pruning technique and then finds the solution via some heuristic algorithms. We have presented several bounds to measure the quality of the solution obtained by any algorithm. Experimental results with real OSN datasets demonstrate the effectiveness and efficiency of our techniques, and show the tightness of our derived upper bounds. ACKNOWLEDGMENT This research is supported by Singapore Ministry of Edu- cation Academic Research Fund Tier 1 under Grant 2017-T1- 002-024 and Tier 2 under Grant MOE2015-T2-2-114. REFERENCES [1] N. Barbieri, F. Bonchi, and G. Manco, "Topic-aware social influence propagation models," in Proc. IEEE ICDM, 2012, pp. 81–90. [2] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, "Maximizing social influence in nearly optimal time," in Proc. SODA, 2014, pp. 946–957. [3] P. Chalermsook, A. Das Sarma, A. Lall, and D. Nanongkai, "Social network monetization via sponsored viral marketing," in Proc. ACM SIGMETRICS, 2015, pp. 259–270. [4] S. Chen, J. Fan, G. Li, J. Feng, K.-L. Tan, and J. Tang, "Online topic- aware influence maximization," Proc. VLDB Endowment, vol. 8, no. 6, pp. 666–677, 2015. [5] W. Chen, W. Lu, and N. Zhang, "Time-critical influence maximization in social networks with time-delayed diffusion process," in Proc. AAAI, 2012, pp. 592–598. [6] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks," in Proc. ACM KDD, 2010, pp. 1029–1038. [7] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in Proc. ACM KDD, 2009, pp. 199–208. [8] P. Dagum, R. Karp, M. Luby, and S. Ross, "An optimal algorithm for monte carlo estimation," SIAM Journal on Computing, vol. 29, no. 5, pp. 1484–1496, 2000. O-Greedy-w/oO-GreedyGreedy-w/oGreedy20212223242526272829210No.ofRRsetsamples(×10,000)-10123456Profit1e420212223242526272829210No.ofRRsetsamples(×10,000)-0.50.00.51.01.52.0Profit1e6 APPENDIX Lemma 2: At ⊆ At+1 ⊆ Bt+1 ⊆ Bt for any t ≥ 0. Proof of Lemma 2: By the definitions in lines 3 and 4 of Algorithm 1, At gradually expands over iterations and Bt gradually shrinks, i.e., At ⊆ At+1 and Bt+1 ⊆ Bt. What is left is to show that At is always a subset of Bt. We prove it by induction. Obviously, A0 = ∅ ⊆ V = B0. Suppose that At ⊆ Bt holds for some t ≥ 0. Then, we can easily get that At ⊆ Bt+1 by the definition in line 4 of Algorithm 1 and that At+1 ⊆ Bt by the definition in line 3 of Algorithm 1. On the other hand, for any node v ∈ Bt \ At, it is obvious that At ⊆ Bt\{v}. Thus, for any node v ∈ At+1\At ⊆ Bt\At, we have β(v At)− γ(v Bt\{v}) ≥ β(v Bt\{v})− γ(v At) > 0, where the first inequality is due to the submodularity of β(·) and γ(·) and the second inequality is by the definition of At+1 in line 3 of Algorithm 1. It indicates that v ∈ Bt+1 as well. Therefore, At+1 \ At ⊆ Bt+1, which implies At+1 ⊆ Bt+1 since we already know that At ⊆ Bt+1. Thus, we can conclude that At+1 ⊆ Bt+1. Proof of Theorem 1: By the definition of St, we easily have At ⊆ St ⊆ Bt. We already know that At ⊆ At+1 ⊆ Bt+1 ⊆ Bt by Lemma 2. Thus, St+1 = S ∩ Bt+1 ∪ At+1 (cid:0)Bt \ (Bt \ Bt+1)(cid:1) (cid:0)S ∩ (Bt \ Bt+1)(cid:1) ∪ At+1 ∪ At+1 = S ∩ = S ∩ Bt \ = S ∩ Bt ∪ At+1 \ = S ∩ Bt ∪ At+1 \ = S ∩ Bt ∪ At ∪ (At+1 \ At) \ = St ∪ (At+1 \ At) \ (cid:0)S ∩ (Bt \ Bt+1) \ At+1 (cid:0)S ∩ (Bt \ Bt+1)(cid:1) (cid:0)S ∩ (Bt \ Bt+1)(cid:1). (cid:1) (cid:0)S ∩ (Bt \ Bt+1)(cid:1) (14) By line 3 of Algorithm 1, for any node v ∈ At+1 \ At, it holds that β(v Bt \ {v}) − γ(v At) > 0. Then, for any St ⊆ T ⊆ St∪(At+1\At), since At ⊆ T and T ⊆ Bt\{v}, we have φ(v T ) = β(v T )−γ(v T ) ≥ β(v Bt\{v})−γ(v At) > 0 due to the submodularity. Let v1, v2, . . . , vk be the set of nodes in At+1 \ At \ St. It follows that φ(St) < φ(St ∪ {v1}) < φ(St ∪ {v1, v2}) < ··· < φ(St ∪ {v1, v2, . . . , vk}) = φ(cid:0)St ∪ (At+1 \ At \ St)(cid:1) = φ(cid:0)St ∪ (At+1 \ At)(cid:1). (cid:0)S∩(Bt\Bt+1)(cid:1) Similarly, by line 4 of Algorithm 1, for any node v ∈ Bt \ Bt+1, it holds that β(v At)− γ(v Bt \{v}) < 0. Then, for any St∪(At+1\At)\ ⊆ T ⊆ St∪(At+1\At), since At ⊆ T and T ⊆ Bt \ {v}, we have φ(v T ) = β(v T ) − γ(v T ) ≤ β(v At) − γ(v Bt \ {v}) < 0 due to the submodularity. Let u1, u2,··· , ul be the set of nodes in S ∩ (Bt \ Bt+1). It follows that φ(St ∪ (At+1 \ At)) < φ(St ∪ (At+1 \ At) \ {u1}) < φ(St ∪ (At+1 \ At) \ {u1, u2}) < ··· < φ(St ∪ (At+1 \ At) \ {u1, u2, . . . , ul}) = φ (cid:0)S ∩ (Bt \ Bt+1)(cid:1)(cid:17) St ∪ (At+1 \ At) \ (cid:16) = φ(St+1), where the last equality is due to (14). Therefore, φ(St) < φ(St+1) if At+1 \ At \ St (cid:54)= ∅ or S ∩ (Bt \ Bt+1) (cid:54)= ∅. On the other hand, if At+1 \ At \ St = S ∩ (Bt \ Bt+1) = ∅, based on (14), we have St = St+1. Proof of Corollary 1: According to Theorem 1, φ(S) = φ(S0) ≤ φ(S1) ≤ ··· ≤ φ(S ∩ B∗ ∪ A∗) since S = S ∩ B0 ∪ A0 = S0. On the other hand, if every "=" holds, we have S = S0 = S1 = ··· = S ∩ B∗ ∪ A∗, which implies ⊆ S ⊆ B∗. This is contradictory to S /∈ [A∗, B∗]. Thus, A∗ it holds that φ(S) < φ(S ∩ B∗ ∪ A∗). Suppose S∗ /∈ [A∗, B∗]. By ∪ A∗). This Corollary 1, we have φ(S∗) < φ(S∗ is contradictory to the fact that S∗ produces the maximum ⊆ B∗. achievable profit. Thus, it holds that A∗ (cid:105) Proof of Theorem 2: Let α(S) denote the overlapping value between the benefit of influence spread and the cost of influence propagation for a seed set S, which is defined as α(S) = E(cid:104) (cid:88) ∩ B∗ ⊆ S∗ Proof of Corollary 2: . min{b(v), c(v)} v∈VX (S) It is easy to verify that α(·) is also submodular and monotone. By the definition of normalization in Section III-B, we have β(S) = ¯β(S) + α(S) and γ(S) = ¯γ(S) + α(S). We prove that At ⊆ ¯At ⊆ ¯Bt ⊆ Bt for any t ≥ 0 by induction. Obviously, it holds that ∅ = A0 = ¯A0 ⊆ ¯B0 = B0 = V . Suppose that At ⊆ ¯At ⊆ ¯Bt ⊆ Bt holds for some t ≥ 0. Then, for any node v ∈ Bt \ ¯Bt, we have β(v Bt \{v})− γ(v At) = ¯β(v Bt\{v})−¯γ(v At)+α(v Bt\{v})−α(v At) ≤ ¯β(v Bt \ {v}) − ¯γ(v At) ≤ ¯β(v ¯Bt \ {v}) − ¯γ(v ¯At), where the inequalities are due to the submodularity of α(·), ¯β(·) and ¯γ(·). By Lemma 2, ¯At−1 ⊆ ¯At ⊆ ¯Bt−1 = ¯Bt−1 \{v} ⊆ ¯Bt \{v}. It follows from the submodularity that ¯β(v ¯Bt \ {v}) − ¯γ(v ¯At) ≤ ¯β(v ¯At−1) − ¯γ(v ¯Bt−1 \ {v}) < 0, where the last inequality is due to v /∈ ¯Bt. This implies that (At+1\At)∩(Bt\ ¯Bt) = ∅. Since At+1\At ⊆ Bt, we have At+1 \ At ⊆ ¯Bt. Since At ⊆ ¯Bt, it follows that At+1 ⊆ ¯Bt. Thus, for any node v ∈ At+1 \ ¯At ⊆ ¯Bt \ ¯At, we have ¯β(v ¯Bt \ {v}) − ¯γ(v ¯At) ≥ ¯β(v Bt \ {v}) − ¯γ(v At) = β(v Bt \ {v}) − γ(v At) − α(v Bt \ {v}) + α(v At) ≥ β(v Bt \ {v}) − γ(v At) > 0, where the first two inequalities are due to the submodularity and the last inequality is due to v ∈ At+1. This implies that At+1\ ¯At ⊆ ¯At+1. Since ¯At ⊆ ¯At+1, it follows that At+1 ⊆ ¯At+1. Similarly, for any node v ∈ ¯At \ At, we have β(v At) − γ(v Bt \ {v}) = ¯β(v At) − ¯γ(v Bt \ {v}) + α(v At) − α(v Bt \ {v}) ≥ ¯β(v At) − ¯γ(v Bt \ {v}) ≥ ¯β(v ¯At)− ¯γ(v ¯Bt \{v}) ≥ ¯β(v ¯Bt−1 \{v})− ¯γ(v ¯At−1) > 0, where the first three inequalities are due to the submodularity of α(·), ¯β(·) and ¯γ(·), and the last inequality is due to v ∈ ¯At. This implies that ¯At \ At ⊆ Bt+1. Since At ⊆ At+1 ⊆ Bt+1, it follows that ¯At ⊆ Bt+1. Thus, for any node v ∈ ¯Bt\Bt+1 ⊆ ¯Bt\ ¯At, we have ¯β(v ¯At)−¯γ(v ¯Bt\{v}) ≤ ¯β(v At)−¯γ(v Bt \ {v}) = β(v At) − γ(v Bt \ {v}) − α(v At) + α(v Bt\{v}) ≤ β(v At)−γ(v Bt\{v}) < 0, where the first two inequalities are due to the submodularity and the last inequality is due to v /∈ Bt+1. This implies that ¯Bt+1 ∩ ( ¯Bt \ Bt+1) = ∅. Since ¯Bt+1 ⊆ ¯Bt, it follows that ¯Bt+1 ⊆ Bt+1. By induction, we have At ⊆ ¯At ⊆ ¯Bt ⊆ Bt for any t ≥ 0 (it also holds after converged) and thus, A∗ Proof of Theorem 3: Let S∗ be an optimal seed set producing the maximum achievable profit. We can directly X (S∗; γ) ≥ β(S∗) − obtain that µi(X) ≥ mi γ(S∗) = φ(S∗), where the first inequality is by the definition of µi(X) and the second inequality is due to the modular upper and lower bounds. X (S∗; β) − hπ∗ ⊆ B∗. ⊆ ¯B∗ ⊆ ¯A∗ Proof of Theorem 4: Let λβ(S) be the expected fraction of samples covered by the seed set S. We have λβ(S) = β(S)/B. To simplify the notation, we omit the common symbol S in what follows, e.g., β represents β(S) and Λβ represents Λβ(S). Then, the inequalities to prove are equiva- lent to (cid:20) (cid:20) and Pr Pr We prove the former first. In fact, ≤ δ/2, ≤ δ/2. (cid:21) (cid:21) /θβ /θβ (cid:17)2 (cid:16)(cid:112)Λβ + 0.25a − 0.5√a (cid:17)2 (cid:16)(cid:112)Λβ + 0.25a + 0.5√a (cid:21) (cid:17)2 (cid:16)(cid:112)Λβ + 0.25a − 0.5√a (cid:104)(cid:112)λβθβ <(cid:112)Λβ + 0.25a − 0.5√a (cid:105) (cid:20)(cid:16)(cid:112)λβθβ + 0.5√a (cid:17)2 (cid:105) (cid:104) Λβ − λβθβ >(cid:112)aλβθβ (cid:18) (cid:19) /θβ < Λβ + 0.25a aλβθβ (cid:21) λβ < λβ > (cid:20) = Pr = Pr = Pr Pr λβ < − ≤ exp = δ/2, 4(e − 2)λβθβ where the inequality is due to Lemma 1. The proof of the latter is analogous. (cid:20) Pr λβ > = Pr = Pr = Pr ≤ exp = δ/2 /θβ (cid:21) (cid:17)2 (cid:16)(cid:112)Λβ + 0.25a + 0.5√a (cid:104)(cid:112)λβθβ >(cid:112)Λβ + 0.25a + 0.5√a (cid:105) (cid:20)(cid:16)(cid:112)λβθβ − 0.5√a (cid:17)2 (cid:104) (cid:112)aλβθβ (cid:18) (cid:19) > Λβ + 0.25a (cid:105) Λβ − λβθβ < − − 4(e − 2)λβθβ aλβθβ (cid:21) Hence, the theorem is proven. Proof of Theorem 5: Imagine that we evaluate S∗ with (cid:17) (cid:19) (cid:16) (cid:18) δ the benefit and cost samples. By Theorem 4, we know that ≥ Pr(cid:2)(cid:0)β(S∗) ≤ βu(S∗)(cid:1) Pr [φ(S∗) ≤ βu(S∗) − γl(S∗)] ∧ (cid:0)γ(S∗) ≥ γl(S∗)(cid:1)(cid:3) 2 + δ 2 Pr [β(S∗) > βu(S∗)] + Pr [γ(S∗) < γl(S∗)] ≥ 1 − ≥ 1 − (15) = 1 − δ. However, without knowing S∗, βu(S∗) and γl(S∗) cannot be obtained. In what follows, we are going to bound βu(S∗)− γl(S∗) by an upper bound on the function η(S) = βu(S) − γl(S). To simplify the notations, and we omit the common symbol S in what follows, e.g., η represents η(S). Then, the estimated profit φ = ρβΛβ − ργΛγ. Consider η as a function of φ and Λβ. We study the monotonicity of η with respect to φ and Λβ. By the definition of η, we have η(Λβ, φ) = ρβ (cid:18) Λβ + a(Λβ + 0.25a) + 0.5a (cid:19) (cid:113) (cid:18) (cid:113) (cid:113) a(cid:0)(ρβΛβ − φ)/ργ + 0.25a(cid:1) a(Λγ + 0.25a) + 0.5a Λγ − (cid:19) − ργ = φ + ργ a(Λβ + 0.25a). + 0.5a(ρβ − ργ) + ρβ (cid:113) (cid:17)2 (cid:16)(cid:112)Λβ + 0.25a + 0.5√a (cid:17)2 (cid:16)(cid:112)Λγ + 0.25a − 0.5√a (cid:16)(cid:112)Λβ + 0.25a + 0.5√a (cid:17)2 (cid:18)(cid:113) − ργ = ρβ − ργ (cid:19)2 (ρβΛβ − φ)/ργ + 0.25a − 0.5√a , which is increasing with Λβ under any given φ. Meanwhile, we also have η(Λβ, φ) = ρβ which is increasing with φ under any given Λβ. For an estimated upper bound µ(So) on the maximum achievable profit, we have φ(S∗) ≤ µ(So). On the other hand, it naturally holds that Λβ(S∗) ≤ θβ. Thus, = η(cid:0)Λβ(S∗), φ(S∗)(cid:1) βu(S∗) − γl(S∗) ≤ η(cid:0)θβ, µ(So)(cid:1) (cid:114) = µ(So) + ργ a (cid:17) (cid:16)(cid:0)ρβθβ − µ(So)(cid:1)/ργ + 0.25a (cid:113) a(θβ + 0.25a). + 0.5a(ρβ − ργ) + ρβ Hence, the theorem is proven. Proof of Theorem 6: Consider the sampling error limit ε under θ samples that can provide a probability guarantee of 1 − δ, i.e., Pr[−ε ≤ Λ − λθ ≤ ε] ≥ 1 − δ (where λ is the expected value of the random variable and Λ is the sum of θ samples). According to Lemma 1, ε is given by ε =(cid:112)4(e − 2) ln(2/δ)λθ = √aλθ, (16) where a = 4(e − 2) ln(2/δ). We denote εβ and εγ as the sampling error limits for the benefit and cost metrics under θβ and θγ samples that can satisfy Pr[−εβ ≤ β(S) − β(S) ≤ εβ] ≥ 1 − δ and Pr[−εγ ≤ γ(S) − γ(S) ≤ εγ] ≥ 1 − δ. Then, εφ = εβ + εγ gives a total sampling error limit for the profit metric which guarantees Pr[−εφ ≤ φ(S) − φ(S) ≤ εφ] ≥ 1 − 2δ. Likewise, let ¯εβ, ¯εγ and ¯εφ denote the sampling error limits under the normalized form. ¯b(v) and ¯Υc = ¯c(V ) = (cid:80) Similar to the definitions of Υb and Υc, we define ¯Υb = v∈V ¯c(v). Then, ¯Υb − ¯Υc = Υb − Υc. For a given seed set S, let ¯λβ(S) and ¯λγ(S) denote the expected fractions of benefit and cost ¯b(V ) = (cid:80) v∈V samples covered by S under the normalized form. To simplify the notation, we omit the common symbol S in what follows, e.g., β represents β(S) and ¯λβ represents ¯λβ(S). Since θβ · λβθβ, based on the definition of ε in (16), we have β = Υb (cid:112)aλβθβ (cid:115) θβ εγ = (cid:115) = aΥcγ θγ Υb εβ = Υb θβ · ε = Similarly, we have (cid:115) ¯εβ = ¯β , a ¯Υb θβ (18) Note that Υb ≥ ¯Υb, Υc ≥ ¯Υc, β ≥ ¯β and γ ≥ ¯γ. Together with (17) and (18), we have εβ ≥ ¯εβ and εγ ≥ ¯εγ. Therefore, εφ = εβ + εγ ≥ ¯εβ + ¯εγ = ¯εφ. (cid:115) θβ (cid:115) aΥ2 bλβ θβ = aΥbβ . (17) and ¯εγ = a ¯Υc¯γ θγ .
1809.05901
1
1809
2018-09-16T15:49:14
Trends in the Diffusion of Misinformation on Social Media
[ "cs.SI" ]
We measure trends in the diffusion of misinformation on Facebook and Twitter between January 2015 and July 2018. We focus on stories from 570 sites that have been identified as producers of false stories. Interactions with these sites on both Facebook and Twitter rose steadily through the end of 2016. Interactions then fell sharply on Facebook while they continued to rise on Twitter, with the ratio of Facebook engagements to Twitter shares falling by approximately 60 percent. We see no similar pattern for other news, business, or culture sites, where interactions have been relatively stable over time and have followed similar trends on the two platforms both before and after the election.
cs.SI
cs
Trends in the Diffusion of Misinformation on Social Media Hunt Allcott, New York University, Microsoft Research, and NBER* Matthew Gentzkow, Stanford University and NBER Chuan Yu, Stanford University September 2018 Abstract We measure trends in the diffusion of misinformation on Facebook and Twitter between Jan- uary 2015 and July 2018. We focus on stories from 570 sites that have been identified as producers of false stories. Interactions with these sites on both Facebook and Twitter rose steadily through the end of 2016. Interactions then fell sharply on Facebook while they con- tinued to rise on Twitter, with the ratio of Facebook engagements to Twitter shares falling by approximately 60 percent. We see no similar pattern for other news, business, or culture sites, where interactions have been relatively stable over time and have followed similar trends on the two platforms both before and after the election. 8 1 0 2 p e S 6 1 ] I S . s c [ 1 v 1 0 9 5 0 . 9 0 8 1 : v i X r a *E-mail: [email protected], [email protected], [email protected]. We thank the Stanford Institute for Economic Policy Research (SIEPR), the Stanford Cyber Initiative, the Toulouse Network for Information Tech- nology, the Knight Foundation, and the Alfred P. Sloan Foundation for generous financial support. We thank David Lazer, Brendan Nyhan, David Rand, David Rothschild, Jesse Shapiro, and Nils Wernerfelt for helpful comments and suggestions. We also thank our dedicated research assistants for their contributions to this project. 1 1 Introduction Misinformation on social media has caused widespread alarm in recent years. A substantial number of U.S. adults were exposed to false news stories prior to the 2016 election, and post-election surveys suggest that many people who read such stories believed them to be true (Silverman and Singer-Vine 2016; Allcott and Gentzkow 2017; Guess et al. 2018). Many argue that false news stories played a major role in the 2016 election (for example, Olson 2016; Parkinson 2016; Read 2016; Gunther et al. 2018), and in the ongoing political divisions and crises that have followed it (for example, Spohr 2017; Azzimonti and Fernandes 2018; Tharoor 2018). Numerous efforts have been made to respond to the threat of false news stories, including educational and other initiatives by civil society organizations, hearings and legal action by regulators, and a range of algorithmic, design, and policy changes made by Facebook and other social media companies. Evidence on whether these efforts have been effective -- or how the scale of the misinformation problem is evolving more broadly -- remains limited. A recent study argues that false stories remain a problem on Facebook even after changes to its news feed algorithm in early 2018 (Newswhip 2018). The study reports that the 26th and 38th most engaging stories on Facebook in the two months after the changes were from fake news websites. Many articles that have been rated as false by major fact-checking organizations have not been flagged in Facebook's system, and two major fake news sites have seen little or no decline in Facebook engagements since early 2016 (Funke 2018). Facebook's now-discontinued strategy of flagging inaccurate stories as "Disputed" can modestly lower the perceived accuracy of flagged headlines (Blair et al. 2017), though some research suggests that the presence of warnings can cause untagged false stories to be seen as more accurate (Pennycook and Rand 2017). Media commentators have argued that efforts to fight misinformation through fact-checking are "not working" (Levin 2017) and that misinformation overall is "becoming unstoppable" (Ghosh and Scott 2018). In this paper, we present new evidence on the volume of misinformation circulated on social media from January 2015 to July 2018. We assemble a list of 570 sites identified as sources of false stories in a set of five previous studies and online lists. We refer to these collectively as fake news sites. We measure the volume of Facebook engagements and Twitter shares for all stories on these sites by month. As points of comparison, we also measure the same outcomes for stories on (i) a set of major news sites; (ii) a set of small news sites not identified as producing misinformation; and (iii) a set of sites covering business and culture topics. The results show that interactions with the fake news sites in our database rose steadily on both Facebook and Twitter from early 2015 to the months just after the 2016 election. Interactions then declined by more than half on Facebook, while they continued to rise on Twitter. The ratio of Facebook engagements to Twitter shares was roughly steady at around 40:1 from the beginning of our period to late 2016, then fell to roughly 15:1 by the end of our sample period. In contrast, 2 interactions with major news sites, small news sites, and business and culture sites have all re- mained relatively stable over time, and have followed similar trends on Facebook and Twitter both before and after the 2016 election. While this evidence is far from definitive, we see it as consis- tent with the view that the overall magnitude of the misinformation problem may have declined, at least temporarily, and that efforts by Facebook following the 2016 election to limit the diffusion of misinformation may have had a meaningful impact The results also show that the absolute level of interaction with misinformation remains high, and that Facebook continues to play a particularly important role in its diffusion. In the period around the election, fake news sites received almost as many Facebook engagements as the 38 major news sites in our sample. Even after the sharp drop following the election, Facebook en- gagements of fake news sites still average roughly 70 million per month. Our evidence is subject to many important caveats and must be interpreted with caution. This is particularly true for the raw trends in interactions. While we have attempted to make our database of false stories as comprehensive as possible, it is likely far from complete, and many factors could generate selection biases that vary over time. The raw decline in Facebook engagements may partly reflect the under-sampling of sites that could have entered or gained popularity later in our sample period, as well as efforts by producers of misinformation to evade detection on Facebook by changing their domain names. It may also reflect changes over time in demand for highly partisan political content that would have existed absent efforts to fight misinformation, and could reverse in the future, for example in the run-up to future elections. We see the comparison of Facebook engagements to Twitter shares as potentially more infor- mative. If the design of these platforms and the behavior of their users were stable over time, we might expect sample selection biases or demand changes to have similar proportional effects, and thus leave the ratio of Facebook engagements to Twitter shares roughly unchanged. For example, we might expect producers changing domain names to evade detection to produce similar declines in our measured interactions on both platforms. The fact that Facebook engagements and Twit- ter shares follow similar trends prior to late 2016 and for the non-fake-news sites in our data, but diverge sharply for fake news sites following the election, suggests that some factor has slowed the relative diffusion of misinformation on Facebook. The suite of policy and algorithmic changes made by Facebook following the election seems like a plausible candidate. However, even the relative comparison of the platforms is only suggestive. Both Facebook and Twitter have made changes to their platforms, and so at best this measure captures the relative effect of the former compared to the latter. Engagements on Facebook affect sharing on Twitter and vice versa. The selection of stories into our database could for various reasons differentially favor the kinds of stories likely to be shared on one platform or the other, and this selection could vary over time. Demand changes need not have the same proportional effect on the two platforms. Some of these factors would tend to attenuate changes in the Facebook-Twitter ratio, leading our 3 results to be conservative, but others could produce a spurious decrease over time. In the appendix, we show that our qualitative results survive a set of robustness checks intended to partially address potential sample selection biases. These checks include: (i) focusing on sites identified as fake in multiple lists; (ii) excluding sites from each of our five lists in turn, (iii) looking at sites that were active in different periods; (iv) excluding potential outliers and looking at sites of different sizes; and (v) looking at sites with different likelihoods to publish misinformation. 2 Background Both Facebook and Twitter have taken steps to reduce the circulation of misinformation on their platforms. In the appendix, we list twelve such announcements by Facebook and five by Twitter since the 2016 election. Broadly, the platforms have taken three types of actions to limit misinfor- mation. First, they have limited its supply, by blocking ads from pages that repeatedly share false stories and removing accounts that violate community standards. Second, they have introduced features such as "disputed" flags or "related articles" that provide corrective information related to a false story. Third, they have changed their algorithms to de-prioritize false stories in favor of news from trustworthy publications and posts from friends and family. Legislators are also taking action. For example, Connecticut, New Mexico, Rhode Island, and Washington passed laws in 2017 encouraging media literacy and digital citizenship (Zubrzycki 2017). Executives from Facebook, Google, and Twitter have been asked to testify before various congressional committees about their efforts to combat misinformation (Shaban et al. 2017; Pop- ken 2018). Although there has been no major national legislation, this testimony may have raised public awareness. Finally, civil society organizations also play an important role. For example, the News Literacy Project provides non-partisan educational materials to help teachers educate students to evaluate the credibility of information; demand for its materials has grown substantially in the past few years (Strauss 2018). In 2017, the newly established News Integrity Initiative (NII) made ten grants totaling $1.8 million to help build trust between newsrooms and the public, make newsrooms more diverse and inclusive, and make public conversations less polarized (Owen 2017). 3 Data We compile a list of sites producing false news stories by combining five previous lists: (i) a re- search project by Grinberg et al. (2018, 490 sites); (ii) PolitiFact's article titled "PolitiFact's guide to fake news websites and what they peddle" (Gillin 2017, 325 sites); (iii) three articles by Buz- zFeed on fake news (Silverman 2016; Silverman et al. 2017a; Silverman et al. 2017b; 223 sites); (iv) a research project by Guess et al. (2018, 92 sites); and (v) FactCheck's article titled "Websites 4 that post fake and satirical stories" (Schaedel 2017, 61 sites). Politifact and FactCheck are indepen- dent journalistic fact-checking websites, while BuzzFeed similarly applies journalistic standards to evaluating whether articles are true or false. The two lists from research projects originally derive from subsets of the other three, plus Snopes.com, another independent fact-checking site, and lists assembled by blogger Brayton (2016) and media studies scholar Zimdars (2016). The union of these five lists is our set of fake news sites. PolitiFact and FactCheck work directly with Facebook to evaluate the veracity of stories flagged by Facebook users as potentially false. Thus, these lists comprise fake news sites that Facebook is likely to be aware are fake. As a result, our results may be weighted toward diffusion of mis- information that Facebook is aware of, and may not fully capture trends in misinformation that Facebook is not aware of. It is difficult to assess how large this latter group might be. Our list almost certainly includes the most important providers of false stories, as Facebook users can flag any and all questionable articles for review. On the other hand, the list might exclude a large tail of small sites producing false stories. Combining these five lists yields a total of 673 unique sites. We have data for 570 of them. We report in the appendix the names and original lists of 50 largest sites in terms of total Facebook engagements plus Twitter shares during the sample period. In our robustness checks, we consider alternative rules for selecting the set of sites. Our sets of comparison sites are defined based on category-level web traffic rankings from Alexa.1 Alexa measures web traffic using its global traffic panel, a sample of millions of Internet users who have installed browser extensions allowing their browsing data to be recorded, plus data from websites that use Alexa to measure their traffic. It then ranks sites based on a combined mea- sure of unique visitors and pageviews. We define major news sites to be the top 100 sites in Alexa's News category. We define small news sites to be the sites ranked 401-500 in the News category. We define business and culture sites to be the top 50 sites in each of the Arts, Business, Health, Recreation, and Sports categories. For each of these groups, we omit from our sample government websites, databases, sites that do not mainly produce news or similar content, international sites whose audiences are primarily outside the U.S., and sites that are included in our list of fake news sites. Our final sample includes 38 major news sites, 78 small news sites, and 54 business and culture sites. We gather monthly Facebook engagements and Twitter shares of all articles published on these sites from January 2015 to July 2018 from BuzzSumo (www.buzzsumo.com). BuzzSumo is a commercial content database that tracks the volume of user interactions with internet content on Facebook, Twitter, and other social media platforms, using data available from the platforms' appli- cation programming interfaces (APIs). We use BuzzSumo's data on total Facebook engagements and total Twitter shares by originating website and month. Facebook engagements are defined 1©2018, Alexa Internet (www.alexa.com) 5 as the sum of shares, comments, and reactions such as "likes." We have data for 570 out of 673 fake news sites in our list and all sites in the comparison groups. We sum the monthly Facebook engagements and Twitter shares of articles from all sites in each category and then average by quarter. 4 Results Figure 1 shows trends in the number of Facebook engagements and Twitter shares of stories from each category of site. Interactions for major news sites, small news sites, and business and culture sites have remained relatively stable during the past two years, and follow similar trends on Face- book and Twitter. Both platforms show a modest upward trend for major news and small news sites, and a modest downward trend for business and culture sites. In contrast, interactions with fake news have changed more dramatically over time, and these changes are very different on the two platforms. Fake news interactions increased steadily on both platforms from the beginning of 2015 up to the 2016 election. Following the election, however, Facebook engagements fell sharply (declining by more than 50 percent), while shares on Twitter continued to increase. Figure 2 shows our main result: trends in the ratio of Facebook engagements to Twitter shares. The ratios have been relatively stable for major news, small news, and business and culture sites. For fake news sites, however, the ratio has declined sharply, from around 45:1 during the election to around 15:1 two years later. While these results suggest that the circulation of fake news on Facebook has declined in both absolute and relative terms, it is important to emphasize that the absolute quantity of fake news interactions on both platforms remains large, and that Facebook in particular has played an outsized role in its diffusion. Figure 1 shows that Facebook engagements fell from a peak of roughly 200 million per month at the end of 2016 to roughly 70 million per month at the end of our sample period. As a point of comparison, the 38 major news sites in the top left panel -- including the New York Times, Wall Street Journal, CNN, Fox News, etc. -- typically garner about 200-250 million Facebook engagements per month. On Twitter, fake news shares have been in the 4-6 million per month range since the end of 2016, compared to roughly 20 million per month for the major news sites. We report a number of robustness checks in the appendix designed to address concerns about selection into our sample of sites. First, we restrict to sites that are identified as fake news sites by at least two or three of our original five lists, which leaves 116 and 19 sites, respectively. Second, given that people might disagree with any one particular study's list of fake news sites, we run five additional analyses, each excluding fake news sites identified exclusively by one of our five lists. Third, we focus on sites that started active operations after November 2016, sites that were still in active operation as of July 2018, and sites that were in active operation from August 2015 6 to July 2018, which leaves 226, 215, and 82 sites respectively. (Active operation is defined to be a global traffic rank reported by Alexa of at least one million.) Fourth, we exclude the five largest sites in terms of total interactions to ensure the trend is not driven solely by outliers. We also look at sites in the first decile and sites in the bottom nine deciles separately to see if the trend holds for both large sites and small sites. Fifth, Grinberg et al. (2018) provide three lists of sites classified by different likelihoods to publish misinformation. We look at each of these lists separately. Our main qualitative conclusions remain consistent across these checks, though the exact size and shape of the trends vary. Finally, we present an alternative comparison group: a small set of politically focused sites such as Politico and The Hill. These sites do see a decline in engagements on Facebook relative to Twitter, but it mainly occurred in late-2015. 7 Figure 1: Engagement on Facebook and Twitter Panel A: Facebook Engagements Major News Sites 2015 Number of sites: 38 2016 2017 2018 Business and Culture Sites ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 300 200 100 0 120 80 40 0 Small News Sites 6 4 2 0 2015 Number of sites: 78 2016 2017 2018 Fake News Sites 210 140 70 0 ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 2015 Number of sites: 54 2016 2017 2018 2015 Number of sites: 570 2016 2017 2018 Panel B: Twitter Shares Major News Sites Small News Sites ) n o i l l i m ( s e r a h s r e t t i w T .21 .14 .07 0 2015 Number of sites: 38 2016 2017 2018 2015 Number of sites: 78 2016 2017 2018 Business and Culture Sites Fake News Sites ) n o i l l i m ( s e r a h s r e t t i w T 6 4 2 0 ) n o i l l i m ( s e r a h s r e t t i w T 30 20 10 0 ) n o i l l i m ( s e r a h s r e t t i w T 9 6 3 0 2015 Number of sites: 54 2016 2017 2018 2015 Number of sites: 570 2016 2017 2018 Notes: This figure shows monthly Facebook engagements and Twitter shares of all articles published on sites in different categories averaged by quarter. Data comes from BuzzSumo. Major News Sites include 38 sites selected from the top 100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites ranking 401-500 in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in each of the Arts, Business, Health, Recreation, and Sports categories. Fake News Sites include 570 sites assembled from five lists. The complete lists can be found in the appendix. 8 Figure 2: Relative Engagement on Facebook s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 15 10 5 0 18 12 6 0 Major News Sites 2015 Number of sites: 38 2016 2017 2018 Business and Culture Sites 2015 Number of sites: 54 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 36 24 12 0 45 30 15 0 Small News Sites 2015 Number of sites: 78 2016 2017 2018 Fake News Sites 2015 Number of sites: 570 2016 2017 2018 Notes: This figure shows the ratio of monthly Facebook engagements over Twitter shares of all articles published on sites in different categories averaged by quarter. Data comes from BuzzSumo. Major News Sites include 38 sites selected from the top 100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites ranking 401-500 in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in each of the Arts, Business, Health, Recreation, and Sports categories. Fake News Sites include 570 sites assembled from five lists. The complete lists can be found in the appendix. 9 References Allcott H, Gentzkow M (2017) Social media and fake news in the 2016 election. Journal of Economic Perspectives 31(2): 211 -- 236. Azzimonti M, Fernandes M (2018) Social media networks, fake news, and polarization. NBER Working Paper No. 24462. Blair S, et al. (2017) Real solutions for fake news? Measuring the effectiveness of general warnings and fact-check tags in reducing belief in false stories on social media. Working Paper. Avail- able at https://www.dartmouth.edu/∼nyhan/fake-news-solutions.pdf. Accessed September 6, 2018. Brayton E (2016) Please stop sharing links to these sites. Patheos. Available at http://www.patheos. com/blogs/dispatches/2016/09/18/please-stop-sharing-links-to-these-sites/. Accessed Septem- ber 5, 2018. Funke D (2018) Fact-checkers have debunked this fake news site 80 times. It's still publishing on Facebook. Poynter.org. Available at https://www.poynter.org/news/fact-checkers-have-de- bunked-fake-news-site-80-times-its-still-publishing-facebook. Accessed September 4, 2018. Ghosh, D, Scott B (2018) Disinformation is becoming unstoppable. Time. Available at http://time. com/5112847/facebook-fake-news-unstoppable/. Accessed September 2, 2018. Gillin J (2017) Politifact's guide to fake news websites and what they peddle. PolitiFact. Available at http://www.politifact.com/punditfact/article/2017/apr/20/politifacts-guide-fake-news- websites-and-what-they/. Accessed September 3, 2018. Grinberg N, Joseph K, Friedland L, Swire-Thompson B, Lazer D (2018) Fake news on Twitter during the 2016 U.S. presidential election. Working Paper. Available from the authors. Guess A, Nyhan B, Reifler J (2018) Selective exposure to misinformation: evidence from the con- sumption of fake news during the 2016 US presidential campaign. Working Paper. European Research Council. Available at https://www.dartmouth.edu/∼nyhan/fake-news-2016.pdf. Ac- cessed September 3, 2018. Gunther R, Beck PA, Nisbet EC (2018) Fake news may have contributed to Trump's 2016 victory. Available at https://assets.documentcloud.org/documents/4429952/Fake-News-May-Have- Contributed-to-Trump-s-2016.pdf. Accessed September 3, 2018. Levin S (2017) Facebook promised to tackle fake news. But the evidence shows it's not working. The Guardian. Available at https://www.theguardian.com/technology/2017/may/16/facebook -fake-news-tools-not-working. Accessed September 3, 2018. NewsWhip (2018) Navigating the Facebook algorithm change: 2018 report. Available at http://go. newswhip.com/rs/647-QQK-704/images/FacebookAlgorithmMarch18.pdf. Accessed Septem- ber 3, 2018. 10 Olson P (2016) How Facebook helped Donald Trump become president. Forbes. Available at https://www.forbes.com/sites/parmyolson/2016/11/09/how-facebook-helped-donald-trump- become-president/. Accessed September 3, 2018. Owen LH (2017) The News Integrity Initiative gives $1.8 million to 10 projects focused on increas- ing trust in news. NiemanLab. Available at http://www.niemanlab.org/2017/10/the-news- integrity-initiative-gives-1-8-million-to-10-projects-focused-on-increasing-trust-in-news/. Ac- cessed September 3, 2018. Parkinson HJ (2016) Click and elect: how fake news helped Donald Trump win a real election. The Guardian. Available at https://www.theguardian.com/commentisfree/2016/nov/14/fake- news-donald-trump-election-alt-right-social-media-tech-companies. Accessed September 2, 2018. Pennycook G, Rand DG (2017) The implied truth effect: attaching warnings to a subset of fake news stories increases perceived accuracy of stories without warnings. Working Paper. Avail- able at http://dx.doi.org/10.2139/ssrn.3035384. Accessed September 3, 2018. Popken B (2018) Apologies and promises: Facebook and Twitter tell senators they will do more to combat misinformation. NBC News. Available at https://www.nbcnews.com/tech/tech-news/ apologies-promises-facebook-twitter-tell-senators-they-will-do-more-n906731. Accessed September 8, 2018. Read M (2016) Donald Trump won because of Facebook. New York Magazine. Available at http://nymag.com/selectall/2016/11/donald-trump-won-because-of-facebook.html. Accessed September 3, 2018. Schaedel S (2017) Websites that post fake and satirical stories. FactCheck. Available at https://www. factcheck.org/2017/07/websites-post-fake-satirical-stories. Accessed September 3, 2018. Shaban H, Timberg C, Dwoskin E (2017) Facebook, Google and Twitter testified on Capitol Hill. Here's what they said. The Washington Post. Available at https://www.washingtonpost.com/ news/the-switch/wp/2017/10/31/facebook-google-and-twitter-are-set-to-testify-on-capitol-hill -heres-what-to-expect. Accessed September 7, 2018 Silverman C (2016) Here are 50 of the biggest fake news hits on Facebook from 2016. BuzzFeed News. Available at https://www.buzzfeednews.com/article/craigsilverman/top-fake-news-of- 2016. Accessed September 3, 2018. Silverman C, Lytvynenko J, Pham S (2017a) These are 50 of the biggest fake news hits on Face- book in 2017. BuzzFeed News. Available at https://www.buzzfeednews.com/article/craigsilver man/these-are-50-of-the-biggest-fake-news-hits-on-facebook-in Accessed September 3, 2018. Silverman C, Singer-Vine J (2016) Most Americans who see fake news believe it, new survey says. BuzzFeed News. Available at https://www.buzzfeed.com/craigsilverman/fake-news-survey. Accessed September 3, 2018. 11 Silverman C, Singer-Vine J, Vo LT (2017b) In spite of the crackdown, fake news publishers are still earning money from major ad networks. BuzzFeed News. Available at https://www.buzzfeed news.com/article/craigsilverman/fake-news-real-ads. Accessed September 3, 2018. Spohr D (2017) Fake news and ideological polarization: filter bubbles and selective exposure on social media. Business Information Review 34(3): 150 -- 160. Strauss V (2018) The News Literacy Project takes on 'fake' news -- and business is better than ever. The Washington Post. Available at https://www.washingtonpost.com/news/answer- sheet/wp/2018/03/27/not-sure-whats-real-or-fake-anymore-the-news-literacy-project-teaches -kids-how-to-tell-the-difference-and-its-growing-faster-than-ever/. Accessed September 3, 2018. Tharoor I (2018) 'Fake news' and the Trumpian threat to democracy. The Washington Post. Avail- able at https://www.washingtonpost.com/news/worldviews/wp/2018/02/07/fake-news-and- the-trumpian-threat-to-democracy/. Accessed September 3, 2018. Zimdars M (2016) False, misleading, clickbait-y, and satirical "news" sources. Available at http:// d279m997dpfwgl.cloudfront.net/wp/2016/11/Resource-False-Misleading-Clickbaity-and- Satirical-%E2%80%9CNews%E2%80%9DSources-1.pdf. Accessed September 5, 2018. Zubrzycki J (2017) More states take on media literacy in schools. Education Week. Available at http://blogs.edweek.org/edweek/curriculum/2017/07/media literacy laws.html. Accessed September 3, 2018. 12 Appendix 1 Actions Against Fake News Appendix table 1 lists Facebook's actions to reduce the diffusion of fake news since the 2016 U.S. election, while Appendix table 2 lists Twitter's actions. All announcements are taken from the platforms' official websites.1 2 Data We combine five lists of fake news sites created by fact-checking organizations or research studies to form our sample of fake news sites. The union of these lists contains 673 unique sites. Among them, 103 have no data available from BuzzSumo. Thus, our final list includes 570 unique sites. Appendix table S3 presents the 50 largest sites in the list in terms of total Facebook engagements plus Twitter shares from January 2015 to July 2018. We also collect three other categories of sites: major news sites, small news sites, and business and culture sites covering arts, business, health, recreation, and sports. Appendix table S4 presents these lists. 3 Robustness Checks As discussed in the manuscript, a key concern is that our list of fake news sites may suffer from sample selection bias. To mitigate the concerns, we consider alternative sets of fake news sites as robustness checks. 3.1 Lists of Fake News Sites Our five different lists each have different inclusion criteria for defining a fake news site, and one might disagree with a particular list's approach. We thus carry out two sets of robustness checks. First, in Appendix figure 1, we focus on sites that are identified as fake news sites by at least two or three lists instead of one, leaving 116 and 19 sites, respectively. Second, Appendix figure 2 replicates the results using sites assembled from any four out of the five original lists. By doing this, we exclude sites that are only identified by one particular list. The downward trend in the ratio of Facebook engagements to Twitter shares since the beginning of 2017 is invariant to including only sites identified on multiple lists and to excluding any single list. 1Facebook: https://newsroom.fb.com/news/; Twitter: https://blog.twitter.com/official/en us.html. 1 3.2 Time Coverage It is possible that the original lists of fake news sites primarily include sites that were popular on Facebook before the 2016 election, and this sample selection combined with the rapid entry and exit of small sites focused on fake stories could generate a spurious downward trend in both the absolute number of Facebook engagements of fake news and the ratio of Facebook engagements to Twitter shares. In Appendix figure 3, we look at sites that were active during different periods. In Panel A, B, and C, respectively, we focus on sites that started active operation after November 2016, sites that were still in active operation as of the end of the sample in July 2018, and sites that were in active operation from August 2015 to July 2018. (Active operation is defined to be a global traffic rank reported by Alexa of at least one million.) The downward trend in the ratio of Facebook engagements to Twitter shares since the beginning of 2017 remains consistent across these samples. 3.3 Number of Interactions Interactions on social media vary substantially across sites in our list. A natural concern might be that the sums of Facebook engagements and Twitter shares could be driven by a small number of outliers. In Appendix figure 4 Panel A, we exclude five largest sites in terms of total Facebook engagements plus Twitter shares in our sample period. The trend survives the exclusion of potential outliers. In Panel B and C, we divide all sites into deciles and look at sites in the first decile and sites in the bottom nine deciles separately. The downward trend in the Facebook/Twitter ratio is observed for both large and small sites. 3.4 Likelihood to Publish Misinformation Grinberg et al. (2018) provide three lists of sites which they deem to have different likelihoods to publish misinformation. "Black" domains are reported to publish entirely fabricated stories. The black list is constructed from pre-existing lists of fake news constructed by academic work and professional fact-checkers such as PolitiFact, FactCheck, and BuzzFeed. "Red" and "orange" domains are identified by Snopes as sources of fake news or questionable claims and classified by their levels of perceived likelihood to publish misinformation: stories from red domains have an "extremely high" likelihood of containing misinformation, and stories from orange domains a "high" likelihood. In Appendix figure 5, we look at these lists separately. There are some differences across these lists. The downward trend of Facebook engagements appears only for black and red domains but not for orange domains. The time when the Facebook/Twitter ratio started to fall is also different. For black domains, the ratio dropped sharply in mid-2016 and all of 2017. For red and orange domains, however, the decline primarily occurred in 2016. These 2 patterns would be consistent with black and to a lesser extent red domains being the primary target of the changes Facebook made to its platform following the election. 3.5 Sites Focusing on Political News Fake news is often political in nature, and it is possible that the Twitter user base is more consis- tently politically engaged than the (much larger) Facebook user base. If Facebook users' interest in political stories is cyclical, rising with major presidential elections and falling after, this could generate a drop in fake news diffusion on Facebook after the 2016 election that might not be mir- rored on Twitter. Thus, the declining Facebook/Twitter ratio beginning in 2017 could be generated by changes in demand for fake news, not changes in supply or efforts by Facebook. If this explanation is true, one would also expect to see a decline in the diffusion of articles from major political websites on Facebook, but not on Twitter. To test this, Appendix figure 6 presents Facebook engagements, Twitter shares, and their ratio for a list of ten (non-fake) political sites of five types: (i) sites mostly focusing on political news (Politico and The Hill); (ii) major parties and politicians (donaldjtrump.com, hillaryclinton.com, democrats.org, and gop.com); (iii) think tanks (Brookings and AEI); (iv) CSPAN; and (v) a mainstream political blog (Real Clear Politics). There is a decline in the Facebook/Twitter ratio for these sites, but it mainly occured in late-2015, well before the election. 3 Appendix Table 1: Facebook's Actions to Fight Against Fake News Actions Announced four updates to address hoaxes and fake news: make reporting easier for users; flag stories as "Disputed" with fact-checking organizations and warn people before they share; incorporate signals of misleading articles into rankings; and disrupt financial incentives for spammers.2 Described three areas where it is working to fight the spead of false news: disrupt economic incentives; build new products to curb the spread of false news; and help people make more informed decisions.3 Tested "Related Articles", an improved feature that presents users a cluster of additional articles on the same topic when they come across popular links, including potantial fake news articles, to provide people easier access to additional information, including articles by third-party fact checkers.4 Announced it would address cloaking so people see more authentic posts.5 Date Dec 15, 2016 Apr 6, 2017 Apr 25, 2017 Dec 20, 2017 Aug 8, 2017 Aug 28, 2017 Announced it would block ads from pages that repeatedly share false news.6 Annouced two changes to fight against false news: replace "Disputed" flags with "Related Articles" to give people more context; and start an initiative to better understand how people decide whether information is accurate.7 Prioritized posts from friends and family over public content.8 Prioritized news from publications rated as trustworthy by the community.9 Prioritized news relevant to people's local community.10 Described three parts of their strategies to stop misinformation: remove accounts and content that violate community standards or ad policies; reduce the distribution of false news and inauthentic content; and inform people by giving them more context on the posts they see.11 Jan 11, 2018 Jan 19, 2018 Jan 29, 2018 May 23, 2018 June 14, 2018 Detailed how its fact-checking program works.12 June 21, 2018 Announced five updates to fight false news: expand fact-checking programs to new countries; test fact-checking on photos and videos; use new techniques in fact-checking including identifying duplicates and using "Claim Review"; take action against repeat offenders; and improve measurement and transparency by partnering with academics.13 2.Addressing Hoaxes and Fake News. 3.Working to Stop Misinformation and False News. 4.New Test With Related Articles. 5.Addressing Cloaking So People See More Authentic Posts. 6.Blocking Ads From Pages that Repeatedly Share False News. 7.Replacing Disputed Flags With Related Articles. 8.Bringing People Closer Together. 9.Helping Ensure News on Facebook Is From Trusted Sources. 10.More Local News on Facebook. 11.Hard Questions: What's Facebook's Strategy for Stopping False News? 12.Hard Questions: How Is Facebook's Fact-Checking Program Working? 13.Increasing Our Efforts to Fight False News. 4 Appendix Table 2: Twitter's Actions to Fight Against Fake News Date June 14, 2017 June 29, 2017 Sept 28, 2017 Actions Described the phenomenon of fake news and bots and the approaches it used, including surfacing the highest quality and most relevant content and context first, expanding the team and resources, building new tools and processes, and detecting spammy behaviors at source. 14 (Not officially announced) Tested a feature that would let users flag tweets that contain misleading, false, or harmful information.15 Shared information on its knowledge about how malicious bots and misinformation networks on Twitter may have been used in the 2016 U.S. Presidential elections and its work to fight both malicious bots and misinformation.16 Oct 24, 2017 Announced steps to dramatically increase the transparency for all ads.17 July 11, 2018 Announced it removed fake accounts.18 14.Our Approach to Bots & Misinformation. 15.Twitter is looking for ways to let users flag fake news, offensive content. 16.Update: Russian Interference in 2016 US Election, Bots, & Misinformation. 17.New Transparency For Ads on Twitter. 18.Confidence in follower counts. 5 Appendix Table 3: 50 Largest Fake News Sites Site indiatimes.com dailywire.com ijr.com dailycaller.com occupydemocrats.com express.co.uk redstatewatcher.com thepoliticalinsider.com thefederalistpapers.org truthfeed.com bipartisanreport.com rightwingnews.com qpolitical.com madworldnews.com yournewswire.com uschronicle.com louderwithcrowder.com jewsnews.co.il 100percentfedup.com angrypatriotmovement.com anonhq.com inquisitr.com yesimright.com worldtruth.tv collective-evolution.com ilovemyfreedom.org tribunist.com clashdaily.com naturalnews.com joeforamerica.com conservativedailypost.com Source Created Still Last G-B G-R G-O PF BF GNR FC Post-Election Active Long 0 0 0 0 1 0 1 0 0 0 0 0 0 1 1 0 0 0 0 1 0 0 1 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 0 1 1 0 0 0 1 0 0 1 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 1 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 1 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 1 0 1 0 0 0 1 0 0 0 1 0 0 1 6 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 0 0 1 0 1 0 1 1 0 0 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 0 1 1 1 0 Site worldnewsdailyreport.com trueactivist.com americasfreedomfighters.com conservative101.com usanewsflash.com babylonbee.com firstpost.com zerohedge.com teaparty.org palmerreport.com judicialwatch.org disclose.tv conservativepost.com thegatewaypundit.com infowars.com dailysnark.com postcard.news higherperspectives.com tmn.today Source Created Still Last G-B G-R G-O PF BF GNR FC Post-Election Active Long 1 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 1 1 1 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 1 1 1 0 1 0 0 1 0 1 0 1 1 1 0 ... 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 1 1 1 0 1 1 1 1 1 1 0 0 0 Total 382 61 47 325 223 92 61 308 287 82 Notes: This table lists 50 largest fake news sites in terms of total Facebook engagements plus Twitter shares from January 2015 to June 2018. The complete list can be found here. Column 2-8 lists the fake news sites identified by five sources described above, where a value of 1 indicates the site appears in the corresponding source and 0 not. G-B, G-R, and G-O represent the black domains, red domains, and orange domains in Grinberg et al. (2018). PF represents PolitiFact. BF represents BuzzFeed. GNR represents Guess et al. (2018). FC represents FactCheck. The last three columns list sites that started active operation after the election in November 2016, sites that were in active operation in July 2018, and sites that were in active operation during the whole sample period from August 2015 to July 2018. A site is defined as being in active operation if it is tracked by Alexa with a global rank higher than one million in terms of total traffic. 7 Appendix Table 4: Lists of Sites in Each Category Category Site cnn.com nytimes.com theguardian.com washingtonpost.com foxnews.com huffingtonpost.com usatoday.com reuters.com wsj.com time.com cnbc.com nypost.com usnews.com cbsnews.com chron.com thehill.com nbcnews.com theatlantic.com Major News Sites latimes.com abcnews.go.com thedailybeast.com sfgate.com newsweek.com chicagotribune.com economist.com theroot.com voanews.com nj.com miamiherald.com mercurynews.com bostonglobe.com seattletimes.com oregonlive.com washingtontimes.com azcentral.com ajc.com philly.com sacbee.com aspentimes.com bakersfield.com bendbulletin.com bnd.com broadcastingcable.com charlestoncitypaper.com chicagomaroon.com collegian.psu.edu columbian.com dailynebraskan.com dailynexus.com dailynorthwestern.com dailypress.com dailyprogress.com dailytexanonline.com dailytrojan.com dcourier.com delcotimes.com durangoherald.com fair.org fredericksburg.com globegazette.com greenvilleonline.com greenwichtime.com havasunews.com hcn.org heraldnet.com heraldsun.com heraldtimesonline.com ibj.com independent.com islandpacket.com jou.ufl.edu Small News Sites journalism.org journalismjobs.com journaltimes.com kitv.com knoxnews.com lacrossetribune.com leadertelegram.com macon.com myrtlebeachonline.com naplesnews.com nashvillescene.com news.cornell.edu news.usc.edu newseum.org news-journalonline.com news-leader.com newstimes.com nwfdailynews.com pjstar.com presstelegram.com rapidcityjournal.com readingeagle.com redandblack.com rgj.com sacurrent.com santacruzsentinel.com santafenewmexican.com 8 Category Site Small News Sites sgvtribune.com signalscv.com siouxcityjournal.com standard.net stanforddaily.com steynonline.com studlife.com tallahassee.com theday.com theeagle.com theledger.com timesleader.com ubm.com vcstar.com wacotrib.com wcfcourier.com wvgazettemail.com yakimaherald.com imdb.com ign.com rottentomatoes.com Arts ultimate-guitar.com npr.org vice.com tmz.com pitchfork.com wired.com forbes.com shutterstock.com businessinsider.com Business finance.yahoo.com bloomberg.com eventbrite.com fortune.com adweek.com webmd.com psychologytoday.com who.int Health apa.org bmj.com mercola.com menshealth.com self.com nejm.org 9gag.com jalopnik.com timeout.com Recreation lonelyplanet.com caranddriver.com hollywoodreporter.com nationalgeographic.com rd.com topix.com espn.com cricbuzz.com nba.com espncricinfo.com sports.yahoo.com bleacherreport.com nhl.com cbssports.com nfl.com Sports iplt20.com skysports.com deadspin.com nbcsports.com wwe.com si.com sbnation.com formula1.com rivals.com foxsports.com Notes: This table lists sites in the comparison groups. Major News Sites include 38 sites selected from the top 100 sites in Alexa's News category. Small News Sites include 78 sites selected from the sites ranking 401-500 in the News category. Business and Culture Sites include 54 sites selected from the top 50 sites in each of the Arts, Business, Health, Recreation, and Sports categories. For each group, we omit from our sample government websites, databases, sites that do not mainly produce news or similar content, international sites whose audiences are primarily outside the U.S., and sites that are included in our list of fake news sites. 9 Appendix Figure 1: Robustness Checks of Fake News Sites - Multiple Lists Panel A: Sites Identified by At Least Two Lists ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 45 30 15 1.8 1.2 .6 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 120 80 40 0 2015 2016 2017 2018 Number of sites: 116 Panel B: Sites Identified by At Least Three Lists 4.5 3 1.5 .12 .08 .04 ) n o i l l i m ( s e r a h s r e t t i w T ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 0 2015 2016 Number of sites: 19 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 150 100 50 0 2015 2016 2017 2018 Notes: This figure plots robustness checks for the sample of fake news sites by looking at sites only identified by multiple lists. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage- ments over Twitter shares averaged by quarter. Panel A includes sites identified by at least two lists out of five. Panel B includes sites identified by at least three lists. Grinberg et al.'s (2018) provide three types of domains. The black domains derive from lists that we already use (with the exception of nine sites, as PolitiFact and FactCheck updated their lists at some point). We avoid double-counting black domains when we count the number of lists that identify a fake news site. 10 Appendix Figure 2: Robustness Checks of Fake News Sites - Excluding Lists Panel A: Excluding Sites Only Identified by Grinberg et al. (2018) ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 150 100 50 3 2 1 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 60 40 20 0 2015 2016 2017 2018 Number of sites: 488 Panel B: Excluding Sites Only Ideitifed by PolitiFact ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 150 100 50 4.5 3 1.5 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 60 40 20 0 2015 2016 2017 2018 Number of sites: 380 Panel C: Excluding Sites Only Identified by BuzzFeed ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 210 140 70 6 4 2 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 45 30 15 0 2015 2016 2017 2018 Number of sites: 454 11 Appendix Figure 2: Robustness Checks of Fake News Sites - Excluding Lists (continued) Panel D: Excluding Sites Only Ideitifed by Guess et al. (2018) ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 180 120 60 6 4 2 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 45 30 15 0 2015 2016 2017 2018 Number of sites: 522 Panel E: Excluding Sites Only Identified by FactCheck ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 210 140 70 6 4 2 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 45 30 15 0 2015 2016 2017 2018 Number of sites: 552 Notes: This figure plots robustness checks for the sample of fake news sites by excluding sites only identified by a particular list. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage- ments over Twitter shares averaged by quarter. Panel A excludes sites only identified by Grinberg er al. (2018). Panel B excludes sites only identified by PolitiFact. Panel C excludes sites only identified by BuzzFeed. Panel D excludes sites only identified by Guess et al. (2018). Panel E excludes sites only identified by FactCheck. 12 Appendix Figure 3: Robustness Checks of Fake News Sites - Time Coverage Panel A: Sites that Started Active Operation after November 2016 ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 30 20 10 .45 .3 .15 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 90 60 30 0 2015 2016 2017 2018 Number of sites: 226 Panel B: Sites that were in Active Operation in July 2018 ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 180 120 60 6 4 2 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 45 30 15 0 2015 2016 2017 2018 Number of sites: 215 Panel C: Sites that were in Active Operation during August 2015 to July 2018 90 60 30 4.5 3 1.5 ) n o i l l i m ( s e r a h s r e t t i w T ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 0 2015 2016 Number of sites: 82 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 36 24 12 0 2015 2016 2017 2018 Notes: This figure plots robustness checks for the sample of fake news sites by looking at sites active in different period. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engagements over Twitter shares averaged by quarter. Panel A includes sites that started active operation after the election in November 2016. Panel B includes sites that were still in active operation in July 2018. Panel C includes sites that were in active operation during August 2015 to July 2018. A site is defined as being in active operation if it is tracked by Alexa with a global rank higher than one million in terms of total traffic. 13 Appendix Figure 4: Robustness Checks of Fake News Sites - Number of Interactions Panel A: Excluding Top Five Fake News Sites ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 150 100 50 4.5 3 1.5 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 60 40 20 0 2015 2016 2017 2018 Number of sites: 565 Panel B: The First Decile of Fake News Sites 180 120 60 6 4 2 ) n o i l l i m ( s e r a h s r e t t i w T ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 0 2015 2016 Number of sites: 57 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 45 30 15 0 2015 2016 2017 2018 Panel C: The Bottom Nine Deciles of Fake News Sites 36 24 12 .75 .5 .25 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 60 40 20 0 2015 2016 2017 2018 ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F Number of sites: 513 Notes: This figure plots robustness checks for the sample of fake news sites by excluding the largest sites and looking at sites of different sizes. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engagements over Twitter shares averaged by quarter. Panel A excludes five largest sites in terms of total Facebook engagements plus Twitter shares from January 2015 to July 2018. Panel B includes sites in the first decile. Panel C includes sites in the bottom nine deciles, i.e., excludes sites in the first decile. The deciles are also defined in terms of total Facebook engagements plus Twitter shares during the sample period. 14 Appendix Figure 5: Robustness Checks of Fake News Sites - Likelihood to Publish Misinformation 75 50 25 Panel A: Black Domains .6 .4 .2 ) n o i l l i m ( s e r a h s r e t t i w T 0 2015 2016 2017 2018 0 2015 2016 2017 2018 ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F Number of sites: 337 Panel B: Red Domains 0 2015 2016 Number of sites: 59 2017 2018 0 2015 2016 2017 2018 Panel C: Orange Domains s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 180 120 60 0 2015 2016 2017 2018 60 40 20 0 2015 2016 2017 2018 45 30 15 0 2015 2016 2017 2018 45 30 15 1.8 1.2 .6 ) n o i l l i m ( s e r a h s r e t t i w T 36 24 12 2.4 1.6 .8 ) n o i l l i m ( s e r a h s r e t t i w T ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 0 2015 2016 Number of sites: 44 2017 2018 0 2015 2016 2017 2018 Notes: This figure plots robustness checks for three lists of fake news sites in Grinberg er al. (2018) separately, classified by their likelihoods to publish misinformation. Each panel plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engagements over Twitter shares averaged by quarter. The black domains were reported to have published entirely fabricated stories, taken from pre-existing lists of fake news constructed by the fact-checking and journalistic outlets Politifact, FactCheck, and Buzzfeed, as well as domains used in other academic work. The red and orange domains are identified by Snopes as sources of fake news or questionable claims and classified by the authors by their levels of perceived likelihood to publish misinformation: stories from red domains have an extremely high likelihood of containing misinformation, and stories from orange domains a high likelihood. 15 Appendix Figure 6: Robustness Checks of Sites Focusing on Political News 24 16 8 3.6 2.4 1.2 ) n o i l l i m ( s e r a h s r e t t i w T ) n o i l l i m ( s t n e m e g a g n e k o o b e c a F 0 2015 2016 Number of sites: 10 2017 2018 0 2015 2016 2017 2018 s e r a h s r e t t i w T / s t n e m e g a g n e k o o b e c a F 15 10 5 0 2015 2016 2017 2018 Notes: This figure plots monthly Facebook engagements, Twitter shares, and the ratio of Facebook engage- ments over Twitter shares averaged by quarter of sites mostly focusing on political news. The sites include politico.com, thehill.com, brookings.edu, aei.org, c-span.org, realclearpolitics.com, donaldjtrump.com, hillaryclin- ton.com, democrats.org, and gop.com. 16
1508.06738
1
1508
2015-08-27T07:39:32
Characterization and Control of Diffusion Processes in Multi-Agent Networks
[ "cs.SI", "eess.SY" ]
Diffusion processes are instrumental to describe the movement of a continuous quantity in a generic network of interacting agents. Here, we present a probabilistic framework for diffusion in networks and propose to classify agent interactions according to two protocols where the total network quantity is conserved or variable. For both protocols, our focus is on asymmetric interactions between agents involving directed graphs. Specifically, we define how the dynamics of conservative and non-conservative networks relate to the weighted in-degree Laplacian and the weighted out-degree Laplacian. Our framework allows the addition and subtraction of the considered quantity to and from a set of nodes. This enables the modeling of stubborn agents with time-invariant quantities, and the process of dynamic learning. We highlight several stability and convergence characteristics of our framework, and define the conditions under which asymptotic convergence is guaranteed when the network topology is variable. In addition, we indicate how our framework accommodates external network control and targeted network design. We show how network diffusion can be externally manipulated by applying time-varying input functions at individual nodes. Desirable network structures can also be constructed by adjusting the dominant diffusion modes. To this purpose, we propose a Markov decision process that learns these network adjustments through a reinforcement learning algorithm, suitable for large networks. The presented network control and design schemes enable flow modifications that allow the alteration of the dynamic and stationary behavior of the network in conservative and non-conservative networks.
cs.SI
cs
Characterization and Control of Diffusion Processes in Multi-Agent Networks Wai Hong Ronald Chan, Matthias Wildemeersch, Tony Q. S. Quek 5 1 0 2 g u A 7 2 ] I S . s c [ 1 v 8 3 7 6 0 . 8 0 5 1 : v i X r a Abstract -- Diffusion processes are instrumental to describe the movement of a continuous quantity in a generic network of interacting agents. Here, we present a probabilistic framework for diffusion in networks and propose to classify agent interactions according to two protocols where the total network quantity is conserved or variable. For both protocols, our focus is on asym- metric interactions between agents involving directed graphs. Specifically, we define how the dynamics of conservative and non- conservative networks relate to the weighted in-degree Laplacian and the weighted out-degree Laplacian. Our framework allows the addition and subtraction of the considered quantity to and from a set of nodes. This enables the modeling of stubborn agents with time-invariant quantities, and the process of dynamic learning. We highlight several stability and convergence charac- teristics of our framework, and define the conditions under which asymptotic convergence is guaranteed when the network topology is variable. In addition, we indicate how our framework accom- modates external network control and targeted network design. We show how network diffusion can be externally manipulated by applying time-varying input functions at individual nodes. Desirable network structures can also be constructed by adjusting the dominant diffusion modes. To this purpose, we propose a Markov decision process that learns these network adjustments through a reinforcement learning algorithm, suitable for large networks. The presented network control and design schemes enable flow modifications that allow the alteration of the dynamic and stationary behavior of the network in conservative and non- conservative networks. Keywords -- multi-agent networks, diffusion process, directed graphs, graph Laplacian, network dynamics, network control, network design I. INTRODUCTION Large-scale network dynamics received ample research in- terest over the last decade in the context of group coordina- tion [1], distributed algorithms [2], [3], network control [4], distributed optimization [5], consensus problems [6], [7], or herding and flocking behavior [8]. Network dynamics involve interactions between individual agents and relate to the diffu- sion of a continuous quantity within a generic network [9] -- [15], including assets among financial institutions and opin- ions within social networks. In this work, we establish a probabilistic diffusion framework that describes in continuous time the movement of such a continuous quantity or node property within a multi-agent network. The main contributions of our framework are (i) to classify linear update rules and characterize the corresponding dynamical network behavior, (ii) to include external inputs as control variables into the Wai Hong Ronald Chan is with Stanford University, California, USA (email: [email protected]). Applied Systems Analysis [email protected]). for (email: Matthias Wildemeersch is with the International Institute (IIASA), Laxenburg, Austria Tony Q. S. Quek is with the Singapore University of Technology and Design (SUTD), Singapore (email: [email protected]). framework resulting in the study of the network stability and convergence under different conditions, and (iii) to impose flow modifications by means of network control and network design. This framework builds on consensus models involving Markovian state transitions that have been formulated in dis- crete time [1], [16] -- [20] and continuous time [21], as well as multi-agent gossiping models describing interactions between pairs of agents [15]. We generalize these models and introduce a classification of linear inter-agent update rules depending on whether the global quantity initially present in the network is conserved or not. This enables our framework to account for a wider range of network phenomena. For example, financial or trade assets could be modeled using conservative flows, while opinions follow non-conservative network dynamics. Going beyond symmetric, unweighted graphs [22], we focus on weighted graphs with asymmetric update rules and derive the corresponding differential equation that describes the diffusion of the considered quantity averaged over all sample paths. The nature of the update rule affects the stability and convergence of diffusion processes over networks [8]. We highlight the differences in the transient and stationary characteristics of conservative and non-conservative networks, the effects of network asymmetry, as well as the conditions for convergence in networks with switching topologies. Building on existing leader-follower models [23], [24], we extend the homogeneous differential equation that describes the diffusion process to its inhomogeneous form and use the inhomogeneous term to model an exogenous quantity input. By doing so, we can model the addition and subtraction of the considered quantity to and from the multi-agent network. Our framework unifies several types of systems involving external influences, including external restrictions on the quantity val- ues of selected agents, as well as externally imposed reference values obtained from measurements or predefined system targets. For instance, we demonstrate that diffusion processes considered by other authors, such as the presence of stubborn agents [15] or the process of dynamic learning [19], can be expressed in terms of the inhomogeneous differential equation. In addition, we demonstrate that under some constraints on the input vector and the network topology, networks with exogenous excitations can remain stable and converge to a steady state. Our framework enables network control through the in- troduction of external excitations at individual nodes or the adjustment of the network structure. By transforming the basis of agents using standard results in state-space control to isolate the time dynamics of the characteristic modes of the system from one another [25], and implementing a suitable controller for one of the modes, we can design time-varying input functions for each of the individual agents. A suitable choice of the controller will allow the network designer to 2 guide the system towards a desired objective in terms of diffusion control. Different types of networks are associated with different modal compositions and require different input design considerations for the achievement of control. Besides externally imposing control on a network, we also address the modification of inter-agent interactions to impose network control. By modifying the transition rate matrix that governs the network dynamics, the eigenvalues of the characteristic modes of the system are shifted, and the dynamics of the system are modified. Furthermore, we present an adaptive heuristic that models the modification of the network structure as a Markov decision process (MDP). In this MDP, the state space is defined as the set of individual agents, while the action space is defined as perturbations to the transition rate matrix governing the system evolution. Using an appropriate reward function and a suitable time schedule for decision making, the action space can be searched efficiently using a reinforce- ment learning algorithm based on standard learning techniques [26], and suboptimal control with quick convergence can be achieved. By enabling each agent to be associated with a cost or a reward, we allow the isolation and control of individual nodes through this modification. In conclusion, the proposed network control and network design processes form a toolbox for the micromanagement of diffusion in networks. The remainder of the paper is structured as follows. In Sec- tion II, we introduce two essential classes of stochastic update rules that are able to model diffusion in networks, and derive the corresponding linear system of ordinary differential equa- tions that describe the network dynamics for the corresponding conservative and non-conservative networks. In Section III, we further discuss the stability and convergence characteristics of these differential equations. In Section IV, we extend the homogeneous equations to their inhomogeneous forms, and discuss their stability and convergence characteristics. In Sec- tion V, we look at how external excitation can possibly achieve control, and in Section VI, we discuss the impact and possible implementations of network structure modification. In Sections V and VI, we also provide case studies to illustrate how these control processes can be implemented. In Section VII, we conclude our work by looking at some future directions and extensions. II. SYSTEM MODEL AND STOCHASTIC UPDATE RULES We consider a population V of interacting agents Vi, where i ∈ I = {1, 2, . . . , n : n ∈ Z+}. These agents have the capacity to generate, destroy, store, transmit and receive a continuous quantity or node property Si(t) ∈ R that can change with time t ≥ 0. We denote the vector of properties by S(t) = {Si(t) : i ∈ I}. Given some set of initial conditions Si(0) = Si,0 for some Si,0 ∈ R, as well as probabilistic interactions between the agents, the system evolves over time and the property Si(t) of each agent can be monitored over time. The probabilistic interactions between the agents can be described by a weighted digraph G = (V, (cid:126)E, w) where V is the set of agents, (cid:126)E is the set of directed links between pairs of agents in V, and w : (cid:126)E → R+ is a function that represents the weights. The weighted adjacency matrix can be represented as AG(i, j) = w(i, j) if (i, j) ∈ (cid:126)E , otherwise . 0 (1) (cid:26) Furthermore, we define the weighted in-degree matrix D(in) and the weighted out-degree matrix D(out) as the diagonal matrices with G G (cid:88) (cid:88) i and D(in) G (j, j) = D(out) G (i, i) = AG(i, j) , AG(i, j) . (2) (3) j The exact meaning of the edge weight and the direction of the links will be made explicit when we analyze the update rules, referred to as protocols, in the following Section. Since the interactions between agents can be asymmetric, we will introduce two different Laplacians that refer to the in-degree and the out-degree of each node. We define the weighted in- degree Laplacian as L(in)(G) = D(in) G − AG . (4) Conversely, the weighted out-degree Laplacian is defined as L(out)(G) = D(out) G − AG . (5) Depending on the choice of the stochastic update rule used in the probabilistic interactions between the agents, we will characterize the flow dynamics of networks operating under different protocols. Here, we describe two main classes of linear update rules that result in linear, time-invariant differen- tial equations in the node property and corresponding linear, time-invariant matrix differential equations in the diffusion probabilities.1 These update rules are distinguished by the conservation or the non-conservation of the total property initially present in the network. The networks applying the conservative and non-conservative protocols will be referred to as conservative and non-conservative networks respectively. A. Conservative networks We first consider a protocol where the total amount of property in the network is conserved at every instant in time. Conservative updating is relevant for the description of conservative flow dynamics in a network, including the flow of material and physical assets. In this respect, conservative networks are able to represent stylized instances of hydraulic, financial, or trade networks. In conservative networks, agents obey the conservative up- date rule Si(t + ∆t) = Si(t) + CijSj(t) Sj(t + ∆t) = (1 − Cij)Sj(t) , (P1) where i, j ∈ I, (i, j) ∈ (cid:126)E. The parameter Cij ∈ (0, 1] is a measure of liability or responsibility of agent j towards agent i, and ∆t is an infinitesimal time interval. For every edge (i, j) ∈ (cid:126)E, there exists a clock that follows an independent Poisson process with rate rij > 0. The protocol (P1) is executed for nodes i and j when the independent Poisson clock of (i, j) ticks. The following Lemma characterizes the property dynamics of the instance-averaged value of S in conservative networks. 1For non-linear update rules, we refer to [27]. CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 3 Lemma 1. Let ¯S(t) denote the expected value of S averaged over all sample paths. The dynamics of the expected property for a network applying (P1) are defined by ¯S(t) = Q ¯S(t) , (A) where Q = −L(in)(G), the weighing function is defined as w(i, j) = Cijrij, and (cid:26) Cijrij −(cid:80) i ∈ V is given by ri =(cid:80) of the network is given by r =(cid:80) Qij = i(cid:54)=j Cijrij Proof: We first note that the total update rate for an node j rij, and that the total update rate i ri. Assume that a global network clock is ticking at rate r. Then, the probability that the clock will activate edge (i, j) is given by rij/r, where in the limit of large-scale networks r ≈ 1/∆t. Consequently, when property updating follows (P1), the probabilistic update of the property of the nodes corresponding to the edge (i, j) is given by if i (cid:54)= j , if i = j . ¯Si(t + ∆t) − ¯Si(t) = (cid:88) ¯Sj(t + ∆t) − ¯Sj(t) = −(cid:88) j(cid:54)=i rij ∆t Cij ¯Sj(t) rij ∆t Cij ¯Sj(t) , (6) (7) (8) i(cid:54)=j which can be succinctly written as ¯Si(t + ∆t)− ¯Si(t) = (cid:88) ∆t(rijCij ¯Sj(t)− rjiCji ¯Si(t)) . (9) Dividing by ∆t and taking the limit for ∆t → 0, we get a system of differential equations ¯Si(t) = rijCij ¯Sj(t) − rjiCji ¯Si(t) , j(cid:54)=i (cid:88) j(cid:54)=i or written differently ¯S(t) = −L(in)(G) ¯S(t) , (10) (11) which concludes the proof. We will refer to (A) as the governing equation. Corollary 1. The matrix Q = −L(in)(G) of a conservative network represents the transition rate matrix of a continuous- time Markov chain (CTMC). The transition probabilities Pij(t) of the CTMC are solutions of the following differential equa- tion P(t) = QP(t) ,P(t) = [Pij(t)] . (12) Proof: From (6), we notice that the Qjj Qij ∀ j ∈ I, (13) = −(cid:88) . i(cid:54)=j such that the columns of Q sum to zero. It follows that Q represents the transition rate matrix of a positive recurrent CTMC. Accordingly, the spread of property from one agent to another can be described by a CTMC whose state space is equivalent to the agent set V and whose instantaneous state is denoted by X(t). Given that the diffusion dynamics can be described by a CTMC, we can write [28] Pr[X(t + u) = i] = Pij(u) Pr[X(t) = j] ,∀ u ∈ (0,∞) (14) (cid:88) j for some state i ∈ I, where Pij(u) = Pr[X(t + u) = iX(t) = j] (15) describes the probability that an infinitesimal piece of property is in state i (i.e. agent i) at time t + u, given that it was in state j (i.e. agent j) at time t. From (14), it follows that the transition probability matrix P = [Pij] satisfies P(t + u) = P(t)P(u) ∀ t, u ∈ (0,∞) , (16) which is known as the Chapman-Kolmogorov equation. As- suming the limits limh→0 P(h) = P(0) and limh→0 P(h) = P(0) exist, we can then adopt the relation P(0) = I where I is the identity matrix, and thereafter the following deterministic differential equation P(t) = QP(t) (17) where Q = P(0) = [Qij]. We can interpret (12) as an equation describing the diffusion of transition probabilities between the various agents over time. Note that Lemma 1 can also be demonstrated via a proba- bilistic interpretation of the CTMC. It can be shown that P(t) is continuous in t, ∀t ≥ 0 [28]. For a conservative network, P(t) always sum to it follows from (13) that the columns of zero. This shows that for each origin agent j, the sum over all the agents i of the time-cumulative transition probabilities Pij is conserved at a value of 1 over time, as expected from conventional laws of probability. We now consider the expected value of Si averaged over all sample paths, which is given by the column vector ¯S(t) = P(t) ¯S(0) . (18) This illustrates that the sum of ¯S over all agents remains a conserved quantity when (P1) is applied. If the system starts from a known, deterministic state, then the bar in ¯S(0) can be omitted. Combining (12) and (18), we find again (A). B. Non-conservative networks We now consider a protocol where property diffuses be- tween agents by means of a convex updating protocol. This protocol is of interest for opinion dynamics [3], [15], or preference dynamics in cultural theory [29]. In non-conservative networks, agents obey the following convex update rule [15] Si(t + ∆t) = CijSj(t) + (1 − Cij)Si(t) , (P2) whenever the Poisson clock ticks for a pair of agents i, j ∈ I, (i, j) ∈ (cid:126)E. In other words, when the (i, j)-th Poisson clock activates the link between agents i and j, agent i is triggered to poll the property value of agent j with a confidence measure of Cij and update its own value accordingly. The following Lemma characterizes the property dynamics in non- conservative networks. Lemma 2. The dynamics of the expected property for a network applying (P2) are defined by the governing equation ¯S(t) = Q ¯S(t) , where Q = −L(out)(G), w(i, j) = Cijrij, and if i (cid:54)= j , if i = j . (cid:26) Cijrij −(cid:80) Qij = j(cid:54)=i Cijrij (A) (19) 4 Proof: When property updating follows (P2), the proba- bilistic update of the property of node vi ∈ V is given by ¯Si(t + ∆t) − ¯Si(t) = (rij∆t)Cij( ¯Sj(t) − ¯Si(t)) . (20) (cid:88) j(cid:54)=i Dividing by ∆t and taking the limit for ∆t → 0, we obtain the instance-averaged linear differential equations represented by (A) with Q = −L(out)(G). (cid:0) ¯Sj(t) − ¯Si(t)(cid:1), with Ni the neighbor- where ¯Si(t) =(cid:80) Note that Lemma 2 extends the basic consensus algorithm hood of i, to asymmetrically weighted updating. The relevance of the asymmetry will be further discussed in Section III. Corollary 2. The matrix Q = −L(out)(G) of a non- conservative network represents the transition rate matrix of a CTMC, and the transition probabilities of the CTMC are solutions of the following differential equation j∈Ni (21) Proof: The proof is similar to the proof of Corollary 1, P(t) = QP(t) , and follows from the fact that Qij ∀ i ∈ I , (22) = −(cid:88) . j(cid:54)=i Qii meaning that the rows of Q all sum to zero. The CTMC corresponding to Q represents a random walk on G. In comparison with the transfer of an infinitesimal piece of property in a conservative network, Pij in non-conservative networks represents the probability that node i polls node j to update its own value using the weight Cij. For networks applying (P2), we note similarly that the rows of P(t) always sum to zero, and consequently the rows of P(t) always sum to one. This shows that every polling tag originating from an agent i must either still be under the possession of agent i or of some other agent j in the network. Remark 1. Lemma 1 and Lemma 2 make the link between the protocols (P1) and (P2) and the transition rate matrices explicit. In the case of a symmetric Q matrix, the in-degree and out-degree Laplacians are identical. Hence, the conservative and non-conservative protocols are equivalent for symmetric matrices. In the event of asymmetry, we observe from (4) and (5) that the conservative Q and the transpose of the non- conservative Q are identical if the two corresponding digraphs have the same weights w but with all link directions reversed. III. HOMOGENEOUS EQUATION: STABILITY AND CONVERGENCE In this Section, we analyze the steady-state characteristics of the homogeneous equation (A) based on the eigendecom- position of the rate transition matrix Q. The relevance of Q can further be understood by considering that (12) and (21) can be solved as P(t) = exp(Qt), indicating the role of the topology, the inter-agent measures of confidence, and the updating rates in the diffusion process. Due to the construction of Q as a Laplacian matrix, Q always has the eigenvalue qs = 0. Moreover, Q is a Metzler matrix, such that exp(Qt) is nonnegative for t ≥ 0. If Q is diagonalizable, then we can write ¯S(t) = exp(cid:0)AΛA−1t(cid:1)S(0) = A diag (exp(qkt)) A−1S(0) , where A contains the unit right eigenvectors of Q as columns, A−1 contains the corresponding left eigenvectors of Q as rows, qk represents the eigenvalues of Q, and Λ = diag(qk). We can further write ¯S(t) = = exp(qkt)vR,kvT L∗,kS(0) ck exp(qkt)vR,k , (24) (cid:88) (cid:88) k k where vR,k and vL∗,k are the unit right and corresponding left eigenvectors2 of Q in column form, and ck = vT L∗,kS(0) are scalars. We refer to the eigenvectors of Q as the system modes. From (24), the eigenvalues and eigenvectors reflect the characteristic growth and decay rates of the system, as well as the dominant and weak nodes in the network. In particular, the quantities of the network nodes are stable and converge to a steady-state distribution in finite time iff the eigenvalues of Q are nonpositive and include zero. Note also that the steady- state behavior of the nodes is given by limt→∞ ¯S(t) = csvR,s, where cs and vR,s are the scalar and the unit right eigenvector corresponding to qs = 0. As per Gersgorin's circle theorem, transition rate matrices Q constructed according to (P1) or (P2) and associated with CTMCs satisfy these properties. In the following subsections, we will illustrate the dynamics for different strongly connected network classes by means of the network presented in Fig. 1. 1 1 α 2 1 α 3 1 α 4 1 α 5 Fig. 1: Path graph P5 with symmetric links of unit weights used to illustrate the transient and steady-state behaviors of the various update rules. A. Conservative asymmetric networks For conservative networks, we formulate the following Lemma for the stationary behavior. Lemma 3. The stationary value of a strongly connected asymmetric network applying (P1) is given by the unit steady- i Si,0/Ψ where state right eigenvector vR,s scaled by cs =(cid:80) Ψ is the sum of the entries of vR,s. Proof: In networks that apply (P1), the column-sum of Q = −L(in)(G) is zero, such that Q has a unit steady-state left eigenvector vL,s with equal components. In an asymmetric network, the stationary node values are in general imbalanced due to the unequal components in the unit steady-state right eigenvector vR,s. Considering (24), the proof is concluded. In the case of asymmetric liabilities between nodes, the stationary distribution will favor attractive nodes and shun repulsive nodes, and uniform spreading of the property over all the nodes does not occur in general. This is a consequence of the conservation of total property after every update. We illustrate this for the network in Fig. 1 with α = 0.2 in the plot of ¯Si(t) in Fig. 2, where we observe that the steady-state properties for each node are different. In the latter plot, we generate ¯Si(t) by both empirically generating sample paths based on the update rule (P1), and analytically determining the expected property from (24). (23) 2The left eigenvectors vL∗,k are only unit in the case where Q is symmetric. CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 5 Fig. 2: Comparison of instance-averaged node property obtained through Monte Carlo simulations (dotted lines) and expected property obtained by eigendecomposition of the matrix Q (solid lines) for the asymmetric network in Fig. 1 with α = 0.2 under (P1). For the simulations, 5000 trials were performed, and each timestep was discretized into 1000 sub-units. In both cases, the initial conditions S(0) = [0 0 0 0 1] were adopted. Fig. 3: Comparison of instance-averaged property obtained numerically (dotted lines) and analytically (solid lines) for the asymmetric network in Fig. 1 with α = 0.2 under (P2). The simulation parameters are identical to those in Fig. 2. In this case, the unit steady-state left eigenvector is [0.0016 0.0078 0.0392 0.1960 0.9798] and the unit steady-state right eigen- vector is [1 1 1 1 1], which gives us Ω = 1.2244 and the corresponding consensus value cv = 0.8003. 1√ 5 B. Non-conservative asymmetric networks For networks that apply the convex update rule (P2), we formulate the following Lemma for the stationary behavior. Lemma 4. A strongly connected asymmetric network follow- ing the convex update rule (P2) always achieves consensus. n in the infinite time The final consensus value cv = cs/ horizon is the weighted average of S(0), where the weights are the corresponding entries of the unit steady-state left eigenvector vL,s, scaled by the factor 1/Ω, where Ω is the sum of the entries in vL,s. In other words, √ cv = L,sS(0) . vT 1 Ω (25) √ Proof: Since the row-sum of Q = −L(out)(G) is zero, Q has a right unit eigenvector with equal components, demonstrating that strongly connected networks with possibly asymmetric updating always achieve agreement. In order to determine the final consensus value, we need to determine for each node the constant cs that corresponds to the initial conditions enforced on the system. This involves finding the row of A−1 corresponding with qs = 0. For an asymmetric matrix, this corresponds to the unit steady-state left eigenvector of Q scaled by the factor n/Ω, since the dot product of this vector and the unit steady-state right eigenvector must equal 1 based on the initial conditions P(0) = I = A−1A. The result is then scaled by the magnitude of the entries of vR,s to obtain cv. We illustrate this for the network in Fig. 1 with α = 0.2 in the plot of ¯Si(t) in Fig. 3. In the latter plot, we generate ¯Si(t) by both empirically generating sample paths based on the update rule (P2), and analytically determining the expected property from (24). In this case, the final consensus value is heavily weighted towards node 5, whose inward link weight exceeds its outward link weight. This means that node 5 is heavily polled by its neighbors, resulting in its higher weight in the final consensus value. Such a trend is reminiscent of the availability heuristic, or availability bias, where subjects that are encountered or recalled more often are given more thought and emphasis [30]. Fig. 4: Comparison of instance-averaged property obtained numerically (dotted lines) and analytically (solid lines) corresponding to the symmetric network in Fig. 1 with α = 1. The simulation parameters are identical to those in Fig. 2. C. Symmetric networks In a strongly connected symmetric network, the steady-state right eigenvector has components of equal magnitude in all dimensions regardless of the update rule. We can interpret this as an equal sharing of resources in conservative networks and consensus among all agents at a value corresponding to the average of the initial conditions at all the nodes in non- conservative networks [15], [17] -- [19]. We illustrate this for the network in Fig. 1 with α = 1 in the plot of ¯Si(t) in Fig. 4. In the latter plot, we generate ¯Si(t) by both empirically gen- erating sample paths based on the update rules (P1) and (P2), which are equivalent in this case, and analytically determining the expected property from (24). D. Switching topologies There are many important scenarios where the network topology can change over time. As an example, connections in wireless sensor networks can be established and broken due to mobility. In this Section, we study the steady-state behavior of networks with switching topologies and provide a condition that leads to convergence under dynamic topologies. Networks with switching topologies converge if they exhibit the same 0246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 50246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 50246810121416182000.20.40.60.81TimeInstance−averaged property at each node Node 1Node 2Node 3Node 4Node 5 6 invariant stationary value as defined in Lemma 3 and Lemma 4, which depend on vR,s and vL,s for (P1) and (P2) respectively. We introduce now two classes of strongly connected, di- rected graphs for which the weighted Laplacian shares the left or the right eigenvector corresponding to qs = 0. For conservative networks, we have G(P1) vs = {G(V, (cid:126)E, w) : rank L(in)(G) = n − 1, L(in)(G) × vR,s = (cid:126)0} . For non-conservative networks, we define G(P2) vs = {G(V, (cid:126)E, w) : rank L(out)(G) = n − 1, vL,s × L(out)(G) = (cid:126)0} . (26) (27) Correspondingly, we define the following sets of matrices with equal steady-state eigenvectors as follows M (P1) vs M (P2) vs = {Q : Q = −L(in)(G),Q × vR,s = (cid:126)0} = {Q : Q = −L(out)(G), vL,s × Q = (cid:126)0} . (28) For these classes of networks, the system dynamics are de- scribed by ¯S(t) = Qk ¯S(t) , (29) vs when (P1) is applied, and Qk ∈ M (P2) where Qk ∈ M (P1) when (P2) is applied. The index k changes over time according to k = f (t), f : R+ → IM , where IM is the index set of the corresponding set of matrices. Lemma 5. Consider a network with network dynamics as described in (29). The networks that are strongly connected and follow (P1) or (P2) are globally asymptotically convergent if Qk belongs to M (P1) , respectively. or M (P2) vs vs vs vs vs or M (P2) Proof: The proof follows from the fact that all networks that belong to M (P1) converge to the same invariant quantity, as they share the same right and left eigenvector, respectively. As all elements of M (P1) are globally vs asymptotically stable, this concludes the proof. We introduce now the distance vector δ = ¯S(t) − csvR,s. As csvR,s is an equilibrium of the system, we can write the distance dynamics as follows and M (P2) vs δ(t) = Qkδ(t) . (30) vs or M (P2) vs We cannot make a general statement about the definiteness of asymmetric matrices with non-positive eigenvalues. For the matrices belonging to M (P1) that are negative definite, we can bound the convergence speed of the distance vector as follows. Corollary 3. Consider a strongly connected graph for which the weighted in-degree or out-degree Laplacian is negative definite. For these networks, the distance vector globally asymptotically converges to zero and the convergence speed can be bounded as (cid:107)δ(t)(cid:107)2 ≤ (cid:107)δ(0)(cid:107)2 exp(qmaxt) (31) where qmax = max q2(M (P1) ) for conservative networks and vs qmax = max q2(M (P2) ) for non-conservative networks. Here, vs q2 is the non-zero eigenvalue with the smallest absolute value of the corresponding transition rate matrix. Proof: The proof of this corollary builds on the Lyapunov function V (δ) = 1/2δ(t)T δ(t). The first derivative can be written as V (δ(t)) = 1/2(cid:0)δ(t)TQT k δ(t) + δ(t)TQkδ(t)(cid:1) , (32) V (δ(t)) ≤ 0 due to the assumptions made. Using such that the Courant-Fischer theorem, and similar to [17], the proof is concluded. Remark 2. A relevant question is if it is possible to verify if two matrices Q1 and Q2 belong to the same set M (x) vs , x ∈ {P 1, P 2}. The common eigenvector problem can be solved when the eigenvalue is not known [31], [32]. For the special case where the common eigenvalue is equal to zero, two matrices Q1 and Q2 have the same eigenvector corresponding to qs = 0 if null(Q1) = null(Q2) . (33) IV. INHOMOGENEOUS EQUATIONS: STABILITY AND CONVERGENCE To model the exogenous addition and subtraction of property to multi-agent networks, we extend the homogeneous equation (A) to include an inhomogeneous term ¯S(t) = Q ¯S(t) + U(t) , (34) where U is an arbitrary input vector. Since the inhomogeneous equation (34) is linear in the exogenous input the exogenous input can either be constant over all sample paths or averaged over all sample paths. Both interpretations will result in identical instance-averaged inputs. For linear, time-invariant systems, the system response can be derived in closed form. Note that the solution to (A) with initial conditions of the network state S(0) is given by ¯Sh(t) = exp(Qt)S(0). It can be shown that the general solution to (34) is given by [25] term, (cid:90) t ¯S(t) = ¯Sh(t) + exp(Q(t − τ ))U(τ )dτ. (35) 0 This can be interpreted as the sum of the solution to (A) and the convolution of the input U with the impulse response to (34) for every node in the network. We now discuss several important use cases for the input vector U and show that many scenarios can be described as in (34). In particular, we will demonstrate that networks containing stubborn agents [15] and networks with dynamic learning [19] can both be expressed in the form of the inhomogeneous governing equation with constant and dynamic U respectively. This motivates the study of stability and convergence in the presence of exogenous inputs. A. Non-conservative networks with static inputs Adopting the definition in [15], as well as the consensus update rule (P2), a stubborn agent does not adjust its own value based on the values of neighboring nodes. This scenario is of interest to model opinion dynamics where a set of agents has constant opinion. In these networks, the out-degree of a stubborn agent is zero and the corresponding row of Q is a zero-row.3 For example, in the presence of two stubborn agents 3Conversely, if the in-degree of an agent equals zero, the node acts as a sink, which can receive property from every neighbor but does not contribute to his neighborhood. This case, where Q contains a zero column, does not lead to a convenient reduction of the state space. CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 7 a1 = 2 and a2 = n, the governing equation can be written as follows ... ¯Sn   ¯S1  =  Q(cid:48)  = 0 ··· Q1,1 Q1,2 ··· Q1,n 0 0 Q3,1 Q3,2 ··· Q3,n ... ... ... ... ··· 0 0  ¯S(cid:48) 0 which can be reformulated as 1,1 Q(cid:48) ... ... Q(cid:48) n−2,1 Q(cid:48) n−2,2 ··· Q(cid:48) ··· Q(cid:48) ... ... ¯S(cid:48) n−2 1,2 1 1,n−2 ... n−2,n−2  ... + ... Bk,a1 Bk,a2 ... ...  ... ¯Sn  ¯S1  ,  ¯S(cid:48)  ... (cid:20) ¯Sa1¯Sa2 ¯S(cid:48) (cid:21) n−2 1 , (36)  (37) ii ≤(cid:80) According to Gersgorin's circle theorem, all eigenvalues of Q(cid:48) reside in the complex plane within the union of the disks Di = {z ∈ C : z − Q(cid:48) ij} , 1 ≤ i ≤ n(cid:48) with ij for a strictly j(cid:54)=i Q(cid:48) n(cid:48) the dimension of Q(cid:48). As Q(cid:48) diagonally dominant matrix, Q(cid:48) cannot have a zero eigenvalue and is invertible. ii >(cid:80) j(cid:54)=i Q(cid:48) From Lemma 6, we notice that for networks with stubborn agents the eigenvalues will on average be more concentrated around Q(cid:48) ii, which can accelerate the network dynamics. For the convergence of a BIBO-stable reduced system involving Q(cid:48) with the conditions of Lemma 6 satisfied, we formulate the following Lemma. . Lemma 7. Let Bu = b. If each agent is connected to at least one stubborn agent, then the network state converges to ¯S(cid:48)∗ = −Q(cid:48)−1b. We can then express the system dynamics as a homogeneous equation in the deviation of the property of a node from its steady state ¯S(cid:48) ∆ = ¯S(cid:48) − ¯S(cid:48)∗: ∆(t) . ¯S(cid:48) ∆(t) = Q(cid:48) ¯S(cid:48) (41) ∆ ∆ (cid:54)= (cid:126)0 ∆ Q(cid:48) ¯S(cid:48) V = ¯S(cid:48)T ∆ Q(cid:48)T ¯S(cid:48) Proof: The proof of this Lemma follows from traditional convergence results similar to those for the basic consensus algorithm [15], [17] -- [19] since the inhomogeneous equation in ¯S(cid:48) can be expressed as a homogeneous equation in ¯S(cid:48) ∆(t) and the poles of Q(cid:48) lie in the open left-half complex plane. Global asymptotic stability can be demonstrated for sym- metric Q(cid:48) by using the standard Lyapunov function V = ¯S(cid:48) ¯S(cid:48)T ∆. In this case, we obtain ∆ + ¯S(cid:48)T ∆ < 0 ∀ ¯S(cid:48) since Q(cid:48) and thus its transpose are negative definite. This demonstrates that the equilibrium point of the network is globally asymptotically stable, and the location of the point can be obtained by setting ¯S(cid:48) The Lyapunov function above does not hold for nonsymmet- ric Q(cid:48). However, because Q(cid:48) is strictly diagonally dominant, the existence of a Lyapunov function for Q(cid:48) can be demon- strated to prove the global asymptotic stability of ¯S(cid:48) [33]. One such Lyapunov function is V = maxi ¯S(cid:48) ∆,i, which proves the global asymptotic stability of ¯S(cid:48). in the general case of conservative or non- conservative updating without stubborn agents, Q is con- structed such that it has a steady state eigenvalue qs = 0. As a consequence, Q is not invertible. If Q (or Q(cid:48)) is singular, then BIBO stability is no longer guaranteed, and the system is instead only marginally stable. Lemma 8. A non-trivially convergent network where qs = 0 exists, diverges in infinite time in the presence of a constant input vector b. Note that ∆ = (cid:126)0. Proof: Consider the convolution integral in (35). Since Q is not invertible, we perform the convolution integral by expanding the matrix exponential in a power series and per- forming an eigendecomposition of Q. Then, since the steady- state eigenvector does not decay with time, the integral does not converge in infinite time. B. Non-conservative networks with dynamic inputs (40) In the case of dynamic learning, each node updates its own value based on the value of its neighboring nodes, as well where Bk,a1 and Bk,a2 are the a1-th and a2-th columns of Q with the a1-th and a2-th entries omitted. The entries of these columns depend both on the network structure and the update profile, and we get ¯S(cid:48)(t) = Q(cid:48) ¯S(cid:48)(t) + Bu , (38) where ¯S(cid:48) and Q(cid:48) represent the reduced state space and reduced transition rate matrix, and u = [ ¯Sa1 ··· ¯San ]T contains the static quantities of the stubborn agents. We notice from (38) that the presence of the stubborn agents in the network leads to a reduction of the state space and a formulation equivalent to (34) with constant but possibly different inputs for different stubborn nodes, and U = Bu. The reduced state space excludes the stubborn agents and the reduced transition rate matrix excludes the rows and columns corresponding to these agents. Note that the inhomogeneous equation (34) with static inputs corresponds to typical open-loop control systems. Since the input vector U is constant, is known that bounded-input bounded-output (BIBO) stability of (38) is guaranteed iff all eigenvalues of Q(cid:48) have negative real com- ponents. In addition, since Q(cid:48) is constructed differently from Q, the convergence of the homogeneous and inhomogeneous systems is not identical. Define Ist = {i : ¯Si(t) is constant} as the index set of stubborn agents. Then, we can write Qij, and the row sum of Q(cid:48) satisfies Qii = −(cid:80) j(cid:54)=i,j /∈Ist j(cid:54)=i,j∈Ist it Q(cid:48) ij ≤ 0 . (39) Qij −(cid:80) (cid:88) Q(cid:48) ii + j(cid:54)=i As a consequence, Q(cid:48) does not have a zero eigenvalue in general and is nonsingular in general. In the following Lemma, we provide a condition that guarantees the non-singularity of Q(cid:48). Lemma 6. In a network with stubborn agents, the transition rate matrix Q(cid:48) of the reduced state space is invertible if all nodes are connected to at least one stubborn agent. Proof: If each agent is connected to at least one stubborn agent, Q(cid:48) is strictly diagonally dominant and we can write (cid:88) j(cid:54)=i Q(cid:48) ii + Q(cid:48) ij < 0 . 8 as the difference of its own value with a measurement of the system state [19], which can be interpreted as a reference input for the node. This scenario is of interest to model tracking systems that are augmented with the information present in the neighborhood. This can be represented by the following update rule (cid:88) Si(t+∆t) = Si(t)+ Cij(Sj(t)−Si(t))+β(t)(Xi(t)−Si(t)) , (42) where Xi(t) represents the measurement of node i at time t. If the measurement of each node is made at a rate ρ, then the corresponding governing equation is j(cid:54)=i ¯S(t) = (Q − β(cid:48)I) ¯S(t) + β(cid:48)X(t) , (43) where β(cid:48) = βρ, and where rij = ρ in the construction of Qij. This is again reminiscent of (34) with time-varying U = β(cid:48)X(t). The inhomogeneous governing equation with dy- namic reference inputs corresponds directly to typical closed- loop proportional control systems with reference input X and proportional gain β(cid:48). Analogous to the case of systems with stubborn agents above is the BIBO stability criteria for the system with dynamic learning and constant β(cid:48): iff all eigenvalues of QD = Q − β(cid:48)I have negative real components, then an input β(cid:48)X(t) that is bounded for all time t > 0 will result in BIBO stability. In addition, we formulate the following Lemmas for the convergence of a BIBO stable dynamic learning system with constant β(cid:48). Lemma 9. If QD is invertible and limt→∞ X(t) = X∗ for some real-valued constant X∗, then the network state converges to ¯S∗ = −QD −1β(cid:48)X∗. Proof: The proof of this Lemma is analogous to the proof of Lemma 7. Remark 3. If Q corresponds to a CTMC and β(cid:48) > 0, then the eigenvalues of QD are exactly β(cid:48) less than the eigenvalues of Q, and the resultant system is guaranteed to be BIBO stable, provided β(cid:48) takes the same value for all agents. In the more general case where X(t) is not an independent measurement, but a function of ¯S∆, we can formulate the following Lemma. Lemma 10. If ¯S∆ reaches equilibrium much faster than X, X(t) ≈ then we can approximate h(X, 0) for any arbitrary function h and regardless of whether X eventually converges. The time evolutions of ¯S∆ and X can then be approximated as independent even if they were originally coupled. X(t) = h(X, ¯S∆) as Proof: This Lemma follows directly from the moving equilibrium theorem. C. Dynamic non-reference inputs Consider the following variation of (43) ¯S(t) = Q ¯S(t) + U(t) , (44) where U(t) is some arbitrary time-varying input vector and Q can be used to described a CTMC. The inhomogeneous governing equation with dynamic non-reference inputs cor- responds to typical open-loop control systems. Since Q is singular, the system is only marginally stable and not BIBO stable. A marginally stable system is known to give a bounded output if its input is an impulse of finite magnitude. By the principle of superposition, a continuously finite input that eventually decays to zero will also give a bounded output. D. Expanded state space (cid:88) j(cid:54)=i Consider the following variation of (42) Si(t+∆t) = Si(t)+ Cij(Sj(t)−Si(t))+β1(Xi(t)−Si(t)) + β2( Xi(t) − Si(t)) + β3(Yi(t) − Ti(t)) , (45) where Yi(t) = Xi(t) and Ti(t) = Si(t). This leads us to the coupled equations ¯T (t) = ¯S(t) , 2) ¯S(t) = (Q − β(cid:48) 1 (1 + β(cid:48) I) ¯S(t) − β(cid:48) ¯T (t) X(t) + β(cid:48) 3 + β(cid:48) 1X(t) + β(cid:48) 2 3Y (t) , (46) (47) 1 3 2 1 3Y (t) . = (β(cid:48) 1 = β1ρ, β(cid:48) 2 = β2ρ and β(cid:48) where β(cid:48) 3 = β3ρ. The inhomogeneous governing equation with an expanded state space corresponds to typical closed-loop proportional, integral and derivative (PID) control systems. Here, β1, β3 and β2 correspond to P, I and D controls respectively. The expanded state space now includes the components of both S and T , and we can write this as a single relation 2)I ¯T (t) + (β(cid:48) (1 + β(cid:48) I − Q) ¯T (t) + β(cid:48) = β(cid:48) Y (t) + β(cid:48) I ¯T (t) Y (t) + β(cid:48) 2s2+β(cid:48) 3)(cid:2)(1 + β(cid:48) (48) Performing a Laplace transform and then rearranging, we obtain ¯S , X (49) where the hat above a quantity denotes a Laplace-transformed quantity. The stability of this system is determined by the roots of the characteristic polynomial of the system, which can be obtained from the determinant of the matrix QE = I(cid:3). From standard state-space (cid:2)(1 + β(cid:48) I − Q)s + β(cid:48) I − Q)s + β(cid:48) 2)Is2 + (β(cid:48) I(cid:3)−1 1s+β(cid:48) 2)Is2 + (β(cid:48) theory, if all the poles of the system, or the roots of the characteristic polynomial of QE, lie in the open left-half complex plane, then the system is BIBO stable. If at least one of the poles lies on the complex axis, then the system is instead marginally stable. Depending on the values of β(cid:48) 1, 2 and β(cid:48) β(cid:48) 3, the convergence of a BIBO stable system can be derived. For example, if β(cid:48) 3 = 0, we recover the results 3 (cid:54)= 0, the final value of Lemma 9; on the other hand, if β(cid:48) theorem tells us that taking the limit s → 0 of s ¯S gives us the steady state value ¯S∞ = X∞. 2 = β(cid:48) 1 3 1 3 V. CONTROL BY EXOGENOUS EXCITATION Whereas we studied in Section IV the convergence and sta- bility under exogenous inputs, we demonstrate in this section how the rates of property diffusion can be controlled through appropriate design of a generic time-varying input vector U(t). CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 9 A. Using inputs for targeted control We first establish a methodology for decomposing the existing system dynamics into a more convenient form for targeted control of individual system modes. We summarize this decomposition, as well as the subsequent reconstruction for implementation in real networks, in Algorithm 1. Algorithm 1 Implementing inputs for targeted control 1: Transform basis of nodes to quasi-node space using char- acteristic eigenvectors as in (50) 2: Perform a Laplace transform of the system to move into the frequency domain 3: if implementation of external controllers is feasible then Implement controllers on one or more quasi-modes to 4: achieve control objective 5: else 6: domain Design quasi-inputs by incorporating controller action on one quasi-mode 7: end if 8: Perform an inverse Laplace transform back into the time 9: Transform quasi-nodes back to node space to obtain de- sired node inputs or system dynamics S(0) ¯S + U − ¯S 1 s −Q Fig. 5: Block diagram for the inhomogeneous equation (34). The hat above a quantity denotes a Laplace-transformed quantity. Figure 5 demonstrates that (34) together with initial con- ditions S(0) can be expressed as a block diagram with a feedback loop. It is possible to separate the effects of the initial conditions and the external input, which is illustrated in Fig. 6 for clarity. In what follows, we study the effects of modifying the lower branch in Fig. 6 related to the exogenous input without influencing the upper branch. We consider here S(0) s(sI − Q)−1 U (sI − Q)−1 ¯S + + Fig. 6: Simplified block diagram for (34). the case where the system has exactly n distinct eigenvalues and eigenvectors. We use the decomposition in (23) and rewrite (34) as A−1 ¯S = ΛA−1 ¯S + A−1U , (50) which corresponds to performing a basis transformation by taking linear combinations of the various nodes. Under this transformation, we obtain quasi-modes with quasi-property si, as well as corresponding quasi-inputs ui that are each acted upon by a single eigenvalue qi of Q. The time evolution for this transformed system is illustrated in Fig. 7. si(0) ui s s − qi 1 s − qi ¯si + + Fig. 7: Simplified block diagram for the inhomogeneous transformed govern- ing equation for a single quasi-mode with quasi-property ¯si = qi ¯si + ui. The tilde above a quantity and its lower case denote a quantity in quasi-node space. After applying the basis transformation, we can tune the quasi-modes individually to achieve the desired control objec- tive using one of the two following approaches. We can either design a controller acting on one or more of the quasi-modes to steer the system response, or modify the quasi input such that it incorporates the controller action. In the first approach, we design a closed-loop feedback control block to adjust the system response to different input signals. These include the implementation of filters and lead-lag compensators to modify the frequency and phase responses. Conversely, we can design i = u(cid:48)(ui) for all quasi-modes i in order the quasi-input u(cid:48) to bring the quasi-outputs to their desired values. This open- loop approach could be convenient in scenarios where perfect measurements of the system state are difficult to make and the effects of system noise are not significant. We illustrate this with a simple example in Fig. 8. Suppose we wish to mimic proportional or integral closed-loop control on the quasi-input uy corresponding to quasi-mode y using a feedback block F with transfer function K or K/s respectively, where K ∈ R. We then subsume the control loop into a quasi-input using the Laplace-transformed relation u(cid:48)(ui) = ui s − qy (51) s − qy + F , which makes the two block diagrams in Fig. 8 equivalent. Note that the controller design here is only performed on a single quasi-mode y. Yet, the quasi-inputs of all the other quasi-modes must be transformed using (51), since all the quasi-modes are subject to the same external input. The main advantage of the proposed method lies in the possibility to isolate parts of the system and separately adjust the response times of the different modes without a physical controller. uy − ¯sy 1 s − qy F u(cid:48)(uy) ¯sy 1 s − qy Fig. 8: Block diagrams for quasi-mode y for the original control loop (left) and when the loop is subsumed into the Laplace-transformed quasi-input u(cid:48)(ui) (right). Remark 4. Note that it is possible to account for the case where some of the n eigenvalues are degenerate as long as Q is diagonalizable. In the event that the algebraic and geometric multiplicities of each of the degenerate eigenvalues are identical, we can use the same transformation as above, except that some of the quasi-modes corresponding to the same eigenvalue, yet different eigenvectors, will have the same transfer function 1/(s − qi). The situation becomes more sensitive when Q is defective. In this case, we have to consider 10 the generalized eigenspace of the matrix instead. Using the generalized eigenvector decomposition of Q, we obtain a complete basis of n orthogonal generalized eigenvectors, and Q can be diagonalized in the block Jordan form. Suppose we have a Jordan block involving nodes z and z + 1. Then, ¯sz = qz ¯sz + ¯sz+1 + uz. B. Case study for external control 0.5 1 4 1 1 0.5 0.5 1 1 2 3 0.5 Fig. 9: Asymmetric cycle graph C4,a. (cid:113) 1 (cid:113) 1 To illustrate how external control on a single quasi-mode can be implemented by quasi-input design, we consider a simple case study of four nodes in an asymmetric cycle graph configuration, as shown in Fig. 9. In this case, the eigenvalues of the associated Q are {q1, q2, q3, q4} = {−3,−2,−1, 0}, and there are no degeneracies. tors are 1 Under −(cid:113) 2 5 (cid:2) 1 the corresponding unit (P1), 2 [ −1 1 −1 1 ], 2 1(cid:3) respectively. Based on the unit steady-state right eigenvec- 2 [ 0 −1 0 1 ], and 2 [ −1 0 1 0 ], 1 2 1 5 1 2 (cid:3), (cid:113) 2 (cid:113) 1 (cid:2) −1 eigenvector, we observe that the network on average tends to accumulate property at nodes 2 and 4 while depleting the property of the other nodes. This motivates us to consider the control objective of maintaining property at nodes 1 and 3 during the transient period to reverse the steady-state asymmetry. 2 −1 Under (P2), 1 the corresponding unit 2 [ 1 0 −1 0 ], right eigenvectors 2 [ 0 −1 0 1 ] and are 2 [ 1 1 1 1 ] respectively. Based on the network structure, we 1 observe that the network allocates higher weights to the quantities at nodes 2 and 4, which affects the calculation of the final consensus value. This motivates us to consider the control objective of increasing the weight of nodes 1 and 3 during the transient period to increase their influence on the system. (cid:113) 1 For either update protocol, it is sensible to excite nodes 1 and 3 in order to achieve the control objective. Since each quasi-mode is associated with a single pole, the net effect of the quasi-mode plant resembles the integration of the input, so we inject a unit impulse δ(t) into nodes 1 and 3 at t = 0, and then apply control to displace the poles and achieve step-like outputs. The injection is equivalent to a Laplace-transformed (cid:113) 5 input U = [1 0 1 0]. By performing the aforementioned basis transformation on U, we obtain the equivalent quasi-inputs (cid:113) 5 3 , 0, 0,−2 18} for the conservative {u1, u2, u3, u4} = {− 4 network and {u1, u2, u3, u4} = {−2 3} for the non- 18 , 0, 0, 2 conservative network. Note that quasi-modes 2 and 3 generate zero quasi-inputs in both cases due to the asymmetrically designed input [1 0 1 0]. Hence, from here on, we will only consider the quasi-modes 1 and 4 with non-trivial quasi-inputs for this particular case study. Figure 10 illustrates the block diagrams for these two quasi-modes in the s-domain, along with possible closed-loop control blocks H1 and H4. u1 − ¯s1 1 s + 3 H1 u4 − ¯s4 1 s H4 Fig. 10: Block diagrams for quasi-modes 1 (left) and 4 (right) of the system illustrated in Fig. 9, with corresponding Laplace-transformed quasi-outputs ¯s1 and ¯s4. The controllers H1 and H4 represent a feedback control block. (cid:113) 5 we obtain the following results: 1) No control: In the absence of controllers (H1 = H4 = 0), Under (P1), we obtain the quasi-outputs ¯s1 = − 4 3 e−3t and ¯s4 = −2 18. After transforming the quasi-outputs back into node space, we obtain ¯S1 = ¯S3 = 1 3 (1 + 2e−3t) for the instance-averaged properties of nodes 1 and 3, and ¯S2 = ¯S4 = 2 3 (1 − e−3t) for the instance-averaged properties of nodes 2 and 4. 18 e−3t 3 (1 + (cid:113) 5 3, which then correspond to ¯S1 = ¯S3 = 1 Under (P2), we obtain the quasi-outputs ¯s1 = −2 and ¯s4 = 2 2e−3t), and ¯S2 = ¯S4 = 1 3 (1 − e−3t). In both cases, the settling time of the outputs to their steady- state values is 1/3. We can adjust this settling time using proportional control. 2) Proportional control: We perform proportional control on quasi-mode 1 by replacing H1 with a fixed constant. We illustrate the resultant outputs for some constants H1 in Figures 11a and 11b for the conservative and non-conservative cases. By decreasing H1 towards −3, we can delay the onset of the steady state, but we also increase the influence of the inputs on the system by increasing the total system input. 3) Integral control: In standard control theory, proportional control is associated with a steady-state error relative to the input. This causes the outputs to be maintained at a non-zero level long after the impulses have ended. Integral control elim- inates this error and further forces the steady outputs to zero at infinite time. We verify this possibly useful behavior in Figures 12a and 12b for the conservative and non-conservative cases by performing integral control on quasi-mode 1. The transient actions neither influence the total steady-state property in a conservative system nor the steady-state consensus value in a non-conservative system. However, the magnitude of the integral gain can influence the speed of onset of the steady state. 4) Conclusions on external control: We have demonstrated that by varying the input functions appropriately, both the transient and steady-state perturbations to the system can be modified. By careful design cognizant of the characteristic timescales of the system, the timescales of the perturbations can be varied. In addition, the perturbations can be designed with either permanent or temporary effects on the system depending on the objectives of the network designer. C. Network classification Section V-B illustrated that both the external input and the structure of the quasi-modes in the system influence the CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 11 (a) Erdos-R´enyi (random graph) (b) Albert-Barab´asi (scale-free) (c) Watts-Strogatz (small-world) Fig. 13: Histograms of Fiedler vector entries for a single instance of various random networks with 400 nodes using the CONTEST toolbox [34]. in Fig. 13 to illustrate their varying distributions. We observe that the spread of the Fiedler vector entries increases with the average network clustering coefficient. Since small-world networks tend to have Fiedler vector entries with a larger spread, inputs to small-world networks can affect different nodes to different extents. The input design considerations for small-world networks have to ensure that specific nodes are targeted to achieve the desired control objective. (a) Conservative protocol (b) Non-conservative protocol Fig. 11: Resultant outputs for different H1 for the two network update protocols by mimicking proportional control on quasi-mode 1. The solid lines indicate the time evolution of properties at nodes 1 and 3, while the dashed lines indicate the time evolution of properties at nodes 2 and 4. VI. CONTROL BY STRUCTURE MODIFICATION Instead of controlling the network dynamics by means of exogenous excitation, we present in this section two methods to steer the dynamics by modifications in the network structure. A. Network structure modification through design Instead of controlling the system with an exogenous input term, we can also modify the network structure directly to achieve control. Modifying the network structure may be preferable to introducing external excitations in systems where it is more convenient to modify the interactions between agents than to introduce or remove property from agents. Through this modification, we can shift both the eigenvalues and the eigen- vector components, thereby changing the system dynamics as well as its steady-state distribution. In particular, modifying the network links causes changes in both the transformation basis between node space and quasi-node space, as well as the characteristic timescales of each system mode. By modifying the links more carefully, we can achieve modification of the characteristic timescales without reshaping the transformation basis. Recall that Q = AΛA−1 if it is diagonalizable. Apart from decomposing Q into the matrices A, Λ and A−1, we can also reconstruct Q by multiplying A, Λ and A−1 together in the appropriate order. By holding A constant and modifying the entries of Λ, we can achieve a modification in Q without affecting the composition of the system modes. The stability of the new eigenvalues of the modified Q will determine if the modified Q continues to represent a CTMC described by (A). In this respect, as long as qs = 0 is preserved, the modification of Q will result in a CTMC where the columns or rows sum to zero for conservative and non-conservative networks, respectively. Remark 5. We note that this approach of network structure modification through design can be extended to more com- plex systems. In particular, consider the distributed control (a) Conservative protocol (b) Non-conservative protocol Fig. 12: Resultant outputs for different H1 for the two network update protocols by mimicking integral control on quasi-mode 1. The solid lines indicate the time evolution of properties at nodes 1 and 3, while the dashed lines indicate the time evolution of properties at nodes 2 and 4. resultant system outputs. The variance in the individual entries of the eigenvectors corresponding to the activated quasi-modes influence the effects of the external input on the individual nodes. For example, an external input on a single node in a network where the activated quasi-modes have low variances in their eigenvector entries tends to influence all other connected nodes to the same extent; conversely, the same input in a network with quasi-modes with large variances may have different effects on different nodes. We provide a simple example here to illustrate this point. It is generally accepted that the eigenvector associated with the non-zero eigenvalue of the Laplacian with the smallest absolute value, the Fiedler vector, provides a reasonable basis for spectral graph partitioning [35]. We plot histograms of the entries of the Fiedler vector for different classes of networks −0.500.5050100150200250300350400Unit Fiedler vector entryCount−0.500.5050100150200250300350400Unit Fiedler vector entryCount−0.500.5050100150200250300350400Unit Fiedler vector entryCount00.511.522.5300.10.20.30.40.50.60.70.80.91TimeInstance−averaged property at each node H1=2H1=1H1=0H1=−100.511.522.5300.10.20.30.40.50.60.70.80.91TimeInstance−averaged property at each node H1=2H1=1H1=0H1=−10246810−0.200.20.40.60.81TimeInstance−averaged property at each node H1=1/sH1=5/s0246810−0.200.20.40.60.81TimeInstance−averaged property at each node H1=1/sH1=5/s 12 2 1 1 4 1 1 1 1 1 3 1 1 5 2 0.9 0.9 4 0.9 0.9 1 0.9 0.9 3 0.9 0.9 5 0.025 2 4 0.025 0.025 0.025 0.025 3 5 0.025 Fig. 14: Star graph S5 with symmetric links of unit weights. Fig. 15: The superposition of these two graphs yields the network structure corresponding to the modified transition rate matrix given in (53). system [36] D ¯T = Q(β(cid:48) (52) for some arbitrary gains β(cid:48) I. Here, modifications to Q will also influence the dynamics of the system. However, the key governing parameters are no longer the eigenvalues qk of Q, but instead the roots of the characteristic polynomial ¯T + β(cid:48) P and β(cid:48) ¯T + β(cid:48) D, β(cid:48) ¯T ) , P I DQ) − s(β(cid:48) PQ) − β(cid:48) To illustrate how we can modify the eigenvalues of a network to achieve a shift in the system response, we consider a symmetric star network depicted in Fig. 14. The transition rate matrix Q corresponding to this network is of the matrix(cid:2)s2(I − β(cid:48)  Q = IQ(cid:3).  . −4 1 1 1 −1 0 1 1 1 1 0 0 −1 0 0 0 1 0 0 0 −1 0 0 −1 0 The eigenvalues of this matrix are 0 with multiplicity 1, −5 with multiplicity 1 and −1 with multiplicity 3. The corresponding eigenvectors are the steady-state eigenvector describing equilibration between all the nodes ([ 1 1 1 1 1 ]), an eigenvector describing diffusion between the peripheral nodes and the central node ([ −4 1 1 1 1 ]), and eigenvectors describing diffusion among the peripheral nodes ([ 0 1 1 1 −3 ], [ 0 0.36 1 −1.36 0 ] and [ 0 −1.36 1 0.36 0 ]). Suppose we want to slow down diffusion between the peripheral nodes and the central node. We can do so by decreasing the effective update rate of this mode, which causes the relative importance of diffusion among the peripheral nodes to increase and results in extra links facilitating this diffusion. For instance, by changing the effective update rate of the peripheral-central mode from 5 to 4.5, we obtain the following transition rate matrix  . (53)  Q = −3.6 0.9 0.9 −0.975 0.025 0.9 0.9 0.9 0.9 0.9 0.025 0.025 −0.975 0.025 0.025 0.025 0.9 0.025 0.025 0.025 −0.975 0.025 0.025 −0.975 0.025 In the resultant architecture, the links between the central node and the peripheral nodes have weights of 0.9 instead of 1, and the links between the peripheral nodes have weights of 0.025 instead of 0. The corresponding network is a superposition of the two graphs depicted in Fig. 15. In sufficiently large systems, B. Network structure modification through adaptive control it can be computationally intensive to perform the eigendecomposition of various Q matrices in order to determine the network structure that gives the most desirable system response. There are two possible approaches to handle this issue. Firstly, one can choose from a (cid:21) (cid:20)(cid:90) ∞ set of matrices that deviate from the original Q by small per- turbations δQ. The eigenvalue and eigenvector perturbations can be derived as a function of δQ for sufficiently small δQ. However, this limits us to small modifications in the network structure that do not span the feasible action space. It is possible to examine larger and/or more modifications without going through the computational complexity by per- forming adaptive control driven by reinforcement learning. In this approach, we formulate the problem as an MDP. The state space X of the MDP is equivalent to the node space of the network, while the action space W of the MDP is equivalent to the set of possible Q that the network can adopt. More formally, X = V, while W = {Q1, . . . ,Qw∗} for w∗ different actions. In essence, the MDP is a direct extension of the CTMC upon which the governing equation of the network diffusion is based.4 By selecting a reward function R(X, W ) that describes the desirability of action W given that the system is in state X, and by scheduling decisions to be made immediately after a change in the state of the system5, the MDP is completely defined. We can determine the conditions for optimality in the MDP by searching the policy that yields the optimal expected reward integrated over time , 0 EX(0),W (0), sample paths γtR(X(t), W (t))dt (54) where γ ∈ (0, 1) denotes a discount rate. By considering (A) and (54) simultaneously, we obtain the Hamilton-Jacobi- Bellman equation for the system. In optimal control theory, this equation is solved to obtain the optimal policy for the system. For large state and/or action spaces, this solution can be difficult to obtain. For a more computationally manage- able approach, we turn to reinforcement learning to deter- mine a suboptimal solution with sufficiently fast convergence. For each state-action pair (X, W ), we store a quality value V Q(X, W ), and update V Q(X, W ) based on the Q-learning method [26] (cid:104) k+1(X, W ) = (1 − µ)V Q V Q + µ k (X, W ) W (cid:48) R(Xnext, W (cid:48)) + γ max max W (cid:48) V Q (cid:105) k (Xnext, W (cid:48)) , (55) where k is the index indicating the k-th change of the system state, µ ∈ (0, 1] is the learning rate of the algorithm, and Xnext is the next state of the system. Whenever the system transitions to a new state, a new action has to be selected. We set up the system such that with probability , the system selects the action with the highest quality given its current state, while with probability 1 − , the system selects a random action. 4A MDP with a single action is equivalent to a CTMC. 5This means that the variation of the active action W (t) with time is a piecewise constant function. CHAN et al.: CHARACTERIZATION AND CONTROL OF DIFFUSION PROCESSES IN MULTI-AGENT NETWORKS 13 each last known Qg such that Qgv0 = 0 and(cid:80) Qg. Using the reinforcement learning parameters µ = 0.2,  = 0.4 and γ = 0.995, we run each simulation for 5E6 time- steps, following which we find the steady-state eigenvector (normalized to sum to 1), or stationary distribution, v0 for i v0(i) = 1. In Fig. 16, we demonstrate using the time evolution of V Q(1, W ) for 5 different actions W that the learning curve has reached convergence. In Fig. 17, we plot the last known stationary distribution v0(i) over all the states i averaged over the 100 trials, and demonstrate that the MDP is, on average, able to modify the stationary distribution of the system after sufficient time has elapsed by careful design of the reward function. In this case, we guided the system to favor nodes 12 and 14 by modifying the network structure, analogous to how we modified the system steady state in Section V-B through the injection of appropriate external inputs. This MDP methodol- ogy can either be used online to allow the network to respond to time-varying objectives, or offline to cycle through various network possibilities with reduced computational complexity. Fig. 16: Time evolution of quality V Q(1, W ) of node 1 for 5 different actions W for a single trial. VII. CONCLUSION In this work, we proposed a probabilistic framework that describes diffusion in multi-agent networks and allows for a variety of inter-agent update rules. We focused on two protocols where the total network quantity is conserved (con- servative protocol) or variable (non-conservative protocol). By including the possibility of asymmetric updates, non-unitary links and switching topologies, we examined the stability and convergence characteristics of generic networks, and described their transient and steady-state dynamics in detail. In addition, we modeled external influences on networks by considering an inhomogeneous form of the governing equation. As such, the framework has the potential to capture the presence of stubborn agents and the process of dynamic learning. Furthermore, we demonstrated the ability to achieve control of diffusion in these networks using either external excitation or modification of the network structure. For the former, we showed that the form of the external excitation and the network structure are crucial to the characteristics of the controlled output, and for the latter, we identified an algorithm involving reinforcement learning for an MDP to promote quick achievement of the control objective. Through these techniques, we enable the possibility of actuating individual nodes and steering the system steady state towards some desired control objective, thereby allowing for the micromanagement of diffusion in networks. Our future work to extend the current toolbox will include more direct applications to large random networks. In addition, we intend to include time-inhomogeneous and stochastic gov- erning equations, and to extend the framework to continuous node spaces. Another important extension of this work is to develop more insight in the higher order moments of the property. REFERENCES [1] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Trans. Automat. Contr., vol. 48, no. 6, pp. 988 -- 1001, 2003. [2] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," IEEE Trans. Inform. Theory, vol. 52, no. 6, pp. 2508 -- 2530, 2006. Fig. 17: Stationary probability distribution of the simulated network averaged over 100 trials. The nodes marked red are the two randomly selected nodes (12 and 14) that were assigned a reward on every visit by each MDP. This is known as the -greedy policy where  is the exploitation probability of the system. By selecting appropriate values of µ, γ and , as well as an appropriate reward function R(X, W ), we can design the learning process to achieve predefined system objectives at a suitable convergence rate. To illustrate the use of an MDP to select a desirable Q in a large network, we set up a state space X containing 20 agents, and we set up the action space W by generating 400 Q matrices corresponding to 400 complete graphs whose links each have weights sampled from a uniform distribution on [0, 1], to simulate 400 different random network configurations. These matrices obey the conservative relation (13), which obeys the update rule (P1). In addition, we select 2 arbitrary nodes (12 and 14) out of the 20 to serve as target nodes for our system. We let the state transitions of the MDP be governed by a grand system transition matrix Qg. Whenever a state transition occurs, we assign a reward of 5 whenever the state coincides with 1 of these 2 target nodes, and a reward of 0 otherwise, in order to encourage the system to visit these states more often. The MDP then selects an action, following which Qg is updated based on this selected action. For example, if the updated state of the system is node 5 and action 20 is selected, then the 5th column of Qg is replaced by the 5th column of Q20 corresponding to the 20th action. For this work, we ran 100 independent numerical simula- tions describing the time evolution of 100 MDPs with the same state and action spaces, but with different initial states and 012345x 106050100150200250TimeVQt(1,W) Action 1 Action 21 Action 41 Action 61 Action 81246810121416182000.010.020.030.040.050.060.070.080.090.1NodeAverage stationary probability control in mobile networks," IEEE Trans. Automat. Contr., vol. 53, no. 8, pp. 1972 -- 1975, 2008. [25] M. Dahleh, M. A. Dahleh, and G. Verghese, "Lectures on dynamic systems and control," 2004. [26] A. G. Barto and R. S. Sutton, Reinforcement learning: An introduction. MIT Press, 1998. [27] R. Olfati-Saber and R. M. Murray, "Consensus protocols for networks of dynamic agents," in Proc. Amer. Control Conf., Denver (CO), USA, Jun. 2003, pp. 951 -- 956. [28] P. Van Mieghem, Performance analysis of communications networks and systems. Cambridge University Press, 2006. [29] M. Thompson, R. Ellis, and A. Wildavsky, Cultural theory. Westview Press, 1990. [30] A. Tversky and D. Kahneman, "Availability: A heuristic for judging frequency and probability," Cognitive psychology, vol. 5, no. 2, pp. 207 -- 232, 1973. [31] D. Shemesh, "Common eigenvectors of two matrices," Linear algebra and its applications, vol. 62, pp. 11 -- 18, 1984. [32] A. George and K. D. Ikramov, "Common invariant subspaces of two matrices," Linear Algebra and Its Applications, vol. 287, no. 1, pp. 171 -- 179, 1999. J. C. Willems, "Lyapunov functions for diagonally dominant systems," Automatica, vol. 12, no. 5, pp. 519 -- 523, 1976. [33] [34] A. Taylor and D. J. Higham, "Contest: A controllable test matrix toolbox for MATLAB," ACM Transactions on Mathematical Software (TOMS), vol. 35, no. 4, p. 26, 2009. [35] M. Fiedler, "Algebraic connectivity of graphs," Czechoslovak Mathe- matical Journal, vol. 23, no. 2, pp. 298 -- 305, 1973. [36] D. Burbano and M. di Bernardo, "Distributed PID control for con- sensus of homogeneous and heterogeneous networks," arXiv preprint arXiv:1409.2324, 2014. 14 [3] A. G. Dimakis, S. Kar, J. M. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal processing," Proc. of the IEEE, vol. 98, no. 11, pp. 1847 -- 1864, 2010. [4] K. Kandhway and J. Kuri, "Campaigning in heterogeneous social networks: Optimal control of SI information epidemics," IEEE/ACM Trans. Netw., 2014, early access. J. Chen and A. H. Sayed, "Distributed pareto optimization via diffusion strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 -- 220, 2013. [5] [6] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social networks," Dynamic Games and Applications, vol. 1, no. 1, pp. 3 -- 49, 2011. I. Matei, C. Somarakis, and J. S. Baras, "A randomized gossip consensus algorithm on convex metric spaces," University of Maryland, Tech. Rep., 2012. [7] [8] V. Blondel, J. M. Hendrickx, A. Olshevsky, and J. Tsitsiklis, "Conver- gence in multiagent coordination, consensus, and flocking," in IEEE Conference on Decision and Control, and the European Control Con- ference, Seville, Spain, Dec. 2005, p. 2996. [9] Q. Ren and H. Kobayashi, "Diffusion approximation modeling for Markov modulated bursty traffic and its applications to bandwidth allocation in ATM networks," IEEE J. Sel. Areas Commun., vol. 16, no. 5, pp. 679 -- 691, 1998. [10] C. Dargatz, "A diffusion approximation for an epidemic model," Sonder- forschungsbereich 386 der Ludwig-Maximilians-Universitat Munchen, Tech. Rep., 2007. [11] -- -- , "Bayesian inference for diffusion processes with applications in life sciences," Ph.D. dissertation, Ludwig-Maximilians-Universitat Munchen, 2010. [12] M. E. Yildiz, A. Scaglione, and A. Ozdaglar, "Asymmetric information diffusion via gossiping on static and dynamic networks," in Proc. of the IEEE Conference on Decision and Control, Atlanta, GA, USA, Dec. 2010, pp. 7467 -- 7472. [13] G. Como, K. Savla, D. Acemoglu, M. A. Dahleh, and E. Frazzoli, "Robust distributed routing in dynamical flow networks," in IEEE Conf. on Decision and Control and European Control Conference (CDC- ECC), Orlando, FL, USA, Dec. 2011, pp. 6290 -- 6295. J. Kiessling and R. Tempone, "Diffusion approximation of L´evy processes with a view towards finance," Monte Carlo Methods and Applications, vol. 17, no. 1, pp. 11 -- 45, 2011. [14] [15] D. Acemoglu, G. Como, F. Fagnani, and A. Ozdaglar, "Opinion fluctua- tions and disagreement in social networks," Mathematics of Operations Research, vol. 38, no. 1, pp. 1 -- 27, 2013. [16] D.-W. Tcha and S. R. Pliska, "Optimal control of single-server queuing networks and multi-class M/G/1 queues with feedback," Operations Research, vol. 25, no. 2, pp. 248 -- 258, 1977. [17] R. Olfati-Saber and R. M. Murray, "Consensus problems in networks of agents with switching topology and time-delays," IEEE Trans. Automat. Contr., vol. 49, no. 9, pp. 1520 -- 1533, 2004. [18] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coop- eration in networked multi-agent systems," Proc. of the IEEE, vol. 95, no. 1, pp. 215 -- 233, 2007. [19] D. Acemoglu, A. Nedic, and A. Ozdaglar, "Convergence of rule-of- thumb learning rules in social networks," in IEEE Conference on Decision and Control, Cancun, Mexico, Dec. 2008, pp. 1714 -- 1720. [20] S. Banisch, R. Lima, and T. Ara´ujo, "Agent based models and opinion dynamics as markov chains," Social Networks, vol. 34, no. 4, pp. 549 -- 561, 2012. [21] E. Yildiz, D. Acemoglu, A. E. Ozdaglar, A. Saberi, and A. Scaglione, "Discrete opinion dynamics with stubborn agents," Social Science Research Network, pp. 1 -- 39, 2011. [22] A. Banerjee and J. Jost, "On the spectrum of the normalized graph laplacian," Linear algebra and its applications, vol. 428, no. 11, pp. 3015 -- 3022, 2008. [23] Y. Hong, J. Hu, and L. Gao, "Tracking control for multi-agent consensus with an active leader and variable topology," Automatica, vol. 42, no. 7, pp. 1177 -- 1182, 2006. [24] M. Ji, G. Ferrari-Trecate, M. Egerstedt, and A. Buffa, "Containment
1707.03778
1
1707
2017-07-12T15:55:20
Catching Zika Fever: Application of Crowdsourcing and Machine Learning for Tracking Health Misinformation on Twitter
[ "cs.SI", "cs.CY" ]
In February 2016, World Health Organization declared the Zika outbreak a Public Health Emergency of International Concern. With developing evidence it can cause birth defects, and the Summer Olympics coming up in the worst affected country, Brazil, the virus caught fire on social media. In this work, use Zika as a case study in building a tool for tracking the misinformation around health concerns on Twitter. We collect more than 13 million tweets -- spanning the initial reports in February 2016 and the Summer Olympics -- regarding the Zika outbreak and track rumors outlined by the World Health Organization and Snopes fact checking website. The tool pipeline, which incorporates health professionals, crowdsourcing, and machine learning, allows us to capture health-related rumors around the world, as well as clarification campaigns by reputable health organizations. In the case of Zika, we discover an extremely bursty behavior of rumor-related topics, and show that, once the questionable topic is detected, it is possible to identify rumor-bearing tweets using automated techniques. Thus, we illustrate insights the proposed tools provide into potentially harmful information on social media, allowing public health researchers and practitioners to respond with a targeted and timely action.
cs.SI
cs
Catching Zika Fever: Application of Crowdsourcing and Machine Learning for Tracking Health Misinformation on Twitter Amira Ghenai University of Waterloo Waterloo, Canada Email: [email protected] Yelena Mejova Qatar Computing Research Institute HBKU, Doha, Qatar Email: [email protected] 7 1 0 2 l u J 2 1 ] I S . s c [ 1 v 8 7 7 3 0 . 7 0 7 1 : v i X r a Abstract-In February 2016, World Health Organization de- clared the Zika outbreak a Public Health Emergency of Inter- national Concern. With developing evidence it can cause birth defects, and the Summer Olympics coming up in the worst affected country, Brazil, the virus caught fire on social media. In this work, use Zika as a case study in building a tool for tracking the misinformation around health concerns on Twitter. We collect more than 13 million tweets – spanning the initial reports in February 2016 and the Summer Olympics – regarding the Zika outbreak and track rumors outlined by the World Health Organization and Snopes fact checking website. The tool pipeline, which incorporates health professionals, crowdsourcing, and machine learning, allows us to capture health-related rumors around the world, as well as clarification campaigns by reputable health organizations. In the case of Zika, we discover an extremely bursty behavior of rumor-related topics, and show that, once the questionable topic is detected, it is possible to identify rumor-bearing tweets using automated techniques. Thus, we illustrate insights the proposed tools provide into potentially harmful information on social media, allowing public health researchers and practitioners to respond with a targeted and timely action. I. INTRODUCTION The information overload poses serious challenges to public health, especially with regards to infectious diseases. Similar to people's increased mobility, the availability and ubiquity of information facilitates the transmission of misinformation and rumors that can hamper the efforts to tackle a major public health crisis. With a continuous threat of digital "wildfires" of misinformation [1], health rumors are a worldwide and serious problem [2]. The complexity of dealing with communication during a health crisis is growing, as social media is playing a more prominent role. Social media, compared with traditional me- dia, is harder to monitor, track and analyze. Public health institutions such as the World Health Organization (WHO) include social media as a crucial part in monitoring a health crisis [3]. However, guidelines and tools on best approaches to tackle this are not yet available. This paper proposes a suite of tools for tracking health- related misinformation, and describes a case study of tracking a health crisis, as discussed on Twitter. We provide a method- ology for uncovering the streams of tweets spreading rumors about the 2016 Zika outbreak identified by the WHO. The Zika virus has been known for decades; it was discovered in Uganda in the 1940s and until recently it has been unnoticed. Things changed dramatically in 2015 when this mosquito- borne disease started to spread quickly across Brazil and then most of the American continent, becoming a major global health crisis. This crisis became more dramatic as the link between the Zika infection and serious brain malformation (i.e. microcephally) started to emerge. Furthermore, fears of a global pandemic started to emerge, since Zika is spread by a mosquito from the Aedes family, which is present in many countries. Another source of concern were the Rio summer Olympics Games, which brought international travelers to the affected areas. As at the time there was no cure or vaccine for the Zika viral infection, communication with the public was one of the most important tools to control this outbreak. These communication efforts – dealing with the detection and prevention of Zika, and also the reduction of mosquito breeding – have been challenged by the appearance of rumors that, in the best of cases, were interfering with the public health campaigns [4]. In particular, we track rumors outlined by the WHO (along with Snopes.com1) in the stream of nearly 13 million tweets. We employ both automated LDA-based topic discovery as well as high-precision expert-led Information Retrieval ap- proach to identifying the relevant tweets in this stream. Using crowdsourcing, we distinguish between rumor and clarification tweets, which we then use to build automatic classifiers. Here, we present in-depth temporal analysis of the found rumors, their origins, and interactions with informational sources. As discussed in the coming section, this work contributes to the literature a first application of the state-of-the-art social media analytic tools to the problem of health rumor tracking. II. RELATED WORK This paper is the first of its kind to relate health informatics, machine learning and social network analysis to detect health- related rumors in a social media site. Below, we outline the 1http://www.snopes.com/ most relevant recent work related to the detection and tracking of health-related attitudes, as well as misinformation in other non-health related fields. Health-related attitudes on social media. As social media captures daily thoughts and actions of millions of users, recent efforts have been made in extracting health-related behaviors and attitudes from the textual content of these websites. Recently, [5] build a classifier to detect the use of marijuana on Twitter. Attitudes toward legal drugs, including Xanax and Adderall, have also been studied by [6]. Further, [7] use association mining to health communities to discover adverse effects of drug interactions. Health-related attitudes around food on Instagram have been mined by [8]. These studies often combine the health expert knowledge with big data analytics (including machine learning, in the case of [5]), to provide insight into attitudes captured in social media interactions. Similar tools can be applied to non health-related rumor detection, as we discuss next. Rumor detection and analysis. Separating newsworthy stories from misinformation and rumors across microblogging sites has been a popular research topic in recent years. Some focus on identifying information credibility of news propa- gated in social media [9], [10], [11], [12]. Others focus on detecting misleading political memes, such as the "Truthy" service presented by Ratkiewicz et al. [13], designed to detect fake political grass-roots movements (dubbed as "astroturf"). Often, machine learning models based on features related to ei- ther users or the content of propagated messages are employed. For example, [12], [11] train a classifier to automatically detect the rumors on Sina Weibo microblog site2. They use Sina Weibo rumor-busting service3 as ground-truth data for the classification. Further, Jing Ma et al. [14], use both Twitter and Sina Weibo as a case study in order to detect rumors. Using time series, they capture the temporal characteristics of the rumor detection features. Authors use already labeled datasets (Twitter [9], Weibo [12]) to train and evaluate the approach. Unlike these studies, we consider a more natural setting wherein no labeled data is available, and the documents associated with the rumors must first be found. In this respect, our approach is similar to Qazvinian et al. in [15] who use content-based, network-based, and Twitter-specific features in order to track urban legends. They build Bayes classifiers using engineered features and then learn a linear function of these classifiers for rumor retrieval and classification. Health Related misinformation detection. WHO's white paper on Risk communication in the context of Zika virus urges to "build capacity to quickly transform new information into usable, culturally-appropriate and easily understood risk communication resources that can be disseminated on multiple platforms", including social media [16]. However, little work thus far concentrated on detecting and tracking health-related rumors. Recently, Kostkova et al. [17] created the "VAC Medi+ board" online interactive visualization framework integrating heterogeneous real-time data streams with Twitter data. They track the spread of vaccine related information on Twitter and the sources of information spread. A potential framework to engaging expert knowledge in a real-time crisis, including health-related, situation is described in Imran et al. [18], where content is selected to be annotated via crowdsourcing into pre- defined classes. These can then be used to train a classifier, and update it as necessary with active learning data selection. Work most relevant to the current study is by Dredze et al. [19], who analyzed the characteristics of nonscientific claims about vaccine misconceptions by the vaccine refusal community. Specifically, the authors analyzed the two most prominent misleading theories about Zika vaccination in Twitter using "supervised machine learning technique" (although these were not explained in the manuscript) and observed the effect of vaccine-skeptic communities over other users' vaccination opinion. While [19] look at two Zika vaccine related memes, in this work we propose a more general methodological pipeline to track health-related rumors. Taking Zika as a case study, with the help of health professionals we expand the list of rumors to six, and examine the behavior of rumor as well as clarification efforts. Below we describe in detail our contributions to the text classification task via novel health- related features, and the application of crowdsourcing to fine- grained document labeling. III. DATA COLLECTION The data was collected using the Artificial Intelligence for Disaster Response (AIDR)4 platform, which taps into Twitter Streaming Application Program Interface (API). The keywords' list contained the following (searched as quoted strings): zika, microcefalia, microcephaly, #zika, zika virus, Aedes, zika fever, Spondweni virus, Aedes albopictus, macu- lopapular rash. We aimed to cover both everyday wording as well as medical jargon which may be associated with the topic. Furthermore, "zika" word is used by all English, Portuguese, and Spanish, which are the major languages of populations affected. The resulting collection of 13,728,215 tweets spans January 13 - August 22, 2016, and includes the peak of interest in Zika (in early February) and the Olympic Games in Brazil (August 5-21). Figure 1 shows the volume of the data by language. Since no language restriction was imposed during data collection (besides some bias English keywords introduced), we captured a plurality of languages, with three dominant ones which represent more than half of the dataset – English, Spanish and Portuguese (46%, 27% and 17% respectively). The language was determined using the language tag in the meta-data of the tweet provided by the Twitter API. Table I summarizes the global statistics of these languages distribu- tions. It illustrates the international nature of the Zika crisis, with each language identifying a population and its diasporas affected. In this work we focus on the English data, and discuss the future work involving other languages below. 2http://weibo.com 3http://weibo.com/weibopiyas 4http://aidr.qcri.org/ ZIKA RUMOR DESCRIPTIONS AND EXAMPLE TWEETS. FIRST FOUR COME FROM WHO AND LAST TWO FROM SNOPES. TABLE II Rumor Description Example tweets R1) Zika virus is linked to genetically modified mosquitoes R2) Zika virus symptoms are similar to seasonal flu R3) Vaccines cause micro- cephaly in babies R4) Pyriproxyfen insecti- cide causes microcephaly R5) Americans are im- mune to Zika virus R6) Coffee as mosquito- repellent to protect against Zika document confirms causes microcephaly.. BIOWEAPON! #Zika Virus Is Being Spread by #GMO #Mosquitoes Funded by Gates! The affects of Zika are same symptoms as the Common Cold. #StopSpreading- GMOMosquitos Government tdap vaccine https://t.co/4ZVLbaabbG "Argentine and Brazilian doctors sus- pect mosquito insecticide as cause of microcephaly" Yup and Americans R immune to Zika, so why fund a response to it? Bring on the Cuban coffee. Say Good- bye to Zika mosquitoes. Dee Lundy- Charles Fredric Sweeney Joshua Oates Laure... http://fb.me/tArL595b 4 were unsuitable, as they were not topically cohesive. For instance, one explained "Fish can help stop Zika", but did not explicitly state what the rumor which this statement would de- bunk would be. The process in understanding whether a topic is a rumor involved writing out an unambiguous description of the rumor, such that a tweet may be easily classified as being one. If no such description could be written, the topic was discarded. Additionally, we employed Snopes.com, which is an online authority for detecting and verifying rumors in social media, emails and other online networks [21], based on expert sourcing. From its Zika-related articles, we selected rumors which are not specific to the US. The final list of rumors, shown in Table II, along with example tweets which propagate it, includes a total of 6 Zika rumor stories (4 from WHO and 2 from Snopes). Note that the selection of these Zika rumor topics was supervised by health experts (acknowledged below) in order to insure the coverage of the most important and influential topics related to the Zika outbreak. V. RUMOR TRACKING We first attempt to discover these rumors using an auto- mated technique, as topic discovery has been used to identify rumors [14], [12] in social media. We train a Latent Dirichlet Allocation (LDA) [22] model on the english-language tweets, which then produces n "topics", grouping words which appear in similar contexts together in a topic. However, after a manual examination of n (varying from 5 to 50) topics, we do not find any topics pertaining to the above selected rumors. The vast majority of topics were informational, following by spam and jokes. Thus, we illustrate the necessity of incorporating expert knowledge in order to achieve a high-precision view of the data for our purpose. Fig. 1. Zika-related Twitter data volume, separated by language. DATA STATISTICS BY MAIN LANGUAGE GROUPS. TABLE I Total tweets Language 6,267,173 English 3,689,292 Spanish 2,296,611 Portuguese 1,475,139 Other Total 13,728,215 (cid:63) or 2,546,851 unique users Users 1,318,293 727,105 623,968 593,221 3,262,587 (cid:63) Tweets/user 4.75 5.07 3.68 2.49 4.21 To understand the geographic distribution of tweets, we use several sources to geo-locate them. We begin with the GPS attributes (latitude, longitude) of the tweet meta-data and convert them to the corresponding country name using World Borders API5. As 99% of tweets have missing GPS attributes, we look at location names in the place attribute of the tweet and convert them to exact country names. In case there is no mentioned location, we assume that the tweet location is where the user is located and get the corresponding location from the user's profile. It is worth mentioning that users' locations are messy, as they are written by the users. Thus, we use Yahoo Placemaker API6 to map the users' place fields to GPS locations. Finally, in case no user location is mentioned, we get location by looking into other already identified location tweets tweeted by the same user (resorting to this noisy approach only if all other geo-location attempts fail). Implementing these steps, we achieve 68% coverage for English data. The top locations in decreasing number of tweets are the United States, United Kingdom, India, Canada, Nigeria, and Brazil, indicating a highly international data. the tweet IV. RUMOR SELECTION Our rumor selection process begins with a reliable list of information from trusted sources. We chose the WHO website as an authority for detecting and verifying rumors about Zika. As Zika was spreading further in the world, WHO provided a source listing major international rumors and misinformation about the virus. At the time of writing, WHO website [20] listed 8 statements debunking ongoing rumors. Out of these, 5http://thematicmapping.org/downloads/world borders.php 6http://www.programmableweb.com/api/yahoo-placemaker 2016−01−132016−01−202016−01−272016−02−032016−02−112016−02−182016−02−252016−03−032016−03−102016−03−172016−03−242016−03−312016−04−072016−04−142016−04−212016−04−282016−05−052016−05−122016−05−192016−05−262016−06−022016−06−092016−06−162016−06−232016−06−302016−07−072016−07−142016−07−212016−07−282016−08−042016−08−112016−08−180100000200000300000400000OtherSpanishPortugueseEnglish RUMOR QUERIES AND THE NUMBER OF TWEETS RETRIEVED. TABLE III No R1 R2 R3 R4 R5 R6 Total Regular Expression Query genetically GMO (symptom & (flu cold)) & (not(rash)) (tdap MMR Measles Mumps Rubella) & vaccine & microcephaly) (vaccine &(cause link relate) & microcephaly) (montsanto pesticide pyriproxyfen insec- ticide) & microcephaly american & immune ((coffee java jive) & (repellent protect)) & (java & jive) & (coffee & mosquito)) - # tweets 73,832 469 4,329 10,389 351 202 89,572 A. Query Construction We consider the task of extracting tweets relevant to our rumors as a standard Information Retrieval task. We first index the collected tweets using Indri7, and submit a set of handcrafted interactively designed search queries (similarly to [15]). Each query is a boolean string consisting of a list of keywords that best describe the rumor. These keywords are first identified, then connected using the AND, OR and NOT operators. Each keyword is then replaced with a series of possible synonyms and replacements, all connected via the OR operator. For instance, consider the rumor saying that "vaccines cause microcephaly" (R3). Transforming this story to a query language would include several common ways of referring to vaccines, as shown in Table III. The queries are hand-crafted over at least 3 iterations of labeling the top 10 returned results. Designing the queries to extract the tweets was not a trivial task. One of the challenges is that many medical term synonyms needed to be added to the query to get the highest coverage. We did not rely on automatic query expansion tech- niques such as Pseudo-relevance feedback as these automatic algorithms perform well in medical articles and not in informal unstructured text such as Twitter messages [23]. Additionally, we added words that distinguish general information tweets from rumors. For example, in R2, to distinguish a rumor from a general information, we need to add (NOT rash) to the query because this is the symptom that differs between Zika symptoms and the seasonal flu ones. The final retrieval resulted in 89,572 tweets varying greatly by rumor, with a maximum of 73,832 to 202 (Table III). These tweets, however, still may contain false positives, tweets that match the query but are not a rumor. For example, the following tweets are all about vaccines and microcephaly in babies (R3). The first tweet is stating that Zika vaccine causes microcephaly (rumor), but the second tweet clarifies that there is no evidence suggesting Zika vaccine causes microcephaly (clarification), and the third does not mention anything specific about the relationship between Zika vaccine and microcephaly (other). CROWDFLOWER LABEL STATISTICS OF UNIQUE TWEETS IN EACH CATEGORY (PROPAGATED LABELS TO DUPLICATES IN PARENTHESES). TABLE IV Labeled 1,000 (42,432) 302 (469) 796 (4,329) 1,000 (8,085) 131 (351) 114 (202) Rumor 253 (11,773) 217 (348) 478 (2,853) 749 (5,586) 17 (22) 72 (129) Clarification 50 (1,912) 71 (100) 88 (846) 221 (2,338) 99 (17) 5 (25) Other 697 (28,747) 14 (21) 230 (630) 30 (161) 15 (312) 37 (48) R1 R2 R3 R4 R5 R6 (rumor) Government document confirms tdap vaccine causes microcephaly.. https://t.co/4ZVLbaabbG (clarification) Anti-vaccination extremists falsely claim that Tdap #vaccine causes microcephaly suspected to be caused by.. https://t.co/yvfHlAFKhw (other) No cure, no vaccine for a virus that scientists believe to cause microcephaly! #microcephaly #ZikaVirus https://t.co/EuG9b1AJVw In the coming section, we explain the approach we take in order to distinguish between the three different types of information available in our data-set. B. Crowdsourced Annotation To annotate the tweets as to whether they are indeed ru- mors, we employ the crowdsourcing platform "Crowdflower"8. Previous studies have shown that using crowds (anonymous workers) for health-related annotation is an effective way to label large amounts of data without employing experts [24], [25]. We begin by creating a task for each topic with clear instructions on the labeling of the tweets as either supporting the rumor (by outright statement or ambiguity), debunking the rumor (by clarification), or doing neither. Also for each task we create a set of no fewer than 20 "gold standard" tweets (those with known classifications) in order to test the quality of annotations throughout the jobs. If an annotator did not pass the threshold of 70% accuracy, he/she would be banned from the task and the annotations would be discarded. Each tweet was labeled at least 3 times and a majority vote determined its classification. The tweets were first de-duplicated by stripping tweet- specific elements such as RT (standing for "re-tweet"), special characters, and mentions, such that only one copy of each tweet was to be labeled. A maximum of 1,000 tweets were annotated per rumor. For those which had more than 1,000 unique tweets (R1 and R4), we first selected 700 most re- tweeted tweets, and sampled 300 from the rest. After the labeling of these unique ones, the label was then propagated to the duplicates within the set. Table IV shows the distribution of classes for the six rumors, with the number of tweets with propagated labels in 7http://www.lemurproject.org/indri.php 8http://www.crowdflower.com/ parentheses. Although the queries were hand-crafted to capture rumors, only 51% of final tweets were rumors (an average percentage across topics, such that no one topic dominates the statistic), and 15% clarifications, attempting to debunk these rumors. The annotator agreement (as measured in label overlap) ranged between 76% (R2) and 93% (R5) with an average of 87.7%, indicating the task differs in difficulty, but is overall clear to the annotators. C. Temporal Tracking Next, we examine the "paths" these rumors have taken in the story line of Zika in our dataset. Figure 2 illustrates the bursty nature of these rumors. The plots also show Pearson product- moment correlation r between the rumor and clarification volumes. For R4,5,6, the volume of clarification corresponds rather closely to that of the rumor with r of around 0.5. However, R1,2,3 display a mismatch between clarification attempts and the rumors. We define the "origin" tweets for rumors or clarifications as the most prominent tweets at that time for the corresponding class and we explain Figure 2 in details as follows: Fig. 2. Volume of the six rumors and their clarifications, along with the Pearson product-moment correlation r between the rumor and clarification volumes. The case of mutant mosquitos: the case of R1 is inter- esting, since it carries over a concern about the dangers of genetically modified organisms (GMO) which has been popu- lar for several years. For instance, the spike in July was due to an article published on The Real Strategy website claiming a link between "chemical exposure" and microcephaly9, which gained thousands of retweets within days. However, without any interference that we detected from authoritative sources, the rumor quickly died out. 9For more on this rumor see http://www.huffingtonpost.com/entry/zika- monsanto-pyriproxyfen-microcephaly us 56c2712de4b0b40245c79f7c Have you got Zika? Flu and cold are very common diseases, therefore confusion between flu or cold and Zika might pose a serious problem for health authorities. This case is addressed in R2. Often the tweets appear to be jokes of users who feel flu-like symptoms such as: RT @arzel: my friend had a small cold and I caught him googling "zika virus symptoms" Thus, although there are regular tweets on the true symptoms of Zika, there is a large proportion among these tweets that are jokes or lighthearted statements. The killer vaccines: Similar to R1, R3's peak originated in April with an article on another advocacy website www.march- against-monsanto.com (which argues that Monsanto, an agri- cultural biotechnology corporation, threatens the environment and the farmers) titled "1991 Government Document Confirms Tdap Vaccine Causes Microcephaly"10. The article was readily believable to people who already view Monsanto negatively and might be spread by pharmaceutical companies to create an opportunity to sell new Zika virus vaccines as Dredze et al. [19] suggested in his paper. The post happened after a major WHO campaign in February and March saying "No evidence that vaccines cause microcephaly"11. Interestingly, the April spike receded just as quickly without any clarifications from authoritative sources. Pesticides, immunities and coffee grounds: Others, how- ever, did have a strong interaction between the rumor and a quick reaction with clarifications. For instance, the most retweeted stories of R4 are those coming from mainstream media including CNN and WHO stating there is "No link between pesticide and microcephaly". At the top three of R5 are stories on the "crazy and dangerous story [that] Americans are immune to Zika" and links to the debunking website Snopes. Similarly to R2, in R6 is a case of hyperbole and exaggeration of a story saying mosquito larvae do not thrive in coffee-infused water, which was turned into sensationalist tweets claiming "Could Coffee Be the Answer in the Fight Against Zika Mosquitoes?", but which still linked to the original correct information. Thus, we show the varied nature of the rumors in the Zika stream. Those which were accompanied with mainstream coverage quickly decreased (R4-6), but even those which originated from the websites of various advocacy groups and were not met with official response were also short-lived (R1, R3). The longer-lived one is the one which concerned the daily occurrences (having a flu R2 or, possibly, coffee R6) which propagates in the Twitter lore. D. Rumor Classification Next, we turn to the supervised methods which have been proposed in previous work on news in social media that seek to establish the level of credibility of information automatically by observing specific features extracted from the social media. 10http://www.march-against-monsanto.com/1991-government-document- confirms-tdap-vaccine-causes-microcephaly/ 11https://twitter.com/WHO/status/708317001366806528 r = 0.113 R1r = 0.212 R2r = −0.004 R3r = 0.468 R4r = 0.512 R52016−01−132016−01−202016−01−272016−02−032016−02−102016−02−172016−02−242016−03−022016−03−092016−03−162016−03−232016−03−302016−04−062016−04−132016−04−202016−04−272016−05−042016−05−112016−05−182016−05−252016−06−012016−06−082016−06−152016−06−222016−06−292016−07−062016−07−132016−07−202016−07−272016−08−032016−08−102016−08−17clarificationrumorr = 0.506 R6 Scope Twitter Sentiment Linguistic Readability Medical AUTOMATICALLY EXTRACTED FEATURES OF TWEETS POTENTIALLY BELONGING TO A RUMOR. TABLE V Feature Description IS RETWEET FOLLOWING FOLLOWERS STATUS COUNT AGE HAS MENTIONS HAS HASH TAG COUNT HASH TAG DAY WEEKDAY COUNT URLS COUNT RT COUNTRY SENTIMENT SCORE POSITIVE/NEGATIVE WORDS EMOTICONS POS/NEG QUESTION MARK EXCLAMATION MARK WORDS COUNT COUNT SENTENCES CHAR COUNT UPPER COUNT PERCENTAGE UPPER PERCENTAGE UPPER/LOWER MULTIPLE QUES/EXCL COUNT NOUN COUNT ADVERB COUNT ADJECTIVE COUNT VERB COUNT PRONOUN HAS PRONOUN 1 HAS PRONOUN 2 HAS PRONOUN 3 COMPLEX WORDS READABILITY SCORES COUNT NOT WORD2VEC AVG SYLLABLES MEDICAL LEXICON WIKIPEDIA DOMAIN ADVOCACY NEWS SOCIAL INFORMATIVE Is a retweet; contains RT The number of people the user is following The number of people following the user The number of tweets at posting time The time passed since the author registered his/her account, in days Mentions a user, eg: @CNN Contains hash tags Count total number of hash tags The day of the week in which the tweet was written Count total number of URLs in text Count total number of Retweets The country the tweet was originated from sentiment score value [26] The number of positive/negative words in text Count total number of positive and negative emoticons in text Contains question mark '?' Contains exclamation mark '!' Count total number of words in text Count number of sentences Count total number of characters in text Count total number of upper case letters The percentage of upper case characters The percentage of upper and lower case characters Contains multiple questions or exclamation marks Count total number of nouns in text Count total number of adverbs in text Count total number of adjectives in text Count total number of verbs in text Count total number of pronouns in text Contains a personal pronoun in 1th person Contains a personal pronoun in 2nd person Contains a personal pronoun in 3rd person Count total number of complex words in text Flesch, Automated, Flesch Kincaid, Gunning, and SMOG [27] Count total number of words not in "word2vec" Google News vocabulary The Average number of syllables per word in text Count number of words in the medical lexicon Count number of URL domains mentioned in the wikipedia web pages Count number of URLs belonging to advocacy domains Count number of URLs belonging to news domains Count number of URLs belonging to social media domains Count number of URLs belonging to informative/trusted domains For instance, Castillo et al. [9] and Qazvinian et al. [15] suggested that the best features to assess the credibility of news topics are those that look into the user, message and topic features. Inspired by these works, we build a set of features in order to assess their power in automatically distinguishing rumors from non-rumors. Gathering all the relevant tweets to the topics in Table 2, results in a total of 56,985 tweets. Later, we filter tweets that are exact duplicates (tweets sharing exact similar information including text, urls, hashtags, and mentions) as the presence of the duplicates might influence the precision and recall values, resulting in a total of 26,728 tweets with human- assigned labels. We group the labels used in Table 2 such that we consider a rumor as the tweet that has been labeled by Crowdflower users as "rumor" (32% - 8,488 tweets) and a non-rumor as the tweet that has either been labeled as "clarification" or "other" (68% - 18,240 tweets). Note that we cannot consider "clarification" class alone, as it is vastly under-represented in our data (in part due to our focus on retrieving rumors in the previous steps). The feature set is listed in Table V and consists of 48 features grouped into five categories. The first three categories (Twitter, sentiment and linguistic features) have been previ- ously implemented in news credibility detection, whereas the last two (readability and medical features) are new to this work: Twitter features As [9] use Twitter features to define credi- bility in news topics, we build 18 similar features includ- ing the number of retweets, number of users followers and following, the presence of hashtags and mentions, the user's number of tweets, etc. Sentiment features We consider five measures of emotional state in our dataset: count of positive/negative words, count of positive/negative smileys and sentiment score representing the strength of sentiment [26]. Linguistic features We also introduce measures to charac- terize different linguistic styles in Twitter text [9]. We compute 17 different linguistic styles e.g: count adjec- tives, adverbs, pronouns, sentences, upper and lower case characters. Readability features Authors in [27] defined the readability score as a measure of how easy it is to understand a piece of text. We introduce a set of tweet text readability mea- sures with the intuition that more readable information are more credible. We implemented the predefined read- ability scores by [27] (Flech, automated, Flesch kincaid, Gunning, and SMOG scores) in addition to computing the number of complex words and average number of syllables per word. Moreover, we counted the number of words not in word2vec news vocabulary which may signal slang language [28]. in specialized corpus M as: mpw = countw/(cid:80) corpus W as wpw = countw/(cid:80) Medical/Domain features We define specialized features in the medical domain by focusing on the medical lexicon of tweets and the reliability of sources shared using URLs. First, we build a medical lexicon12 which signals how many medical terms are used in the tweet. Prior studies [29] showed that Wikipedia is a reliable knowledge base for medical data extraction tasks. Additionally, as a source for lexical and contextual features, Wikipedia was used in the past to improve medical text relation extrac- tion [30]. Guided by prior work, we build a specialized lexicon by crawling a total of 113 Wikipedia pages under the category of "Infectious disease", resulting in 22,123 words representing corpus M. Then, we download the same number (22,123) of the most frequent words on all of Wikipedia, representing a general corpus W. These can then be used to compute a probability of every word w M, as well as the probability of every word in general w W. Next, for every word in every corpus, we compute pw = mpw − wpw. Intuitively, the differences in probabilities pw provide the most descriptive words related to "infectious disease" topic which are not as prevalent in the general Wikipedia. Ranking the terms by pw, we only keep the top 13,300 meaningful words, as illustrated in Table VI (note the topmost words are more specific, while those further down the ranking are more general). Additionally, Wikipedia references are considered trusted citations as Wikipedia increasingly includes references with high impact factor medical journals such as the New England Journal of Medicine, The Lancet, the Journal of the American Medical Association, and the British Med- ical Journal among the 10 most frequently cited science journals in Wikipedia in 2007 [31]. As Wikipedia pages are usually among the top results of search engine queries [32], [31], we expect people to use Wikipedia pages and references as a major source of online health information. From the same Wikipedia pages used to collect the medical lexicon, we collect a total of 2,979 referenced SELECTED "INFECIOUS DISEASE" WIKIPEDIA MEDICAL LEXICON WORDS TABLE VI Rank Word (w) syphilis∗ 4 bronchitis∗ 81 tetanus ∗ 236 diarrhea 13682 epidemiology 15284 treatment 33869 life 35074 ∗ Among the chosen top 13,300 words with highest pw • - : is when w is not in the W corpus pw 0.01 0.002 0.001 -0.121 -0.138 -4.633 -34.608 mpw 0.01 0.002 0.001 0.006 0.009 0.019 0.003 • wpw - - - 0.128 0.147 4.652 34.61 URLs from 441 different domains13 including medical literature databases and news agencies. As most Twitter URLs are shortened, we expanded the URLs to detect the original domain. Finally, we manually classify tweet URL domains as advocacy group (advocating specific actions or policies, or claiming to be the best in providing the related information without official ties), social media (YouTube, Facebook and social media helper websites that forward and aggregate content), news (news sources informational (reliable resources CNN, Reuters, etc.), providing medical information: medical companies, gov- ernment sites, Snopes...) or non-informative (URLs hav- ing no specific domain type). Doing this, we have a total of four different domain type features where every feature is a count of the number of URLs belonging to a domain class in the tweet. In order to pick the best features for the classification task, we employ two different automatic feature selection techniques. First, Information Gain (IG) which is a popular filtering approach that aims at removing irrelevant features after computing the gain value (amount of information a feature brings to the training set) [33]. Second, we use Greedy backward elimination technique (GBE) that starts with a model having all features, and removes features one at a time until reaching a certain performance threshold [33]. Table VII shows the top features each technique produced. Here, we list the top ten features by information gain value and GBE results selecting the best ten features. Based on both techniques, the most significant features correspond to the medical features (advocacy domains count, Wikipedia domains count) followed by the syntax of the tweet text (question marks, exclamation marks...) and the sentiment features (sen- timent score, count positive/negative words) and some Twitter features. Note that advocacy feature domain type is the strongest feature with high IG value (table VII). It is understandable this feature would be useful, given that it requires expert annotation. Further, we find that out of the URLs cited in rumor tweets, 35.0% were from advocacy websites, 0.1% from social media, 39.1% were news and 25.9% were informative domains, compared to 3.1% from advocacy and 0.6% social media, 32.3% news, and 64.0% informational in non-rumors, 12Available at http://bit.ly/2m56t0w 13Available at http://bit.ly/2m59wpm THE FEATURES SELECTED USING INFORMATION GAIN AND GREEDY CLASSIFICATION PERFORMANCE ON THE RUMOR VS. NON-RUMOR TASK, BACKWARD ELIMINATION. USING RANDOM TREE CLASSIFIER WITH GBE FEATURES. TABLE VII TABLE VIII Feature min, max µ (σ) IG(cid:63) GBE• Class Precision Recall F-measure 188 (71) 0.177 (0.381) 394 (713) 61, 281 0, 1 1, 2457 -2.2, 1.6 (T) AGE (T) HAS MENT (T) COUNT RT (S) SENTIMENT (S) NEG COUNT (L) HAS QUEST (L) HAS EXCL (L) VERB CNT (L) ADVB CNT (L) MULT. '?/!' (M) ADVOCACY CNT (M) WIKI CNT (cid:63) Features are ranked desc according to information gain values. • -0.332 (0.71) 0.639 (0.871) 0.193 (0.395) 0.023 (0.161) 0.673 (0.716) 0.682(0.936) 0.014 (0.12) 0.045 (0.21) 0.253 (0.435) 0, 13 0, 1 0, 1 0, 38 0, 102 0, 1 0, 2 0, 1 9 10 6 8 - 4 5 - 3 2 1 7 : is in GBE best 10 feature subset, otherwise not. rumor non-rumor weighted average 0.929 0.963 0.946 0.921 0.967 0.944 0.925 0.965 0.945 - - IX. Every row of the table shows which topic is excluded in training the classifier, and then is used for testing. We find the performance is not uniform, with topics 1 and 5 having the worst precision, while topics 3 and 4 having recall under 0.500. Once again, this points to the importance of expert labeled data that is topically matched to the one in question. making the presence of advocacy groups and informational sources the distinctive features, and, the news media. Wikipedia domains features is also among the top selected features in both techniques and this features is automatically computed and can be used more broadly. interestingly, not Finally, we train a supervised classifier to predict which tweets contain rumor and which do not. We build a classifier separately for the top 10 features of IG and GBE techniques. We experiment with three different learning algorithms. First, Naıve-Bayes algorithm [34], a probabilistic based on Bayes' theorem with strong ("naıve") independence assumptions be- tween the features. Second, Random Forest [35], which is a collection of classifiers where every classifier votes for one class and every instance is classified based on the majority class. Third, Random Decision Tree [36], a classifier that recursively builds a tree by splitting the training data based on a criterion until all partitions have the same class label. We find the best results using the Random Tree classifier using the top 10 GBE features. For training/validation process, we perform 10-fold cross validation, in which 10 experiments are performed on a different tenth of the data held out for testing, such that we take advantage of the whole dataset for both training and testing. A summary of the best classifier (Random Tree) with top 10 GBE features results are shown in Table VIII. As it shows, the classifier achieves a precision of 0.946 with recall 0.944 which is significantly better than a random predictor. The F-value (a harmonic mean of precision and recall) is high, indicating a good balance between precision and recall values. The final row presents the average values from across both classes. Note that these results are overfitted, given the limited amount of data available, feature selection on the test set, and also that the method relies on manually labeled tweets, with the addition that the dataset is already topically specialized. As we find having training data within the topic to be extremely helpful in building accurate classifiers, we explore a more challenging scenario wherein the classifier is trained on 5 topics and tested on the 6th. The results are shown in Table CLASSIFICATION PERFORMANCE OF DETECTING RUMOR TWEETS IN INDIVIDUAL TOPICS, USING RANDOM TREE CLASSIFIER WITH GBE TABLE IX FEATURES. Topic % Rumor Precision Recall F-Measure R1. Zika linked to GMO R2. Flu symptoms similar to Zika R3. Vaccines cause microcephaly R4. Insecticide cause microcephaly R5. Americans are immune to Zika R6. Coffee as mosquito repellent 61% 31% 71% 32% 32% 31% 0.296 0.746 0.683 0.594 0.101 0.688 0.869 0.504 0.490 0.432 0.523 0.688 0.440 0.602 0.571 0.500 0.170 0.688 VI. DISCUSSION Key Findings. Communication on Twitter around a major public health crisis is an essential component in the public health response. In our search of rumors in the stream of Zika-related tweets, we find automatic topic discovery tools such as LDA to be too coarse-grained to tease out the rumors WHO and Snopes have cited as most concerning. Thus, we incorporate the expert knowledge to compose high-precision queries to retrieve the relevant tweets. We also show that further steps are needed, as after a closer examination we find only roughly half of the captured tweets to be actual rumors. This insight shows the perils of using keyword or hashtag-based topic definition, as is done, for example by "Truthy" [13] where a topic is defined by a single hashtag, or even in Castillo et al. [9] who use Twitter Monitor algorithm to formulate keyword-based queries. Further, within the small sample of topics we examined, we discovered a variety in terms of longevity. Topics relating to everyday activities, such as seasonal flu or coffee, can be a subject to hyperbole and humor which may propa- gate the misinformation. However, rumors originated from known advocacy websites such as http://www.march-against- monsanto.com/ may display a spike which quickly dissipates without correction. These websites adjust their stances to the new trending topics like Zika while maintaining their core message. Interestingly, mainstream news websites were cited at roughly the same rate in rumor tweets (39.1%) as in others (32.3%), including the clarifications. This emphasizes the importance of authoritative sources outside mainstream news media in setting the record straight. Further, Towers et al. [37] find that mainstream news media may help spread fear and misinformation, such as in the case of Ebola in 2014, "with each Ebola-related news video inspiring tens of thousands of Ebola-related tweets and Internet searches", effectively spreading unsubstantiated panic in the United States. Public Health Relevance. Detecting health rumors in a timely fashion can help public health officials tackle them before they spread. However, over- reacting to a rumor might in fact increase its damage by advertising the harmful misconceptions. In the case of the Ebola outbreak, some of the rumors circulated on the Internet, such as that drinking salty water was an effective protective measure, led to several deaths [38], [39]. Rumors around a vaccination trial for a new Ebola vaccine sparked fears for a regular Measles vaccine, which was being used to tackle a Measles outbreak at the same time [40]. Public health decisions in one country can spark rumors and mistrust in another, such as when the HPV (Human Papilloma Virus) vaccine campaign discontinuation in Japan sparked concerns and rumors about is imperative that the impact of health-awareness campaigns is monitored in real time, as well as internationally. The tools described here can help public health practitioners in tackling the large scale of social media streams. its safety worldwide [41]. Thus, it Further, the case of Zika is highly complex, as much uncertainty surrounded important information. For instance, the pathogenesis of microcephaly took months to be estab- lished. Previous works have highlighted the difficulty of early detection of rumors (i.e. [42]) in public health cases – to assess the veracity of a rumor can take months of public health investigations. However, due to the unprecedented scale of the crisis, health authorities started to act before a clear link between the Zika outbreak and microcephaly was established. This was especially challenging, since it can happen that apparent rumors are in fact truth. As an example, reports on narcolepsy as a side effect of a flu vaccine in the Nordic countries were first depicted as rumors, but later, few cases were confirmed and that took years of research and still it is contested [43]. Although correlation was found in epidemio- logical data, some scholars argue that an increase in awareness due the hype of the "vaccination crisis" might have caused the increase in cases. Public health authorities are continuously working in a complex crisis communication dilemma, since they have to act on some level of uncertainty. In this study, we chose the rumors which have been identified by authoritative sources as certain. However, a different approach may be called for the detection of possible health rumors, which is an exciting future research direction. In this context, we believe more work is needed in the integration of rumor monitoring with public health officials, and especially the work-flow of communication departments of public health authorities. A pipeline such as AIDR (which provided our collection) described by Imran et al. [18] wherein volunteers provide labeled social media during a disaster to train automated methods, may also be useful for ongoing health emergencies. Limitations. One of the main challenges of this study is that we cannot be sure about the representativeness of the social media users compared with the general population. The demographics of social media users tend to be young, and female [44], which may be important, as some have called women "gatekeepers" of their families health [45], [46]. In addition, we need to consider that particular segments of the population are more at-risk (e.g. pregnant women) and it may be difficult to identify such users online (however, tracking this particular group of users would enlighten the effect Zika has on child-baring women). Further, the limited resources of this study were applied to only a handful of rumors – those especially brought up by WHO and Snopes – and a closer collaboration with health communication experts may provide further insight into the variety of misinformation both online and its interaction with mainstream media. Finally, Zika affected many countries, and our original dataset has covered several languages. The peculiarities of rumors in each language (and by proxy, in perhaps different cultures), could illuminate differences in the perception of medical information on social media. VII. CONCLUSION This paper presents tool pipeline incorporating expert knowledge, crowdsourcing, and machine learning for health- related rumor discovery in a social media stream. Each step of the analysis was rigorously tested by manual evaluation, providing qualitative and quantitative insight into a process needed to collect data relevant to the health communication professionals. In particular, our study shows that tracking health misinfor- mation in social media is not trivial, and requires some expert supervision. This can then augmented by "crowd" workers in order to provide additional annotation of the captured rumor- related tweets. We show the bursty and varied nature of the Zika rumors, some provoked by known advocacy groups, others propagated due to their affordance for humor or light banter. We find traditional media sources not to be prominent in clarifying rumors, but instead show the importance of authoritative informational sources. We hope this work will encourage a collaboration between health professionals and data researchers in order to quickly understand and mitigate health misinformation on social media. Continued work will address the multi-lingual nature of the dataset, and expand the efforts to cross-language analysis of rumors and their potential international spread. More studies on health rumors may provide richer test beds for building automatic classifiers not just for rumors, but for the detection of informational campaigns. Finally, a user-friendly interface similar to Kostkova et al. [17], which may involve expert input, like AIDR [18], would smooth the interaction between data scientists and health communication professionals. ACKNOWLEDGMENT We would like to thank Luis Fernandez-Luque, scientist, Qatar Computing Research Institute, William Schulz, research assistant, London School of Hygiene & Tropical Medicine, Clarissa Simas, research assistant, London School of Hygiene & Tropical Medicine and Per Egil Kummervold, Research Scientist, Norut Northern Research Institute for the fruitful discussions and health related expertise in the Zika rumor selection process. REFERENCES Jirotka, and M. [1] H. Webb, P. Burnap, R. Procter, O. Rana, B. C. Stahl, M. Williams, W. Housley, A. Edwards, "Digital Wildfires: Propagation, Verification, Regulation, and Responsible Innovation," ACM Transactions on Information Systems, vol. 34, no. 3, pp. 1–23, 2016. [Online]. Available: http://dl.acm.org/citation.cfm?id=2915200. 2893478{%}5Cnhttp://dl.acm.org/citation.cfm?doid=2915200.2893478 [2] L. Fernandez-Luque and T. Bau, "Health and social media: perfect storm of information," Healthcare informatics research, vol. 21, no. 2, pp. 67– 73, 2015. [3] World Health Organization, "Mixed uptake of social media among public health specialists," Bull World Health Organ, vol. 89, pp. 784– 785, 2011. [Online]. Available: http://www.who.int/bulletin/volumes/89/ 11/11-031111.pdf?ua=1 [4] WHO. (2016) Risk communication in the context of zika virus. http://www.who.int/risk-communication/zika-virus/risk-communication- presentation.pdf?ua=1. Accessed: 2017-01-03. [5] A. A. Ginart, S. Das, J. K. Harris, R. Wong, H. Yan, M. Krauss, and P. A. Cavazos-Rehg, "Drugs or dancing? using real-time machine learning to classify streamed dabbing homograph tweets," in Healthcare Informatics (ICHI), 2016 IEEE International Conference on. IEEE, 2016, pp. 10– 13. [6] I. Seaman and C. Giraud-Carrier, "Prevalence and attitudes about illicit and prescription drugs on twitter," in Healthcare Informatics (ICHI), 2016 IEEE International Conference on. IEEE, 2016, pp. 14–17. [7] H. Yang and C. C. Yang, "Harnessing social media for drug-drug interactions detection," in Healthcare Informatics (ICHI), 2013 IEEE International Conference on. IEEE, 2013, pp. 22–29. [8] Y. Mejova, H. Haddadi, A. Noulas, and I. Weber, "#foodporn: Obesity patterns in culinary interactions," in DH'15: International Conference on Digital Health 2015. ACM, 2015, pp. 51–58. [9] C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on twitter," in Proceedings of the 20th international conference on World wide web. ACM, 2011, pp. 675–684. [10] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and the dynamics of the news cycle," in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 497–506. [11] F. Yang, Y. Liu, X. Yu, and M. Yang, "Automatic detection of rumor on sina weibo," in Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. ACM, 2012, p. 13. [12] K. Wu, S. Yang, and K. Q. Zhu, "False rumors detection on sina weibo by propagation structures," in 2015 IEEE 31st International Conference on Data Engineering. IEEE, 2015, pp. 651–662. [13] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, S. Patil, A. Flam- mini, and F. Menczer, "Truthy: mapping the spread of astroturf in microblog streams," in Proceedings of the 20th international conference companion on World wide web. ACM, 2011, pp. 249–252. [14] J. Ma, W. Gao, Z. Wei, Y. Lu, and K.-F. Wong, "Detect rumors using time series of social context information on microblogging websites," in Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 2015, pp. 1751–1754. [15] V. Qazvinian, E. Rosengren, D. R. Radev, and Q. Mei, "Rumor has it: Identifying misinformation in microblogs," in Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 2011, pp. 1589–1599. [16] World Health Organization et al., "Risk communication in the context of zika virus: interim guidance," pp. 3–4, March 2016. [17] P. Kostkova, V. Mano, H. J. Larson, and W. S. Schulz, "Vac medi+ board: Analysing vaccine rumours in news and social media," in Proceedings of the 6th International Conference on Digital Health Conference. ACM, 2016, pp. 163–164. [18] M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg, "Aidr: Artificial intelligence for disaster response," in Proceedings of the 23rd International Conference on World Wide Web. ACM, 2014, pp. 159– 162. [19] M. Dredze, D. A. Broniatowski, and K. M. Hilyard, "Zika vaccine misconceptions: A social media analysis," Vaccine, vol. 34, pp. 3441– 3442, 2016. [20] World Health Organization. (2016, September) Dispelling rumours around zika and complications. http://www.who.int/emergencies/zika- virus/articles/ rumours/en/. Accessed: 2016-07-20. [21] A. Nourbakhsh, X. Liu, S. Shah, R. Fang, M. M. Ghassemi, and Q. Li, "Newsworthy rumor events: A case study of twitter," in 2015 IEEE International Conference on Data Mining Workshop (ICDMW). IEEE, 2015, pp. 27–32. [22] B. David, N. Andrew, and J. Michael, "Latent dirichlet allocation," Journal of machine Learning research, vol. 3, pp. 993–1022, Jan 2003. [23] I. Ruthven and M. Lalmas, "A survey on the use of relevance feedback for information access systems," The Knowledge Engineering Review, vol. 18, no. 2, pp. 95–145, 2003. [24] B. Yu, M. Willis, P. Sun, and J. Wang, "Crowdsourcing participatory evaluation of medical pictograms using amazon mechanical turk," Jour- nal of medical Internet research, vol. 15, no. 6, p. e108, 2013. [25] H. Zhai, T. Lingren, L. Deleger, Q. Li, M. Kaiser, L. Stoutenborough, and I. Solti, "Web 2.0-based crowdsourcing for high-quality gold stan- dard development in clinical natural language processing," Journal of medical Internet research, vol. 15, no. 4, p. e73, 2013. [26] W. Lowe, K. Benoit, S. Mikhaylov, and M. Laver, "Scaling policy preferences from coded political texts," Legislative studies quarterly, vol. 36, no. 1, pp. 123–155, 2011. [27] L. Feng, M. Jansche, M. Huenerfauth, and N. Elhadad, "A comparison of features for automatic readability assessment," in Proceedings of the 23rd International Conference on Computational Linguistics: Posters. Association for Computational Linguistics, 2010, pp. 276–284. [28] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their composi- tionality," in Advances in neural information processing systems, 2013, pp. 3111–3119. [29] J. Friedlin and C. J. McDonald, "An evaluation of medical knowledge contained in wikipedia and its use in the loinc database," Journal of the American Medical Informatics Association, vol. 17, no. 3, pp. 283–287, 2010. [30] B. Rink, S. Harabagiu, and K. Roberts, "Automatic extraction of relations between medical concepts in clinical texts," Journal of the American Medical Informatics Association, vol. 18, no. 5, pp. 594–600, 2011. [31] J. M. Heilman, E. Kemmann, M. Bonert, A. Chatterjee, B. Ragar, G. M. Beards, D. J. Iberri, M. Harvey, B. Thomas, W. Stomp et al., "Wikipedia: a key tool for global public health promotion," Journal of medical Internet research, vol. 13, no. 1, p. e14, 2011. [32] M. R. Laurent and T. J. Vickers, "Seeking health information online: does wikipedia matter?" Journal of the American Medical Informatics Association, vol. 16, no. 4, pp. 471–479, 2009. [33] M. Cord and P. Cunningham, Machine learning techniques for multime- dia: case studies on organization and retrieval. Springer, 2008. [34] H. Zhang and J. Su, "Naıve bayesian classifiers for ranking," in Machine Learning: ECML 2004. Springer, 2004, pp. 501–512. [35] T. K. Ho, "Random decision forests," in Document Analysis and Recognition, 1995., Proceedings of the Third International Conference on, vol. 1. IEEE, 1995, pp. 278–282. [36] W. Du and Z. Zhan, "Building decision tree classifier on private data," in Proceedings of the IEEE international conference on Privacy, security and data mining-Volume 14. Australian Computer Society, Inc., 2002, pp. 1–8. [37] S. Towers, S. Afzal, G. Bernal, N. Bliss, S. Brown, B. Espinoza, J. Jackson, J. Judson-Garcia, M. Khan, M. Lin et al., "Mass media and the contagion of fear: the case of ebola in america," PloS one, vol. 10, no. 6, p. e0129179, 2015. [38] S. O. Oyeyemi, E. Gabarron, and R. Wynn, "Ebola, Twitter, and misinformation: a dangerous combination?" British Medical Journal, vol. 349, no. October, p. g6178, 2014. [Online]. Available: http://www.bmj.com/cgi/doi/10.1136/bmj.g6178 [39] F. Jin, W. Wang, L. Zhao, E. Dougherty, Y. Cao, C. T. Lu, and N. Ramakrishnan, "Misinformation propagation in the age of Twitter," Computer, vol. 47, no. 12, pp. 90–94, 2014. [40] The Vaccine Confidence Project, "Sierra Leone: Ebola campaigns vaccination hamper http://www.vaccineconfidence.org/sierra-leone-ebola-fears-hamper- vaccination-campaigns-against-polio-and-measles/, jun 2015, accessed: 2016-10-16. against Polio fears and Measles," [41] H. J. Larson, R. Wilson, S. Hanley, A. Parys, and P. Paterson, "Tracking the global spread of vaccine sentiments: The global response to Japan's suspension of its HPV vaccine recommendation," Human Vaccines and Immunotherapeutics, vol. 10, no. 9, pp. 2543–2550, 2014. [42] Z. Zhao, P. Resnick, and Q. Mei, "Enquiring minds: Early detection of rumors in social media from enquiry posts," in Proceedings of the 24th International Conference on World Wide Web, ser. WWW '15. New York, NY, USA: ACM, 2015, pp. 1395–1405. [43] M. C. Sturkenboom, "The narcolepsy-pandemic influenza story: Can the truth ever be unraveled?" Vaccine, vol. 33, pp. B6–B13, 2015. [44] M. Duggan and J. Brenner, The demographics of social media users, Pew Research Center's Internet & American Life Project 2012. Washington, DC, 2013, vol. 14. [45] N. Calabretta, "Consumer-driven, patient-centered health care in the age of electronic information," Bulletin. Medical Library Association, vol. 90, no. 1, pp. 32–37, 2002. [46] D. Warner and J. D. Procaccino, "Toward wellness: Women seeking health information," Journal of the American Society for Information Science and Technology, vol. 55, no. 8.
1906.06545
1
1906
2019-06-15T12:38:29
Interactive health communication and the construction of the identity of the person with low vision in social media
[ "cs.SI", "cs.CY", "cs.HC" ]
With use and appropriation of digital environments by the Green Cane movement in Brazil, the informational character in health is a central discursive resource, and occurs imbued with (self) conceptions about the characteristic ways of thinking, feeling and acting of the person with low vision. This work aims at exploring the discourse of the person with low vision in the social media about their own social identity. Based on the Interactive Health Communication, videos on Youtube and Facebook and Instagram posts of the Virtual Group Stargardt, a virtual community made up of people with low vision and suffering from Stargardt's Disease, were investigated. From the selection of excerpts and their coding, 42 identity traits were identified and grouped into a synthetic model with 08 categories: (T1) we are low vision and we use the green cane; (T2) we have sensitivity to light and we wear sunglasses; (T3) we have difficulties in the day-to-day, but we use assistive strategies and technologies; (T4) we are a PcD (Person with Disability) and we have rights guaranteed by law; (T5) we seek to understand about our disease and we are the spokesperson of it; (T6) we have a visual impairment, but we are not just that; (T7) we live with conflicts and contradictions by the way we see things, and; (T8) we recognize as a community. Such traits are constructed interactively, through a construction based on moments of agreement, disagreement and good humor. The discourses are oriented in the consolidation of a proper identity, distinct from the person with blindness, but similar in the legal framework of the visually impaired person.
cs.SI
cs
Comunicación interactiva en salud y construcción de identidad en redes sociales de personas con baja visión Gustavo Caran1, Ronaldo Araujo2, Críspulo Travieso Rodríguez3 1 0000-0002-1199-5002 Instituto Brasileiro de Informação em C&T, Brasil. [email protected] 2 0000-0003-0778-9561 Universidade Federal de Alagoas, Brasil. [email protected] 3 0000-0002-0774-0728 Universidad de Salamanca, España. [email protected] Resumen: En el uso y apropiación del ámbito digital por parte del movimiento Bengala Verde en Brasil, el carácter informativo en salud es un recurso discursivo fundamental, y se desarrolla infundido por (auto)concepciones sobre los modos característicos de pensar, sentir y reaccionar de la persona con baja visión. El objetivo de este estudio es explorar el discurso de estas personas respecto a su propia identidad social en medios y redes sociales. Basado en la Comunicación Interactiva en Salud, se analizaron vídeos de YouTube y publicaciones en Facebook e Instagram del Grupo Virtual Stargardt, una comunidad virtual compuesta por personas de baja visión y que padecen la enfermedad de Stargardt. A partir de la selección de fragmentos de esos discursos y de su codificación, se identificaron 42 rasgos identificadores, agrupados en un modelo sintético de 8 categorías: (T1) tenemos baja visión y usamos un bastón verde; (T2) tenemos sensibilidad a la luz y usamos gafas de sol; (T3) tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías asistenciales; (T4) somos personas con discapacidad y la ley garantiza nuestros derechos; (T5) queremos saber sobre nuestra enfermedad y somos portavoces de la misma; (T6) tenemos una discapacidad visual pero somos más que eso; (T7) convivimos con ciertos problemas y contradicciones por la forma en que vemos las cosas, y; (T8) nos reconocemos como comunidad. Estos rasgos se construyen de forma interactiva, por medio de una elaboración pautada en momentos de acuerdo, discordancia y sentido del humor. Los discursos contribuyen a la consolidación de una identidad propia, distinta a la de la persona invidente pero similar en cuanto al marco legal de la persona con discapacidad visual. Palabras clave: Persona com discapacidad; Baja visión; Identidad; Comunicación interactiva em salud; Redes sociales. Resumo No uso e apropriação dos ambientes digitais pelo movimento Bengala Verde no Brasil, o caráter informativo em saúde é um recurso discursivo central, e ocorre imbuído de (auto) concepções a respeito de modos característicos de pensar, sentir e agir da pessoa com baixa visão. O objetivo deste trabalho foi explorar o discurso da pessoa com baixa visão nas mídias sociais sobre sua própria identidade social. Apoiada na Comunicação Interativa em Saúde, foram investigados vídeos do Youtube e postagens do Facebook e Instagram do Grupo Virtual Stargardt, uma comunidade virtual composta por pessoas com baixa visão e acometidas pela Doença de Stargardt. A partir da seleção de trechos e da sua codificação, foram identificados 42 traços identitários, agrupados em um modelo sintético com 08 categorias: (T1) somos baixa visão e o usamos a bengala verde; (T2) temos sensibilidade à luz e usamos óculos de sol; (T3) temos dificuldades no dia-a-dia, mas utilizamos estratégias e tecnologias assistivas; (T4) somos uma PcD e temos direitos garantidos por lei; (T5) buscamos entender sobre nossa doença e somos o porta-voz dela; (T6) temos uma deficiência visual, mas não somos apenas isso; (T7) convivemos com conflitos e contradições pela maneira como enxergamos as coisas, e; (T8) nós reconhecemos como uma comunidade. Tais traços são construídos interativamente, por meio de uma construção pautada em momentos de concordância, discordância e bom- humor. Os discursos se orientam na consolidação de uma identidade própria, distinta da pessoa com cegueira, mas semelhante no enquadramento legal da pessoa com deficiência visual. IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 1 Palavras-chave: Pessoa com Deficiência; Baixa Visão; Identidade; Comunicação Interativa em Saúde; Redes Sociais na Internet. Introducción En los últimos 20 años Internet se ha convertido en un espacio de movilización social en diversos ámbitos. Conceptos como colaboración, participación, compromiso o cooperación se han incorporado a la web, modificando su configuración inicial, unidireccional, asíncrona y estática, hacia una comunicación cada vez más multidireccional, síncrona y dinámica (Recuero, 2009). La red se ha vuelto así un espacio de diálogo amplio y diverso, en el que las conversaciones se conforman y distribuyen mediante múltiples herramientas, como son Facebook, Twitter, Instagram, YouTube etc. (Recuero, 2012). Por un lado, esta comunicación virtual es capaz de promover un entorno más democrático, en que se comparten y debaten perspectivas ideológicas y sociales distintas. Los grupos sociales minoritarios tienen ahora un espacio en el que pronunciarse, de defensa de su identidad y de sus posiciones políticas e ideológicas. Y por otro lado, estos espacios virtuales no están libres de la influencia del capital, de la globalización y de los vaivenes propios de una sociedad fluída, dinámica y condicionada de forma constante por impulsos de tipo emocional (Bauman & Mauro, 2016). Al estar supeditada a influencias masivas y de carácter heterogéneo, la web ha devenido en un espacio determinado por los distintos movimientos sociales, que articulan todo un entramado de esperanzas y sentimientos de indignación (Castells, 2017). En este contexto, los grupos sociales minoritarios se movilizan para dejar su impronta en esa comunicación en red. Como una forma de lucha y de poder para su inclusión social, dichos grupos buscan un "lugar en la mesa de debate", manifestando no solo aquello que defienden en cuanto a posición político-ideológica, sino también construyendo, defendiendo y dando a conocer su identidad -- además de armarse de las prácticas informacionales que contribuyen a este proceso -. Dentro de los estudios de mediación de la información en el ámbito de la salud, la Comunicación Interactiva en Salud (CIS) se define a partir del uso que las personas hacen de los dispositivos informáticos para buscar, obtener y compartir información sobre salud (Araújo, Silva & Mota, 2015). Para Eng et al., (1999), se considera CIS cualquier interacción de un individuo -- consumidor, paciente, cuidador o profesional -- mediante un dispositivo electrónico o tecnología de comunicación para acceder o transmitir información sanitaria o para recibir orientación o ayuda en un asunto relacionado con la salud. Las investigaciones previas sobre CIS se han ocupado más de la educación y la promoción de hábitos saludables (Eng & Gustafson, 1999; Murray et al, 2005; Rada, 2005) y solo algunas se han centrado en el análisis de la subjetividad y los rasgos identificadores de los sujetos durante el proceso de mediación e intercambio de informaciones suministradas por los medios digitales. En cuanto a las intervenciones en redes sociales para promover la igualdad en salud, Welch et al. (2016) defienden que los distintos medios sociales están determinados en base a que concentran bloques de construcción funcional a partir del grado de interacción y comunicación entre los usuarios IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 2 y los autores; uno de esos bloques es precisamente el de la identidad, definida en los términos en que los usuarios y los grupos se revelan y relacionan. Redundando en la idea planteada, ello cobra aún mayor relevancia en determinados colectivos; en palabras de Vaca Vaca et al (2012), "esta relación dialéctica entre interpretaciones y actos, entre individuos y contextos sociales, hace que el estudio de las representaciones sociales sea de utilidad en la comprensión de problemáticas comunitarias, como lo es la de la discapacidad, pues permite comprender cogniciones y sistemas explicativos que median las interacciones en determinados grupos". Entre los numerosos grupos sociales minoritarios con presencia en internet, este trabajo se centra en las Personas con Discapacidad Visual (PDV), un grupo heterogéneo en cuanto a sus capacidades visuales y a sus rasgos socio-identificadores. Igual que los demás subgrupos de Personas con Discapacidad (PcD), las PDV buscan, también en la web, acceso a productos, servicios, informaciones y derechos. Términos como accesibilidad, inclusión social y digital, integración social y diseño universal representan ese esfuerzo promovido por las propias personas con discapacidad visual, por la sociedad y por los organismos públicos en construir una relación bidireccional entre este grupo social y la sociedad en que se inserta (García, 2102). Bidireccional en el sentido en que permite el acceso y la inclusión, facilitando que el individuo asuma plenas capacidades a la hora de interaccionar activa y pasivamente con la sociedad, logre una comprensión del mundo y de su posición social y constituya su identidad por medio de elementos materiales y simbólicos. Tanto dentro como fuera del ámbito de la Ciencia de la Información (CI), varios trabajos han explorado el acceso y la accesibilidad en el contexto de las personas con discapacidad visual, discutiendo los factores actitudinales, técnico/tecnológicos, políticos y socioculturales que marcan su inclusión en el ámbito digital. Sin embargo, especialmente en CI, se ha abordado de forma escasa esa expresión identitaria de las PDV en internet, a través de los contenidos multimedia compartidos por ellas mismas en entornos en línea. ¿Cómo construye una persona con discapacidad visual su presencia digital? ¿Qué discurso defiende? ¿Qué rasgos identificadors manifiesta? ¿Y ante qué otros aspectos se posiciona de forma contraria? Estas preguntas motivaron que se llevara a cabo la siguiente investigación, cuyo objetivo es analizar de manera cualitativa, exploratoria y descriptiva la presencia digital y el discurso de las personas con discapacidad visual en la construcción de su identidad. 2 Metodología Según las directrices de la Organización Mundial de la Salud (2003) los tipos de discapacidad visual pueden clasificarse en dos grupos: ceguera; y baja visión o visión insuficiente. Una persona invidente puede o no tener resto visual, pero en todo caso no lo usa de manera significativa para localizar objetos u orientarse. Frente a ello, la persona con baja visión usa ese remanente visual que posee en sus actividades cotidianas (Caran, 2013). Los parámetros clínicos de medición de la capacidad visual se han materializado en la creación de una clasificación normativa. Sin embargo, la experiencia de no ver, parcial o completamente, depende del contexto práctico, social y cultural. Según establecía en 2015 el nuevo Estatuto da Pessoa com Deficiência: la discapacidad se expresa en base a la desigualdad de oportunidades experimentadas (Dhanda, 200'8; Lago Júnior & Barbosa, 2016). La distinción entre esos dos grupos se ha vuelto actualmente más evidente en Brasil, con la aparición online de movimientos sociales como Bengala Verde1. Sustentados en el lema queremos que você nos veja, el objetivo de este movimiento es difundir socialmente la identidad de la persona 1 http://www.bengalaverde.com.br/ (Bastón verde) IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 3 con baja visión, utilizando también el bastón para indicar que se es una PDV, pero diferenciándose de la persona invidente por el color verde. Esta iniciativa se inspiró en el proyecto social del mismo nombre, puesto en marcha en Argentina en 2012 por la profesora Perla Mayo. En Brasil, el movimiento Bengala Verde emplea internet para promover espacios de interacción entre personas con baja visión y para concienciar socialmente sobre su distinción con respecto a las personas que padecen ceguera. En el contexto descrito, este trabajo analiza la presencia digital y los discursos de las personas con baja visión. Tras localizar los registros micro-documentales de los medios y redes sociales (Jeanneret, 2015), se comenzó un tratamiento metodológico de exploración inspirado en la teoría Actor-Red de Bruno Latour (2012). Las huellas digitales de los autores sobre los discursos de las personas con baja visión fueron monitorizados, empezando por la página web del movimiento Bengala Verde y ampliando la investigación a partir de la navegación por los hiperenlaces y referencias publicados desde allí. En este examen se ha contemplado la identificación de comunidades online relevantes impulsadas por los propios usuarios (User-Driven Social Support) -- esto es, orientadas a personas con baja visión y gestionadas por ellas mismas (Ahmed et al., 2017) -. Tras esa fase inicial, se seleccionó el Grupo Virtual Stargardt (GVS)2, creado en 2012 por los afectados por la enfermedad de Stargardt (ES), una patología que provoca la degeneración de los fotorreceptores de la zona central de la retina (mácula) y que lleva a la condición de baja visión. El GVS tiene presencia en Facebook, YouTube, Instagram y Whatsapp y se trata de una comunidad cuyo objetivo es compartir informaciones y apoyo social a los pacientes de esta dolencia. Aunque la enfermedad de Stargardt está catalogada como enfermedad rara, es una de las patologías degenerativas de la retina más frecuentes en la población mundial, afectando a una de cada 10.000 personas. La perdida de capacidad visual (agudeza visual) se puede manifestar en la infancia o ya en la edad adulta. La facultad de ver detalles en la visión central se va reduciendo gradualmente, pero no suele derivar en ceguera. Por eso, la persona que padece esta enfermedad suele vivir como una persona con visión normal, si bien esta va perdiendo agudeza, hasta el momento en que se reconoce a sí misma y es legalmente reconocida como persona con baja visión (Retina Brasil, 2019). De los canales del GVS se seleccionaron solo los de acceso público, concretamente su página en Facebook, su perfil en Instagram y su canal en YouTube. Se consideraron productos de comunicación interactiva en salud, y por tanto se analizaron como tales los contenidos de las entradas y comentarios. Se recogieron todos los vídeos de YouTube y publicaciones de Instagram, con sus correspondientes descripciones y reacciones. En el caso de Facebook, debido al gran volumen de publicaciones existentes, se optó por recopilar las publicaciones de 2018 y sus comentarios. Se usó la aplicación Netvizz3 para la recogida automática de los datos de Facebook, mientras que en el resto de medios se procedió de manera manual. Este proceso se llevó a cabo el 5 de enero de 2019 y se recogió un total de 42 vídeos de YouTube, 18 publicaciones de Instagram y 70 posts de Facebook. Para el tratamiento de los datos se utilizó Excel 365 y el análisis de los mismos se realizó con el programa ATLAS.ti. La figura 1 ilustra los pasos seguidos en la metodología de este trabajo. Figura 1: Fases de la metodología empleada. 2 http://www.stargardt.com.br/ 3 https://apps.facebook.com/107036545989762/?ref=br_rs IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 4 En los estudios sobre medios sociales, incluso en los orientados hacia el marketing digital, cada vez es más habitual el estudio de reglas de conducta aplicadas al análisis del comportamiento de los usuarios. Una de estas normas, esgrimidas por Scott (2013), destaca que, además del hecho de que los actores en redes sociales estén dispuestos e interesados en la interacción con otros y en la participación, las publicaciones dicen mucho sobre quienes las comparten. Dicho autor llega a afirmar que "usted es lo que publica". En esa línea, para esta investigación se partió de la premisa de que los contenidos de las publicaciones y de sus reacciones eran significativas sobre el grupo analizado, y los rasgos identificadors percibidos en las publicaciones fueron agrupados y descritos en función de sus características y similitudes. Como se ha comentado, el análisis de los datos se realizó en ATLAS.ti, siguiendo las siguientes etapas: 1) importación de los vídeos de YouTube (42 documentos) y de las publicaciones y comentarios de Facebook (70 documentos) en formato .pdf; 2) importación de páginas web y vídeos compartidos en publicaciones de Facebook (26 documentos); 3) detección y citación de fragmentos de documentos que incluían percepciones o creencias sobre la persona con enfermedad de Stargardt, en expresiones como "yo soy…", "nosotros somos…", "la persona con ES es…", etc.; 4) agrupación y clasificación de la citaciones obtenidas en expresiones (códigos) que representaran los rasgos identificadors presentes en los contenidos compartidos, y; 5) análisis de los códigos y citas, ajustados y sistematizados según un modelo de síntesis. 3 Resultados y discusión Los contenidos procedentes de vídeos de YouTube y las publicaciones de Facebook e Instagram permitieron la identificación de 42 códigos, que fueron agrupados en 8 rasgos identificadores de la persona afectada por la enfermedad de Stargardt. Estos rasgos están relacionados con la dimensión de los sentidos en la mediación de información (Marteleto, 2010), y su objeto de representación en construcción intersubjetiva es la persona con ES en su vida diaria respecto a su comunicación interactiva en salud. Estos rasgos representan tanto aspectos subjetivos, referidos a sus modos de pensar y sentir sobre sí mismo, como aspectos objetivos, sus formas de expresión y reacción en el uso de objetos cotidianos. A la hora de llevar a cabo el análisis, este trabajo concebía que la identidad de la persona con ES no está separada del resto de su existencia. Lo que "ellos son" no esta separado del resto de "lo que viven" o de "lo que hacen" o "lo que usan" en el día a día. Por tanto, los rasgos identificadores son IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 5 capas representativas híbridas sobre actores, acciones y artefactos de la vivencia de la persona con esta enfermedad, sin separar los sujetos y los objetos de su contexto social (Latour, 2012). En la figura 2 se muestran los rasgos identificadores, indicando los distintos aspectos representados para cada uno de ellos. En concreto, dichos rasgos son los siguientes: (T1) tenemos baja visión y usamos un bastón verde; (T2) tenemos sensibilidad a la luz y usamos gafas de sol; (T3) tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías asistenciales; (T4) somos personas con discapacidad y la ley garantiza nuestros derechos; (T5) queremos saber sobre nuestra enfermedad y somos portavoces de la misma; (T6) tenemos una discapacidad visual pero somos más que eso; (T7) convivimos con ciertos problemas y contradicciones por la forma en que vemos las cosas, y; (T8) nos reconocemos como comunidad. Figura 2: Rasgos identificadores de la persona con enfermedad de Stargardt IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 6 Los tres primeros rasgos asocian la identidad de la persona con ES a objetos que han sido incorporados a su rutina: el bastón, las gafas de sol y las tecnologías de apoyo. Los rasgos T4 y T5 representan el aspecto social recogido en la legislación y el papel de portavoces en la construcción social de la identidad de la persona con ES. Los rasgos T6 y T7 constituyen aspectos de la vida diaria que los definen más allá de la enfermedad (como estilo de vida), pero vinculados a los problemas y equívocos inherentes a la baja visión. Por último, el rasgo T8 se refiere a la relación entre las personas con ES, mediante su vinculación comunitaria e institucional. (T1) Tenemos baja visión y usamos un bastón verde El discurso más recurrente en el GVS demuestra una vinculación de la persona con enfermedad de Stargardt con la condición de discapacidad visual establecida por la Organización Mundial de la Salud (OMS), usando expresiones como "soy de baja visión", "tengo baja visión" y "tengo visión por debajo de lo normal". En una de las intervenciones se dice "[…] tengo enfermedad de Stargardt, así que soy subnormal" (Vídeo de YouTube de 9 de julio de 2016), apropiándose de esa definición normativa como aspecto inherente a esta enfermedad. En términos clínicos, no todas las personas con ES se consideran de baja visión (OMS, 2013). Sin embargo, con la evolución natural del proceso degenerativo de la visión (aún sin tratamiento para interrumpir o revertir este proceso), la persona con ES tiende a perder agudeza visual, y a encasillarse como de baja visión en algún momento de su vida. Otro aspecto referido a la forma en que la persona con esta enfermedad se presenta a los demás es informar de su agudeza visual. Así se comprobó en el discurso de cinco individuos, según el siguiente fragmento: "me llamo Luciano Marques […], padezco la enfermedad de Stargardt […] y mi grado de visión es 20/100" (Vídeo de YouTube de 21 de enero de 2017). Esa asimilación de los patrones normativos de agudeza visual reconocidos por la OMS es una fracción cuyo numerador representa la distancia en que esa persona es capaz de ver un determinado objeto, siendo el denominador la distancia a la que lo ve una persona con visión normal. En otras palabras, tener una agudeza de 20/100 significa que esa persona tendrá que estar cinco veces más cerca para que sea capaz de ver el mismo objeto. También estuvo presente en las declaraciones el incentivo del uso del bastón verde en la rutina de la persona con ES, relacionando este objeto con su identidad como persona con baja visión. El bastón blanco, como elemento simbólico reconocido socialmente como propio de las personas invidentes, se redimensiona aquí por la persona con baja visión por el color verde. Ello implica el mensaje de que "también somos personas con discapacidad, vemos con dificultad y tenemos necesidades distintas a las de los invidentes". Además de ser un instrumento que proporciona seguridad y mejor movilidad a estos individuos, se concibe como un objeto de señalización, para que los demás sepan que se trata de una persona con baja visión, tal como se muestra en la siguiente intervención: [Marina:] Lo importante del bastón verde es […] que las demás personas nos identifican. Porque puede que estés en un lugar en que vas a ver a alguien, pero puede que no lo veas. Esa persona te va a identificar como persona con discapacidad visual […] es importante, es importante porque te va a esquivar, no se va a tropezar contigo, porque estás usando el bastón. O si estás en algún lado y vas a pedir que alguien te ayude, en un banco o en una estación. Con el bastón, te identifican inmediatamente como discapacitado y esa persona te va a prestar auxilio, te va a ayudar. Y así no IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 7 tienes que andar buscando a alguien que te eche una mano y pasar por más aprietos. (Vídeo de YouTube de 16 de febrero de 2018) Este aspecto identificado en el presente estudio coincide plenamente con una investigación de enfoque cualitativo anterior, también centrada en personas con baja visión. En ella, los autores, Morel y Villalobos (2011) mantienen que lejos de negar la discapacidad, se empeñan en mostrarla y demostrarla, y recogen la afirmación de uno de los participantes que declara no temer "ponerse el cartel y usar un bastón sin importar si es blanco o verde, lo que importa es que lo necesitamos y con él nos sentimos seguros". El lema "queremos que nos ayudéis" encarna la intención de persona con ES de que el color verde del bastón sea capaz de distinguirla en la sociedad. Esto es, promueve una construcción social de conocimiento y reconocimiento de sus características y necesidades propias. En los argumentos de Sony, una persona con baja visión que lleva dos años usando el bastón verde, se ilustra la importancia del color verde del bastón, al decir que "creo que […] desde el momento en que puedo identificarme con lo que me pasa, me siento más cómodo. Y las personas que me miran necesitan también saber lo que me pasa" (Post n.º 13 de Facebook). (T2) tenemos sensibilidad a la luz y usamos gafas de sol El uso de gafas de sol es también un elemento identificador de la persona con enfermedad de Stargardt, y es, ante todo, una consecuencia fisiológica de la propia dolencia: la elevada sensibilidad a la luz, denominada fotofobia. Según afirma Marina, "incluso en situaciones en que la claridad aparentemente no molesta, para nosotros puede ser excesiva […]" (Vídeo de YouTube de 12 de octubre de 2016), así que el uso de gafas oscuras no es solo una cuestión de cuidado de la salud de los ojos, sino un elemento imprescindible para el bienestar diario -- incluso en entornos cerrados muy iluminados -. Al igual que el bastón, las gafas de sol con monturas grandes que cubren todo el campo visual son elementos característicos de la persona con ES. Muchos poseen varias, con tipos de monturas y lentes adaptadas a distintos ambientes. Las molestias propias de la luminosidad diurna hacen que las noches sean el periodo más agradable y cómodo, según cuenta Luciano, un deportista habitual: "[…] mi visión es de 20/100. No es mucha, pero me es bastante para andar por la noche sin ningún problema". Y culmina afirmando que "[…] acabamos yendo en bici más por la noche. Me encanta montar en bici por la noche, es cuando más disfruto" (Vídeo de YouTube de 21 de enero de 2017). (T3) tenemos dificultades en el día a día, pero hacemos uso de estrategias y tecnologías de apoyo Uno de los principales problemas manifestados por las personas con esta enfermedad tiene que ver con la lectura, especialmente para aquellos que están en periodo de formación escolar o académica. La lectura de libros, pizarras, etiquetas de productos e incluso documentos escritos a mano se vuelven tareas difíciles a simple vista. Por ello, las lupas son una herramienta esencial para el día a día, ya sean ópticas o electrónicas. Esta relación con las lupas es tan estrecha que Marina (Vídeo de YouTube de 20 de agosto de 2016) afirma que son sus mejores amigas, que las usa a diario y que le son tan indispensables como las gafas de sol. Los ordenadores y smartphones también son elementos cotidianos de la persona con ES, para cuyo uso han de emplear constantemente tecnologías de apoyo, como puedan ser las técnicas de ampliación de pantalla, el aumento del contraste y los lectores (conversores de texto a voz). Este tipo de aplicaciones se utilizan tanto al usar propiamente los ordenadores y teléfonos móviles, como al IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 8 tomarlos como tecnologías de apoyo para la visualización de imágenes pequeñas o textos cortos. Por ejemplo, la cámara de un teléfono pude usarse para ampliar los textos impresos en un folleto o para ampliar un menú en una pantalla de un dispositivo electrónico que no esté adaptado a una persona con baja visión. Aunque las diversas tecnologías de apoyo ya posibilitan ayudar en el día a día a estos individuos, aún no permiten la realización de ciertas prácticas de forma autónoma. Una de esas lagunas que todavía no se ha cubierto satisfactoriamente es la identificación de los rostros de personas -- cuestión apuntada como fundamental por la persona con enfermedad de Stargardt -. Debido a la significativa reducción de la capacidad de ver los detalles, la persona con ES no percibe los rasgos faciales de los que le rodean. Esta característica innata de los seres humanos se considera primordial en el proceso de socialización, por lo que la pérdida de esta capacidad puede traer consecuencias prácticas y emocionales negativas en la relación interpersonal y en la autoestima. En palabras de Gabriela y Milka: [Gabriela:] Hoy día tenemos muchas aplicaciones que nos facilitan mucho las cosas, pero una de las que sigue siendo difícil para nosotros que tenemos una discapacidad visual es que no conseguimos disitiguir los rasgos faciales de la gente. Esto termina produciendo sufrimiento, muchas dificultades. (Vídeo de YouTube de 3 de marzo de 2016) [Milka:] Ya no lograba reconocer a la gente, incluso aunque estuviesen bastante cerca de mí -- a metro o metro y medio. Y esto fue mermando mucho mi autoestima y mi productividad. Llegué a cuestionarme mi capacidad para trabajar. (Vídeo de YouTube de 21 de junio de 2017) (T4) somos personas con discapacidad y la ley garantiza nuestros derechos Las personas con esta enfermedad consideran que tienen una discapacidad, y por tanto sufren de forma colectiva las barreras a la accesibilidad y la desigualdad de oportunidades. Los acuerdos internacionales y la leyes nacionales, creadas y potenciadas especialmente en los últimos treinta años, atribuyen derechos especiales a las personas con discapacidad. Estas garantías legales cubren diversos aspectos de la vida de estas personas, como acceso a la educación, reservas en el mercado de trabajo, jubilaciones por invalidez, gratuidad y beneficios en el trasporte público, ventajas en la compra de vehículos, atención preferente y descuentos en diversos eventos. Todos estos aspectos se abordan con detalle en el GVS, lo que supone convertirse en un canal informativo y de incentivación al uso de estas prerrogativas legales. Al recopilar toda la legislación que rige estos derechos especiales, el GVS establece el alcance y la definición legal de "qué es ser una persona con discapacidad y dónde nos encuadramos legalmente", "cuáles son las leyes que tratan de reducir nuestra desigualdad de oporunidades" y "qué derechos se aplican a nuestra discapacidad". Se conforma así una percepción de la persona con ES y sus derechos desde el punto de vista legal, señalando su importancia en la vida diaria, para facilitar su movilidad y desplazamientos, mantenerse económicamente o estudiar. Los carnets especiales para el transporte público y las plazas de aparcamiento reservadas son documentos que los legitiman como personas con algún tipo de discapacidad. A pesar de que estas garantías legales persiguen la igualdad de oportunidades, la persona con enfermedad de Stargardt se encuentra muy limitada en cuanto a la reserva de plazas de empleo público. Según atestigua Milka (Vídeo de YouTube de 20 de mayo de 2017) la persona que padece IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 9 ES cuenta con total amparo legal para realizar los exámenes en condiciones especiales, pero siempre que pueda asumir cargos que sean compatibles con su discapacidad. Así, aún concursando a plazas por turno libre (no reservadas a personas con discapacidad), el candidato está circunscrito a aquellos puestos cuyas funciones se le consideren factibles. (T5) queremos saber sobre nuestra enfermedad y somos portavoces de la misma Igual que otras minorías, la persona que padece esta enfermedad actúa como portavoz de sus patrones de comportamiento, difundiendo información y defendiendo sus intereses (García, 2012). Este papel queda claramente patente en las intervenciones del GVS, en las que el carácter informativo sobre "cómo ve la persona con ES" (Vídeo de YouTube de 15 de noviembre de 2016), "qué es la enfermedad de Stargardt y cómo se manifiesta" (Vídeo de YouTube de 1 de abril de 2016), entre otros contenidos que explican a las personas que no tienen esta enfermedad qué significa padecerla. En estos discursos, aparecen explicaciones de conceptos técnicos de oftalmología, demostrando en la práctica una mayor familiaridad con la jerga médica. A la vez que se subrayan las características biológicas y experimentales que contribuyen a la definición de la persona con ES, sus contenidos cumplen una función de promoción de la salud de los ojos y de divulgación científica, explicando aspectos fisiológicos de estos órganos y la importancia de determinados cuidados, como tomar el sol con filtros de protección UV-A y UV-B y la atención que ha de prestarse a ciertos síntomas, como el ardor o los ojos enrojecidos. El apoyo a la campaña Abril Marrom es un ejemplo de ello, donde el cuidado de la salud ocular asume una función simbólica vinculada a la deficiencia visual (Post n. º15 de Facebook). Otras fechas destacadas, como el Día Internacional de las Personas con Discapacidad (3 de diciembre) o el Día Nacional de la Persona Ciega (13 de diciembre) y el Día Mundial de la Retina (25 de septiembre) también se difunden desde el GVS y son señaladas como especiales para la persona con ES, acercándolas conceptualmente a la noción de persona con discapacidad y a persona invidente, así como las vincula con la retina como parte de la estructura del ojo donde se manifiesta esta enfermedad. La divulgación de información sobre nuevos tratamientos y sobre investigación científica reciente se refleja en varias de las publicaciones, lo que deja entrever un sentimiento de esperanza y expectativas positivas hacia la detención o reversión del proceso degenerativo que lleva a la pérdida de la visión. Estas expresiones emotivas se hacen presentes, sobre todo, en los comentarios de personas con ES y sus padres: "vamos a contrarreloj… lloré de la emoción… si funciona [en pruebas en el extranjero], por qué no podemos???!!!" (Post n.º 45 de Facebook) y "estoy deseando que llegue el día en que pueda decir que mi hijo está participando en un estudio de esos" (Post n.º 17 de Facebook). También se difunden desde el GVS cursos sobre investigaciones y tratamientos nuevos, demostrando de nuevo el interés y la esperanza hacia todo lo que rodea a este tema. (T6) tenemos una discapacidad visual, pero somos más que eso Para las personas afectadas por la ES, la discapacidad visual es solo uno más de los aspectos de su vida, pero no lo que las define. Los discursos recogidos en GVS tratan la discapacidad, más que como una condición o propiedad del paciente, como una característica que se manifiesta en la relación de este con su contexto. Tomando la posición del Estatuto de Defesa dos Direitos da Pessoa com Deficiência publicado en 2015, la discapacidad "no está en las personas sino en las barreras debidas a las actitudes y al ambiente que impiden el ejercicio efectivo pleno de los derechos de todos, en igualdad de condiciones y oportunidades" (Enlace del post n.º 32 de Facebook). Esta afirmación parte IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 10 de la premisa de que la igualdad de oportunidades constituye un derecho fundamental, para el que la baja visión o la ceguera no deben suponer barreras. En palabras de Sony, la persona con discapacidad vive hoy una situación más favorable para el ejercicio pleno de su libertad. Según él, esto se debe a los avances en lo que respecta a las tecnologías de apoyo, a la movilidad y a la propia actitud y percepción de la sociedad. Siguen existiendo diversas barreras, pero "hoy las personas con discapacidad pueden hacer realidad sus sueños, viajan, planifican su vida, gastan, compran. ¡Eso está muy bien!" (Vídeo del post n.º 13 de Facebook). Se encontraron muchas declaraciones sobre cómo estas personas construyen su identidad a partir de distintas actividades, lo que les hace superar la concepción simple de portadores de una discapacidad visual. Ejemplos como el de Luciano con los deportes, Lúcia con el maquillaje, Marina con el ballet o Milka con la masoterapia, demuestran que cada uno de ellos es capaz de desarrollar habilidades, incluso con poca capacidad de visión. La masoterapia aparece como una práctica en la que la persona con ES puede tener un enorme potencial, ya que se ejerce mediante sensibilidad táctil en gran medida (Vídeo de YouTube de 28 de enero de 2017). Los deportes paraolímpicos se presentan también en GVS como un campo de actuación de la persona con discapacidad, lo que se plasma en declaraciones y entrevistas de nadadores, levantadores de peso, y judocas (Vídeos de los posts n.º 52 y 68 de Facebook). (T7) convivimos con ciertos problemas y equívocos por la forma en que vemos las cosas Vivir con baja visión es vivir de modo constante con equívocos y problemas. Al ver lo suficiente como para caminar por la calle, pero no ser capaz de leer un texto impreso en un papel o reconocer los rostros de la gente puede llevar a situaciones complicadas. Algunas de esas situaciones incómodas se deben a la dificultad de los demás para entender que la persona con enfermedad de Stargardt a veces necesita ayuda o condiciones especiales, a pesar de ser capaz de mantener una existencia anónima como videntes de rango normal. Las declaraciones de Barbara hacen hincapié en esos problemas por no tener un status socialmente reconocido y legitimado: Tener baja visión es ser ciego en un mundo de videntes y vidente en un mundo de ciegos. Es que te miren mal cuando estás usando el móvil y estás sentado en un banco preferente. Es que no se acuerden de ti cuando se habla de accesibilidad de persona con discapacidad visual. Es no recibir ayuda porque ves. Es tener que usar el bastón para que todo el mundo lo sepa y, aún así, que se te considere un impostor. Es que se olviden de ti los compañeros y los profesores porque actúas como los demás. Pero tiene un lado bueno: ves. (Vídeo "O que é baixa visão", indicado en el post n.º 49 de Facebook) Paulo también apunta este sentimiento de no pertenencia a ningún grupo cuando dice, en tono indignado: "[…] sabe esa sensación de saber que alguien le está observando? […] la gente quiere estar segura de si soy o no invidente". Preguntándose el porqué de que las personas asuman esa actitud de desconfianza, el propio Paulo subraya para las situaciones en las que no ha sido ayudado ante un imprevisto o accidente: [¿esa persona que está ahí de pie] qué está esperando? ¿a que yo tropiece y caiga para demostrarle que es verdad que no veo bien? (Vídeo del post n.º 13 de Facebook). Otro de los testimonios recogidos señala la incomodidad que produce la desconfianza de los demás, lo que afecta a la autoestima y a la concepción de la valía personal. Según Milka, esa desconfianza hizo que "en algunos momentos, llegué a dudar de si era realmente capaz de hacer determinadas cosas" (Vídeo de YouTube del 21 de enero de 2017). IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 11 Incluso en la interacción con personas conocidas, que saben de la discapacidad visual del enfermo de ES, también se dan las situaciones de incomprensión momentánea sobre la capacidad de ver bien. La intención de la persona con ES de omitir su dificultad en la visión, expresada por Marina, Gabriela y Luciano, demuestra lo cansado que puede llegar a ser estar siempre explicando qué cosas puede ver y cuáles no. Por tanto, la alternativa es fingir que ve bien. "[Gabriela:] no conseguimos distinguir los rasgos faciales. Pero …[Marina:] miramos […] y fingimos que vemos todo. [Gabriela:] […] ¡Hacemos eso, es verdad!" (Vídeo de YouTube del 2 de marzo de 2016). Lo mismo sucede cuando alguien les enseña algo en un móvil o en un cartel, tal y como relata Luciano: Otra cosa que solemos hacer es engañar a la gente […] Como nos miran y no ven nada particular en nuestros ojos […] para ellos somos personas normales. Entonces, esa persona llega toda contenta y nos dice "mira esto" y nos muestra una foto, nos manda leer un mensaje. Ahí finges que lees, sueltas una carcajada y dices "¡madre mía1", haces el paripé, merecedor de Oscar. Esa persona se va toda contenta, pero tú no viste nada, no entendió ni papa. (Vídeo de YouTube del 9 de julio de 2017). Estas situaciones complicadas y surrealistas, pasado algún tiempo, se incorporan a un conjunto de historias graciosas vividas. Denominadas gafies o patetadas por Luciano, él mismo las presenta como habituales para la persona con ES. En un vídeo dedicado a estas situaciones ridículas, hace un recorrido por este tipo de vivencias, como son: confundir maniquíes en las puertas de las tiendas y conversar con ellos o equivocarse de coche y entrar en el de un extraño creyendo que es su mujer (Vídeo de YouTube del 9 de julio de 2016). Este sentido del humor, que permite convertir una dificultad o una limitación en algo divertido, no siempre está presente en los testimonios del grupo. Pese a ello, cuando una persona con esta enfermedad se encuentra con otra que también lo padece, las bromas relacionadas con la baja visión son habituales en sus conversaciones. Un ejemplo de ello es la presentación de sí mismo que hace Roberto al inicio de un curso. En tono irónico, se aprovecha de las dificultades para verlo que tiene el público y dice: "[…] mido 1,99m., peso 40 kilos, tengo el pelo rubio y largo hasta los hombros, y creo que guapo, porque hasta este momento [ustedes] no han mirado a nadie más" (Vídeo de YouTube de 27 de marzo de 2017). (T8) nos reconocemos como comunidad Las cuestiones genéticas (biológicas) que determinan la enfermedad de Stargardt, las consecuencias que derivan a la baja visión (aspectos funcionales) y la similitud en cuanto a experiencias (aspectos vivenciales) de los miembros del GVS crean una noción de familiaridad, de cercanía y de comunidad. Según revelan los administradores del grupo y por algunos otros participantes, ha terminado acuñándose la expresión "familia Stargardt" para calificar lo que se establece entre sus pares. Ello denota el sentimiento de pertenencia a un grupo en el que la enfermedad es el lazo biológico en el que se reconocen mutuamente. El GVS promueve diversos actos y eventos de confraternización e intercambio de información, de manera que se facilite el contacto cara a cara de sus miembros (Post n.º 18 de Facebook). Según la actividad formativa propuesta por uno de los administradores del grupo, todo ello va más allá de una trayectoria en que las personas con ES y sus familiares buscan informaciones sobre esta patología e intercambian experiencias. Con la extensión de internet en Brasil, se han creado blogs IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 12 y comunidades virtuales desde el año 2000, destacando el grupo de discusión Stargardt de Yahoo, que llegó a reunir a cerca de 200 participantes de todo el país (Vídeo de YouTube del 27 de marzo de 2017). Una vez que integran estas comunidades, aumentan las iniciativas de intereses comunes a sus miembros, como la divulgación científica y el acceso a investigaciones y tratamientos, la difusión y defensa de los derechos legales de las personas con discapacidad y la consolidación de canales de comunicación entre pacientes y sus familiares. El uso de hashtags como #JuntosSomosMaisFORTES y #deficientesVisuais en algunas de sus publicaciones denota la intención del GVS de articularse como dinamizador social comprometido con los intereses comunes de las personas con discapacidad visual. Del mismo modo, también se involucra en los intereses compartidos por otras asociaciones y comunidades. Entre ellas se mencionan: Retina Brasil y sus delegaciones regionales, y el Mobimento Brasileiro de Mulheres Cegas e com Baixa Visão (MBMC). Entre las iniciativas sociales defendidas por el GVS cabe destacar el apoyo al Proyecto de Ley de la Cámara n.º 56/2016, de Política Nacional sobre Enfermedades Raras, que propone, entre otros aspectos, que se proporcione gratuitamente medicación a los enfermos de este tipo de enfermedades (Post n.º 39 de Facebook). 4 Conclusiones Las comunidades virtuales y los grupos en redes sociales son formas en que se plasman las nuevas modalidades de comunicación interactiva en salud. El aumento del número de usuarios, el tiempo conectado y la predisposición de los participantes por discutir sobre temas y asuntos de salud, hábitos de riesgo, miedos e inexactitud de las informaciones hace que el acceso a la información aumente. Además, "la solicitud de apoyo también hace que crezca la dimensión de las informaciones, lo que también aumenta la audiencia potencial" (Silveira, Costa & Lima, 2012). Es precisamente en este nuevo entorno en el que estas vías de comunicación pueden contribuir a aumentar el espectro de las relaciones personales, siempre, eso sí, que los usuarios no las conciban solo como una herramienta para perpetuar las relaciones sociales ya existentes sino también como una forma de establecer conexiones nuevas. Yendo un paso más allá, como plantean Martiniello et al (2012), es fundamental llamar la atención sobre la necesidad de estar presentes y visibles en las redes, puesto que mientras mayor sea su protagonismo, y más consideración tengan como grupo, más se extenderán las aplicaciones y características que las harán usables y adecuadas para determinados colectivos, como son las personas con baja visión. Cabe destacar, como uno de los hallazgos del estudio, que esta comunidad se muestra transparente y proclive a difundir las características de su modo de vida en las redes de forma directa y natural, algo que en cierto modo supone un cambio de percepción de estos instrumentos con respecto a las conclusiones que se han puesto de manifiesto en estudios anteriores, en los que las personas con problemas de visión se mostraban más reacias a hacer preguntas sobre estos temas, tanto por la falta de respuesta como por la posibilidad de aparecer como personas dependientes frente al resto de sus contactos (Brady et al, 2013). Frente a esa apreciación, y en la línea de lo planteado por Wu y Adamic (2014) aplicado a personas con dificultades visuales, los resultados indican que las personas con ES sí valoran estos medios y redes sociales como un cauce para hacerse oír, plantear sus preocupaciones y obtener ayuda y atención, lo que termina derivando en mayor visibilidad. De hecho, ese mismo estudio comprobaba que este tipo de contenidos recibían de media mayor tasa de respuesta (comentarios y "me gusta" en Facebook) que los que no eran tan personales. Los resultados obtenidos demuestran que la comunicación interactiva en salud, la relación entre ejes conceptuales cognitivos, sociales y tecnológicos están presentes en la construcción identitaria de IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 13 esta comunidad (Caran & Biolchini, 2016). Padecer la enfermedad de Stargrardt va mucho más allá de la cuestión patológica en sí misma, sino que tiene que ver con la vivencia de experiencias complicadas parecidas en el día a día, con la indignación por la desigualdad de oportunidades, con las esperanzas en nuevos tratamientos y en las tecnologías de apoyo. Estas realidades vividas se comparten en el GVS y van construyendo el discurso intersubjetivo de "qué significa ser una persona con ES" y de "qué no es una persona con ES". Esta construcción de la identidad toma forma a través de un proceso de comunicación interactiva basada en la negociación de elementos simbólicos, alternando los momentos de acuerdo, desacuerdo y consenso (Gajaria, Yeung, Goodale & Charach, 2011). En definitiva, y tal y como adelantaban Morel y Villalobos (2011), estas nuevas formas de comunicación ayudan a generar un 'constructo social de la discapacidad' positivo y diferente, capaz de valorar la diversidad y respetar al sujeto. 4 Referencias Ahmed, S., Haines‐Saah, R. J., Afzal, A. R., Tam‐Tham, H., Al Mamun, M., Hemmelgarn, B. R., & Turin, T. C. (2017). User‐driven conversations about dialysis through Facebook: A qualitative thematic analysis. Nephrology, 22(4), 301-307. Bauman, Z. & Mauro, E. (2016). Babel: entre a incerteza e a esperança. Rio de Janeiro: Zahar. Brady, E. L., Zhong, Y., Morris, M. R., and Bigham, J. P. (2013). Investigating the appropriateness of social network question asking as a resource for blind users. In: Proc CSCW'13, 1225 -- 1236. Caran, G. (2013). Acessibildiade e suas fronteiras com a deficiência, usabiidade e comportamento informacional. In VI Encontro Ibérico EDICIC. Porto: EDICIC. Caran, G. & Biolchini, J. (2016). Eixos conceituais do acesso à informação pelo deficiente visual: suportes cognitivo, social e tecnológico. Tendências da Pesquisa Brasileira em Ciência da Informação, 9(2). Castells, M. (2017). Redes de indignação e esperança: movimentos sociais na era da internet (2nd ed.). Rio de Janeiro: Zahar. Dhanda, A. (200'8). Construindo um novo léxico dos direitos humanos: Convenção sobre os Direitos das Pessoas com Deficiências. Sur, Rev. int. direitos human.(Impr.), 5(8). Lago Júnior, A., & Barbosa, A. S. (2016). Primeiras análises sobre o sistema de (in) capacidades, interdição e curatela pós Estatuto da Pessoa com Deficiência e Código de Processo Civil de 2015. Revista de Direito Civil Contemporâneo-RDCC (Journal of Contemporary Private Law), 8, 49-89. Eng, T. & Gustafson, D. (1999). Wired for Health and Well-Being: the Emergence of Interactive Health Communication. In: The Science Panel on Interactive Communication and Health. Washington, abr. Eng, T., Gustafson, D., Henderson, J., Jimison, H. & Patrick, K. (1999). Introduction to evaluation of interactive health communication applications. Science panel on interactive communication and health. American Journal of Preventative Medicine, 16(1):10 -- 5 IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 14 Gajaria, A., Yeung, E., Goodale, T. & Charach, A. (2011). Beliefs about attention- deficit/hyperactivity disorder and response to stereotypes: Youth postings in facebook groups. Journal of Adolescent Health, 49(1), 15 -- 20. Garcia, C. (2012). Sociologia da acessibilidade. Porto Alegre: IESDE Brasil. Jeanneret, Y. (2015). Analisar as "redes sociais" como dispositivos infocomunicacionais: uma problemática. In M. Tomaél & R. Marteleto (Eds.), Informação e Redes Sociais: interface de teorias, métodos e objetos. (pp. 11 -- 31). Londrina: Eduel. Latour, B. (2012). Reagregando o social: uma introdução à Teoria do Ator-Rede. Salvador: Edufba. Marteleto, R. (2010). Redes sociais, mediação e apropriação de informaçõoes: situando campos, objetos e conceitos na pesquisa em ciência da informaçãao. Pesquisa Brasileira em Ciência Da Informação, 3(1), 27 -- 46. Martiniello, N., Budd, J., Nguyen, M.N., Tibbs, A., Asuncion, J., Barile, M., Amsel, R., Gaulin, C., & Fichten, C.S. (2012). Accessibility of social media for students who are blind or have low vision. Canadian Blind Monitor, 32, 28. Morel, G.; Villalobos, L. (2011). Identidad y baja visión. Alteridad, Revista de Educación, 6(2) 2011: 109 -- 117. https://doi.org/10.17163/alt.v6n2.2011.02 Murray, E., Burns. J., See, T., Lai, R. & Nazareth, I. (2005) Interactive health communication applications for people with chronic disease. Cochrane Database Syst Rev (4):CD004274 Organização Mundial da Saúde (2003). CIF: classificação internacional da funcionalidade, incapacidade e saúde. São Paulo: EDUSP. Rada R. (2005). A case study of a retracted systematic review on interactive health communication applications: impact on media, scientists, and patients. Journal of medical Internet research, 7(2), e18. doi:10.2196/jmir.7.2.e18 Recuero, R. (2009). Redes sociais na internet. Porto Alegre: Sulina. Recuero, R. (2012). A conversação em rede: comunicação mediada pelo computador e redes sociais na internet. Porto Alegre: Sulina. Retina Brasil. (2019). Doenças degenerativas e principais sintomas. Recuperado 5 de abril de 2019, de Retina Brasil website: http://retinabrasil.org.br/site/doencas/doencas-degenerativas-e- principais-sintomas/ Silveira, P. C. M., Costa, A. E. S., & Lima, C. C. (2012). Gagueira na web: qualidade da informação. Rev. CEFAC. mai-jun; 14(3):430-437. IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 15 Scott, D. M. (2013). The new rules of marketing and PR: How to use social media, online video, mobile applications, blogs, news releases, and viral marketing to reach buyers. Wiley and Sons, Hoboken, NJ Vaca Vaca, M., Rodríguez Cárdenas, D., Gutiérrez Cárdenas, P., & Ruiz, O. (2012). Representaciones Sociales De La Inclusión Escolar De Estudiantes Con Limitación Visual: Creencias y doi: 10.30788/RevColReh.v11.n1.2012.51 Rehabilitación, Prácticas. 56-67. Revista Colombiana De 11(1), Welch, V., Petkovic, J., Pardo Pardo, J., Rader, T., & Tugwell, P. (2016). Interactive social media interventions to promote health equity: an overview of reviews. Health promotion and chronic disease prevention in Canada: research, policy and practice, 36(4), 63-75. Wu, S., Adamic, L. (2014). Visually impaired users on an online social network, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 26-May 01, 2014, Toronto, Ontario, Canada [doi>10.1145/2556288.2557415] IX Encontro Ibérico EDICIC (Barcelona, entre 9 e 11 de julho de 2019) 16
1912.01122
1
1912
2019-12-02T23:15:02
Discovering Opioid Use Patterns from Social Media for Relapse Prevention
[ "cs.SI", "cs.HC", "cs.LG" ]
The United States is currently experiencing an unprecedented opioid crisis, and opioid overdose has become a leading cause of injury and death. Effective opioid addiction recovery calls for not only medical treatments, but also behavioral interventions for impacted individuals. In this paper, we study communication and behavior patterns of patients with opioid use disorder (OUD) from social media, intending to demonstrate how existing information from common activities, such as online social networking, might lead to better prediction, evaluation, and ultimately prevention of relapses. Through a multi-disciplinary and advanced novel analytic perspective, we characterize opioid addiction behavior patterns by analyzing opioid groups from Reddit.com - including modeling online discussion topics, analyzing text co-occurrence and correlations, and identifying emotional states of people with OUD. These quantitative analyses are of practical importance and demonstrate innovative ways to use information from online social media, to create technology that can assist in relapse prevention.
cs.SI
cs
Discovering Opioid Use Patterns from Social Media for Relapse Prevention Zhou Yang, Spencer Bradshaw, Rattikorn Hewett, and Fang Jin Abstract -- The United States is currently experiencing an unprecedented opioid crisis, and opioid overdose has become a leading cause of injury and death. Effective opioid addiction recovery calls for not only medical treatments, but also behavioral interventions for impacted individuals. In this paper, we study communication and behavior patterns of patients with opioid use disorder (OUD) from social media, intending to demonstrate how existing information from common activities, such as online social networking, might lead to better prediction, evaluation, and ultimately prevention of relapses. Through a multi-disciplinary and advanced novel analytic perspective, we characterize opioid addiction behavior patterns by analyzing opioid groups from Reddit.com - including modeling online discussion topics, analyzing text co-occurrence and correlations, and identifying emotional states of people with OUD. These quantitative analyses are of practical importance and demonstrate innovative ways to use information from online social media, to create technology that can assist in relapse prevention. Index Terms -- Opioid Crisis, Opioid Use Disorder, Addiction Patterns, Relapse Emotion, Addiction on Social Media, Addiction Treatment, Addiction Network ! 1 INTRODUCTION Opioid overdoses are now causing more deaths than car crashes, prompting the current U.S. President to declare the opioid crisis a national public health emergency in October 2017. According to the latest statistics from the National Institute on Drug Abuse (NIDA), more than 115 Americans die daily after overdosing on opioids, and nearly 64,000 people died of drug overdoses in the US in 2016, the most lethal year of the drug overdose epidemic [1]. Moreover, millions of Americans have been impacted by opioid-related problems. It is estimated that 2.1 million people suffer from substance use disorders related to prescription opioid pain relievers in the United States alone [?]. Additionally, the opioid crisis has social impacts beyond an increased death toll. Other consequences include a rise in the number of infants born dependent on opioids as well as a spread of infectious diseases such as HIV and hepatitis C [2]. The status of the opioid crisis in the U.S. is shown in Figure 1 (a) and Figure 1 (b) from different perspectives. As revealed in a recent paper published in Science [3], the drug epidemic currently sweeping across the U.S. has deteriorated into a full-scale national pandemic, leading to national concern because of its negative impacts on health, social security and economics. Current knowledge of the opioid crisis has been mostly limited to scattered statistics that only reveal macro aspects of the crisis, such as the nationwide/state-level overdose death tolls and overdose death tolls regarding certain time periods, races, and/or specific drugs. This has led to a rapid • Zhou Yang, Rattikorn Hewett, and Fang Jin are with the Department of Computer Science, Texas Tech University, Lubbock, Texas, USA. E-mail: {zhou.yang, rattikorn.hewett, fang.jin}@ttu.edu Spencer Bradshaw is with the Community, Family, and Addic- tion Sciences, Texas Tech University, Lubbock, Texas, USA. Email: [email protected] • increase in OUD treatment admissions, including a 53.5% increase during 2013 - 2015, and with adult treatment for heroin use more than doubling [5]. While treatment is im- portant and leads to effective outcomes and greater health for some, the relapse rate post-treatment for substance use disorders is relatively high, ranging from 40 − 60% [6], with potential relapse being difficult to predict. Therefore, research that can enhance relapse prediction using data from everyday, common situations is needed. One such resource may include behavioral data available from social media, a forum now used by 88% of persons in the U.S. ages 18-29, 78% of those ages 30-49, 64% of those ages 50-64, and 37% of those age 65 and older [7]. Despite its popularity, detailed analysis of user-specific knowledge, such as social media behavioral patterns that associate with substance use and relapse, have not been studied. Therefore, to facilitate a better understanding of the opioid epidemic that may ultimately lead to better prediction of relapse and ultimately responses and interventions that prevent relapse and promote remission - individualized, user-specific anal- ysis is urgently needed. This manuscript begins to tackle this complex problem from a multi-disciplinary perspective, and includes text analysis, topic modeling,and sentiment analysis. 2 DATA ANALYSIS AND RESULTS 2.1 Opioid Communities on Social Media With social media growing profoundly and widely inter- twined with people's everyday lives, social media contains more and more biomedical psychological information about its users. As a result, social media represents an increasingly important data source for discovering knowledge that can have various applications. Reddit.com is an online com- munity and social media platform, which allows Redditors (registered users of Reddit.com) to form groups/subreddit arXiv:1912.01122v1 [cs.SI] 2 Dec 2019 2 (a) (b) Fig. 1: (a).Drug overdose death toll by county in 2017 [4]; (b).Drug overdose death toll by drug type from 1996 to 2017 in the U.S. to discuss specific topics. Groups such as "r/OpioidRecovery", "r/Opiates" and "r/drugs" aim to provide people suffering from OUD and seeking remission with psychological sup- port. This function spurs people with OUD to turn to social media for help, posting various problems and confusion. In this way, social media has become a widely utilized form of social support, which is an important recovery resource that can buffer the negative effects of stress on the quality of life of those with OUD [8]. Indeed, many people with OUD- related problems that have managed to abstain from opioid use are often willing to share their experience with others online. For instance, a Redditor posted on Reddit that "I was the same way, I only got clean cuz I didn't wanna go back to jail tbh, and had to go cold turkey in rehab". This study is based on data collected from subreddit groups such as "r/opioid", "r/opioidrecovery", and "r/drugs" from Reddit.com in 2018. 2.2 Dataset The dataset used in this paper is collected from Reddit.com, a social news aggregation, web content rating, and dis- cussion website. We developed a web crawling tool using PRAW (Python Reddit API Wrapper) to collect data. The dataset for this paper is from three subreddits (Subreddits are subsidiary threads or categories within the Reddit web- site) on Reddit.com, including "r/opiates", "r/opiatesRecovery" and "r/drugs". In a subreddit, there are a series of posts that include a post topic and a collection of related comments. The dataset consists of two parts. The first consists of 3,000 posts with the top (collected in April 2018) 1,000 posts from each subreddit, since 1,000 is the maximum number that is allowed by PRAW API. This first part includes posts and interactions within posts. After collecting the subreddit data, we extracted a list of Redditor IDs of participants. The second part of the dataset consisted of personal data, which was collected based on the previously mentioned Redditor list that was extracted. Data labeling then involved manually reading the posts/comments and categorizing each Redditor into a cor- responding group. With intent to implement binary classifi- cation, each Redditor was marked with a label and different labels were mutually exclusive. This classification ensured that each participant was assigned to one and only one label. More specifically, in the group classification process, we labeled a Redditor ID by manually reading his/her post history in the collected dataset. This labeling process was done by several health science researchers, and labeling agreement among the researchers was required to reduce labeling errors that might otherwise have resulted from different labeling metrics. For the OUD classifier, we fol- lowed DSM-5 criteria [9], in which a Redditor is labeled with OUD if at least two of the listed criteria were met within the past 12 months. For instance, a Redditor was labeled with OUD if he/she admitted that he/she often takes in larger amounts of opioids and/or over a long pe- riod of time than intended, and also mentioned a persistent desire or unsuccessful efforts to cut down or control use, or had strong cravings to use. If less than two symptoms were detected, a Redditor was classified to a "Non-OUD" group. Redditors who met at least two DSM-5 criteria but showed no intentions of limiting or abstaining from use were classified to an "OUD" group. For instance, an OUD Redditor posted "Late Christmas Gift for myself 5x 40mg Oxycodone (Toroxycon)". Redditors were classified into a "positive recovering OUD" group if he/she was attempting and/or struggling to seek treatments that reduced symp- toms associated with previously met DSM-5 criteria in the last 12 months. For instance, a positive recovering OUD posted "what to say when returning to work from drug treatment". If there was no evidence that a Redditor was seeking treatment, this Redditor was classified to a "non- positive recovering OUD" group. Similarly, Redditors were classified to an "OUD relapse" group if they first classified as in recovery but indicated that they had used opioids again (no matter how many times) in the fifty days pre- vious to the latest post/comment. For instance, a relapsed Redditor posted "45 Days clean and now I'm drunk and high". Otherwise, Redditors in recovery were assumed to have stayed clean. When classifying participants into the "positive recov- ering OUD" and "non-positive recovering OUD" groups, one interesting finding was that many participants with OUD had varying degrees of willingness to stay clean, which is consistent with the literature [10]. That is, "positive recovering OUD" group members showed the intention of reducing symptoms associated with DSM-5 criteria while "non-positive recovering OUD" group members show less intention of such symptom reduction. In summary, we collected 1,000 Reddit posts respec- tively from "r/opiates", "r/opiatesRecovery", and "r/drugs". By utilizing Redditor IDs extracted from the 1,000 posts, we also collected the latest 1,000 comments/posts Reddit API restricts the number of posts that can be collected to 1,000 for each Redditor ID respectively, and obtained a personal post dataset. 2.3 Redditor Classification The Redditor classification is based on the text features. Give a set of Redditors A = {a1, a2, a3, . . .}, and their corre- sponding feature variable Fj =< X1, . . . , Xm >, which is represented by these features extracted from text, and their status label Yj ∈ [0, 1], the Redditor classification task is to learn a function f : Fj → Yj, such that the task errors are minimized. Formally, we have 3 testing. We show the performance of these two classifiers in Table 1. OUD Classif. Recorvering Classif. Acc. LG. 0.82 KNN 0.70 SVM 0.92 Rec. 0.83 0.81 0.94 Prec. 0.82 0.76 0.93 F1 0.82 0.7858 0.93 Acc. 0.74 0.75 0.88 Rec. 0.78 0.8121 0.93 Prec. 0.73 0.73 0.84 F1 0.76 0.77 0.88 TABLE 1: Classification results for Logistic Regression, KNN, and SVM. The SVM classifier is implemented by using the "Lib- shorttext" library. The dataset is processed by converting to lower case, removing punctuation and stop words, tokeniz- ing, stemming and lemmatizing. As shown in Table 1, SVM classifier outperforms logistic regression and KNN in both cases. Moreover, the accuracy of the first classifier was 0.917, which was better than the accuracy of the second classifier. Thus, there wouldn't be any performance bottleneck if the output of the first classifier was fed into the second classifier. We manually classified 3,157 people, with 64.9% of them have OUD problems, and 35.1% are non-OUD. However, only 10.4% of these people with OUDs had shown that they have been positively seeking remission and/or recovery, while the other 89.6% of those with OUD showed no signs of seeking remission and/or recovery according to our dataset records. Of the recovering Redditors with OUD, 89.3% will relapse within fifty days. arg min Ψ f (X1, . . . , Xm) − Yj2 (1) m X j=1 where Xj and Yj are a feature variable and label variable respectively, and Ψ is the model parameters learned from training. Two classifiers were designed and implemented to filter out the research targets: an OUD classifier and a recovering classifier. The first classifier differentiates between OUD and non-OUD, while the second "within OUD" classifier separates those who are in positive recovery and who hadn't shown any evidence of being in a positive recovery process, and they were denoted as "positive recovering OUD" and "non-positive recovering OUD" group members, respec- tively. For the OUD classifier, we employed a Support Vector Machine (SVM) classifier that transformed posts/comments into term vector features to determine whether participants had an OUD problem. The dataset for this classifier included 1,000 Redditors (419 OUDs and 581 non-OUDs). In the labeled dataset, 70% (namely, 70% of the samples) was used as the training dataset, and the rest were used for testing. Once the classifier had been trained, we applied it to the unlabeled dataset. The data of the identified OUDs were then fed into the next classifier to determine whether they were a positive recovering OUD or a non-positive recov- ering OUD. The second classifier was designed to identify those with OUD who had shown positive attitudes/acts toward seeking recovery. This took another four days to label 1,000 people (with 375 positive recovering OUDs and 625 non-positive recovering OUDs). Among this labeled data, 70% was used as the training dataset and the rest for 2.4 Topic Modeling To discover the hidden semantic structures (i.e., "topics") that occur in an extensive collection of posts collected from Reddit.com, we first built a topic model to analyze those posts. Given a document in the topic modeling, we would expect particular words to appear in the document more or less frequently. For instance, by specifying two topics, we found the corresponding topics of "people take opioids because of pain" and "people take dope and feels". Those topics are indicated by words "people" and "pain", and "people" and "dope", respectively, since they appear more frequently in those posts than other words. According to the Deveaud2014 [11], the best topic num- ber is in the range of [4, 11], where model achieve the extremum. Since posts typically concern numerous topics, we specified the existence of multiple topics to further ex- plore any additional potential topics that might emerge. As shown in Figure 2, we present the results of an eight-topic model. These topics are "hard day, don't do opiates", "don't dope heroin", "people feel love to feel clean", "taking drugs or opioids for days", "people feel, heroin", "people pain, taking opiates or drugs", "for pain, don't do oxycodone", and "post about heroin", respectively. In brief, the general topics included 1). Attempts to dissuade people from taking highly addictive opioids (e.g., heroin and oxycodone); 2). Information on how to stay clean; 3). How people feel when they stay clean for an extended period; and 4). Advice about treatment and how to stay clean. Even though topic modeling reveals the general topics in certain social communities, individualized user-specific information remains hidden. To expose more details about 4 Fig. 2: Topic modeling results. The topic numbers were set as eight, and top keywords as 8. user-specific patterns for people with OUD that utilize social media, we implemented text co-occurrence and correlation analysis to further dig and discover behavior patterns on social media. 2.5 Text Co-occurrence and Correlation Figure 3 A. shows the word correlation with annotations. The word correlation and bigram illustrate the social in- teractions between different Redditors. We generated word correlation graphs to obtain a full picture of their conver- sations. A textual analysis was implemented to capture the relationship between words, to examine words that tend to follow each other immediately, or tend to co-occur within the same posts. Sentences were tokenized into sequences of words. By checking how often a word X was followed by word Y , the relationships between words are measured by the Phi efficient metric, and the Phi efficient is defined as φ = n11n00 − n10n01 √n1.n0.n.0n.1 , (2) where n11 represents the number of posts where both X and Y appear, n00 is the number where neither appears, and n10 is the cases where one appears without the other. In this case, a pair of words with higher phi coefficiency indicates that this word pair appears more frequently than other word pairs do. By gradually increasing the Phi coefficient, the words that are most likely to appear with each other were detected, as shown in Figure 3 (b), (c), and (d). After analyzing a large number of posts from Reddit, the relationship was visualized in Figure 3. By analyzing and annotating these keywords, some frequent topics are summarized as follows: • Talking about detoxification processes and assisting medications such as 'naloxone' and 'bupe', in conjunc- tion with 'doctor' and 'detox'. Participants of these discussion topics are Redditors who are motivated and willing to find recovery from their addiction and man- age to stay clean. Also, some of these Redditors who have been clean for a longer period participate in those discussions and share their experiences about how to stay clean. • Describing pains and prescriptions from doctors, as indicated by keywords such as 'pain', 'doctor', and 'painkiller'. These topics are consistent with the fact that opioids are often originally used as a prescribed painkiller. Some Redditors do have bodily and/or chronic pain problems and concerns. Though opioids are an effective painkiller and have curative effects, after months or years of taking opioids, these Redditors often develop an opioid dependency. • Sharing of withdrawal symptoms, which symptoms fall into two categories. One category involves men- tal/psychological symptoms such as anxiety, insom- nia, and social isolation. The other category involves physical symptoms, including headaches and dizzi- ness. Both categories of withdrawal symptoms are very uncomfortable and may lead people with OUD to a compulsive relapse if they do not have proper guidance and support. • Talking about what kind of opioids they take, how it feels, and the dosage of drugs they take. These topics are indicated by words such as "hight", "enjoy", "mg (the dosage of opioids)", etc. For those topics, Redditors always share their experiences about what kinds of opioids they are taking, or they have been taking, or they used to take. But they try to be cautious about the dosage because of the risks of death caused by overdose. Also, since treatment is critical for people with OUD, fig- uring out how those with OUD evaluate treatment-assisting 5 (a) (b) (c) (d) Fig. 3: (a): Word correlation with Phi coefficiency≥0.2. (b): Word bigrams with co-currence co-occurrence count ≥ 150. (c): Word bigrams with co-occurrence count ≥ 200. (d): Word bigrams with co-occurrence count ≥ 250. medications is very important. By specifying treatment- assisting medications such as 'buprenorphine', 'methadone', 'naloxone', and 'suboxone', we detected and filtered out words that were associated with those medicines in these communities. In Figure 4 A, we visualize the word correla- tion on posts that are about treatments. Figure 4 B shows the top six words with the highest correlation coefficiency for each medication. As shown in this figure, most of the words related to these medications are neutral, represent- ing neutral feedback from those with OUD. For instance, Buprenorphine is associate with " people months clean ben- zos love". Also, a lot of words about dosage are used such as 'dose' and 'mgs'. Those words indicate that when they use medications, they seem to be paying much attention to dosage, perhaps because high dosages may have lethal rather than curative effects. 2.6 Emotion of People with OUD Relapses for persons with OUD are associated with younger age, heavy use before treatment, a history of injecting, and not following up with aftercare [12]. They are also frequently associated with extreme emotions and other stressors [13]. Specifically, people seeking remission or rehabilitation can experience extreme emotions that range from great highs to great lows, and sometimes they feel like their emotions are out of control. This is important as the well-accepted Self-Medication Hypothesis [14] proposes that people often use substances to self-medicate the negative and painful emotions associated with trauma, stress, and/or comorbid mental health disorders [15]. To explore emotions that are associated with relapse, an emotion analysis was imple- mented to show the observational results. On Reddit.com, people with OUD are free to express their joy and sadness, trust and disgust, and anticipation and anger, etc. in their posts or comments. These sentiments, along with their other online behaviors, could disclose infor- mation about their remission/recovery status and thus serve as relapse risk indicators and therefore also for the need for intervention that might assist with relapse prevention [16]. We therefore sought to capture subtle emotional sentiments from those with OUD and associate these sentiments with OUD associated behaviors such as staying clean or relaps- ing. By studying Redditor posts as well as their interactions with other Redditors, it was hoped that identified emotions can increase understanding of remission/recovery status. Such understanding may ultimately lead to transforming the sentiments and behavior patterns that emerge from 6 (a) (b) Fig. 4: A: Word correlation (in the same posts) with correlation coefficiency ≥ 0.17. B: Top ords that are used when talking about opioid related medicines. Redditor posts into possible indicators of relapse risk and the need for some type of intervention to prevent relapse. A word-emotion association lexicon [17] was utilized to study the emotional content of each comment from a Redditor. In the sentiment analysis, we focused on domi- nant rather than submerged emotions. For instance, a post may include a complex emotion that is a combination of several emotions. In this case, a comment is labeled with the emotion that has the highest score, which is defined in equation 3, 4 and 5. In particular, suppose Li is the subset of a lexicon which contains words in emotion i. The emotion count emotion_count_i and normalized count n_emotion_count_i for the emotion i are: emotion_count_i =Xj wordij n_emotion_count_i = emotion_count_i max(emotion_counts) Where: wordj =(1 if wordj in Li 0 otherwise (3) (4) (5) Ten categories of emotion were identified as shown in Figure 5: anger, anticipation, disgust, fear, joy, sadness, surprise, trust, negative, positive. Also consistent with ad- diction literature [18], we found that people with OUD can be highly influenced by their emotions. Words that express emotions or feelings, such as "feeling", "bad", and "high", are repeatedly used. Among the 670 persons with OUD who had relapsed, 72% showed the predominant emotions that were 'negative' or that of 'joy'. This observation shows relapse is highly related to more extreme emotions such as 'negative' and 'joy' based-emotions. 3 DISCUSSION The opioid crisis is one of the leading threats to public health in the U.S., and therefore treatment admissions are rising. Despite positive benefits from treatment, many persons seeking remission relapse, and such relapse is difficult to predict. Nevertheless, a thorough understanding of social media behavior patterns that associate with remission can promote potential supportive and even potential relapse prevention-based interventions. In this paper, we conducted a series of experiments and observed significant Opioid ad- diction patterns by analyzing posts and comments collected from Reddit.com. These advanced analyses demonstrate 1) how information from social media posts/discussions can be used to more accurately predict potential relapse, 2) how discussions might be discovered around various topics that association with use, treatment, and remission, and 3) how emotional/affective sentiments from these discussions may be used to predict relapse risk. First, only 10.4% of those identified with OUD ac- tively seek remission/recovery, while the 89.6% show no indication of seeking recovery. This demonstrates the im- portant need that the majority of those with OUD to progress through various motivational stages that may yield a greater readiness for change. Additionally, the machine- learning based classifiers used in this study showed high accuracy and precision in predicting group classification outcomes. Second, people with OUD who are seeking re- mission/recovery more generally have positive judgments regarding medications such as Buprenorphine, Methadone, 7 Fig. 5: Word cloud with ten different emotions. The drug names such as Heroin, OxyContin and Vicodin are not the dominant words in the wordcloud, since people talk more about their feelings instead of the drug itself. Also, stopwords are removed from the wordcloud. Naloxone, and Suboxone; and they pay close attention to dosage. Thus, this finding supports that medication assisted treatment (MAT; use of medications such as Buprenorphine and Methadone) may be helpful to those seeking recovery from OUD. This is important as MAT is often a controversial topic and widely underutilized resource in substance use disorder treatment [19]. Third, 72% of those seeking recov- ery from OUD - but appear to have relapsed - showed both dominant 'negative' as well as 'joy' based emotions that as- sociated with relapse. Therefore, we infer people with OUD may experience a wide range of emotion and emotional shifts, and that without support that aids emotional regu- lation they have higher relapse risk. In sum, these multi- disciplinary analyses conducted in this paper help disclose several behavioral patterns and characteristic features of persons with OUD, making it more possible to detect and identify precursors of relapse, increasing assessment and prediction of relapse risk. Ultimately, this may lead to the development and implementation of personalized OUD- based interventions that enhance relapse prevention and OUD remission. REFERENCES [1] H. Hedegaard, "Drug overdose deaths in the united states, 1999 - 2016," https://www.cdc.gov/nchs/products/databriefs/db294. htm, December-2017, online, accessed 25-March-2018. [2] Z. Yang, L. Nguyen, and F. Jin, "Opioid relapse prediction with gan," in 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2019. [3] H. Jalal, J. M. Buchanich, M. S. Roberts, L. C. Balmert, K. Zhang, and D. S. Burke, "Changing dynamics of the drug overdose epidemic in the united states from 1979 through 2016," Science, vol. 361, no. 6408, p. eaau1184, 2018. [4] NIDA, "Overdose death rates," https://www.drugabuse.gov/ related-topics/trends-statistics/overdose-death-rates, September- 2017, online, accessed 25-March-2018. [5] A. Huhn, E. Strain, D. Tompkins, and K. Dunn, "A hidden aspect of the u.s. opioid crisis: Rise in first-time treatment admissions for older adults with opioid use disorder." Drug and Alcohol Dependence, vol. 193, pp. 142 -- 147, 2018. [6] A. T. McLellan, D. C. Lewis, C. P. Oâ A ´ZBrien, and H. D. Kleber, "Drug dependence, a chronic medical illness: Implications for treatment, insurance, and outcomes evaluation," JAMA, vol. 284, pp. 1689 -- 1695, 2000. [7] A. Smith and M. Anderson, "Social media use in 2018." Internet and Technology, pp. 1 -- 17, 2018. Pew Research Center: [Online]. Available: https://www.pewinternet.org/2018/03/01/ social-media-use-in-2018/ [8] A. B. Laudet, K. Morgen, and W. L. White, "The role of social supports, spirituality, religiousness, life meaning and affiliation with 12-step fellowships in quality of life satisfaction among indi- viduals in recovery from alcohol and drug problems," Alcoholism Treatment Quarterly, vol. 24, pp. 33 -- 73, 2006. [9] M. J. Tarrahi, A. Rahimi-Movaghar, H. Zeraati, S. A. Mote- valian, M. Amin-Esmaeili, A. Hajebi, V. Sharifi, R. Radgoodarzi, M. Hefazi, and A. Fotouhi, "Latent class analysis of dsm-5 criteria for opioid use disorders: results from the iranian national survey on mental health," European addiction research, vol. 21, no. 3, pp. 144 -- 152, 2015. [10] S. B. Bradshaw, S. T. Shumway, K. S. Harris, and A. K. Baker, "Pre- dictive factors of readiness for change during inpatient treatment," Alcoholism Treatment Quarterly, vol. 31, pp. 280 -- 302, 2013. [11] R. Deveaud, E. SanJuan, and P. Bellot, "Accurate and effective la- tent concept modeling for ad hoc information retrieval," Document numérique, vol. 17, no. 1, pp. 61 -- 84, 2014. [12] B. P. Smyth, J. Barry, E. Keenan, and K. Ducray, "Lapse and relapse following inpatient treatment of opiate dependence." Irish medical journal, 2010. [13] J. Elster, Strong feelings: Emotion, addiction, and human behavior. mit Press, 2009. [14] E. J. Khantzian, "The self-medication hypothesis of addictive disorders: focus on heroin and cocaine dependence," The American Journal of Psychiatry, vol. 142, pp. 1259 -- 1264, 1985. [15] C. D. Tronnier, "Harnessing attachment in addiction treatment: regulation theory and the self-medication hypothesis," Journal of Social Work Practice In The Addictions, vol. 15, pp. 233 -- 251, 2015. [16] Z. Yang, V. J. Reddy, and a. J. F. Kesidi, Rashmi, "Addict free - a smart and connected relapse intervention mobile app," in 16th International Symposium on Spatial and Temporal Databases (SSTD). Springer, 2019. [17] S. M. Mohammad and P. D. Turney, "Crowdsourcing a word -- emotion association lexicon," Computational Intelligence, vol. 29, no. 3, pp. 436 -- 465, 2013. [18] D. Randles and J. L. Tracy, "Nonverbal displays of shame predict relapse and declining health in recovering alcoholics," Clinical Psychological Science, vol. 1, pp. 149 -- 155, 2013. [19] H. Knudsen, A. Abraham, and P. Roman, "Adoption and im- plementation of medications in addiction treatment programs." Journal of Addiction Medicine, vol. 5, pp. 21 -- 27, 2011. 1 An opioid use disorder is defined as a problematic pattern of opioid use that leads to serious impairment or distress. Doctors use a specific set of criteria to determine if a person has a substance use problem. To be diagnosed with an opioid use disorder, a person must have 2 or more of the following symptoms within a 12-month period of time. Loss of Control 1 I did not mean to start using so much. Substance taken in larger amounts or for a longer time than intended Persistent desire or unsuccessful effort to cut down or control use of a substance Great deal of time spent obtaining, using, or recov- ering from substance use Craving (a strong desire or urge) to use opioids Continued opioid use that causes failures to fulfill major obligations at work, school, or home Continued opioid use despite causing recurrent so- cial or personal problems Important social, occupational, or recreational activ- ities are reduced because of opioid use I have tried to stop a few times before, but I start using this drug again every time. Everything I do revolves around using this drug. (In severe cases, most/all of a person's daily activities may revolve around substance use.) I wanted to use so badly, I couldn't think of anything thing else. I keep having trouble at work/have lost the trust of friends and family because of using this drug. I can not stop using, even though it's causing problems with my friends/family/boss/landlord. I have stopped seeing my friends and family, and have given up my favorite hobby because of drugs. Recurrent opioid use in dangerous situations Continued opioid use despite related physical or psychological problems I keep doing things that I know are risky and dangerous to buy or use this drug. I know that using this drug causes me to feel badly/messes with my mind, but I still use anyway. Pharmacological Problems 10 Tolerance (the need to take higher doses of a drug to feel the same effects, or a reduced effect from the same amount) Withdrawal (the experience of pain or other uncom- fortable symptoms in the absence of a drug) I have to take more and more of the drug to feel the same high. When I stop using the drug for a while, I am in a lot of pain. Summary: OUD: Nsymptoms ≥ 2, Non-OUD:Nsymptoms < 2 TABLE 1: Labeling criteria and text examples from DSM-5. A Redditor is labeled with OUD if at least two symptoms are observed. It's used for labeling OUD and non-OUD, and positive recovering OUD and non-positive recovering OUD. 4 Social Problems 5 6 7 Risky Use 8 9 2 3 11 arXiv:1912.01122v1 [cs.SI] 2 Dec 2019
1805.04191
1
1805
2018-05-10T22:15:12
Sentiment-driven Community Profiling and Detection on Social Media
[ "cs.SI" ]
Web 2.0 helps to expand the range and depth of conversation on many issues and facilitates the formation of online communities. Online communities draw various individuals together based on their common opinions on a core set of issues. Most existing community detection methods merely focus on discovering communities without providing any insight regarding the collective opinions of community members and the motives behind the formation of communities. Several efforts have been made to tackle this problem by presenting a set of keywords as a community profile. However, they neglect the positions of community members towards keywords, which play an important role for understanding communities in the highly polarized atmosphere of social media. To this end, we present a sentiment-driven community profiling and detection framework which aims to provide community profiles presenting positive and negative collective opinions of community members separately. With this regard, our framework initially extracts key expressions in users' messages as representative of issues and then identifies users' positive/negative attitudes towards these key expressions. Next, it uncovers a low-dimensional latent space in order to cluster users according to their opinions and social interactions (i.e., retweets). We demonstrate the effectiveness of our framework through quantitative and qualitative evaluations.
cs.SI
cs
Sentiment-driven Community Profiling and Detection on Social Media Amin Salehi, Mert Ozer, Hasan Davulcu Computer Science and Engineering Arizona State University, Tempe, AZ, USA {asalehi1,mozer,hdavulcu}@asu.edu 8 1 0 2 y a M 0 1 ] I S . s c [ 1 v 1 9 1 4 0 . 5 0 8 1 : v i X r a ABSTRACT Web 2.0 helps to expand the range and depth of conversation on many issues and facilitates the formation of online communities. Online communities draw various individuals together based on their common opinions on a core set of issues. Most existing commu- nity detection methods merely focus on discovering communities without providing any insight regarding the collective opinions of community members and the motives behind the formation of communities. Several efforts have been made to tackle this problem by presenting a set of keywords as a community profile. How- ever, they neglect the positions of community members towards keywords, which play an important role for understanding com- munities in the highly polarized atmosphere of social media. To this end, we present a sentiment-driven community profiling and detection framework which aims to provide community profiles presenting positive and negative collective opinions of commu- nity members separately. With this regard, our framework initially extracts key expressions in users' messages as representative of issues and then identifies users' positive/negative attitudes towards these key expressions. Next, it uncovers a low-dimensional latent space in order to cluster users according to their opinions and social interactions (i.e., retweets). We demonstrate the effectiveness of our framework through quantitative and qualitative evaluations. ACM Reference Format: Amin Salehi, Mert Ozer, Hasan Davulcu. 2018. Sentiment-driven Community Profiling and Detection on Social Media. In HT '18: 29th ACM Conference on Hypertext and Social Media, July 9–12, 2018, Baltimore, MD, USA. ACM, New York, NY, USA, 9 pages. https://doi.org/10.1145/3209542.3209565 1 INTRODUCTION With the advent of social media platforms, individuals are able to express their opinions on a variety of issues online. Like-minded users forge online communities by interacting with each other and expressing similar attitudes towards a set of issues. While many methods [31] have been proposed to detect online communities, most of them do not provide insights into the collective opinions of community members. To shed light on such opinions, few efforts have focused on profiling communities, but a large body of work Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. HT '18, July 9–12, 2018, Baltimore, MD, USA © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5427-1/18/07...$15.00 https://doi.org/10.1145/3209542.3209565 has been devoted to user profiling [17, 19, 26]. Indeed, "the founders of sociology claimed that the causes of social phenomena were to be found by studying groups rather than individuals" [18]. Turner et al. [43] suggest that individuals come together and form communities by developing shared social categorization of themselves in contrast to others . Therefore, to profile a community, we need to uncover the collective opinions of its members which makes them distinguishable from the members of other commu- nities. Tajfel [40] suggests focusing on unit-forming factors (e.g., similarities, shared threats, or common fate) which function as cog- nitive criteria for segmentation of the social world into discrete categories. Accordingly, the controversial issues on which users have different opinions can be taken into account in order to dis- cover the motives driving the segmentation of social media and the formation of communities. As a result, the profile of a community should present its important issues on which its members generally have the same position. Such community profiles can be found use- ful in a broad range of applications such as recommender systems [38], community ranking [6, 16], online marketing [20], interest shift tracking of communities [47], and community visualization [8]. For example, a group recommender system [3] can suggest more relevant items to communities by knowing the collective opinions of their members. Many community detection methods [1, 5, 29, 30, 32, 33, 37, 46, 47] which are capable of community profiling have been proposed. However, these methods usually present a set of frequent keywords used by the members of a community as the community profile. However, it is common in social media that the members of different communities use the same keywords in their messages. Therefore, keywords alone might not be enough to differentiate communities in which their members have similar word usage. For instance, in the course of the US presidential election of 2016, Republicans and Democrats have used many common keywords such as Trump, Clinton, and Obamacare but with different sentiments. To differ- entiate and understand these two parties, not only keywords but also the collective attitude of community members towards these keywords should be taken into account. In this paper, we tackle the aforementioned problem by propos- ing a sentiment-driven community profiling and detection frame- work which utilizes user-generated content and social interactions. Our framework first captures key expressions in users' messages as representative of issues by utilizing a POS-tagger and built- in features of social media platforms (i.e. hashtags and user ac- counts). Next, it identifies users' attitudes towards the extracted key expressions. Finally, we employ a novel graph regularized semi-nonnegative matrix factorization (GSNMF) technique to clus- ter users according to both their opinions and social interactions. HT '18, July 9–12, 2018, Baltimore, MD, USA Amin Salehi, Mert Ozer, Hasan Davulcu GSNMF uncovers not only communities but also their sentiment- driven profiles. The main contributions of the paper are as follows: • Providing sentiment-driven community profiles which sepa- rately present the positive and negative collective attitudes of the members of each community towards their important key expressions; • Achieving higher performance in detecting communities compared to several existing state-of-the-art community detection methods. The rest of the paper is organized as follows. We review related work in Section 2. In Section 3, we propose our sentiment-driven community profiling and detection framework. To demonstrate the efficacy of our framework, we conduct quantitative and qualitative experiments by using real-world social media datasets in Section 4. Section 5 concludes the paper and discusses future work. 2 RELATED WORK Community detection methods can fall into three broad categories: link-based, content-based and hybrid methods. Most of the existing works belong to the first category and utilize only social interac- tions [2, 7]. However, they neglect to utilize valuable user-generated content in which users express their opinions. On the other hand, content-based methods only utilize user-generated content [22]. Nevertheless, the content on social media is extremely noisy, result- ing in the failure in detecting communities effectively. To alleviate these challenges, hybrid community detection methods are pro- posed. These methods are the most related work to our study since they not only exploit both user-generated content and social interac- tions but are also capable of profiling communities. These methods roughly fall into two categories: probabilistic graphical models and non-negative matrix factorization (NMF) based methods. 2.1 Probabilistic Graphical Models Community User Topic (CUT) models [46] are one of the earliest works for detecting communities using probabilistic graphical mod- els. The first proposed model (CUT1) assumes that a community is a distribution over users, while the second one (CUT2) considers a community as a distribution over topics. To discover communi- ties, CUT1 and CUT2 are biased towards social interactions and user-generated content, respectively. Community Author Recipient Topic (CART) [32] is an unbiased model which assumes the mem- bers of a community discuss topics of mutual interests and interact with one other based on these topics. CART considers users as both authors and recipients of a message. However, in well-known social networks such as Twitter and Facebook, the number of recipients for a message can be very large. To make community detection scal- able, Topic User Community Model (TUCM) [37], considering users as authors not recipients, is proposed. Since CART and TUCM con- sider users as authors, recipients, or both, they are limited to certain types of social interactions (e.g., retweet and reply-to in Twitter). The link-content model [29] solves this problem by ignoring the assumption that messages can be related to each other using social interactions. It is also capable of using different types of social in- teractions (e.g., friendship in Facebook and followership in Twitter). Furthermore, COCOMP [47] is proposed to model each commu- nity as a mixture of topics about which a corresponding group of Table 1: Notations used in the paper Notation U C S n m k X U V W ∼ W D Explanation The set of users The set of communities The set of key expressions The number of users The number of key expressions The number of communities User opinion matrix Community membership matrix Community profile matrix Social Interaction matrix Symmetrically normalized matrix W Degree matrix of W users communicate. [5] is another model which detects and profiles communities in the domains having user-user, user-document, and document-document links. 2.2 NMF-based Methods In order to encode graphs as local geometric structures, many meth- ods extending standard NMF are proposed. LLNMF [15] introduces a regularizer, imposing the constraint that each data point should be clustered based on the labels of the data points in its neighborhood. GNMF [4] further incorporates a graph regularizer to encode the manifold structure. Moreover, DNMF [39] is proposed based on the the idea that not only the data, but also the features lie on a manifold. The graph regularizers proposed by the above methods have been utilized by several other works [30, 33] to detect communities on social media. Moreover, another work [1] proposes a NMF-based ap- proach utilizing a graph regularizer to exploit different social views (i.e., different social interactions and user-generated content) as well as prior knowledge in order to detect and profile communities. 3 THE PROPOSED FRAMEWORK 3.1 Problem Statement We first begin with the introduction of the notations used in the paper as summarized in Table 1. Let U = {u1, u2, ..., un} be the set of n users, C = {c1, c2, ..., ck} indicate the set of k communi- ties, and S = {s1, s2, ..., sk} denote the set of m key expressions. X ∈ Rm×n indicates the matrix of users' attitudes towards key ex- pressions, where Xli corresponds to the attitude of user ui towards key expression sl . Furthermore, U ∈ Rn×k indicates the community membership matrix, in which Uik corresponds to the membership strength of user Ui in community ck. V ∈ Rm×k further denotes the community profile matrix, where Vlk corresponds to the con- tribution strength of key expression sl in the profile of community ck. Moreover, W ∈ Rn×n indicates the social interaction matrix, in which Wij represents the number of social interactions between ∼ user ui and user uj. We use W to denote the symmetric normaliza- ∼ W = D−1/2WD−1/2, where D is the degree matrix tion of W (i.e., of W). By using the above notations, the problem of detecting and profiling communities can be defined as: Given user opinion matrix + + Sentiment-driven Community Profiling and Detection on Social Media X and social interaction matrix W , we aim to obtain community membership matrix U and community profile matrix V. 3.2 Extracting Key Expressions as Issues Social media presents an opportunity to utilize user-generated con- tent in which individuals express their opinions on various issues. The first step towards understanding users' opinions is the extrac- tion of the issues they discuss. To this end, many efforts [28, 35, 45] have been made to extract issues or related aspects. However, these methods require enough training samples for a specific domain to work accurately. Due to the lack of such a dataset for our required experiments, we follow a simple approach to extract key expres- sions. We utilize the built-in features common among well-known social media platforms. In such social networks, hashtags and user account mentions, which usually indicate issues, are perpended by '#' and '@', respectively. However, the built-in features are not enough to detect all issues. To tackle this problem, we employ a part-of-speech (POS) tagger to extract proper nouns and noun phrases (two or more nouns in a row) as representative of issues. If some proper nouns are in a row, they are considered as a single key expression. We utilize the POS tagger proposed in [13] proven to perform well for the content on social media. 3.3 Capturing Users' Opinions The position individuals take towards issues reflects their opinions1. Many efforts [34, 41] have been made to detect users' sentiments towards issues. However, these methods work effectively when enough training samples for a specific domain are given. However, there is no such a dataset for our required experiments so we apply a simple approach although a sophisticated approach can improve the result of our framework. First, a window with a certain size cen- tered at each positive/negative sentiment word is created. Next, the nearest key expression to the sentiment word is selected, and the positivity/negativity of the sentiment word determines user's posi- tive/negative attitude towards that key expression. For instance, in the message "Conservatives seem angry every time economy adds jobs", we assume the author has a negative sentiment towards key expression "conservatives" because it is the closest key expression to the negative sentiment word "angry" if we consider the window size to be at least two. To generate matrix X, we need to apply the above procedure for all messages. Therefore, for each message if author ui takes a positive/negative attitude towards key expression sl , we add the sentiment strength of the corresponding sentiment word to Xli, respectively. We utilize SentiStrength [42] to discover positive and negative words as well as their sentiment strength. 3.4 Exploiting Users' Opinions After extracting users' attitudes towards key expressions, the next major objective is sentiment-driven community profiling and de- tection of like-minded users. To accomplish this, we exploit semi- nonnegative matrix factorization [10] as follows: X − VUT 2 F min U ,V s.t. U ≥ 0. 1An opinion is defined as an attitude towards an issue [11]. HT '18, July 9–12, 2018, Baltimore, MD, USA Since the non-negativity constraint in Eq. (1) only holds on ma- trix U, matrix V can contain both positive and negative values. A positive/negative value of Vlk denotes that the members of com- munity ck have a collective positive/negative attitude towards key expression sl . The larger the positive value of Vlk is, the more the members of community ck have a collective positive attitude to- wards key expression sl . The lower the negative value of Vlk is, the more the members of community ck have a collective negative attitude towards key expression sl . This property of matrix V also results in the categorization of key expressions into positive and negative categories according to the sign of the corresponding ele- ments of key expressions in matrix V. Therefore, key expressions in a community profile are divided into two positive and negative cat- egories. Moreover, the key expressions in each category can also be ranked by their values in matrix V in order to show how important they are to the members of the corresponding community. 3.5 Exploiting Social Interactions Social interactions (e.g., retweets in Twitter and friendship in Face- book) are one of the most effective sources of information to detect communities [31]. To utilize social interactions, NMF-based meth- ods exploit graph regularizers. Gu et al. [14] suggest that graph regularizers used in GNMF [4] and DNMF [39] suffer from the trivial solution problem and the scale transfer problem. When the graph regularizer parameter is too large, the trivial solution prob- lem occurs and results in similarity among the elements of each row of community membership matrix U. The scale transfer problem, in which {V∗, U∗} stands as the optimal solution for Eq. (1), results in a smaller objective value for the scaled transferred solution ( V∗ β , βU′) , for any real scalar β > 1. To avoid these problems, we propose using the following graph regularizer, ∼ WU) Tr(UT max U s.t. U ≥ 0, UT U = I. (2) where I is the identity matrix with the proper size. Eq. (2) clusters users into k communities, with the most interactions within each community and the fewest interactions between communities. In fact, Eq. (2) is equivalent to the nonnegative relaxed normalized cut as put forth in [9]. 3.6 The Proposed Framework GSNMF In the previous sections, we introduced our solutions to exploit and social interactions and users' attitudes toward key expressions. Using these solutions, our proposed framework simultaneously utilizes users' opinions and social interactions to uncover commu- nities and their profiles. The proposed framework requires solving the following optimization problem, F = X − VUT 2 min U ,V s.t. U ≥ 0, UT U = I. F − λTr(UT ∼ WU) (3) (1) where λ is a non-negative regularization parameter controlling the contribution of the graph regularizer in the final solution. Since the optimization problem in Eq. (3) is not convex with respect to variables U and V together, there is no guarantee to find the global HT '18, July 9–12, 2018, Baltimore, MD, USA Amin Salehi, Mert Ozer, Hasan Davulcu Algorithm 1 The Proposed Algorithm for GSNMF Table 2: The statistics of the datasets. Input: user opinion matrix X and social interaction matrix W output: community membership matrix U and community profile matrix V 1: Initialize U and V randomly where U ≥ 0 2: while not convergent do 3: 4: 5: end while Update U according to Eq. (4) Update V according to Eq. (6) optimal solution. As suggested by [21], we introduce an alternative scheme to find a local optimal solution to the optimization problem. The key idea is optimizing the objective function with respect to one of the variables U or V, while fixing the other one. The algo- rithm keeps updating the variables until convergence. the following update rule, U = U ⊙ Optimizing the objective function F with respect to U leads to (cid:118)(cid:116)(XT V)+ + [U(VT V)−] + λ (XT V)− + [U(VT V)+] + UΓ+ ∼ WU + UΓ− (4) where ⊙ denotes the Hadamard product, and ∼ WU Γ = UT XT V − VT V + λUT (5) We separate the negative and positive parts of a matrix A as A− = (A − A)/2 and A+ = (A + A)/2, respectively. The details regarding the computation of Eq (4) are given in Appendix A. Moreover, optimizing the objective function F with respect to V leads to the following updating rule, V = XU(UT U)−1 (6) The details are given in Appendix B. The algorithm for GSNMF is shown in Algorithm 1. In line 1, it randomly initializes U and V. From lines 2 to 5, it updates U and V until convergence is achieved. 3.7 Algorithm Complexity In Algorithm 1, the most costly operations are the matrix multipli- cations in update rules Eq. (4) and Eq. (6). Therefore, we provide the time complexity of these two updating rules as follows: • The time complexity of Eq. (4) is O(nmk + mk2 + n2k + nk2). • Since the inversion of small matrix UT U is trivial, the time Accordingly, the time complexity of Algorithm 1 is O(ik(nm + mk + n2 + nk)) where i is the number of iterations. Our framework can be applied to large scale social network platforms by exploiting the distributed approaches outlined in [12, 23, 25]. 4 EXPERIMENTS To evaluate the efficacy of our framework, we need to answer the following two questions: complexity of Eq. (6) is O(mnk + nk2). (1) How effective is the proposed framework in detecting com- munities compared to the the-state-of-the-art community detection methods? (2) How effective is our framework in profiling communities? # of tweets # of retweets # of distinct words # of distinct key expressions # of users # of baseline communities US 113,818 18,891 5,773 165 404 2 UK 236,008 6,863 7,653 349 317 5 Canada 98,899 3,104 3,738 69 102 3 In the next sections, we first describe the datasets used in this study. Next, the performance of GSNMF is compared with several state-of-the-art community detection methods. Then, we qualita- tively evaluate the community profiles uncovered by our frame- work. 4.1 Data Description We take politics as an example to evaluate our framework. In this regard, we used Twitter search API to crawl politicians' tweets from three different countries, namely United States, United King- dom, and Canada. However, Twitter API imposes the limitation of retrieving only the latest 3200 tweets for each user. To overcome this limitation, we crawled politicians' user accounts several times during the time each dataset covers. The datasets are described as follows, • US Dataset consists of the tweets posted by 404 politicians from two major political parties (Republican party and Demo- cratic party) in the United States from August 26 to Novem- ber 29, 2016. • UK Dataset consists of the tweets posted by 317 political figures from five major political parties (Conservative Party, Labour Party, Scottish National Party, Liberal Democratic Party, and UK Independence Party) in the United Kingdom from January 1 to September 30, 2015. • Canada Dataset consists of the tweets posted by 102 politi- cians from three major political parties (Liberal Party, Con- servative Party, and New Democratic Party) from January 1 to November 18, 2016. All users in the datasets have discussed at least 15 key expres- sions. Moreover, the key expressions used by less than 15 users and stop words are eliminated. As a window size, we experimentally determine the threshold of 3 for the nearest keywords on both sides of each sentiment word. Furthermore, the party to which a user belong is labeled as ground truth. The statistics for the datasets are shown in Table 2. The GSNMF code and users' Twitter accounts as well as their ground truth labels used in this paper are available 2. 4.2 Community Detection Evaluation 4.2.1 Baselines. In order to demonstrate the effectiveness of our framework, we compare GSNMF with the following state-of-the-art community detection methods, • GNMF [4] is a hybrid method utilizing both user-generated and social interactions by incorporating a graph regularizer into standard NMF. 2https://github.com/amin-salehi/GSNMF Sentiment-driven Community Profiling and Detection on Social Media HT '18, July 9–12, 2018, Baltimore, MD, USA using a greedy approach. • Louvain [2] is a link-based method optimizing modularity • Infomap [36] is a link-based method built upon information theory to compress the description of random walks in order to find community structure. • DNMF [39] is a hybrid method utilizing both user-generated content and social interactions by incorporating two regu- larizers (i.e, a graph regularizer and a word similarity regu- larizer) into standard NMF. • Soft Clustering [44] is a link-based method that assigns • CNM [7] is a link-based method based on modularity opti- users to communities in a probabilistic way. mization. 4.2.2 Evaluation Metrics. To evaluate the performance of the methods, we utilize three metrics frequently used for community de- tection evaluation; namely, Normalized Mutual Information (NMI), Adjusted Rand Index (ARI), and purity. 4.2.3 Experimental Results. For this experiment, we use all three datasets. We also utilize the party membership of each politician as ground truth in our evaluation. For the methods providing soft community membership, like our framework, we select the com- munity with the highest membership value for each user as the community to which she/he belongs. Regularization parameters of NMF-based methods are set to be all powers of 10 from 0 to 9 to find the best configuration for each of these methods. We run each method 10 times with its best configuration and then report the best result. According to the results shown in Table 3, we can make the following observations, • Our proposed framework achieves the highest performance in terms of NMI and ARI for all three datasets. In terms of purity, it also achieves the best in the Canada and US datasets. In the UK dataset, Louvain, Infomap, and CNM obtain higher purity compared to our framework since they generate an artificially large number of communities for sparse graphs such as social media networks. For instance, Louvain detects 21 communities for UK dataset. • Exploiting both user-generated content and social interac- tions does not necessarily result in achieving better perfor- mance compared to link-based methods. For example, the Soft Clustering method achieves better results compared to GNMF and DNMF in terms of all three used metrics. How- ever, link-based methods do not uncover any community profile. • All NMF-based methods achieve their highest performance with large values (i.e., from 106 to 109) for the graph regu- larizer parameter. 4.3 Community Profiling Evaluation In this section, we evaluate the effectiveness of our proposed frame- work in profiling communities by using US and UK datasets. In this regard, we first label each community detected by our framework with the party to which the majority of community members be- long. Next, we evaluate how effectively the profile of a community represents its corresponding ground truth party. To this end, two graduate students who have knowledge of US and UK politics are Table 3: Comparison of community detection methods. Canada UK ARI 0.4352 0.8874 0.8746 0.8291 0.8030 0.8450 0.9612 Purity 0.9937 0.9936 0.9905 0.9085 0.8896 0.9495 0.9811 NMI 0.8602 0.8971 0.9405 0.9597 0.9574 1.0000 1.0000 ARI 0.8430 0.9299 0.9643 0.9794 0.9716 1.0000 1.0000 Purity 0.9902 0.9804 0.9902 0.9902 0.9902 1.0000 1.0000 Method Louvain Infomap CNM GNMF DNMF Soft Clustering GSNMF NMI 0.5083 0.5026 0.5741 0.8564 0.8599 0.8934 0.9069 US ARI 0.3889 0.3755 0.4664 0.9126 0.9222 0.9413 0.9510 Purity 0.9752 0.9752 0.9752 0.9777 0.9802 0.9851 0.9876 NMI 0.7077 0.8871 0.8830 0.8120 0.8308 0.8481 0.9298 assigned to label the results of community profiling methods. It is asked that each key expression in a community profile to be assigned to one of the following categories: • Supported: A key expression is labeled as supported if the majority of community members have a positive attitude towards it or support it. • Opposed: A key expression is labeled as opposed if the major- ity of community members have a negative attitude towards it or oppose it. • Concerned: A key expression is labeled as concerned if the • Unrelated: A key expression is labeled as unrelated if the annotators cannot find a strong relevance between the com- munity (party) and the key expression. majority of community members are concerned about it. In the tables representing community profiles, we color (and mark) supported, opposed, and concerned key expressions with green (+), red (−), and blue (±), respectively. We also leave unrelated key expressions uncolored (and unmarked). In the following experiments, we expect our proposed framework to achieve three goals: (1) Uncovering community profiles which represent the collec- tive opinions of community members into two positive/negative categories; (2) Assigning supported key expressions and opposed/concerned ones to positive/negative categories, respectively; (3) Minimizing the number of unrelated key expressions in com- munity profiles. In Sections 4.3.1 and 4.3.2, we evaluate the results of GSNMF according to the first and second goals by using US and UK datasets. To evaluate the performance of the third goal, Section 4.3.3 com- pares GSNMF with the baselines with regard to their effectiveness in extracting relevant key expressions. 4.3.1 US Politics. The US dataset covers many events such as occurrences of gun violence, police brutality (e.g., the shooting of Terence Crutcher), the Flint water crisis, and the death of Fidel Castro; but the major event is the US presidential election of 2016. To give brief background knowledge, two major US parties during the election are described as follows [24], • Democratic Party: A liberal party focusing on social jus- tice issues. In 2016, Hillary Clinton was nominated as the presidential candidate of the party with Tim Kaine as her vice president. Moreover, Barrack Obama, the incumbent Democratic President, was a strong advocate for Hillary Clinton. • Republican Party: A conservative party, known as the GOP, which had the majority of congressional seats in 2016 and embraces Judeo-Christian ethics. Moreover, Donald Trump HT '18, July 9–12, 2018, Baltimore, MD, USA Amin Salehi, Mert Ozer, Hasan Davulcu Table 4: The profiles of two communities detected by our framework in the US dataset. Table 5: The profiles of two communities detected by GNMF and DNMF in the US dataset. Democrats Positive Negative Zika Trump HillaryClinton POTUS America @HouseGOP Donald Trump Gun Violence ± + − + − + − + #WomensEqualityDay + #NationalComingOutDay − ± − #GunViolence ± Climate Change ± #Trabajadores ± TerenceCrutcher − − Violence Situations − ± − Americans #LaborDay TimKaine Hillary American Halloween Veterans Florida #LGBTQ equality #FundFlint Donald + + + + + #Trans Cubs GOP ISIS + + + Republicans Positive America Negative Obamacare #BetterWay + + Texas Congress Zika Iran Obama Tax code − + ± + @SpeakerRyan ± + − + @Mike_Pence − + @RepTomPrice + @realDonaldTrump − ± Breast Cancer − President Obama ± − − State Sponsor − − − − + + + Constitution Day + + ICYMI Senator #LaborDay GITMO Islamic #VeteransDay ISIS Hillary Thanksgiving Fidel Castro POTUS USMC God Note: All colors, signs, and the name of parties in the table are ground truth. was nominated as the party candidate for the presidency with Mike Pence as his vice president. During the campaign, Republicans-especially Donald Trump- mainly criticized president Obama and his policies (e.g., Obamacare, tax plans, and Iran deal) in order to discredit Hillary Clinton, whom they claimed was going to continue the Obama legacy and uphold the status quo [24]. On the other hand, Clinton's campaign brought the issue of gun violence into the contest, and also focused on human rights for groups such as women and LGBTQ [24]. Table 4 shows the profiles of two communities detected by our framework in the US dataset as well as their corresponding ground truth political parties and experts' labels. According to the pro- vided background, the community on the left highly resembles the Democratic Party since its members have generally expressed: (1) positive attitudes towards Hillary Clinton, the U.S. president (i.e., POTUS), Tim Kaine, and human rights issues (e.g., #WomensEqual- ityDay, #LGBTQ equality, and #NationalComingOutDay), and (2) negative attitudes towards the Republican Party (e.g., @HouseGOP and GOP), Donald Trump, and gun violence, police brutality (e.g., the shooting of Terence Crutcher). On the other hand, the commu- nity on the right highly resembles the Republican Party since its members have generally expressed: (1) positive attitudes towards the Republican Party (e.g., @HouseGOP and @SpeakerRyan), Don- ald Trump, Mike Pence, Congress, and religion (i.e., God), and (2) negative attitudes towards President Obama and his policies (i.e., Obamacare, tax code, Iran, Guantanamo Bay detention camp (i.e., GITMO)) as well as Hillary Clinton. Negative sentiment implies both opposition and concern. If nec- essary, our framework can differentiate opposition from concern by providing the sentiment words frequently expressed by the members of a community towards each key expression. For exam- ple, Democrats' negative sentiment towards Donald Trump mainly comes from the sentiment words "unfit", "low", and "dangerous" which suggest opposition. On the other hand, their negative senti- ment towards #Trans (i.e., transgender people) mainly originates from the sentiment words "discrimination" and "murder" which indicate concern. To demonstrate the advantage of our community profiling method, we compare the profiles of typical community profiles usually pro- vided by retrospective studies with those uncovered by our frame- work. Table 5 shows the profiles of two communities detected by GNMF and DNMF in the US dataset as well as their corresponding a. GNMF b. DNMF Democrats Trump Hillary Gov HillaryClinton Donald Trump #DoYourJob DebateNight − + + + − ± − @realDonaldTrump − ± ± Climate Change @CoryBooker ElectionDay Russia China Debate Hillary Clinton + − + Donald Virginia HRC VPDebate America TimKaine FLOTUS #IamWithHer + + + #WomenEqualityDay + + ± + + HouseDemocrats − Steve Bannon − + Flint POTUS Bannon USA − ± + ± + + + − Republicans Obamacare #BetterWay Congress Zika America @HouseGOP American ICYMI Obama Florida Americans POTUS Clinton Iran U.S. + − + ± #HurricanMatthew − + @realDonaldTrump − ± Hurrican Matthew − ± + + + ± FBI Texas Senate Veterans Matthew #DoYourJob Washington + @SpeakerRyan ± + #NeverForget Ohio GOP WSJ − + − + ± − + + ± + + + − Democrats Congress Obamacare Trump #BetterWay America Zika @HouseGOP American Gov #DoYourJob ICYMI Americans HillaryClinton Hillary − @realDonaldTrump Clinton Obama U.S. POTUS Iran + + + + + − + + ± HurricanMatthew − ± Donald Trump Washington Senate FBI Veterans Florida Texas GOP Oct Republicans Congress Obamacare Trump #BetterWay America Zika @HouseGOP American Gov #DoYourJob ICYMI Obama U.S. POTUS Iran HillaryClinton Americans Hillary − + − + @realDonaldTrump − + − − − + + − ± HurricanMatthew + ± Veterans Washington Donald Trump Senate FBI Clinton Florida Texas GOP Oct + − + ± + ± + + − + + ground truth political parties. As we observe, it is almost impossible for a non-expert individual to recognize the party associated with each profile since the position of the communities towards the key expressions are not taken into account. For example, in profiles cor- responding to the Democratic Party and the Republican Party, many key expressions related to Trump, Clinton, and Obama exist, but there is no information regarding collective attitude of community members toward such key expressions. However, Table 4 shows that our proposed method correctly divides opposed/concerned key expressions and supported ones into the correct categories. Therefore, our framework makes it easy not only to differentiate and understand communities better but also to associate online communities with their real-world counterparts (if exist). 4.3.2 UK Politics. The UK dataset covers many events such as the rise of terrorism and terrorist attacks (e.g., CharlieHebdo and Tunisia attack), and many natural disasters (e.g., Nepal earthquake and Ebola) that happened in the first nine months of 2015. However, the major event in this period of time is the UK general election. Brief background knowledge about five major UK parties during the general election are provided as follows [27], • Conservative Party: This party is also known as Tory and was led by David Cameron in 2015. David Cameron also led the UK government before and after the election of 2015. George Osborne, Nicky Morgan, and Jeremy Hunt were some of his secretaries. • Labour Party: Ed Miliband was the leader of the Labour party for the election and selected Tom Watson as his deputy chair and campaign coordinator. Jeremy Corbyn, Yvette Cooper, Liz Kendall, and Andy Burnham were among the prominent members of the party. • Liberal Democrat Party: Nick Clegg led the Liberal Demo- crat Party in 2015. Norman Lamb, John Leech, Nick Harvey, Tim Farron, and Charles Kennedy were some of the party's parliamentarians. Sentiment-driven Community Profiling and Detection on Social Media HT '18, July 9–12, 2018, Baltimore, MD, USA Table 6: The profiles of five communities detected by our framework in the UK dataset. + + Conservative Party (Tory) Positive Conservatives Cameron GE2015 Negative Labour Miliband Tunisia Paris FIFA ISIL − + @David_Cameron − ± ± + @George_Osborne + VoteConservative⋆ − + NickyMorgan01⋆ ± − Charles Kennedy − Ed_Miliband − ± − − ± ± David Cameron + + @Jeremy_Hunt + + @Tracey_Crouch + LibDems Calais Nepal London Wales SNP Syria Lab Team2015⋆ Heathrow England Chris Labour Party (Lab) Negative Tories Tory Positive Labour UKLabour A&E Britain Cameron Ed_Miliband − + − + − + LabourDoorStep + @AndyBurnhamMP − David Cameron + − Bedroom Tax + − + @GloriadePiero BedroomTax − + YvetteCooperMP + YvetteForLabour⋆ ± − − ± + @TristramHuntMP ± ± + SteveReedMP @LeicesterLiz LizforLeader⋆ France Tunisia Syria Europe VoteLabour⋆ Government Tax Credits GE2015 Govt + + + SNP + + Cardiff GE2015 Tories Tory Positive LibDems Liberal Democrat Party (Lib Dem) Negative Labour Iraq − + @Nick_Clegg ± ± Climate Change + NormanLamb − − + @TimFarron − − ± Mental Health ± − ± CharlieHebdo − Nigel Farage ± ± − Welfare Bill UKLabour Tuition Fees HIV SNP PMQs + Nick Clegg LibDem Govt Ebola Paris Lib Dems NHS John Lib Dem LBC + + + + + + + + MPs Scotland Negative Tory Trident Tories Labour Scottish National Party (SNP) Positive TheSNP GE15 SNP − ± − + NicolaSturgeon − + #RefugeesWelcome ± ± ± CharlieHebdo⋆ Alan ± Scottish ± Mediterranean GE2015 ± Edinburgh Maiden Speech ± ± ± + Nicola Sturgeon − Med French Charles Tunisia Westminster Iraq Paris NHS Neil Glasgow Syria + + + UK Independence Party (UKIP) + + − Nigel Farage Positive UKIP Negative Calais Labour ISIS Greece BBC Britain BBCqt GE2015 Cameron Mark Brexit ± + @Nigel_Farage' − − ± − ± − Government − − David Cameron ± − ± ± − JeremyCorbyn⋆ − − Jeremy Corbyn ± Mediterranean Telegraph BBC5live Queen Andrew George's Libya Miliband Tunisia Paris SNP Tories + + + Note: All colors, signs, and the name of parties in the table are ground truth. • Scottish National Party: The SNP is a Scottish Nationalist party led by Nicola Sturgeon in 2015. Alan Brown and Neil Gray were some of the party's parliamentarians. • UK Independence Party: UKIP was led by Nigel Farage in 2015. The party embodies opposition to both United King- dom EU membership and immigration. Table 6 shows the profiles of five communities detected by our framework in the UK dataset as well as their corresponding ground truth political parties. As shown in the table, all parties have a com- mon key expression, the general election of 2015 (e.g, GE2015 and GE15). We can also observe that the members of each party have generally expressed: (1) positive attitudes towards their party and also their prominent members and (2) negative attitudes towards other parties and their prominent members due to election com- petition [27]. Moreover, the government was a coalition between the Conservative Party and the Liberal Democrat Party before the election. This coalition explains why they expressed positive sentiments towards the government related issues (i.e., Govt and Cameron) [27]. According to the negative attitudes of almost all par- ties, we can determine that the Conservative party and the Labour party are the ones towards which other parties expressed most negative sentiments. Furthermore, these two parties expressed a high negative sentiment towards each other. The reason behind this antagonism is that these parties are the two biggest parties having the highest chance of winning an outright majority in the election [27]. Moreover, UKIP's negative view on Calais, the city in France where immigrants enter the UK, and Mediterranean (immi- grants/immigration) reflects its anti-immigration stance. Moreover, UKIP's positive sentiment on Brexit and its negative sentiment on Greece indicates its anti-EU orientation. Table 7 shows the profiles of five communities detected by GNMF in the UK dataset as well as their corresponding ground truth po- litical parties. Due to space limitation, we do not provide the com- munity profiles detected by DNMF. As we observe from Table 7, the same problem which exists in the profiles of communities de- tected by GNMF and DNMF in the US dataset still exists here. In other words, it is not clear which community represents which party. For instance, the profiles which corresponds to the Con- servative Party and the Labour Party shared many key expres- sions such as Labour, Tories, David Cameron (@David_Cameron), @Ed_Miliband, UKLabour, and VoteLabour, but there is no other information to understand the positions of these two parties to- wards these key expressions in order to differentiate them and also Table 7: The profiles of five communities detected by using GNMF in the UK dataset . − + Conservatives Miliband Conservatives − + − + @David_Cameron + − + + VoteConservetives − GE2015 Labour + + Govt NHS − @Nigel_Frange LeaderDebates + @ZacGoldsmith + LabourDoorStep − @Ed_Miliband + + MPs London UKLabour Labours UKIP Labour Tories NHS Britain Cameron UKLabour London BBC BBCqt Europe + + + + − − − Lib dems Libdems GE2015 Labour + − + @LFeatherstone − @CLeslieMP Bradford + @Nick_Clegg ± Budget2015 London + − Wales NHS Miliband LeaderDebate SNPs SNP Scotland VoteSNP GE15 @TheSNP Labour Westminster Tory GE2015 UKIPs Labour john Libdems − @JessPhillips birmingham − − − − − − − @TobyPerkinsMP LabourEoin Lib dems Lib dem Hansard NHS UKLabour MPs Jess @SabelHardman − Labour party − @SimonDanczuk − Libdem GE2015 Youtube Europe miliband Food Banks + @NicolaSturgeon LeadersDebate − LaboursDoorStep − MPs Trident Scottish London UKLabour PMQS + − − @David_Cameron Wales + + + − Lib dem croydon Lib dems TessaJowell Wales England David Cameron Tory Corbyn Calasis + @AndyBurnhamMP − @George_Osborne ± + @ED_Miliband + + @George_Osborne − − + @NickyMorgan01 + + @NorwichChloe ± + @RobertBuckland + @YvetteCooper − VoteLabour + ± − @CLeslieMP − LabourLeadership + + − + YvetteCooperLabour − + @EmmaReynoldMP − David Cameron ± Mental Health + @SWilliamsMP + @NormanLamb − Conservatives − + Tories Minister Guardian Leeds Greece England Jeremy Corbyn Government VoteLabour Telegraph Farage + + − + State Thurrock − Tories Nick Clegg Glasgow Front Page VoteLabour + @TimFarron ScottishLabour − VoteConservatives + Nicola Sturgeon Cardiff @GradySNP − − − − Housing Benefit − @GiselaStuart Labour MPs + + − − − LabourLeadership − − − @AndyburnhamMP − @David_Cameron Britain Wales Edinburgh Google Lab + Bristol Croydon Norwich Chancellor Note: All colors, signs, and the name of parties in the table are ground truth. associate the community profiles to the parties. However, as Table 6 suggests, the community profiles detected by our framework shows that the community associated to the Conservative Party have posi- tive attitude towards David Cameron but negative attitude towards Labour and Miliband. On the other hand, the community associ- ated to the Labour Party have the positive attitude towards Labour, UKLabour, and Miliband but negative attitude towards Tories and David Cameron. Since this corresponds to our ground truth, we can conclude that sentiment information can play an essential role in providing better community profiles. 4.3.3 Quantitative results. In this section, we aim to compare GSNMF with GNMF and DNMF in terms of their effectiveness in extracting relevant key expressions for community profiles. Figure 1 shows the accuracy of all methods in US and UK datasets by considering different number of top key expressions as community profiles. As we observe, GSNMF outweighs GNMF and DNMF in all experiments. For instance, by considering top 30 key expressions as community profiles, 93% of key expressions extracted by GSNMF in the US dataset are relevant compared to 82% in GNMF and 85% in DNMF. Similarly, 83% of key expressions extracted by GSNMF in the UK dataset are relevant compared to 65% in DNMF and 73% in GNMF. The experiments also suggest that GSNMF achieves better HT '18, July 9–12, 2018, Baltimore, MD, USA Amin Salehi, Mert Ozer, Hasan Davulcu The US dataset The UK dataset y c a r u c c A 1 0.8 0.6 0.4 0.8 0.6 0.4 Top 6 Top 12 Top 18 Top 24 Top 30 DNMF GNMF GSNMF Top 6 Top 12 Top 18 Top 24 Top 30 The number of top key expressions per community profile Figure 1: The accuracy of community profiling methods in extracting relevant key expressions. accuracy with lower number of top key expressions as community profiles. This implies that the higher a key expression is ranked by GSNMF, the more likely it is relevant. Following these observations, sentiment-driven community profiling produces key expressions which are more relevant than its sentiment insensitive counterparts. 5 CONCLUSION AND FUTURE WORK In this paper, we presented a sentiment-driven community pro- filing and detection framework. Our framework uncovers a low- dimensional latent space in order to cluster users according to their opinions and social interactions. It also provides community profiles reflecting positive/negative collective opinions of their members. Experimental results on real-world social media datasets demon- strated: (1) our framework obtains significant performance in detect- ing communities compared to several state-of-the-art community detection methods, and (2) our framework presents a sentiment- driven community profiling approach that provides better insights into the collective opinions of community members by dividing key expressions into positive and negative categories. Our future work includes the following directions. First, the current sentiment analysis is not capable of differentiating between opposition and concern. There is a need to propose new methods to differentiate between opposition and concern. Second, identifying the dynamics of communities sheds light on their temporal behavior. Therefore, we will focus our efforts on detecting and profiling the dynamics of communities. A APPENDIX A.1 Computation of U Optimizing the objective function F in Eq. (3) with respect to U is equivalent to solving FU = X − VUT 2 min U s.t. U ≥ 0, UT U = I. F − λTr(UT ∼ WU) (7) Let Γ and Λ be the Lagrange multiplier for constraints UT U = I and U ≥ 0 respectively, and the Lagrange function is defined as follows: min U LU = X − VUT 2 ∼ WU) − Tr(ΛUT ) + Tr(Γ(UT U − I)) F − λTr(UT The derivative of LU with respect to U is ∼ WU − Λ + 2UΓ = −2XT V + 2UVT V − 2λ ∂LU ∂U By setting ∂LU = 0, we get ∂U Λ = −2XT V + 2UVT V − 2λ ∼ WU + 2UΓ (10) With the KKT complementary condition for the nonnegativity of U, we have Λij Uij = 0. Therefore, we have (−XT V + UVT V − λ where Γ = UT XT V − VT V + λUT ∼ WU + UΓ)ij Uij = 0 ∼ WU. Matrices Γ, XT V, and VT V take mixed signs. Motivated by [10], = we separate positive and negative parts of any matrix A as A+ ij (Aij + Aij)/2, A− = (Aij − Aij)/2. ij Thus, we get ∼ WU + UΓ−) +((XT V)− + [U(VT V)+] + UΓ+)]ij Uij = 0 +λ (8) (9) (11) (12) (13) (14) which leads to the updating rule of U in Eq (4). A.2 Computation of V Optimizing the objective function F in Eq. (3) with respect to V is equivalent to solving min V FV = X − VUT 2 The derivative of FV with respect to V is = −2XU + 2VUT U F ∂FV ∂V Setting ∂FV ∂V = 0, we get the updating rule of V in Eq (6). Sentiment-driven Community Profiling and Detection on Social Media HT '18, July 9–12, 2018, Baltimore, MD, USA REFERENCES [1] Mohammad Akbari and Tat-Seng Chua. 2017. Leveraging Behavioral Factoriza- tion and Prior Knowledge for Community Discovery and Profiling. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. ACM, 71–79. [2] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008. [3] Ludovico Boratto. 2016. Group Recommender Systems. In Proceedings of the 10th ACM Conference on Recommender Systems. ACM, 427–428. [4] Deng Cai, Xiaofei He, Jiawei Han, and Thomas S Huang. 2011. Graph regularized nonnegative matrix factorization for data representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 8 (2011), 1548–1560. [5] Hongyun Cai, Vincent W Zheng, Fanwei Zhu, Kevin Chen-Chuan Chang, and Zi Huang. 2017. From community detection to community profiling. Proceedings of the VLDB Endowment 10, 7 (2017), 817–828. [6] Wen-Yen Chen, Dong Zhang, and Edward Y Chang. 2008. Combinational collab- orative filtering for personalized community recommendation. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 115–123. [7] Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding commu- nity structure in very large networks. Physical review E 70, 6 (2004), 066111. [8] Juan David Cruz, Cécile Bothorel, and François Poulet. 2013. Community detec- tion and visualization in social networks: Integrating structural and semantic information. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (2013), 11. [9] Chris HQ Ding, Xiaofeng He, and Horst D Simon. 2005. On the Equivalence of Nonnegative Matrix Factorization and Spectral Clustering.. In SDM, Vol. 5. SIAM, 606–610. [10] Chris HQ Ding, Tao Li, and Michael I Jordan. 2010. Convex and semi-nonnegative matrix factorizations. IEEE transactions on pattern analysis and machine intelli- gence 32, 1 (2010), 45–55. [11] Martin Fishbein and Icek Ajzen. 1977. Belief, attitude, intention, and behavior: An introduction to theory and research. (1977). [12] Rainer Gemulla, Erik Nijkamp, Peter J Haas, and Yannis Sismanis. 2011. Large- scale matrix factorization with distributed stochastic gradient descent. In Pro- ceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 69–77. [13] Kevin Gimpel, Nathan Schneider, Brendan O'Connor, Dipanjan Das, Daniel Mills, Jacob Eisenstein, Michael Heilman, Dani Yogatama, Jeffrey Flanigan, and Noah A Smith. 2011. Part-of-speech tagging for twitter: Annotation, features, and experiments. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: short papers-Volume 2. Association for Computational Linguistics, 42–47. [14] Quanquan Gu, Chris Ding, and Jiawei Han. 2011. On trivial solution and scale transfer problems in graph regularized nmf. In IJCAI Proceedings-International Joint Conference on Artificial Intelligence, Vol. 22. 1288. [15] Quanquan Gu and Jie Zhou. 2009. Local learning regularized nonnegative matrix factorization. In Proceedings of the 21st international jont conference on Artifical intelligence. Morgan Kaufmann Publishers Inc., 1046–1051. [16] Xiao Han, Leye Wang, Reza Farahbakhsh, Ángel Cuevas, Rubén Cuevas, Noel Crespi, and Lina He. 2016. CSD: A multi-user similarity metric for community recommendation in online social networks. Expert Systems with Applications 53 (2016), 14–26. [17] Morgan Harvey, Fabio Crestani, and Mark J Carman. 2013. Building user profiles from topic models for personalised search. In Proceedings of the 22nd ACM in- ternational conference on Conference on information & knowledge management. ACM, 2309–2314. [18] Michael Hechter. 1988. Principles of group solidarity. Vol. 11. Univ of California [19] Kazushi Ikeda, Gen Hattori, Chihiro Ono, Hideki Asoh, and Teruo Higashino. 2013. Twitter user profiling based on text and community mining for market analysis. Knowledge-Based Systems 51 (2013), 35–47. [20] Robert V Kozinets. 2002. The field behind the screen: Using netnography for marketing research in online communities. Journal of marketing research 39, 1 (2002), 61–72. [21] Daniel D Lee and H Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In Advances in neural information processing systems. 556–562. [22] Kyumin Lee, James Caverlee, Zhiyuan Cheng, and Daniel Z Sui. 2013. Cam- paign extraction from social media. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (2013), 9. [23] Fanglin Li, Bin Wu, Liutong Xu, Chuan Shi, and Jing Shi. 2014. A fast distributed stochastic gradient descent algorithm for matrix factorization. In Proceedings of the 3rd International Conference on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications-Volume 36. JMLR. org, 77–87. Press. [24] Darren Lilleker, Dan Jackson, Einar Thorsen, and Anastasia Veneti. 2016. US Election Analysis 2016: Media, Voters and the Campaign. (2016). [25] Chao Liu, Hung-chih Yang, Jinliang Fan, Li-Wei He, and Yi-Min Wang. 2010. Distributed nonnegative matrix factorization for web-scale dyadic data analysis on mapreduce. In Proceedings of the 19th international conference on World wide web. ACM, 681–690. [26] Alan Mislove, Bimal Viswanath, Krishna P Gummadi, and Peter Druschel. 2010. You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining. ACM, 251–260. [27] Michael Moran. 2015. Politics and Governance in the UK. Palgrave Macmillan. [28] Arjun Mukherjee and Bing Liu. 2012. Aspect extraction through semi-supervised modeling. In Proceedings of the 50th Annual Meeting of the Association for Com- putational Linguistics: Long Papers-Volume 1. Association for Computational Linguistics, 339–348. [29] Nagarajan Natarajan, Prithviraj Sen, and Vineet Chaoji. 2013. Community de- tection in content-sharing social networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 82–89. [30] Mert Ozer, Nyunsu Kim, and Hasan Davulcu. 2016. Community Detection in Political Twitter Networks using Nonnegative Matrix Factorization Methods. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (2016). [31] Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. 2012. Community detection in social media. Data Mining and Knowledge Discovery 24, 3 (2012), 515–554. [32] Nishith Pathak, Colin DeLong, Arindam Banerjee, and Kendrick Erickson. 2008. Social topic models for community extraction. In Proceedings of the 2nd SNA-KDD Workshop. [33] Yulong Pei, Nilanjan Chakraborty, and Katia Sycara. 2015. Nonnegative matrix tri-factorization with graph regularization for community detection in social net- works. In Proceedings of the 24th International Conference on Artificial Intelligence. AAAI Press, 2083–2089. [34] Maria Pontiki, Dimitris Galanis, Haris Papageorgiou, Ion Androutsopoulos, Suresh Manandhar, AL-Smadi Mohammad, Mahmoud Al-Ayyoub, Yanyan Zhao, Bing Qin, Orphée De Clercq, et al. 2016. SemEval-2016 task 5: Aspect based sentiment analysis. In Proceedings of the 10th international workshop on semantic evaluation (SemEval-2016). 19–30. [35] Guang Qiu, Bing Liu, Jiajun Bu, and Chun Chen. 2011. Opinion word expansion and target extraction through double propagation. Computational linguistics 37, 1 (2011), 9–27. [36] Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences 105, 4 (2008), 1118–1123. [37] Mrinmaya Sachan, Danish Contractor, Tanveer A Faruquie, and L Venkata Sub- ramaniam. 2012. Using content and interactions for discovering communities in social networks. In Proceedings of the 21st international conference on World Wide Web. ACM, 331–340. [38] Shaghayegh Sahebi and William W Cohen. 2011. Community-based recommen- dations: a solution to the cold start problem. In Workshop on recommender systems and the social web, RSWEB. [39] Fanhua Shang, LC Jiao, and Fei Wang. 2012. Graph dual regularization non- negative matrix factorization for co-clustering. Pattern Recognition 45, 6 (2012), 2237–2250. [40] Henri Tajfel. 2010. Social identity and intergroup relations. Cambridge University [41] Duyu Tang, Bing Qin, and Ting Liu. 2016. Aspect level sentiment classification with deep memory network. arXiv preprint arXiv:1605.08900 (2016). [42] Mike Thelwall, Kevan Buckley, Georgios Paltoglou, Di Cai, and Arvid Kappas. 2010. Sentiment strength detection in short informal text. Journal of the American Society for Information Science and Technology 61, 12 (2010), 2544–2558. [43] John C Turner, Michael A Hogg, Penelope J Oakes, Stephen D Reicher, and Margaret S Wetherell. 1987. Rediscovering the social group: A self-categorization theory. Basil Blackwell. [44] Kai Yu, Shipeng Yu, and Volker Tresp. 2005. Soft clustering on graphs. In Advances in neural information processing systems. 1553–1560. [45] Lei Zhang and Bing Liu. 2014. Aspect and entity extraction for opinion mining. In Data mining and knowledge discovery for big data. Springer, 1–40. [46] Ding Zhou, Eren Manavoglu, Jia Li, C Lee Giles, and Hongyuan Zha. 2006. Prob- abilistic models for discovering e-communities. In Proceedings of the 15th inter- national conference on World Wide Web. ACM, 173–182. [47] Wenjun Zhou, Hongxia Jin, and Yan Liu. 2012. Community discovery and profiling with social messages. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 388–396. Press.
1607.07243
1
1607
2016-07-25T12:38:22
Self-presentation and emotional contagion on Facebook: new experimental measures of profiles' emotional coherence
[ "cs.SI", "physics.soc-ph" ]
Social Networks allow users to self-present by sharing personal contents with others which may add comments. Recent studies highlighted how the emotions expressed in a post affect others' posts, eliciting a congruent emotion. So far, no studies have yet investigated the emotional coherence between wall posts and its comments. This research evaluated posts and comments mood of Facebook profiles, analyzing their linguistic features, and a measure to assess an excessive self-presentation was introduced. Two new experimental measures were built, describing the emotional loading (positive and negative) of posts and comments, and the mood correspondence between them was evaluated. The profiles "empathy", the mood coherence between post and comments, was used to investigate the relation between an excessive self-presentation and the emotional coherence of a profile. Participants publish a higher average number of posts with positive mood. To publish an emotional post corresponds to get more likes, comments and receive a coherent mood of comments, confirming the emotional contagion effect reported in literature. Finally, the more empathetic profiles are characterized by an excessive self-presentation, having more posts, and receiving more comments and likes. To publish emotional contents appears to be functional to receive more comments and likes, fulfilling needs of attention-seeking.
cs.SI
cs
Self-presentation and emotional contagion on Facebook: new experimental measures of profiles' emotional coherence Andrea Guazzini,1, ∗ Elisa Guidi,2, † Cristina Cecchini,2, ‡ Monica Milani,2, § Daniele Vilone,3, 4, ¶ and Patrizia Meringolo1, ∗∗ 1Department of Education and Psychology, and Center for the Study of Complex Dynamics (CSDC), University of Florence, Via di San Salvi 12, 50135, Florence, Italy 2Department of Information Engineering, via S. Marta 3, I-50193, Florence (Italy) 3LABSS (Laboratory of Agent Based Social Simulation), Institute of Cognitive Science and Technology, National Research Council (CNR), Via Palestro 32, 00185 Rome, Italy 4Grupo Interdisciplinar de Sistemas Complejos (GISC), Departamento de Matem´aticas, Universidad Carlos III de Madrid, 28911 Legan´es (Spain) 6 1 0 2 l u J 5 2 ] I S . s c [ 1 v 3 4 2 7 0 . 7 0 6 1 : v i X r a ABSTRACT Social Networks allow users to self-present by sharing personal contents with others which may add comments. Recent studies highlighted how the emotions expressed in a post affect others' posts, eliciting a congruent emotion. So far, no studies have yet investigated the emotional coherence between wall posts and its comments. This research evaluated posts and comments mood of Facebook profiles, analyzing their linguistic features, and a measure to assess an excessive self-presentation was introduced. Two new experimental measures were built, describing the emotional loading (positive and negative) of posts and comments, and the mood correspondence between them was evaluated. The profiles "empathy", the mood coherence between post and comments, was used to investigate the relation between an excessive self-presentation and the emotional coherence of a profile. Participants publish a higher average number of posts with positive mood. To publish an emotional post corresponds to get more likes, comments and receive a coherent mood of comments, confirming the emotional contagion effect reported in literature. Finally, the more empathetic profiles are characterized by an excessive self-presentation, having more posts, and receiving more comments and likes. To publish emotional contents appears to be functional to receive more comments and likes, fulfilling needs of attention-seeking. I. INTRODUCTION The rise of World Wide Web offered new tools to spread news and information, managing any time. The direct outcome was to increase interactions among different Internet users [1], preparing a suitable ground for the birth of Social Networks (SNSs). SNSs are an interesting growing field [2, 3] for Psychology, Computer Science and Sociology, because their popularity allows researchers to open up new opportunities for reliable affective assessment [4, 5]. At present Facebook is one of most used SNSs [6], and in last decades it has developed an innovative way to create and increase social relationships of people of all ages [7, 8]. Particularly, these technologies let users sharing personal contents on their profile, allowing others to read and add comments [9]. This is basic for online self-presentation, where users need to find effective strategies to fully express themselves with different audiences [10–12]. Facebook users easily change their approach and communication with others [13], which may indicate they apply different strategies depending on kind of audiences and type of published message (i.e., public wall posts, wall posts updates, private messages). Choosing what to discover and which emotion may produce positive or negative reactions from audience [7]. Some studies [14, 15] state users seek two main goals through self-presentation: impression construction, to create a desired impression, and impression motivation, to manage others' opinion of the self. This is complicated on SNSs, where audience is various and rather difficult to select [10]. Then, the best strategy appears to be to show only acceptable information for all targets [16], while superficial messages appear not to be suitable in creating positive impressions [7]. However, such information represents a self-disclosure of personal issues, such as attitudes, personal hobbies, experiences and emotions. A recent research [7] investigated how the use of emotions, both positive ∗ [email protected][email protected][email protected] § [email protected][email protected] ∗∗ [email protected] 2 and negative, affected the linguistic style for self-presentation on Facebook. Findings confirmed different adoptions of language style depending on the audience, and highlighted a major use of positive emotions, as opposed to negative emotions, in status updates. Therefore, emotions appear to be central not only in in-person interactions, but also in online communication [17, 18], where they can be spread and reach other people, who may be affected in a sort of "empathetic contagion" [19]. Indeed, one relevant question was whether this contagion would be effective in the cyber- world. Research exploring online empathy has especially examined support communities or "thematic" forums (e.g., sports) [20, 21], or Instant Messaging [22], analyzing empathetic responses to the posts. In these studies, empathy was defined as the capacity to both feel and understand others' feelings and thoughts [23], which allow to predict others' intentions and experience the same emotion [24, 25]. Empathy is basic to build appropriate social relationships [26] and is a predictor of pro-social behaviors [27, 28] and perspective taking abilities [29]. Studies on online empathy revealed that online support in thematic communities consisted of providing practical information and fostering emotional attachment [30]. Participating members build social relationships and are more likely to write empathetic messages than new members [21]. Moreover, [22] found that an empathetic communication had a significant influence on online interpersonal trust, where more empathetic people were more trusted by others. Moreover, a study enhancing gender differences in virtual communities underlined how females published more empathetic messages than males [20]. Facial and body expressions can be helpful to empathy in understanding one's behavior [31], but online interactions are missing the use of non-verbal communication, complicating the empathetic answers [32]. By contrast, the virtual environments are feasible to precisely detect and record every gesture, voice feature, non verbal behavior, avoiding difficult data mining/coding of empathy and emotional contagion in real settings. We recently tested such aspects, confirming that the mood of a short message, such as those observed within online social networks, forums, and web-based chats, can be detected and be informative about the dynamics of the system and the topological position of the writer [33]. The concept of "virtual empathy (i.e., the existence of an empathy capacity for humans into virtual environments) could state or predict a measurable effect of the mood polarization of a stimulus (e.g., messages, photos) on the inner psychological state of the observer. As a consequence, some effects on the subsequent production of the observer should be detectable, as well as a possible coupling between the behavior of the observer and the post maker. Regarding this, some studies began to explore the computer-mediated communication [34] and the spread of emotions [35, 36]. Results showed that inducing negative emotions elicited negative messages in participants, confirming that the emotional contagion on virtual environments is not only detectable, but clearly evident even without face-to-face interactions. Recently, emotional dissemination was analyzed on Facebook, examining posts and status updates. Findings showed emotions expression conditioned others' emotional posts, eliciting a congruent emotional contagion: that is, people having friends who published positive posts were more likely to publish positive messages as well. Then, emotions transmission does not occur only after in-person interactions, but also through computer-mediated communication [37, 38]. Despite such interesting findings, no studies have yet investigated emotional coherence between wall posts and received comments. When a user publishes a status, are comments he receives emotionally congruent with that status? The present research purposes to explore this aspect by means of the development of two experimental metrics assessing the emotional loading and the emotional coherence. II. EXCESSIVE SELF-PRESENTATION, NARCISSISTIC TRAIT AND EMOTIONAL MOOD OF POSTS Self presentation on SNSs has been largely explored in literature, and researchers also investigated the origins of an excessive online self-presentation, wondering whether a frequent posting might be a signal of a narcissistic trait [39–42]. Literature described narcisissm [43–45] as a personality trait and not a clinical disorder, and as the tendency to an inflated and positive self-concept, with exhibitionism and attention-seeking behaviors. SNSs are suitable to achieve narcissistic goals, and they may also incentive to self-promote and to engage superficial behaviors [46]. [47] confirmed this, finding Facebook users to be more narcissistic than non-users. Other studies referred that narcissistic and excessive self-presentation strategies on SNSs were related to publish more self-promotional information [48] and to have more friends [39, 46], besides using more swear and anger words [40], sexual words [49] and singular first-person pronouns [50]. It appears that narcissistic people engage in more self-promotional and self-disclosed behaviors, as frequent status updates, to seek for others' attention [51]. A study investigated how personality traits influenced self-presentation, self-disclosure and linguistic and emotional content of messages on Facebook [52]. Results displayed narcissists disclose more personal information and self-present more than others, revealing a tendency to an excessive self-presentation. Despite a frequent negative relation between narcissism and empathy on SNSs and the widespread knowledge about SNSs promoting narcissism [46], another research revealed that participating to SNSs has an association with empathy, too [53]. To investigate the presence of emotional loading in SNSs narcissistic posts, and the association between online narcissism and empathy, is nowadays of particular interest because of the recent findings about the negative correlation between empathetic behaviors and the narcissistic style [54]. Moreover, more information about linguistic strategies in the narcissistic trait and in the excessive self-presentation could be provided. Unfortunately, few studies analyzed these aspects. Given that some studies explored linguistic contents in the narcissistic trait and excessive self-presentation on Facebook [49, 50], revealing a peculiar use of communication strategies for attention-seeking goals [55], a second purpose of the present study was to analyze all posts of 50 Facebook profiles in one year through the linguistic software LIWC [56], and to explore content emotional features of posts and comments in excessive self-presentation profiles. Particularly, we meant to identify an "empathetic coherence or incoherence" between posts and received comments in different profiles. 3 III. AIMS OF OUR STUDY The main challenge of our study concerns about the dynamics (e.g., spreading and sensitiveness) of the emotional coherence on Facebook among Italian adolescents. We focused on adolescents' sample because recent studies under- lined how most of members of SNSs are young people [57]. The first property required to the measure is the ability to detect the emotional content (i.e., sentiment) of a web-based post (e.g., message, photo, news, etc). Given the literature about the "Sentiment Analysis [58–60], several tools and approaches can be adopted to fulfill this first challenge. For this reason, our study analyzed 50 Facebook users' profiles, coding each published post or activity during a year (table I). In our study we first define for all the Facebook profile an emotional loading for each post and comment by means of the development of two operative metrics (i.e., negative and positive mood indicators). Once the emotional loading of each post and comment was evaluated, the emotional coherence of each profile has been defined as the normalized correspondence between each post mood, and its average comments moods, assessed by the Pearson χ2 statistics. As a consequence, the empathy level of a profile is defined as the degree of agreement between the moods of the posts, and the moods of the comments received by each post. Finally, the average emotional loading and coherence of profiles have been related with the gender, with the variables describing the social network usage, and with the self-presentation style of individuals. IV. METHODS A. Participants and procedure Participants were 50 students (50% females) recruited from a Tuscan high school. They ranged in age from 15 to 19 (M=16.95, SD=1.08). All participants had a Facebook account and were involved as volunteers. The data collection carried out during the ARCA project". The agreement of the high school to participate was obtained from the principal. The professors of the classes involved, and a research assistant introduced the aims of the survey, and the confidentiality issues to the students. Before the students' participation in the research, parental consent and adolescent assent was obtained. To analyze one year of the Facebook usage on participants' profiles, a Facebook account was created using the recruitment coordinator's contact information, with a research logo as the profile picture. Before befriending a participant's profile, we sent a private message inviting him/her to participate in the research. Participants were explicitly notified that the researchers would have access to their Facebook profiles for one year and we communicated that the data would be stored anonymously. All the 50 students gave permission to save their Facebook pages to be used in the present research. B. Measures a. Facebook Page Coding (observation grid) From each Facebook profile, some relevant information were ex- tracted, both concerning the directly available data (i.e., friends, followed people, visited places, famous quotes, pages with like), and some objective criteria calculated and coded by the year-long analysis of each profile (i.e. complete activity, wall posts, profile picture edit, personal photos, photos, videos, likes, activities with likes, comments, posts with comments, wall posts length, wall posts average length). We analyzed one year of participants' activity on Facebook, considering a total of 32368 activities(28878 of which were wall posts), and 62083 comments. b. Linguistic Analysis In order to assess the posts emotional loading, we used the Linguistic Inquiry Word Count program [56]. LIWC analyzes transcripts on a word-by-word basis and compares words with a dictionary related to 70 linguistic, affective, cognitive and social processes. LIWCs psychometric properties and external validity have been established in a large number of studies, and has been used to examine the relationship between language and emotion, personality, and deception, among others [61]. In this study, all the sampled profiles have been considered TABLE I: Facebook Profile Features. The descriptive statistics related to the sample's Facebook profiles features are reported 4 Facebook Variable M SD Min Max 3085 1089 642 0 1 1 30 29 22 0 1 15 1 4970 46 644 333 4762 2609 2399 11 124 99 781 529 491 20 43 194 93 12 64 94 547 647 578 23 49 218 62 Friends Followed people Visited places Famous quotes Pages with likes Complete activity Wall posts Profile picture edit Personal photos Photos Videos Likes 641 Activities with like Wall post with comments 263 1242 Comments Wall posts length 46814 42021 2010 193966 Wall posts average length 12646 13280 465 66815 2537 746 4494 81 30 31 183 81 206 908 562 520 179 926 29 21 121 as separated elements, and the LIWC analysis concerned the entire production (i.e., the posts) as a single narration (table II). TABLE II: In table are reported the LIWC categories discriminating effectively the posts/comments mood. In particular the significant Fischer F, and the associated sum of squares are reported and connected with the specific mood assessed by them. The signs between brackets after the mood polarization indicate the sign assumed by the terms in the operative models. Variable Sum of Squares F(p. < 0.01) Condition Negative emotions Swear word Positive feeling Anger word Positive Emotion Sadness word Numerals Third-Person plural verb Family Question marks 4.009 5.356 2.002 6.000 2.839 4.562 0.939 3.441 5.631 3.374 21,063 12,418 12,309 11,355 10,169 9,834 8,376 6,214 5,937 5,587 Negative [+] Negative [+] Positive [+] Negative [+] Positive [+] Negative [+] Negative [-] Negative [+] Positive [+] Positive [+] c. Excessive Self-presentation Model Since excessive online self-presentation could be an indicator of narcissism [41, 42], we used a previously developed model, labeled Excessive online self-presentation model, to directly assess this tendency, through the linguistic analysis of public contents of personal pages. This measure was originated by an observation grid coding the Facebook activities of our participants (e.g. wall posts, comments, photos, etc.), and the analysis of the language style obtained through LIWC analysis of their Facebook published posts. For more details please refer to [62]. Such a measure has been defined investigating the linguistic features of the individuals' Facebook wall posts, merging recent studies validating online measurements of the narcissistic trait [39, 40, 46, 48–50], with 5 the theoretical models coming from classical literature. The final model presented in [62] is composed by the two LIWC-based parameters (i.e. Word Count and Sexual ) provided by the linear regression analysis. d. Creating metrics to measure emotional load and emotional coherence The assessment of Profiles Emotional Coherence (i.e., Facebook Empathy Profile) includes a Sentiment Analysis of the wall posts and the comments to identify their "mood". In particular, the Facebook Empathy profile level is not the user's level, but it is the commentators' average level, in other words the comments accord level with a particular wall post. It was possible to define an Emotional Load of the wall post and its comments and, subsequently, a Profiles Emotional Coherence defined as the degree of correspondence normalized between the wall posts mood and its comments. The Sentiment Analysis was conducted starting from the LIWC software analysis. Based on the LIWC categories we defined two metrics to estimate the emotional content of posts and comments: the Positive Mood Indicator and the Negative Mood Indicator. C. Data Analysis e. Emotional coherence and loading indicators development Step 1: The wall posts that did not receive any comments and those that were photos, videos, music, or famous quotes were excluded from the original sample (14644). Four judges examined a random sample of 500 wall posts extracted from the new set of 14234. The judges selected 144 wall posts, in order to achieve 48 wall posts defined by them as "Negative", 48 as "Positive" and 48 as "Neutral", comparing their emotional content. These subgroups of wall posts were used as a criterion to develop the model for the sentiment analysis. Step 2: It was carried out an analysis of variance (ANOVA) to identify which LIWC variables showed a discerning capacity in identifying the condition of "Negative Mood Indicator", "Positive Mood Indicator", or "Neutral Mood Indicator". We chose the LIWC categories that reported a significant F Fischer's score. Moreover, to assess the main effects and to evaluate which condition the LIWC variable was able to discriminate, we adopted the Scheff´e test (Scheff´e, 1999), and the most discriminating variables were organized and ordered by F-test score (Table 1). A greater value of F-score corresponded to a greater ability to discriminate an emotional condition with respect to the other two (e.g., positive mood against negative and neutral mood). Step 3: After identifying the LIWC most discriminating categories, we have also calculated the Z-scores (i.e., associated to the F values) of such categories for each condition "Negative Mood Indicator", "Positive Mood Indicator", or "Neutral Mood Indicator". After sorting the Z scores (figure 1), the LIWC variables that reported higher average values on a specific mood and lower values on the other two were selected as the "best" predictors. Step 4: Based on the LIWC Best predictors, we have defined three metrics to estimate the emotional content of posts and comments (Negative Mood Indicator, Positive Mood Indicator and Neutral Mood Indicator). After metrics verification, we decided to not consider the posts with neutral mood, despite the clarity construct emerging from the LIWC semantic and syntactic categories analysis. This decision was motivated by the huge variability exhibited by neutral mood wall posts (as opposed to positive and negative mood wall posts), and thus to avoid the risk of excessive and impossible generalization of the neutrality construct. FIG. 1: The z-scores associated with the LIWC variables significantly related with the operative criteria, and concerning the mood polarization are reported. 6 f. Inferential analysis The statistical analysis comprised five different steps. In the first one, the Student t statistic has been used to compare the sub-samples of posts categorized as positive, with those with a negative emotional loading. The differences between the two sub-samples have been investigated on the observable quantities defined as order parameters of our study (i.e., gender, Facebook variables, Positive and Negative Mood Indicators of comments). To balance the sub-samples, a bootstrap sampling has been adopted and a final sample of 3392 units has been analyzed. The same strategy has been used to compare the posts with an emotional loading different from 0 (i.e., positive plus negative posts), and those with no emotional loading (i.e., neutral posts). In this case the two sub-samples resulting from the bootstrap method were composed by approximately 6380 units. To estimate the Facebook Empathy profile level, we used the Pearson chi square test, assessing the agreement degree between the emotional loading of each post and its comments. To evaluate the relation between the empathy and the excessive self-presentation, we simply computed the Pearson correlation between the scores reported to the Chi square test, and all the observable quantities of interest. Finally, to compare the participants with an High empathy profile with those with a Low empathy profile, the sample has been split in two, depending on the median reported to the Chi Square test (M edian = 0.74). Subsequently, another independent sample Student t test has been calculated with respect to all the independent variables. V. RESULTS A. Creation of two metrics to weight the emotional load of a message The analysis of variance (ANOVA) on the 144 posts selected by judges (i.e., 48 negative, 48 positive and 48 neutral) was focused on identifying which LIWC variables showed a discerning capacity in the three conditions and to calculate two metrics (Positive Mood Indicator and Negative Mood Indicator). A greater F Fischer's score corresponds a greater capacity to discriminate one of the emotional conditions with respect to the other. Table 1 shows the LIWC categories that have obtained a significant F Fischer, sorted in descending order in respect to its score. Some significant categories, such as body, and comma, were not able to discriminate the emotional content of the posts (i.e., test Scheff´e not significant or negligible effect) and therefore they were not used to build the two metrics. Furthermore, we have calculated the Z-scores for the LIWC variables that were able to discriminate the post emotional content, i.e. to produce two different scores for each post respectively indicating the positive and negative "load" of the message. The resulting graph (figure 1) shows that there is a clear inverse correspondence between the negative mood variables and those of positive mood. As shown in equation 1, regarding Positive Mood Indicator, the LIWC best predictors were the variables Positive Feeling (PF), Positive Emotion (PE), Family (Fa), and Question Marks (QM), while concerning Negative Mood Indicator (eq. 2) the LIWC best predictors were the categories Negative Emotion (NE), Swear Word (SW), Anger Word (AW), Sadness Word (SaW), Numerals (Nu), and Third-Person Plural Verb (TP). P M N i = N E + SW + AW + SaW − N u + T P P M P i = P F + P E + F a + QM (1) (2) where, P M P and P M N respectively indicate the positive and negative mood score for the post i. The several variables of the models were added or subtracted to the total scores if Z-score sign was positive or negative (e.g., the LIWC variable "Negative Emotion" appeared as characterized by a Z-score of 1.63 for what concerns the negative load, and a Z-score of −0.69 for the positive load; while on the other hand, the variable "Numerals" obtains a negative load of −0.77, and a positive load of 0.23). Therefore, in the former case the Negative Emotion variable has been adopted as a positive term to add for the Negative Mood Indicator (i.e., its presence increases the probability to have a post with a negative mood), while the latter Numerals variable has been adopted as negative term to subtract in the same model, because its presence decreases the probability to have a negative post. The descriptive statistics related to the Facebook profiles' features are reported in table I. Regarding the 14234 posts, it has been calculated the descriptive statistics relating to the variables number of likes, number of comments and scores of the negative and positive mood variables. Each post had a mean score of 18.15 (SD = 23.154) for number of likes and 2.06 (SD = 4.078) for number of comments. The average score for the Negative Mood Indicator was 4.915 (SD = 15.939) and for the Positive Mood Indicator was 5.776 (SD = 12.689). Concerning the comments, it has been calculated the average score of the negative (M = .877, SD = 5.204) and positive mood indicators, too (M = 3.046, SD = 12.62). The frequency distributions of the mood indicator variables do not appear normal (i.e., skewness was large). This is due to the abundance of posts and comments with a zero score. These posts (6380) and comments (9940) have been removed from the analysis, since they are not emotionally determined. Thus, about the 14234 posts, those deemed valid were 7854 (55.2%) of which 4462 identified as positive and 3392 negative, while comments were deemed valid 4294 (30.2%), of which 3147 positive and 1147 negative. 7 B. Descriptive analysis A preliminary analysis tested that no gender differences are detectable for what concerns all the order parameters such as number of likes, number of comments, negative comments scores and positive comments scores. The summary of the inferential analysis are reported in table III. First, it was carried out a balance through bootstrap method to conduct a Student's t-test in which the sub-sample of positive posts has been compared to that of the negative posts with respect to the variables mentioned before. Two groups were obtained characterized by a same high number of units (3392). From the analysis carried out, there was a unique significant relationship between mood posts and negative comments. The negative posts have a significantly higher probability of receiving a negative comment (t = 3.523, p. < .01). Subsequently, another Student's t-test was performed to compare posts expressing emotional content (negative or positive) and posts obtaining a zero score for the positive and negative mood variables, in other words the 6380 posts that had previously been removed from the analysis. The sub-sample containing emotional posts (6380) was obtained using the bootstrap method. The analysis showed that the emotional posts received significantly more "Likes" (t = −6.667, p. < .01), more comments (t = −2.8, p. < .01), more negative comments (t = −2.82, p. < .01), compared to neutral posts. TABLE III: Differences between Negative VS Positive posts, and Neutral Vs Emotional posts, with respect to the number of likes, number of comments, negative comment scores, positive comment scores.. The table reports the significant Student t values describing the differences between groups. All the statistics reported in table are significant at a level of p. < 0.01(∗∗). Variable t Group M SD Number of likes 1.748 Number of Comments -0.021 Negative comments scores -3.523** Positive comments scores -1.007 Negative Posts 21.30 23.02 Positive Posts 20.31 23.42 2.09 4.12 Negative Posts Positive Posts 2.09 3.70 1.25 5.79 Negative Posts 0.79 5.10 Positive Posts Negative Posts 3.05 10.39 3.78 15.79 Positive Posts Number of likes 6.667** Number of Comments -2.800** Negative comment scores -2.820** Positive comment scores -1.716 Neutral Posts Neutral Posts 15.37 23.00 Emotional Posts 17.95 20.39 1.93 4.16 Emotional Posts 2.13 3.96 0.76 4.96 Emotional Posts 1.03 5.51 2.87 12.52 Emotional Posts 3.27 13.63 Neutral Posts Neutral Posts 8 C. Tendency to the emotional coherence between post and comments After classifying all the wall posts and comments in relation to the mood, we calculated the Chi-square statistic, both for the entire sample and for each subject separately, to assess the degree of consistency between the post mood and its comments mood. We measured both a general level of empathy profiles, and a particular level of empathy for each individual profile. The general Chi-square shows a significant relationship between post mood and comments mood (Chi2 = 26.44, p. < .01). There is a tendency to mainly respond in a positive way to positive than negative posts. Nevertheless, the two posts categories elicit the same absolute number of negative comments. Thus, positive posts show lesser percentage of negative comments than negative posts because they are greater. g. Classification of the subjects on the basis of the Emotional Coherence of their Facebook profile: empathic de- tector We classified the individuals' profiles to discriminate those "more" empathetic, that is profiles for which the relationship between comments and posts appeared to be stronger (i.e. Chi-square greater). Each profile was ana- lyzed separately from the others and therefore it represented a sub-sample, and we considered all wall posts, and the associated comments. We calculated 50 values for the Chi2 statistic. The participants' profiles were assessed through the significant statistical of the parameter Chi2. It was possible to identify the most empathetic profiles (n = 8), i.e. Facebook profiles for which a statistically significant relationship between post and comment mood was found (Chi2 > or = 4). These participants were defined as subjects with highly empathetic profile. However, other profiles can be characterized also in terms of "intensity of the degree of empathy profile", on the basis of their Chi2 absolute value associated with. D. Relation between Excessive Self-presentation and Empathy profile To evaluate the relationship between the Excessive Self-presentation style and the Empathy profile, first of all, a correlation analysis was carried out among the parameters used to estimate the empathy profile of each participant (i.e. Chi2 value), with the Facebook variables, LIWC categories and Excessive Self-Presentation Model. The most significant results are the following. Regarding the Facebook variables, the participants with more empathetic profiles publish a greater number of famous quotes (r = .344, p. < .05), write longer average posts (r = .288, p. < .05) and receive a greater number of comments (r = .307, p. < .05). About the LIWC categories, the participants with more empathetic profiles use more words relate to the physical (r = .394, p. < .01), the body (r = .352, p. < .05), the sensorial processes (r = .305, p. < .05), more words associated with the possibility (r = .309, p. < .05) and more commas (r = .304, p. < .05). Finally, regarding the Excessive Self-presentation Model the participants with an excessive self-presentation elicit a higher number of empathetic comments by their Facebook friends compare to the other subjects (r = .273, p. < .05). Subsequently, a sample discretization was carried out based on the Empathetic detector representing the degree of coherence on the emotional profile analyzed (i.e. Chi2 value associated with each Facebook Profile). We defined two sub-groups respectively called "Little empathetic Profiles" and "High Empathetic Profiles". The first group was composed by the Facebook Profiles that reported a lower Chi2 score than the median of the entire sample (median = .74) while the second group was composed by Facebook profiles with higher scores. In table 4, the significant statistical tests describing the differences between the little and high empathetic profiles in relation to the followed variables are reported (e.g. Facebook variables, LIWC categories and the Excessive Self- Presentation Model). Student's t-test was conducted. About the Facebook variables, the participants with more empathetic profiles publish longer posts, more comments, more posts with comments, more personal photos, more posts, more average long posts, more complete activity, more activities with like, and more famous quotes. Concerning the LIWC categories, the participants with more empathetic profiles use more singular second person verbs, more words, more words related to physical, sensorial processes, possibility, sex, and money. These subjects utilize more present tense, singular first person pronouns, commas, conditional sentences, and less words with more than six letters. About the Excessive Self-presentation Model, the participants with more empathetic profiles report a higher score on our metric. (table IV) profile (t. = −3.324, p < .01). Moreover, the gender shows a significant effect, with the females appear as characterized by a more empathetic VI. DISCUSSION AND CONCLUSIONS Confirming the literature [7, 18], our results show that participants publish a higher average number of posts with positive emotional loading, compared to an average number of posts with negative emotional loading. Furthermore, it is confirmed that to publish negative emotional posts increases the likelihood of receiving negative comments [35, 36]. TABLE IV: Differences between High and Low Empathetic Profiles. The table reports the significant Student t values describing the differences between users with high or low empathetic Facebook profiles. All the statistics reported in table are significant at a level of p. < 0.01 (**) or p. < 0.05 (*). The values regarding the LIWC variables are frequently represented by percentages. 9 Variable t Group M SD Wall post length Comments -3.187** -3.094** Wall posts with comments -2.953** Personal photos Wall posts -2.885** -2.809** Wall post average length -2.618** Complete activity Activities with like Famous quotes -2.572* -2.570* -2.217* Singular second person verb -3.514** Word Count Physical Sensorial processes Possibility Sexual Present tense -3.301** -3.082** -2.954** -2.776** -2.628* -2.254* Word with more than six letters 2.214* Comma -2.212* Singular first person pronoun -2.146* Conditional Money -2.092* -2.049* Excessive Self-presentation Model -3.770** Low 30109 29312 High 64910 46591 Low 882 518 High 1630 1109 Low 119 196 High 206 335 Low 33 33 High 66 47 Low 293 402 High 589 767 Low 24 71 High 92 32 Low 352 472 High 623 837 Low 348 468 High 827 613 Low 80 65 High 110 125 Low 0,63 1,42 High 2,02 0,57 Low 5138 5002 High 11297 7966 0,48 Low High 0,35 0,38 Low 0,17 High 0,49 Low High 0,46 0,15 Low 0,14 High Low 1,59 High 0,90 Low 20,95 2,53 19,48 2,11 High Low 3,29 1,50 1,54 4,20 High 0,64 1,88 Low 0,80 2,32 High Low 0,58 0,28 0,23 0,74 High 0,06 0,09 Low High 0,12 0,06 Low -0,39 0,61 0,89 High 1,22 1,59 1,12 1,37 1,54 1,91 0,29 0,40 7,98 8,81 0,42 10 The research also highlights that to publish a post with emotional charge, either positive or negative, corresponds to get more likes, and comments, assuming a precise linguistic strategy for online self-presentation [7]. The general Chi- Square analysis showed a significant relationship between posts and comments mood, in particular there was a greater tendency to respond in a positive way, rather than negative, to positive posts and vice versa. The results appear to confirm the possibility of an emotional coherence through an Internet-based communication, stressing how emotional dissemination does not require face to face interaction, but can occur even during online interactions [37, 38]. To compare the subjects with an High Empathetic profile with those with a Low empathetic profile, the sample has been split in two sub-samples, depending on the median reported to the Chi square test (M edian = 0.74). Regarding the gender effect, previous studies have shown that females post more empathetic comments than males [20]. Our study partially confirms such results, showing that the females profiles appeared to be more empathetic (i.e., a stronger emotional coherence between posts and comments mood) than those of males. In the second part of our work we investigated the relations between the profile empathetic level, with the other factors of interest got into account in the present study. We found that the more empathetic profiles have a higher activity, receiving a higher number of likes for each activity. Such profiles are characterized by a greater number of wall posts, that tend to be longer and to receive more comments. The profiles with a greater empathy shown a greater number of personal photos. The linguistic and semantic analysis revealed how the more empathetic profiles use a higher number of singular first person pronouns, verbs in the singular second person, a greater number of words, and particularly more words related to sex and physical. Finally, the more empathetic profiles are characterized by a more excessive self-presentation style on SNSs. Such results seem to confirm the literature regarding the relationship between narcissism and excessive self- presentation on SNSs. Previous studies [46, 51] emphasized how the narcissistic trait is related to an intense activity on Facebook, such as connecting to many friends and publishing more wall posts and photos. In addition, another research adopting LIWC [50] found that narcissistic people published more self-promoting and sexy photos, and had a more aggressive language when singular first person pronouns were less employed. Moreover, [49] pointed out that narcissistic people used to talk more about sexual topics, while [39] underlined how narcissists may be characterized by a high degree of personal information disclosure, status and personal photos updating. The main result of our study indicates how the subjects with an excessive self-presentation style elicit a greater density of empathetic comments. In general, the individuals reporting a greater score on the Excessive Self-presentation model are those who have the more empathetic and coherent emotional profiles. In this way, our study appears to confirm how to publish emotional contents on own profile can increase the likelihood of receiving more comments and likes, fulfilling a goal of attention-seeking, as narcissistic people have. Thus, to post on the profile positive and negative emotional contents might be considered an effective way to satisfy the that need. The study has two limitations: first, the socio- demographic features of participants who belong to the same municipality. To generalize and verify the two metric models, an extension toward different countries is needed. Also, an explicit measure to assess narcissism is missing. This is partially mitigated by using a real-world Facebook dataset and taking into account six validated narcissistic models to build our Index. Noteworthy, three of such models applied LIWC to evaluate the trait. Moreover, [41] underlined the appropriateness of non-self-report measures to explore online behaviors because the linguistic analysis is objective and quantifiable behavioral data, and unlike surveys and questionnaires, it allows a free self-presentation in the users own words. Moreover, a self-report scale sometimes may encounter several difficulties (i.e. people not answering all questions, social desirability bias, etc.) [63]. Nevertheless, a confirmatory study is recommended to verify the construct validity. Unfortunately, few studies investigated the empathetic coherence between posts and received comments, which precludes to fully compare these results on literature. Further studies are suggested, to increase knowledge on linguistic strategies of online self-presentation on SNSs. The main scientific contribution of our work is the processing of new effective measures for the assessment of emotional loading on SNSs posts, using little public information. Two ICT algorithms ("Positive Mood Indicator" and "Negative Mood Indicator") were applied to evaluate such a dimension. The LIWC analysis of the posts appears to be particularly recommended and suitable to increase the reliability of the measures, as [48] suggests. The model, appearing robust even for short messages, could be used also for other SNSs, such as Twitter, Google+ both characterized by short messages, the typical style of the new web based virtual environments. Moreover, our study analyzed all posts on 50 profiles for one year, improving previous studies which attempted to merge posts contents and style [64]. ACKNOWLEDGMENTS We thank the district of Prato for giving us the opportunity to collect data during the ARCA Project. We thank the high school "Gramsci-Keynes in Prato for the support and availability for the data collection, as well as for the promotion of the research activities partially object of the present study. 11 [1] A. Bohn, C. Buchta, K. Hornik, P. Mair, Making friends and communicating on facebook: Implications for the access to social capital, Social Networks (37 ) (2014) 29–41. [2] L. Goodings, A. Locke, S. D. Brown, Social networking technology: Place and identity in mediated communities, Journal of community & applied social psychology 17 (6) (2007) 463–476. [3] L. Whittaker, A. Gillespie, Social networking sites: Mediating the self and its communities, Journal of Community & Applied Social Psychology 23 (6) (2013) 492–504. [4] E. Kanjo, A. Chamberlain, Emotions in context: examining pervasive affective sensing systems, applications, and analyses, Personal and Ubiquitous Computing 1–16. [5] E. L. Van den Broek, Ubiquitous emotion-aware computing, Personal and Ubiquitous Computing 17 (1) (2013) 53–67. [6] S. Day, Self-disclosure on facebook: How much do we really reveal?, Journal of Applied Computing and Information Technology 17 (1). [7] N. N. Bazarova, J. G. Taft, Y. H. Choi, D. Cosley, Managing impressions and relationships on facebook: Self-presentational and relational concerns revealed through the analysis of language style, Journal of Language and Social Psychology (2012) 0261927X12456384. [8] P. Niland, A. C. Lyons, I. Goodwin, F. Hutton, Friendship work on facebook: Young adults' understandings and practices of friendship, Journal of Community & Applied Social Psychology 25 (2) (2015) 123–137. [9] P. B. O'Sullivan, Masspersonal communication: Rethinking the mass interpersonal divide, in: annual meeting of the International Communication Association, New York, May, 2005. [10] N. C. Kramer, N. Haferkamp, Online self-presentation: Balancing privacy concerns and impression construction on social networking sites, in: S. Trepte, L. Reinecke (Eds.), Privacy Online, Springer, 2011, pp. 127–141. [11] C. Lampe, R. Wash, A. Velasquez, E. Ozkaya, Motivations to participate in online communities, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2010, pp. 1927–1936. [12] Z. Papacharissi, A. Mendelson, Toward a new(er) sociability: Uses, gratifications and social capital on facebook, in: Z. Papacharissi (Ed.), Media perspectives for the 21st century, Routledge, New York, 2011, pp. 211–231. [13] K. Richardson, S. Hessey, Archiving the self? facebook as biography of social and relational memory, Journal of Information, Communication and Ethics in Society 7 (1) (2009) 25–38. [14] M. R. Leary, Self-presentation: Impression management and interpersonal behavior., Brown & Benchmark Publishers, 1995. [15] M. R. Leary, R. M. Kowalski, Impression management: A literature review and two-component model., Psychological bulletin 107 (1) (1990) 34. [16] B. Hogan, The presentation of self in the age of social media: Distinguishing performances and exhibitions online, Bulletin of Science, Technology & Society (2010) 0270467610385893. [17] A. Garas, D. Garcia, M. Skowron, F. Schweitzer, Emotional persistence in online chatting communities, Scientific Reports 2. [18] Y. Hu, J. Zhao, J. Wu, Emoticon-based ambivalent expression: A hidden indicator for unusual behaviors in weibo, arXiv preprint arXiv:1505.01723. [19] U. Dimberg, M. Thunberg, Empathy, emotional contagion, and rapid facial reactions to angry and happy facial expressions, PsyCh Journal 1 (2) (2012) 118–127. [20] J. Preece, K. Ghozati, Observations and explorations of empathy online, in: R. E. Rice, J. E. Katz (Eds.), The Internet and Health Communication: Experience and Expectations, Sage Publications Inc., Thousand Oaks, 2001, pp. 237–260. [21] U. Pfeil, P. Zaphiris, Patterns of empathy in online communication, in: Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, 2007, pp. 919–928. [22] J. Feng, J. Lazar, J. Preece, Empathy and online interpersonal trust: A fragile relationship, Behaviour & Information Technology 23 (2) (2004) 97–106. [23] E. J. Lawrence, P. Shaw, D. Baker, S. Baron-Cohen, A. S. David, Measuring empathy: reliability and validity of the empathy quotient, Psychological medicine 34 (05) (2004) 911–920. [24] S. Baron-Cohen, S. Wheelwright, The empathy quotient: an investigation of adults with asperger syndrome or high functioning autism, and normal sex differences, Journal of autism and developmental disorders 34 (2) (2004) 163–175. [25] N. Eisenberg, B. C. Murphy, S. Shepard, The development of empathic accuracy, Empathic accuracy (1997) 73–116. [26] J. Venkatanathan, E. Karapanos, V. Kostakos, J. Gon¸calves, A network science approach to modelling and predicting empathy, in: Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on, IEEE, 2013, pp. 1395–1400. [27] N. Eisenberg, Emotion, regulation, and moral development, Annual review of psychology 51 (1) (2000) 665–697. [28] P. A. Miller, M. A. J. op de Haar, Emotional, cognitive, behavioral, and temperament characteristics of high-empathy children, Motivation and Emotion 21 (1) (1997) 109–125. [29] L. C. Findlay, A. Girardi, R. J. Coplan, Links between empathy, social behavior, and social understanding in early childhood, Early Childhood Research Quarterly 21 (3) (2006) 347–359. 12 [30] K. B. Wright, The communication of social support within an on-line community for older adults: A qualitative analysis of the seniornet community, Qualitative Research Reports in Communication 1 (2) (2000) 33–43. [31] C. D. Batson, The altruism question: Toward a social-psychological answer, Psychology Press, 2014. [32] M. J. Culnan, M. L. Markus, Information technologies., in: L. L. Putnam, K. H. Roberts, L. W. Porter (Eds.), Handbook of organizational communication: An interdisciplinary perspective, Sage Publications, Inc, 1987, pp. 420–443. [33] A. Cini, A. Guazzini, Human virtual communities: affinity and communication dynamics, Advanced in complex science 16 (7) (2013) 1350034–1–1350034–24. [34] A. I. Alberici, P. Milesi, The influence of the internet on the psychosocial predictors of collective action, Journal of Community & Applied Social Psychology 23 (5) (2013) 373–388. [35] J. T. Hancock, K. Gee, K. Ciaccio, J. M. H. Lin, I'm sad you're sad: emotional contagion in cmc, in: Proceedings of the 2008 ACM conference on Computer supported cooperative work, ACM, 2008, pp. 295–298. [36] J. Guillory, J. Spiegel, M. Drislane, B. Weiss, W. Donner, J. Hancock, Upset now?: emotion contagion in distributed groups, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2011, pp. 745–748. [37] A. D. I. Kramer, The spread of emotion via facebook, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2012, pp. 767–770. [38] A. D. I. Kramer, J. E. Guillory, J. T. Hancock, Experimental evidence of massive-scale emotional contagion through social networks, Proceedings of the National Academy of Sciences (2014) 201320040. [39] S. M. Bergman, M. E. Fearrington, S. W. Davenport, J. Z. Bergman, Millennials, narcissism, and social networking: What narcissists do on social networking sites and why, Personality and Individual Differences 50 (5) (2011) 706–711. [40] C. J. Carpenter, Narcissism on facebook: Self-promotional and anti-social behavior, Personality and individual differences 52 (4) (2012) 482–486. [41] F. grosse Deters, M. R. Mehl, M. Eid, Narcissistic power poster? on the relationship between narcissism and status updating activity on facebook, Journal of Research in Personality 53 (2014) 165–174. [42] L. D. Rosen, K. Whaling, S. Rab, L. M. Carrier, N. A. Cheever, Is facebook creating idisorders? the link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety, Computers in Human Behavior 29 (3) (2013) 1243–1254. [43] W. K. Campbell, J. D. Foster, C. Sedikides, S. J. Spencer, The narcissistic self: Background, an extended agency model, and ongoing controversies, The self (2007) 115–138. [44] S. Mehdizadeh, Self-presentation 2.0: Narcissism and self-esteem on facebook, Cyberpsychology, Behavior, and Social Networking 13 (4) (2010) 357–364. [45] S. Vazire, L. P. Naumann, P. J. Rentfrow, S. D. Gosling, Portrait of a narcissist: Manifestations of narcissism in physical appearance, Journal of Research in Personality 42 (6) (2008) 1439–1447. [46] L. E. Buffardi, W. K. Campbell, Narcissism and social networking web sites, Personality and social psychology bulletin 34 (10) (2008) 1303–1314. [47] T. Ryan, S. Xenos, Who uses facebook? an investigation into the relationship between the big five, shyness, narcissism, loneliness, and facebook usage, Computers in Human Behavior 27 (5) (2011) 1658–1664. [48] E. T. Panek, Y. Nardis, S. Konrath, Mirror or megaphone?: How relationships between narcissism and social networking site use differ on facebook and twitter, Computers in Human Behavior 29 (5) (2013) 2004–2012. [49] N. S. Holtzman, S. Vazire, M. R. Mehl, Sounds like a narcissist: Behavioral manifestations of narcissism in everyday life, Journal of Research in Personality 44 (4) (2010) 478–484. [50] N. C. DeWall, L. E. Buffardi, I. Bonser, W. Keith Campbell, Narcissism and implicit attention seeking: Evidence from linguistic analyses of social networking and online presentation, Personality and Individual Differences 51 (1) (2011) 57–62. [51] E. Y. L. Ong, R. P. Ang, J. C. M. Ho, J. C. Y. Lim, D. H. Goh, C. S. Lee, A. Y. K. Chua, Narcissism, extraversion and adolescents self-presentation on facebook, Personality and Individual Differences 50 (2) (2011) 180–185. [52] S. Winter, G. Neubaum, S. C. Eimler, V. Gordon, J. Theil, J. Herrmann, J. Meinert, N. C. Kramer, Another brick in the facebook wall–how personality traits relate to the content of status updates, Computers in Human Behavior 34 (2014) 194–202. [53] S. Gountas, J. Gountas, Exploring the association between social media, narcissism, empathy, the desire for fameand well-being, in: Australian and New Zealand Marketing Academy (ANZMAC) Conference, 2011. [54] S. H. Konrath, E. H. O'Brien, C. Hsing, Changes in dispositional empathy in american college students over time: A meta-analysis, Personality and Social Psychology Review. [55] D. M. Buss, L. M. Chiodo, Narcissistic acts in everyday life, Journal of personality 59 (2) (1991) 179–215. [56] J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, R. J. Booth, The development and psychometric properties of liwc2007, Austin, TX, LIWC. Net. [57] Z. Jord´an-Conde, B. Mennecke, A. Townsend, Late adolescent identity definition and intimate disclosure on facebook, Computers in Human Behavior 33 (2014) 356–366. [58] X. Hu, J. Tang, H. Gao, H. Liu, Unsupervised sentiment analysis with emotional signals, in: Proceedings of the 22nd international conference on World Wide Web, International World Wide Web Conferences Steering Committee, 2013, pp. 607–618. [59] X. Hu, L. Tang, J. Tang, H. Liu, Exploiting social relations for sentiment analysis in microblogging, in: Proceedings of the sixth ACM international conference on Web search and data mining, ACM, 2013, pp. 537–546. [60] C. Tan, L. Lee, J. Tang, L. Jiang, M. Zhou, P. Li, User-level sentiment analysis incorporating social networks, in: Pro- ceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2011, pp. 1397–1405. [61] Y. R. Tausczik, J. W. Pennebaker, The psychological meaning of words: Liwc and computerized text analysis methods, Journal of language and social psychology 29 (1) (2010) 24–54. [62] A. Guazzini, C. Cecchini, E. Guidi, M. Milani, The narcissism map on facebook: one-year of analysis on posting online (2016). [63] H. A. Schwartz, J. C. Eichstaedt, M. L. Kern, L. Dziurzynski, S. M. Ramones, M. Agrawal, A. Shah, M. Kosinski, D. Stillwell, M. E. Seligman, et al., Personality, gender, and age in the language of social media: The open-vocabulary approach, PloS one 8 (9) (2013) e73791. [64] C. T. Carr, D. B. Schrok, P. Dauterman, Speech acts within facebook status messages, Journal of Language and Social Psychology (2012) 0261927X12438535. 13
1712.02926
1
1712
2017-12-08T03:15:58
Online Red Packets: A Large-scale Empirical Study of Gift Giving on WeChat
[ "cs.SI", "cs.CY", "cs.HC", "cs.MM", "econ.EM" ]
Gift giving is a ubiquitous social phenomenon, and red packets have been used as monetary gifts in Asian countries for thousands of years. In recent years, online red packets have become widespread in China through the WeChat platform. Exploiting a unique dataset consisting of 61 million group red packets and seven million users, we conduct a large-scale, data-driven study to understand the spread of red packets and the effect of red packets on group activity. We find that the cash flows between provinces are largely consistent with provincial GDP rankings, e.g., red packets are sent from users in the south to those in the north. By distinguishing spontaneous from reciprocal red packets, we reveal the behavioral patterns in sending red packets: males, seniors, and people with more in-group friends are more inclined to spontaneously send red packets, while red packets from females, youths, and people with less in-group friends are more reciprocal. Furthermore, we use propensity score matching to study the external effects of red packets on group dynamics. We show that red packets increase group participation and strengthen in-group relationships, which partly explain the benefits and motivations for sending red packets.
cs.SI
cs
Online Red Packets: A Large-scale Empirical Study of Gift Giving on WeChat Yuan Yuan∗, Tracy Xiao Liu†, Chenhao Tan‡, and Jie Tang§ December 11, 2017 Abstract Gift giving is a ubiquitous social phenomenon, and red packets have been used as monetary gifts in Asian countries for thousands of years. In recent years, online red packets have become widespread in China through the WeChat platform. Exploiting a unique dataset consisting of 61 million group red packets and seven million users, we conduct a large-scale, data-driven study to understand the spread of red packets and the effect of red packets on group activity. We find that the cash flows between provinces are largely consistent with provincial GDP rankings, e.g., red packets are sent from users in the south to those in the north. By distinguishing spontaneous from reciprocal red packets, we reveal the behavioral patterns in sending red packets: males, seniors, and people with more in-group friends are more inclined to sponta- neously send red packets, while red packets from females, youths, and people with less in-group friends are more reciprocal. Furthermore, we use propensity score match- ing to study the external effects of red packets on group dynamics. We show that red packets increase group participation and strengthen in-group relationships, which partly explain the benefits and motivations for sending red packets. 1 Introduction Online red packet (formerly called "Lucky Money" or "Red Envelopes") was first released in 2014 as a new feature on WeChat, the largest social messaging platform in China. This feature enables people to send red packets to individual friends individually or randomly split a red packet among a limited number of people in a group on a first-come, first-serve basis. WeChat red packets have become viral since 2015: there were over 100 million participants during the 2016 Mid-autumn Festival alone, and the number of red packets sent over WeChat on Lunar New Year's Eve 2017 was 14.2 billion. Now, to facilitate paricipation by users overseas, it is possible for someone to send red packets by linking her PayPal account to WeChat. 1 The red packet phenomenon is an instance of gift giving, which is a pervasive behavior in human society that ranges from giving Christmas gifts to purchasing from a wedding ∗Institute for Data, Systems, and Society, Massachusetts Institute of Technology, Cambridge, MA, †Department of Economics, School of Economics and Management, Tsinghua University, Beijing, China, ‡Department of Computer Science, University of Colorado, Boulder, CO, USA, 80309. chen- USA, 02139. [email protected]. 100084. [email protected]. [email protected]. [email protected]. Economist 1The §Department of Computer Science and Technology, Tsinghua University, Beijing, China, 100084. ji- (https://www.economist.com/news/business/21703428-chinas-wechat-shows-way-social-medias-future- wechats-world). offers an introduction to WeChat and red packets 1 registry [10, 20, 28, 8, 1, 27, 5]. However, gift giving is governed almost entirely by unwrit- ten rules. Such unwritten rules have attracted interest from a wide range of disciplines, including anthropology, economics, sociology, psychology, and marketing [10, 20, 28, 8, 5]. Findings indicate that the motivations for gift giving include altruism [3, 23], reciprocity [16, 17], and many other factors such as prestige [14], empathy [7], etc. For example, the red packets between friends are mainly reciprocal and it is considered as "Renqing (favor)" in Chinese culture [9]. By contrast, sending red packets among family members is expected to enhance family bonds is usually considered non-reciprocal. Our contribution to the literature is twofold. First, we study a new type of online red packets, the "group red packet". In contrast with traditional red packets exchanged among family members and friends, this feature allows individuals to send red packets to a group of people by randomly splitting a red packet among a limited, user-determined number of people on a first-come, first-served basis. Moreover, online platforms provide a convenient and informal channel for gift giving, which may bring fundamental changes to the age-old practice of gift giving. Second, most studies in the literature use small samples, including studies of online gifts [30, 29]. To the best of our knowledge, this is the first study to quantitatively analyze gift exchange using a dataset on millions of users. In addition, considering a different setting than the fruitful existing empirical works focusing on the West [3, 18, 22, 23, 13, 26, 21, 2, 15, 6, 16, 17, 32, 12, 25, 11], our study includes a large sample of the population in contemporary China and sheds light on gift giving in a representative Eastern country. In this paper, we study this new type of gift giving behavior in three respects. First, we provide an overview of the cash flow patterns among users with different demographic and geographic backgrounds. If gift exchanges were completely reciprocal, the cash flows among users from different groups would be approximately zero. However, our results reveal intriguing patterns among different demographic and geographic groups. For ex- ample, we find that users from southern provinces are inclined to export cash to their northern counterparts. Second, we study how demographic factors such as gender and age relate to sending red packets. In particular, to distinguish the motivations for sending red packets (altruism vs. reciprocity), we define spontaneous and reciprocal red packets and identify their corresponding distinctive patterns. We find that males, older people, southerners, and people with more friends in the group tend to send more spontaneous red packets, e.g., they are more likely to be the first one to send a red packet in a group, while red packets from females, younger people, northerners, and people with more friends in the group are more reciprocal. These differences can be explained by many aspects of Chinese culture, including "mianzi", i.e. the Chinese cultural value of interpersonal dignity or prestige. Finally, we examine the casual effect of online red packets on group dynamics. Applying propensity score matching to data on approximately seven million red packets, we conduct a quasi-experiment to study the causal effects of the cash amount in red packets. We show that increasing the amount of money in red packets can stimulate reciprocal red packets and, consequently, increase the total amount of red packets sent by members of a group. We also find that increasing the amount of money in red packets can provide the senders with new friends. Based on these findings, we shed light on the benefits of online group red packets for both senders and all group members and improve our understanding of the motivation for sending red packets. 2 Figure 1: The net cash flows between provinces in Mainland China (a: upper left); the cash flow for Heilongjiang Province (b: upper right); Guangdong Province (c: lower left); and Beijing Municipality (d: lower right). Each curve represents a net cash flow from the province at the origin of the line to the province at the arrow, and its darkness represents the size of net cash flow. 2 Results 2.1 Macro Cash Flow Patterns We measure the directions of cash flows between users with different demographics. In particular, we are interested in examining whether, on net, the group red packets are sent from those from more-developed provinces to those from less-developed provinces. Figure 1 (a) presents the net cash flow in Mainland China.2 First, we observe more net cash flow from the east coast to the west, or from the south to the north. This suggests that the direction of the cash flow might be significantly affected by the GDP in a region. Second, the magnitude of cash flow varies and the largest cash flow is from Guangdong to Hunan. We conjecture that this is driven by the large number of migrants from Hunan to Guangdong. Furthermore, we are interested in understanding the relationship between the mag- nitude of cash flows and the geographic distance between two regions. We selected (1) Beijing, which is the capital of China and a municipality in the north with a large number of migrants, (2) Heilongjiang, which is a province in the northeast that has been experienc- ing significant economic difficulties and labor force outflows, and (3) Guangdong, which is the province with the highest GDP, population, and number of migrants. We find that the net cash flows from Heilongjiang to other provinces are almost always negative and the figures from Guangdong to other regions are almost always positive. Furthermore, the cash flows for both provinces are mainly with neighboring regions, and geographic distance tends to have a negative impact on the level of cash flows. In contrast, 2For easy visualization, we filter pairs of provinces where the total cash flow is under 1,000 RMB in the dataset. 3 we do not find a consistent direction of cash flows for Beijing. On the one hand, the average standard of living in Beijing is higher than in most other provinces, leading to substantial cash flows out of this region; on the other hand, there are millions of college students in Beijing, and this may lead to large cash flows into the region. The cash flows between two arbitrary provinces and the net amount of incoming cash for each province are presented in SI. To validate the aforementioned factors affecting the interprovincial cash flows, we predict the net cash flow between two provinces by the differences in GDP and GDP per capita (PPP) and the distance between their capitals. We find that a one-thousand-RMB increase in the difference in PPP is associated with a 9.02 increase in the net cash flow (p < 0.01), while a one-kilometer increase in distance is associated with a 0.57 decrease in the net cash flow (p < 0.01), while the results for GDP are not significant. The difference in PPP measures the difference in standards of living between provinces, and these results indicate that it is more likely to see a net cash flow from a more-developed to a less- developed province. We explain the effect of the distance by simple geographic proximity: nearby provinces have more interactions and migration between them. Additionally, we also examine the overall cash flows between people of different ages and find that, generally, the net cash flow is from older to younger people. This is consistent with social norms in China, i.e., older people give red packets to younger people, especially to children and the unmarried. In terms of gender, we find that, in general, the direction of the net cash flow is from males to females. Comparing four types of cash flow (male to male, male to female, female to male, and female to female), we find that male to male represents the largest proportion (36%). Details on cash flows among age and gender groups are stated in SI. 2.2 Demographic Factors and Gift Giving In addition to overall cash flows, we examine the motivation for sending red packets by distinguishing two types of red packets and the effect of different factors on the likelihood of sending red packets. Reciprocity is considered an important motive for gift giving[17]. We distinguish a particular type of red packets: reciprocal red packets. If a person receives a red packet and then quickly sends a new red packet, we consider the new red packet to be reciprocal. We also define spontaneous red packets, which are initiated without the sender having recently received a red packet, and thus, these are unlikely to be triggered by reciprocity. The formal definitions are as follows: • Reciprocal red packets. We define a reciprocal red packet based on the following three criteria. (1) The time interval between this red packet and the prior packet is no more than 600 seconds; (2) before sending this red packet, the sender had received a red packet in the previous 600 seconds; (3) the two consecutive packets are not sent by the same person. In other words, if we observe someone receiving a red packet from another group member in a short period and sending a red packet to the same WeChat group, it is likely that she is motivated by reciprocity. • Spontaneous red packets. If the time interval between a red packet and the prior red packet is more than 24 hours, we consider it to be a spontaneous red packet. It is very unlikely that users send such red packets to express reciprocity, and one possible motivation for sending them is to promote group communication. We define propensity to send given feature F (see Methods). Fig. 2 presents the average propensity score for key features across all groups. We then define the relative propensity to send each particular type of red packets given a feature F. Specifically, we subtract the 4 Figure 2: Propensity to send given (a) gender (b) age (c) degree (d) location. We define three groups: high-d (people with in-group degree that is no less than the second tertile), low-d (people with in-group degree that is no more than the first tertile) and mid-d (the rest). Group-level SEs are shown as blacks ticks on the tops/bottoms of the bars. Figure 3: Relative Propensity to send spontaneous/reciprocal red packets given (a) gender, (b) age, (c) degree, and (d) location. We define three groups: high-d (people with in-group degree that is no less than the second tertile), low-d (people with in-group degree that is no more than the first tertile) and mid-d (the rest). Group-level SEs are shown as blacks ticks on the tops/bottoms of the bars. propensity to send any red packet from the propensity to send a spontaneous/reciprocal red packet. The results are shown in Fig. 3. Details of definition of the variables can be found in SI. We have the following observations based on Figures 2 and 3. Please refer to SI for the definition of related variables. • Gender: In general, men are more likely to send red packets than women. More importantly, this gender difference is stronger for spontaneous red packets. This suggests that the motivation for sending red packets differs across genders, i.e., men are more likely to initiate sending behavior rather than reciprocate others' red packets. • Age: Users between 30 and 40 years of age are the most likely to send red packets, especially spontaneous ones. Users less than 30 years of age are less likely to send red packets, and their red packets are more likely to be reciprocal. Users over 40 years of age are less active due to their underrepresentation and overall inactivity on WeChat. • In-group degree: A group member of high degree (a proxy of in-group status) is more likely to send a red packet. However, they are less likely to send reciprocal red packets. One explanation is that she might be the creator of a group and tend to initiate red packets more often than others. Also, high-status people may be concerned more with their prestige and thus are more willing to spontaneously reward other group members instead of following others. 5 malefemalen/a-0.06-0.04-0.020.00.020.040.06propensitytosendage1age2age3age4-0.04-0.020.00.020.04highmiddlelow-0.6-0.4-0.20.00.20.40.6northsouthother-0.04-0.020.00.020.04SponReci-0.06-0.04-0.020.00.020.040.06propensitytosend(allasbaseline)malefemalen/aSponReci-0.06-0.04-0.020.00.020.040.06age1age2age3age4SponReci-0.6-0.4-0.20.00.20.40.6highmiddlelowSponReci-0.04-0.020.00.020.04northsouthother • Location. Consistent to results in cash flow, southerners are more likely to send red packets, and this holds for both two types of red packets. We have similar analysis on receivers, which can be found in SI. 2.3 Effects of Red Packets on Social Groups Although reciprocity is a widely accepted motivation for gift-giving, it cannot explain the motivations for all red packets. For example, sending a spontaneous red packet is unlikely to be driven by pure reciprocity. herefore, in this section, we attempt to measure the causal effect of spontaneous red packets on the group, as well as the red packet's sender, by applying propensity score matching to examine the possible benefit that red packets bring to groups. Since it is difficult to conduct counter-factual analysis such as "what if this red packet had not been sent", we choose to match and compare the spontaneous red packets with large amounts of money compared to those with small amounts of money. Doing so allows us to determine whether a marginal increase in the money in a red packet can have significant impacts on group activities. Therefore, our treatment dummy is coded as one when the cash amount of a spontaneous red packet ≥ 100 RMB.3, zero otherwise. In total, we have 54,150 red packets in the treatment group and 6,133,489 in the control group. Table 1 reports the regression results. We also control for the number of splits allowed for each red packet (RPnum), and group fixed effects, including at the individual and seasonal levels. We define a session as a sequence of red packets in a group where the interval between two consecutive red packets is shorter than τ. τ = 30min, and we examine the effect of spontaneous red packets on the session. The dependent variables are (1) the total amount of money available to following users in this session (session money); (2) the number of following users who send red packets in the session (number of following senders, or #FS); (3) the number of following red packets in the session (#FRP); and (4) the number of new in-group friends that the sender has within 1 day after a spontaneous red packet is sent (#Senders' new friends). Compared to prior studies that match on individual-level data [4], we further utilize group features, e.g., the size of the group, and seasonality features, e.g., whether the red packet is sent during the spring festival, to understand the causal effect of the amount of cash in red packets. All 54,150 treatment observations are successfully matched. The stan- dardized differences of all covariates are below 0.1, which indicates insignificant imbalance between the treatment and control groups [24]. First, compared to small red packets, on average, large red packets have 0.295 more group members following and generate 0.415 more following red packets (Columns 1 and 2). Additionally, red packets sent on special days, such as festivals and weekends, generate more following users and following red packets. Interestingly, those sent by female users and by people with lower in-group degree also have more following users and more following red packets. Second, we examine the impact on the following session money (Column 3). We find that a large red packet, on average, increases 52.632 RMB in session money. This indicates that a large cash amount may significantly benefit other group members. Therefore, they might be more likely to reciprocate by sending red packets to the group. Finally, we analyze the number of new friends that a group member garners by sending a large amount of red packets. On average, a large amount of red packets attracts 0.009 new friends to the sender. This indicates that red packets can help senders to attract new friends. 3We also used other thresholds, i.e., 50 and 150 RMB, and find consistent results. 6 Table 1: Determinants of Group Activities #Follower #FRP Session Money #Sender's New Frds Dependent variable: treatment (large amount) is festival is weekday RPnum female degree group size (1) 0.295∗∗∗ (0.010) 0.185∗∗∗ (0.025) −0.094∗∗∗ (0.011) 0.006∗∗∗ (0.0004) 0.089∗∗∗ (0.013) −0.145∗∗∗ (0.028) 0.0004∗∗∗ (0.0001) (2.349) Y Y Y (2) 0.415∗∗∗ (0.024) 0.224∗∗∗ (0.057) −0.078∗∗∗ (0.025) 0.006∗∗∗ (0.001) 0.119∗∗∗ (0.029) −0.388∗∗∗ (0.065) 0.002∗∗∗ (0.0002) (5.396) Y Y Y (3) 52.632∗∗∗ (1.490) 6.479∗ (3.625) −4.862∗∗∗ (1.602) 0.218∗∗∗ (0.055) 9.683∗∗∗ (1.815) −12.416∗∗∗ (4.111) 0.015 (0.012) (340.545) (4) 0.009∗∗∗ (0.003) −0.006 (0.008) −0.002 (0.003) 0.0003∗∗∗ (0.0001) 0.002 (0.004) −0.039∗∗∗ (0.009) 0.001∗∗∗ (0.00002) (0.716) Y Y Y 108,300 0.051 group fixed effect individual fixed effect seasonal effect Observations R2 ∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01 Group/individual/seasonal effects refer to all control variables not listed above. 108,300 0.019 108,300 0.036 Y Y Y 108,300 0.016 3 Discussion In summary, we have presented the macro- and micro-level patterns in red packet sending and discussed the motivations for and benefits of sending red packets. Studying the interprovincial cash flows improves our understanding of human mobil- ity. The patterns that we found are consistent with a gravity model: the interactions between two areas, for example in the form of immigration and trade, are proportional to the "masses" in these two areas (population, economic development) and inversely pro- portional to the distance between them[19]; similarly, cash flows between provinces are dependent on both living standards (PPP) and distance. We conjecture that the trends could be driven by immigration: people move to nearby and more developed provinces and maintain their social bonds with families and friends in their hometowns. Our micro-level results add new dimensions to our understanding of gift giving. For example, we find that men are generally more inclined to send red packets and that red packets from women are more likely to be reciprocal than spontaneous. Most existing studies on gender differences in gift exchange, especially in charitable giving, state that women are more likely to donate to more charities [18, 3, 22]. However, in the context of group red packets, men are more likely to send red packets. Rather than pure altruism, we conjecture that income inequality and a desire for prestige account for this gender difference. Although it has decreased, the gender income gap persists in China [33], which limits the budget available to females to reward others. Another account is the desire for prestige, or "mianzi" in Chinese culture. Findings indicate that men are more inclined to seek status than women [31], and sending red packets, especially spontaneous red packets, provides a way to demonstrate one's generosity and wealth. The results of differences in reciprocal and spontaneous red packets and casual effects of spontaneous red packets explain the motivations of sending red packets, and furthermore, reasons why online red packets has spread rapidly in China. We find that the increased rewards (amount of money) spontaneous red packets of increased rewards (amount of money) to a group can significant stimulate other group members to send follow-up red 7 packets. Ultimately, spontaneous red packets generate rewards for group that exceed the packets' initial values. The explanation for this increase is likely reciprocity, that is, others have received money and feel obliged to send money in turn. Moreover, motivations of the spontaneous senders who tend to be senior or people with high in-group degree can be explained by the aforementioned benefits of sending red packets. However, our work does suffer from limitations. First, despite the large sample size, our dataset is unable to represent the entire population of China. Although 65% people in China use WeChat, users who are active in red packets are biased toward young and middle-aged people. Moreover, we filtered out inactive groups and suspiciously highly active groups, which may also have influenced our results. Second, gender, age, location, and status differences can be confounded by unobserved factors such as income. However, because of privacy issues, we were unable to collect such information. Therefore, we are not arguing for causal effects of, for example, gender or age. Third, although we explored the motivations for sending red packets by examining the causal effects of spontaneous red packets, we do not have a comprehensive understanding of the true motivations of such sending behavior, although we propose that reciprocity and the beneficial effects on group activities could be two main reasons. There are many promising directions for future research. For example, if we were to collect data from all message groups to which an individual belongs, we could explore her strategies for allocating money across the groups. In addition, we could also study how red packets are spread across all WeChat groups and which groups are responsible for the rapid adoption of red packets. 4 Methods 4.1 Data Description We first randomly sample one million WeChat groups in which at least one group red packet was sent between October 1, 2015, and February 29, 2016. To avoid the problem of data sparsity, we exclude groups with fewer than η red packets. We further exclude extremely active groups with more than τ red packets as a group that have extremely large amounts of money in the red packets, as these might be used for online gambling, and incorporating these groups might significantly bias our results. Specifically, we empirically set η = 3 × m and τ = 50 × m, where m is the group size. In total, this selection process leaves us with 367,361 groups with 7,816,214 group members (7,380,110 unique users). We combine three datasets for our statistical analyses, including (1) the characteristics of 367,361 WeChat groups, e.g., the number of members, total number of red packets and the total value of the red packets; (2) the characteristics of the 7,380,110 unique users in these WeChat groups, e.g., demographic variables, the number of friends and the number of WeChats that they join; and (3) propensities for red packets, such as the cash amount and the number of recipients of a particular red packet. In total, 61,501,862 red packets were sent in these WeChat groups, generating 218,301,860 recipients. During this five-month period, the average number of red packets sent in a group is 172.88 and the average amount of money exchanged in a group is 995.78 RMB (approxi- mately 146 USD). All details on the data and summary statistics of the variables can be found in the Data section of the SI. 4.2 Propensity to Send We define a group g ∈ G, where Rg represents number of red packets sent in group g. Among all group members (potential senders), there are NF group members with the feature in question and N ¯F without it. Among all red packets in that group, we can 8 compute the frequency of red packets sent by people with feature F, TF , and without as the propensity to feature F, T ¯F . Then, for each group, we compute send given feature F in this group. − NF NF +N ¯F TF TF +T ¯F 4.3 Covariates in Matching To eliminate the influence of other factors, we extract various features for matching. For the group features (group-level fixed effect), we have the size of the group, density of the group network at the time red packet is sent, gender ratio, age entropy, and province entropy. For the sender features (individual-level fixed effect), we have the gender, age, location of the city (latitude and longitude), the number of WeChat friends the individual has (activity_1), the number of WeChat groups to which the individual belongs (activ- ity_2), and the degree ratio (degree/(member count − 1)). For the seasonal features, we have whether it is during a festival (such as the spring festival period, New Year's Day, and Christmas), whether it is weekday, the period of a given day (we divide one day into six equal periods, as an integer; empirically, a higher number indicates a higher probability to send more and larger red packets), and the UNIX time stamp of the sent red packet (how many seconds from January 1, 1970, sendtime). Additionally, we have the number of parts into which the red packet was divided (RPnum). Imposing such controls can help to exclude the trivial statements such as "during festivals, people are more likely to send big red packets when people are also very active on WeChat to send red packets". References [1] George A Akerlof. Gift exchange and efficiency-wage theory: Four views. The Amer- ican Economic Review, 74(2):79–83, 1984. [2] Paul R Amato. Family processes in one-parent, stepparent, and intact families: The child's point of view. Journal of Marriage and the Family, pages 327–337, 1987. [3] James Andreoni, Eleanor Brown, and Isaac Rischall. Charitable giving by married couples who decides and why does it matter? Journal of human Resources, 38(1):111– 133, 2003. [4] Sinan Aral, Lev Muchnik, and Arun Sundararajan. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51):21544–21549, 2009. [5] Neeli Bendapudi, Surendra Singh, and Venkat Bendapudi. Enhancing helping be- havior: An integrative framework for promotion planning. Journal of Marketing, 60:33–49, 1996. [6] Joyce Berg, John Dickhaut, and Kevin McCabe. Trust, reciprocity, and social history. Games and economic behavior, 10(1):122–142, 1995. [7] Seymour M Berger. Conditioning through vicarious instigation. Psychological review, 69(5):450, 1962. [8] Theodore Caplow. Rule enforcement without visible means: Christmas gift giving in Middletown. American journal of sociology, pages 1306–1323, 1984. [9] Allan KK Chan, Luther Denton, and Alex SL Tsang. The art of gift giving in china. Business Horizons, 46(4):47–52, 2003. [10] David Cheal. The gift economy, volume 4. Routledge, 2015. 9 [11] Armin Falk. Gift exchange in the field. Econometrica, 75(5):1501–1511, 2007. [12] Uri Gneezy and John A List. Putting behavioral economics to work: Testing for gift exchange in labor markets using field experiments. Econometrica, 74(5):1365–1384, 2006. [13] Daniel F Hansler and DL Riggin. Geo-demographics: Targeting the market. Fund Raising Management, 20(10):35–43, 1989. [14] William T Harbaugh. What do donations buy?: A model of philanthropy based on prestige and warm glow. Journal of Public Economics, 67(2):269–284, 1998. [15] Andrew Jones and John Posnett. Charitable donations by uk households: evidence from the family expenditure survey. Applied Economics, 23(2):343–351, 1991. [16] Aafke Komter and Wilma Vollebergh. Gift giving and the emotional significance of family and friends. Journal of Marriage and the Family, 59(3):747–757, 1997. [17] Aafke Elisabeth Komter. Reciprocity as a principle of exclusion: Gift giving in the netherlands. Sociology, 30(2):299–316, 1996. [18] Rita Kottasz. Differences in the donor behavior characteristics of young affluent males and females: Empirical evidence from britain. Voluntas: International Journal of Voluntary and Nonprofit Organizations, 15(2):181–203, 2004. [19] Joshua J Lewer and Hendrik Van den Berg. A gravity model of immigration. Eco- nomics letters, 99(1):164–167, 2008. [20] Marcel Mauss and Wilfred Douglas Halls. The gift: The form and reason for exchange in archaic societies. WW Norton & Company, 2000. [21] P Mears. Understanding strong donors. Fund raising management, 23(2):45–6, 1992. [22] Debra J Mesch, Melissa S Brown, Zachary I Moore, and Amir Daniel Hayat. Gender International Journal of Nonprofit and Voluntary differences in charitable giving. Sector Marketing, 16(4):342–355, 2011. [23] Elizabeth Midlarsky and Mary E Hannah. The generous elderly: naturalistic studies of donations across the life span. Psychology and aging, 4(3):346, 1989. [24] Sharon-Lise T Normand, Mary Beth Landrum, Edward Guadagnoli, John Z Aya- nian, Thomas J Ryan, Paul D Cleary, and Barbara J McNeil. Validating recom- mendations for coronary angiography following acute myocardial infarction in the elderly: a matched analysis using propensity scores. Journal of clinical epidemiology, 54(4):387–398, 2001. [25] Gabriele Plickert, Rochelle R Cote, and Barry Wellman. It's not who you know, it's how you know them: Who exchanges what with whom? Social networks, 29(3):405– 429, 2007. [26] Alan Radley and Marie Kennedy. Charitable giving by individuals: A study of atti- tudes and practice. Human relations, 48(6):685–709, 1995. [27] Barry Schwartz. The social psychology of the gift. American Journal of Sociology, 73(1):1–11, 1967. [28] John F Sherry. Gift giving in anthropological perspective. Journal of consumer research, 10(2):157–168, 1983. 10 [29] Emmi Suhonen, Airi Lampinen, Coye Cheshire, and Judd Antin. Everyday favors: a case study of a local online gift exchange system. In Proceedings of the 16th ACM international conference on Supporting group work, pages 11–20. ACM, 2010. [30] Alex S Taylor and Richard Harper. Age-old practices in the'new world': a study In Proceedings of the SIGCHI of gift-giving between teenage mobile phone users. conference on Human factors in computing systems, pages 439–446. ACM, 2002. [31] Christopher Von Rueden, Michael Gurven, and Hillard Kaplan. Why do men seek status? fitness payoffs to dominance and prestige. Proceedings of the Royal Society of London B: Biological Sciences, page rspb20102145, 2010. [32] Hui Wang and Sherman D Hanna. Does risk tolerance decrease with age? Financial Counseling and Planning, 8(2):27–32, 1997. [33] Lin Xiu and Morley Gunderson. Gender earnings differences in china: base pay, performance pay, and total pay. Contemporary economic policy, 31(1):235–254, 2013. 11 (a) (b) (c) (d) Figure 4: An example of sending and receiving group a red packet. Four steps are listed. The first two are seen by the sender, and the following two are seen by group members who successfully receive the red packets. Appendices A Background Comparable to the popularity of non-cash gift-giving in Western culture, Asians have a long history of giving cash to one another to express their gratitude and deepen their relationship. Moreover, they typically place the cash inside a packet, the color of which differs across cultures. For example, the packets are red in China and Singapore and white in Japan.4 These red packets are among the most important components of festivals, for example, the Chinese lunar new year and important events such as wedding and birthdays. They are the most frequently used tool for gift exchange between friends and an effective mechanism to maintain the close relationships with family members.5 Because of its lack of geographic constraints, WeChat significantly speeds the flow of red packets among individuals. Moreover, the popularity of WeChat groups results in an extremely interesting change - the cash flow is extended from one-to-one exchange to a one-to-many case, which is called the "Group Red Packet". Specifically, a group user can send a red packet to a WeChat group. She can either choose an identical amount or a random amount for each group member. For identical packets, she needs to specify each packet's monetary value, while for random red packets, she needs to specify the total amount. Additionally, she needs to specify the number of recipients ("quantity"), which can be fewer than the number of group members. Therefore, the lottery nature of random red packets and the possibility of not receiving a packet generate the entertainment aspect of red packets, which has made them quite popular on WeChat. Figure 4 presents an example of group red packets with a random amount. As shown in panel (a), a group member clicks the "red packet" button on the left corner of the screen. Then, a window in panel (b) pops out. Conditional on the user's choice of random amount, she determines the quantity of red packets and the total amount. She can also leave a message that will be shown at the top of the red packets, e.g., "Happy Lunar New 4We use the term "red packet" if doing so generates no ambiguity. 5They have also been criticized for being instruments of bribery and corruption. This is beyond the scope of this work and will be discussed elsewhere. 12 Year!". Finally, she clicks "prepare lucky money", and the red packet is sent to the group. Thereafter, everyone in this group will be notified of this red packet (panel c) and can choose to click the "open" button to determine the (random) amount they will receive. Finally, all group members can determine the amount that all other members received. The person who receives the highest amount will be tagged with a star icon with the legend "Luckiest Draw". 6 B Data Description There are 7,380,110 unique users in our 367,361 groups, and a user may belong to multiple groups. We retrieve each user's demographic information, e.g., gender, age, location, the number of friends, and the number of groups that she joins. Since these information is updated every month, we use the information retrieved in February 2016 for analyses. Moreover, we identify the friendship between users in the dataset. In total, there are 292,565,291 friend links in our dataset and we also accessed the date for two users become WeChat friends. For each group gi, we retrieve group member gij's frequency of sending (receiving) red packets, the cash amount of each red packet, the number of messages that she posts in group i, and the time stamp that she joined group i. Table 2 reports summary statistics for groups. As the individual level, the relevant variables are as follows. Table 3 reports summary statistics for individual users. • Gender:Users report their gender. In total, 3,893,537 users are male, 3,438,393 are female, and the remainder have no data. • Region and Location. Since most WeChat users live in Mainland China, we focus on 31 provinces (or municipalities/autonomous regions) in Mainland China, excluding Hong Kong, Macau and Taiwan. We classify the cities where a user re- sides in into seven categories7. (1) North contains Beijing, Tianjin, Hebei, Shanxi, and Inner Mongolia; (2) Northeast contains Liaoning, Jilin, and Heilongjiang; (3) East contains Shanghai, Jiangsu, Zhejiang, Anhui, Fujian, Jiangxi, and Shandong; (4) Center contains Henan, Hubei, and Hunan; (5) Southwest contains Chongqing, Sichuan, Guizhou, Yunnan, and Tibet; (6) Northwest contains Shaanxi, Gansu, Qinghai, Ningxia, and Xinjiang; and (7) South contains Guangdong, Guangxi, and Hainan. Although it is imprecise, we further cluster the North, Northwest and Northeast regions as "North" and the rest as "South". • Age. WeChat reports that they collect and infer users' age with over 70% accuracy. We classify people into six age groups: [10, 20), [20, 30), [30, 40), [40, 50) and [50, 60), and [60, 70), which we name age1, age2, age3, age4, age5, age6, respectively. As shown in Table 3, the sizes of the age groups are unbalanced. • Degree Ratio. Group members in a WeChat group (Gi) can be either friends or strangers on WeChat. Therefore, a WeChat group is an undirected network, where each user j is a node and an edge represents a "friend" relationship between two group members. The degree of a group member j in group i, dij, is the number of friends that she has in this group, and we define her degree ratio in a group rij #group member−1. rij ∈ [0, 1]. The higher rij is, the more closely a user j is as attached to group i. dij 6See https://goo.gl/eUjNTy for a detailed description. 7We refer to Wikipedia: https://en.wikipedia.org/wiki/List_of_regions_of_the_People%27s_ Republic_of_China 13 Table 2: Statistics of Red Packet Groups. Mean Min 13.58 3 0 0.55 0.09 995.78 9 172.88 96.82 0.03 3 12.98 0 0.53 0.75 0.0 0.0 0.40 25% 5 0.31 148.31 46 15.76 5.24 0.4 0.29 0.0 50% 10 0.5 441.81 101 40.13 9.31 0.52 0.83 0.04 492,969.24 16,795 18,600 Max 500 1 50 1.0 1.94 1.97 75% 17 0.775 1065.11 184 101.94 17.33 0.67 1.07 0.83 It Statistics #member Densitya Total RP money Total RP count RP Money per capita RP Count per capita Female ratio Age group entropyb Location region entropy a Density measures # pairs of friends b Entropy is calculated as P (#member)(#meber-1)/2 age/province group. the connectivity within a group. is defined as i −pi log2(pi), where pi is the proportion of each In total, 61,501,862 red packets were sent in all groups in our dataset, and red packets were received 218,301,860 times. The average number of red packets sent in each group is 172.88, and the average amount of money is 995.78 RMB (146 USD). Table 4 reports further statistics about the red packets. C Cash Flows Between Demographic groups Figure 5(a) depicts the cash flows between gender pairs, i.e., MM (male to male), MF (male to female), FM (female to male) and FF (female to female). The direction of the arrow represents the direction of a cash flow, and the thickness refers to the percentage of each pair in the total cash flow between two arbitrary individuals. Specifically, 36.1% of total cash flows is within men, followed by MF (24.8%), FF(19.5%) and FM (19.3%). In total, the high percentage of within-gender cash flows might be driven by homophily- people tend to make friends who are similar to them, as demonstrated by Figure 7. The percentage of cash flows is determined by who is more likely to send a red packet, who is more likely to participate in receiving a red packet, and the gender composition of a group. If we want to construct a model of the gender composition of a cash flow, e.g., how likely a red packet between a male and female is, we need to consider these three factors. Figure 5(b) illustrates the net cash flows between different age groups. Since the age distribution on WeChat is extremely unbalanced, e.g., users in [20, 30) represent approximately 50% of users, we utilize balance ratio to measure the cash flows among age groups. The balance ratio is defined as equation 1, ranging from −1 to 1, and a positive balance ratio from province (gender / age) A to B implies that users from A are more likely to send red packets to those from B. We utilize the ratio to measure the significance of the cash flows among different demographic groups. Balance Ratio(A → B) = 2 × Cash(A → B) Cash(A → B) + Cash(B → A) − 1 (1) For example, the balance ratio from group 4, aged [40, 50), to group 1, [10, 20), is 0.41, indicating that the balance ratio from group 1 to group 4 is -0.41. The balance ratio from group 4 to other groups is always positive, while the balance ratio from group 1 to other groups is always negative (the arrow in Figure 5 ends at group 1). This is consistent with social norms in China, whereby older people give red packets to younger people, especially 14 Table 3: Statistics of WeChat Users Demographic features Count Gender Male Female Unreported Location North Northeast Northwest East Center Southwest South Other/Unreported Age [10, 20) [20, 30) [30, 40) [40, 50) [50, 60) [60, 70) Other/Unreported 795,113 465,941 433,681 1,462,468 937,148 593,279 894,397 1,798,083 3,893,537 3,438,293 48,280 747,226 3,886,688 1,963,130 488,033 63,410 4,067 227,556 Proportion 52.76% 46.59% 0.65% 10.77% 6.31% 5.88% 19.82% 12.70% 8.04% 12.12% 24.36% 10.12% 52.66% 26.60% 6.61% 0.86% 0.06% 3.08% to children and the unmarried (citation). The only exception is the net cash flow from group 4 to group 5, which might be driven by the fact that those aged 40 to 50 are the breadwinners in a family and have to give red packets to both older and younger people. The detailed net cash flows among location groups are shown in Figure 6. We conclude that southern and southwestern provinces, along with Beijing and Tianjin, send more money to other provinces than they receive, while the rest are net "gainers" from red packets. The reason that Xinjiang, Qinghai and Gansu have high absolute values of the balance ratio is partly due to the low number of red packets in the sample for most western provinces. For the regression analysis, we define the dependent variable as the net cash flow in the dataset between a pair of provinces (A and B), i.e., Cash(A → B) − Cash(B → A). To remove redundant observations, we require that A has a nonnegative net cash flow to B. We use the difference in GDP (GDP(A) − GDP(B)) and GDP per capita (PPP, PPP(A) − PPP(B)) and the distance between the provincial capitals. Table 5 presents the regression results. We find that GDP is not a significant predictor, while PPP and distance are positively and negatively related to the net cash flow, respectively. D Receiving patterns Users are free to choose whether to receive red packets in WeChat groups. In some cases, users may race to collect red packets to secure one of a limited number of packets. In this subsection, we focus on the association between the propensity to receive a gift and other variables, including demographic variables (gender, age and location), network structural variables (degree and the number of friends) and their interaction with group variables and sender variables. 15 (a) (b) Figure 5: Cash flows across gender (a) and age (b) groups. The thickness of a line represents the weight of the cash flow. In (a), the curves indicate that the cash flow is from the group at the origin of an arrow to the group at the arrowhead. The percentages on the curves indicate the proportion of that cash flow in the total cash flow (we filter out cases in which people receive red packets from themselves). In (b), the number represents an age group. * represents the age group [*0, *9]. The numbers on the edges represent the net cash flow between two age groups, normalized by the maximal value, that is, from 40 to 10. Figure 6: Subfigure(a) presents the heatmap of balance ratio between provinces. Red indicates a balance ratio greater than 0, blue represents one less than 0, and gray represents a ratio of 0. Subfigure(b) presents the balance ratio between a given province and all other provinces. Red indicates a positive and blue indicates a negative ratio. The darkness of red and blue represents the absolute value of the balance ratio. 16 AnhuiBeijingChongqingFujianGansuGuangdongGuangxiGuizhouHainanHebeiHeilongjiangHenanHubeiHunanInnerMongoliaJiangsuJiangxiJilinLiaoningNingxiaQinghaiShaanxiShandongShanghaiShanxiSichuanTianjinTibetXinjiangYunnanZhejiangsenderZhejiangYunnanXinjiangTibetTianjinSichuanShanxiShanghaiShandongShaanxiQinghaiNingxiaLiaoningJilinJiangxiJiangsuInnerMongoliaHunanHubeiHenanHeilongjiangHebeiHainanGuizhouGuangxiGuangdongGansuFujianChongqingBeijingAnhuireceiver−0.6−0.30.00.30.6 Table 4: Statistics of Red Packets Statistics Red packet money Red packet parts Intervala Finished timeb Mean 5.55 5.06 25,458.09 27.92 Min 25% 50% 75% 0.01 5 5 1 511 0 1 11 1 3 34 6 2 5 89 8 Max 10000 100 12,475,671 86,400 a The time between the current and preceding red packet. Unit is sec- onds. We do not consider the first red packets in the groups that we can observe in the dataset. b The interval between the time when the red packet is sent and the time when the previous packet was received. Red packets that were not received by anyone are not taken into account. Table 5: Regression Results for Interprovincial Cash Flows Dependent variable: Net Cash Flow (1) 0.045 (0.031) 1073.916∗∗∗ (80.712) 465 0.004 0.002 (2) −0.007 (0.034) 9.995∗∗∗ (2.713) 1020.960∗∗∗ (80.926) 465 0.033 0.029 (3) −0.584∗∗∗ (0.108) 1887.943∗∗∗ (167.357) 465 0.059 0.057 (4) 0.010 (0.033) 9.020∗∗∗ (2.642) −0.574∗∗∗ (0.107) 1810.117∗∗∗ (166.762) 465 0.090 0.084 ∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01 GDP PPP Distance Constant Observations R2 Adjusted R2 Note: In particular, we study the effects of individual variables on the propensity to receive a red packet, conditional on the characteristics of the senders. Similar to the propensity to send, we define the propensity to receive of a characteristic (or demographic group). We first define the revealed propensity to receive a red packet as the difference between the proportion of this demographic group among receivers of red packets and the proportion of this demographic group in the group chat. We take the average of the propensity of red packets for each group chat and, furthermore, take the average of each group. If the aggregated propensity is 0, then we believe this demographic group has the same propensity to receive as the average WeChat user. A positive sign indicates that this demographic group is more likely to receive red packets. Note that although WeChat allows the red packet senders to receive packets from themselves, we do not regard them as receivers or candidate receivers. We define the propensity to receive of characteristic F given condition C and present the propensity conditional on different senders. In Figure 7, we depict the propensity to receive of a given characteristic such as gender, age, degree (number of friends), location and whether the sender and receiver are friends. • Gender. Females have an approximately +0.020 propensity to receive a red packet, 17 (a) (e) (d) (b) (c) Figure 7: Propensity to receive a red packet for given demographic characteristics, rep- resented by the bars. Group-level SEs are shown as blacks ticks on the tops/bottoms of the bars. (a) is gender, (b) age, (c), degree (d), location (e), and strong tie (whether the sender and receiver are friends). We also present the conditions given the sender. while males are less likely to receive red packets. Interestingly, when we consider the genders of red packet senders, we find both genders have a higher propensity to receive a red packet from a person of the opposite gender. Specifically, the propensity of females to receive a red packet from a male is approximately +0.047, which is higher than the propensity of males to receive from a female (approximately +0.01). • Age. Because we have limited samples of people over age 50, we only consider four groups: age1, age2, age3, age4, representing age groups [10, 20), [20, 30), [30, 40), and [40, 50), respectively. On average, the propensity to receive red packets declines with the age when the latter is over 20, indicating that older people tend to be less likely to receive a red packet than a younger person is. On average, the propensity to receive red packets declines with the age when the latter is over 20, indicating that older people tend to be less likely to receive a red packet than a younger person is. • Location. As shown in Fig. 7(d), despite the statistical significance, the difference in the propensity to receive across locations is smaller than that for other variables. • In-group degree. In-group degree is the number of friends that a user has in a group. It measures in-group social status. We define three groups: high-d (people with in-group degree that is no less than the second tercile), low-d (people with in-group degree that is no more than the first tercile) and mid-d (the rest). We find that a high-degree group member has an approximately +0.1 propensity to receive a red packet, regardless of the degree group to which the sender belongs. The propensity decreases as the degree decreases. This is probably because people with high degrees are more avid users of WeChat and are willing to spend more time to wait to receive red packets. • Strong ties. Finally, we study whether strong ties differ from weak ties, that is, if 18 allsendersmalesendersfemalesenders-0.06-0.04-0.020.00.020.040.06propensitytoreceivemalereceiversfemalereceiversreceivedbyfriendsreceivedbystrangers-0.1-0.075-0.05-0.0250.00.0250.050.0750.1propensitytosendallsendersnorthsenderssouthsenders-0.01-0.0075-0.005-0.00250.00.00250.0050.00750.01propensitytoreceivenorthreceiverssouthreceiversallsendersage1sendersage2sendersage3sendersage4senders-0.04-0.020.00.020.04propensitytoreceivereceivedbyage1receivedbyage2receivedbyage3receivedbyage4allsendershigh-dsendersmid-dsenderslow-dsenders-0.15-0.1-0.050.00.050.10.150.20.25propensitytoreceivereceivedbyhigh-dreceivedbymid-dreceivedbylow-d one is more likely to receive red packets from friends than from non-friends in a given group. As shown in Figure 7(e), when people are friends, they have an approximately +0.08 propensity to receive red packets. E PSM details Table 6 reports the complete regression results. All covariates are also used as control variables. We report the most significant and interesting controls in the main article. Table 6: Complete Regression Results #Follower #FRP Session Money #Sender's New Friends Dependent variable: (3) 52.632∗∗∗ (1.490) 6.479∗ (3.625) −4.862∗∗∗ (1.602) 1.191∗∗∗ (0.118) 0.00000∗∗∗ (0.00000) 0.218∗∗∗ (0.055) 0.303∗∗∗ (0.105) −0.189 (0.118) 0.604∗∗∗ (0.101) 9.683∗∗∗ (1.815) −12.416∗∗∗ (4.111) 0.056∗∗∗ (0.008) −0.003 (0.002) −25.545∗∗∗ (3.699) 6.618∗∗∗ (1.493) 3.377∗∗∗ (1.163) 14.506∗∗∗ (4.307) 0.015 (0.012) −3, 267.126∗∗∗ (340.545) 108,300 0.016 0.016 (4) 0.009∗∗∗ (0.003) −0.006 (0.008) −0.002 (0.003) 0.0001 (0.0002) −0.000 (0.000) 0.0003∗∗∗ (0.0001) −0.00002 (0.0002) 0.0004 (0.0002) −0.001∗∗∗ (0.0002) 0.002 (0.004) −0.039∗∗∗ (0.009) 0.00002 (0.00002) −0.00000 (0.00000) 0.001 (0.008) 0.001 (0.003) 0.007∗∗∗ (0.002) −0.013 (0.009) 0.001∗∗∗ (0.00002) 0.870 (0.716) 108,300 0.051 0.051 ∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01 treatment is festival is weekday hour sendtime RPnum latitude longitude age female degree activity_1 activity_2 female ratio age entropy province entropy density member count Constant Observations R2 Adjusted R2 Note: (1) 0.295∗∗∗ (0.010) 0.185∗∗∗ (0.025) −0.094∗∗∗ (0.011) 0.021∗∗∗ (0.001) 0.00000∗∗∗ (0.000) 0.006∗∗∗ (0.0004) 0.002∗∗ (0.001) −0.001∗ (0.001) 0.007∗∗∗ (0.001) 0.089∗∗∗ (0.013) −0.145∗∗∗ (0.028) 0.0002∗∗∗ (0.0001) −0.00003∗∗ (0.00001) −0.130∗∗∗ (0.026) 0.099∗∗∗ (0.010) 0.020∗∗ (0.008) −0.267∗∗∗ (0.030) 0.0004∗∗∗ (0.0001) −51.669∗∗∗ (2.349) 108,300 0.036 0.036 (2) 0.415∗∗∗ (0.024) 0.224∗∗∗ (0.057) −0.078∗∗∗ (0.025) 0.038∗∗∗ (0.002) 0.00000∗∗∗ (0.000) 0.006∗∗∗ (0.001) 0.001 (0.002) −0.0002 (0.002) 0.008∗∗∗ (0.002) 0.119∗∗∗ (0.029) −0.388∗∗∗ (0.065) 0.0004∗∗∗ (0.0001) −0.0001∗∗∗ (0.00003) −0.218∗∗∗ (0.059) 0.178∗∗∗ (0.024) 0.038∗∗ (0.018) −0.301∗∗∗ (0.068) 0.002∗∗∗ (0.0002) −88.131∗∗∗ (5.396) 108,300 0.019 0.019 19
1807.00382
1
1807
2018-07-01T19:49:04
Survey of Graph Analysis Applications
[ "cs.SI", "physics.soc-ph" ]
Recently, many systems for graph analysis have been developed to address the growing needs of both industry and academia to study complex graphs. Insight into the practical uses of graph analysis will allow future developments of such systems to optimize for real-world usage, instead of targeting single use cases or hypothetical workloads. This insight may be derived from surveys on the applications of graph analysis. However, existing surveys are limited in the variety of application domains, datasets, and/or graph analysis techniques they study. In this work we present and apply a systematic method for identifying practical use cases of graph analysis. We identify commonly used graph features and analysis methods and use our findings to construct a taxonomy of graph analysis applications. We conclude that practical use cases of graph analysis cover a diverse set of graph features and analysis methods. Furthermore, most applications combine multiple features and methods. Our findings motivate further development of graph analysis systems to support a broader set of applications and to facilitate the combination of multiple analysis methods in an (interactive) workflow.
cs.SI
cs
Survey of Graph Analysis Applications Tim Hegeman Alexandru Iosup Delft University of Technology Vrije Universiteit Amsterdam [email protected] [email protected] July 3, 2018 Abstract Recently, many systems for graph analysis have been developed to address the growing needs of both industry and academia to study complex graphs. Insight into the practical uses of graph analysis will allow future developments of such sys- tems to optimize for real-world usage, instead of targeting single use cases or hypothetical work- loads. This insight may be derived from surveys on the applications of graph analysis. However, existing surveys are limited in the variety of ap- plication domains, datasets, and/or graph analysis techniques they study. In this work we present and apply a systematic method for identifying practical use cases of graph analysis. We identify commonly used graph features and analysis methods and use our findings to construct a taxonomy of graph anal- ysis applications. We conclude that practical use cases of graph analysis cover a diverse set of graph features and analysis methods. Furthermore, most applications combine multiple features and meth- ods. Our findings motivate further development of graph analysis systems to support a broader set of applications and to facilitate the combination of multiple analysis methods in an (interactive) work- flow. 1 Introduction Graph analysis is used across many application do- mains to interpret complex webs of relationships and connections formed by people, roads, finan- cial transactions, etc. Understanding the practi- cal uses of graph analysis is key to tuning existing graph analysis systems and guiding the develop- ment of new systems. However, this understand- ing requires knowledge of applications from many domains, including the datasets and graph analy- sis methods they use. Existing surveys focus on studying in-depth the datasets and analysis meth- ods used in a single domain [1,12,27,63,69], identi- fying applications of specific (classes of) graph al- gorithms [17, 20, 25], or exploring a variety of ap- plication domains [10, 18]. In contrast, we identify applications across a large number of application domains and characterize the datasets and graph analysis methods used in practice. To facilitate the growing need for analyzing graphs, many graph analysis systems have been de- veloped1. Most systems target generic applications of graph analysis, e.g., by providing a generic pro- gramming model like Pregel [52], without explicitly considering the characteristics of real-world appli- cations. However, the performance of graph anal- ysis applications depends a combination of three characteristics [29, 38], known as the PAD-triangle: the platform, the algorithm, and the dataset. Thus, when developing and tuning graph analysis plat- forms, knowledge of the algorithms and datasets used in practice is essential to achieving good per- formance across many applications. To address the gaps in knowledge left by previous work, we pose our main research question: What are the characteristics of the datasets and analy- sis methods used in practical applications of graph analysis? We further define two sub-questions: How to identify practical applications of graph anal- ysis? and How to characterize graph datasets and graph analysis methods? In this work we make three contributions to answer these questions: 1. We present a systematic method for identifying practical use cases of graph analysis (Section 2) and apply this method to find a set of graph analysis application (Section 3). 2. We identify commonly used graph features (Section 4) and classes of graph analysis meth- ods (Section 5). Based on these common ele- ments, we present a taxonomy of graph analy- sis applications (Section 6). 3. We propose directions for future research in the development of graph analysis systems (Sec- tion 7). 1Doekemeijer et al. [21] identified over 80 parallel graph processing frameworks between 2004 and 2014. 1 2 Method for Finding, Select- ing, and Characterizing Rel- evant Material Applications of graph analysis can be found across many application domains and use a wide range of datasets and algorithms. In this section we de- fine a method for finding and selecting literature on graph analysis applications and for characteriz- ing their datasets and methods. 2.1 Selection of a Comprehensive Method Three common methods used to conduct litera- ture surveys are: unguided traversal of the mate- rial, snowballing [83, 86], and the Systematic Liter- ature Review method proposed by Kitchenham et al. [44] Unguided traversal of the material is the simple process of reading as much as possible of the topic starting from a seed set of articles (e.g., provided by the supervisor) and continuing with as many articles as the reader can find using the typical repositories and search tools for scientific literature. For example, the reader could pursue every relevant link in each article read, or check all articles in the best conferences and journals in the past decade. The unguided element of the method comes from the lack of definition of stop and search criteria. The decision of which articles to select for review from the set of found articles is left en- tirely to reader and is not guided by a set of selec- tion criteria. The snowballing method uses similar mechanisms, but imposes guidance elements such as criteria for finding and selecting material. The Systematic Literature Review method of Kitchenham et al. is a comprehensive method for conducting literature reviews. As summarized in Table 1, the methods consists of three major stages: planning, conducting, and reporting. Each of these stages is comprised of a set of steps whose appli- cation depends on the application domain and the specific goals of the survey. The stage of conduct- ing the review in the SLR method includes at least three important elements: identifying the reposito- ries and search engines that can deliver relevant ma- terial, defining a set of specific keywords (queries) used as automated selection criteria for relevant material, and defining a procedure for manually se- lecting truly relevant material from the set obtained through automated search. We compare qualitatively these three methods, considering two criteria: the scale of the resulting dataset, and selection bias. The unguided traversal method can yield any amount of material, but it has an implicit selection bias towards material already known to the reader by relying on the reader to select directions for searching material. The snow- balling method results in a large body of relevant material with a minor selection bias caused by the choice of a seed set of relevant material. The SLR method yields a limited set of relevant material and avoids a selection bias through a systematic search. To make a selection, we first specify the desired outcomes for the two criteria. We prefer a limited number of articles because we would like to do an in-depth manual inspection of each, and we envi- sion a large number of application domains (many of which we do not know) which requires a lack of selection bias. Therefor, we select the System- atic Literature Review method of Kitchenham et al. which best meets our criteria. In the remainder of this work, we follow the steps of the method as listed in Table 1 where applicable. Notably absent in our approach is the "study quality assessment" step. The quality of the work presented in sur- veyed material is largely irrelevant to our analysis; we consider only the datasets and graph analysis methods used and do not investigate how well these methods perform with respect to other approaches in a given domain. 2.2 Identification and Selection of Literature To identify relevant literature we considered typ- ical search engines for scientific literature, as rec- ommended by the SLR method. Due to the wide range of application domains that potentially use graph analysis, we excluded any search engine ded- icated to specific fields. We selected Google Scholar for its extensive corpus and open access. We used eight queries to search for relevant material as listed in Table 2. For each query we retrieved the first 100 search results for further inspection. We conducted our search during January 2018. Our search queries were formulated to match a wide range of possible applications, but they also match a large volume of irrelevant material. We used manual selection to extract all relevant lit- erature from the body of search results. We se- lected all articles that explicitly describe the use of one or more algorithms or methods for graph analysis as a primary contribution to address their research question(s). We specifically exclude sec- ondary studies, books, and theses because they typ- ically present multiple applications and inclusion of these applications may have led to overrepresenta- tion of the corresponding application domain. We also exclude articles presenting a system or algo- rithm for graph analysis unless they target a spe- 2 Table 1: Overview of steps that comprise the Systematic Literature Review method by Kitchenham et al. [44] The steps we apply in this work are indicated by a checkmark () and we list the section(s) implementing the step (if applicable). Planning the review  Identification of the need for a review (S. 1)  Commissioning a review  Specifying the research question(s)  Developing a review protocol  Evaluating the review protocol (S. 1) (S. 2.1) Conducting the review  Identification of research  Selection of primary studies  Study quality assessment (S. 2.2) (S. 2.2) Reporting the review  Data extraction and monitoring  Data synthesis   Formatting the main report  Evaluating the report Specifying dissemination mechanisms (S. 2.3, 3, 6) (S. 4-6) Table 2: Search queries used to identify relevant literature. (cid:63)Three articles were retrieved via two search queries. ID Query # Selected # Analyzed Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 graph analysis graph analytics graph mining graph processing network analysis network analytics network mining network processing Total: 39 4 19 3 15 6 12 1 96(cid:63) 34 3 14 2 7 2 1 0 60(cid:63) cific application (domain). The results of the identification and selection pro- cess are summarized in Table 2. From 800 search results we selected 96 relevant articles (12%). We further reduced this set to 60 articles for in-depth analysis through manual selection while preserving the diversity of application domains among selected articles. 2.3 Analysis of Selected Material To analyze the selected material we used a three- step process. The primary purpose of this process is characterizing the datasets and methods for graph analysis used in practice. First, we scanned each selected article to summarize the application it de- scribes (presented in Section 3). We also identified any notable features of the dataset and the primary method of graph analysis used by each application. Second, we derived a list of common (classes of) graph features (Section 4) and graph analysis meth- ods (Section 5) from the initial analysis performed in the first step. Third, we extracted from each se- lected article the graph features and graph analysis methods they use. The resulting data was used to construct a taxonomy as presented in Section 6. We manually classified the graph features present in each application. Due to a combination of fre- quently used terms (e.g., many articles refer to both "directed" and "undirected" graphs) and features not explicitly identified by the authors (e.g., vertex and edge properties, heterogeneity), keyword-based 3 search as primary classification method was not feasible. Where plausible we used keyword-based search to validate the results of the manual inspec- tion process (used keywords are listed in Section 4 where applicable). To classify the graph analysis methods used by each application, we used search queries for most classes of methods (listed in Section 2 where appli- cable), followed by manual inspection of the context of each search result to rule out false positives. We supplemented these results with the list of primary methods extracted during the initial scan of each article, especially for (classes of) methods with- out well-defined terminology (e.g., no suitable key- words for the "graph mutation" class were found due to the ubiquity of candidates such as "reduc- tion", "merge", "mutate"). Some atypical meth- ods for graph analysis may have been missed in our classification process if such a method was not identified as the primary method of analysis of an article. 2.4 Threats to Validity Although we selected our method to identify rele- vant graph analysis applications from a broad range of domains, the specifics of our search strategy in- troduces three potential biases. First, we restrict our search to scientific literature, so we do not iden- tify any commercial applications if their methods have not been published. Second, we restrict our search to English literature, which may exclude ap- plications that are not well-known in the English- speaking scientific community. Third, some of our search queries show a strong correspondence with specific types or analysis, e.g., "mining" returns many application of pattern matching or subgraph isomorphism, whereas "network analysis" often oc- curs in the phrase "social network analysis", refer- ring to a common set of graph analysis methods. 3 Applications In this section we present the graph analysis ap- plications we have selected and characterized using the method presented in Section 2. Applications are grouped by application domain. 3.1 Biology Biological networks are used to study the interac- tions of numerous biological entities, including pro- teins, genes, and organisms. We present in turn the biological applications we characterized. Protein-protein interaction networks: Li et al. [50] propose an algorithm to identify protein complexes in protein-protein interaction networks. Their Local Clique Merging Algorithm (LCMA) it- eratively identifies local cliques and merges them if they overlap significantly (i.e., are similar). Gene regulatory networks: Pinna et al. [65] address the problem of deriving a gene regulatory network from observed gene expression levels. The authors construct a network of genes and inferred edges with weights signifying an initial estimate of the probability of an edge's existence. Edges with a probability below some threshold are removed from the network. Using strongly connected compo- nents, the authors identify unessential edges (feed- forward edges) to derive a final regulatory network. [45] present an algorithm for identifying common pat- terns in graph-based representations of metabolic pathways. Their graphs contain one vertex for ev- ery unique enzyme in a pathway and edges for in- teraction between those enzymes. By mining the metabolic pathway graphs of multiple organisms for frequent subgraphs, the authors are able to identify sub-pathways common to many organisms. Metabolic networks: Koyturk et al. Tissue modeling: Bilgin et al. [7,8] classify tis- sue samples by segmenting tissue images to iden- tify cells, linking those cells in cell graphs, comput- ing various graph theoretical measures for each cell graph, and applying machine learning techniques. They apply variations of this method to detect can- cer in breast tissue [8] and bone tissue [7]. Microbial communities: Barber´an et al. [3] study the co-occurrence of microbes. Their network consists of vertices corresponding to microbes and edges corresponding to statistically significant cor- relation in occurrence across soil samples. Based on several network measures, e.g., average path length, and a comparison of the network's structure to a random graph, the authors find a distinct separa- tion between two types of microbes: generalists and specialists. Protein assembly: A typical approach to iden- tifying proteins involves collecting information on the peptide fragments (i.e., parts of a protein) in a sample and assembling these fragments to find pro- teins that could have been present in the sample. Zhang et al. [91] solve the assembly problem using a bipartite graph: observed peptides and poten- tial proteins are mapped to vertices and an edge is added between a peptide and all proteins it is part of. To find likely candidates for proteins present in the sample, the authors reduce the resulting graph by merging vertices with identical connections, ex- tract all connected components, and use a greedy set cover algorithm to find a set of proteins that 4 cover all observed peptides. 3.3 Security Other: Royer et al. [71] propose the Power Graph Analysis method for compressing biological networks. They identify three basic motifs found in many networks: stars, cliques, and bicliques. By iteratively identifying motifs and replacing sub- graphs with power nodes, the authors achieve com- pression rates of up to 85% without losing informa- tion for a variety of biological networks. 3.2 Neuroscience The human brain consists of an estimated 100 bil- lion neurons and 1 quadrillion synapses. Although these neurons and synapses naturally comprise a brain network, this network is difficult to collect and analyze due to the small scale of the neu- rons and the large scale of the resulting network. Instead, brain networks used for practical neuro- science applications consist of brain regions and their communication paths. Brain networks collected using fMRI are typi- cally undirected and weighted, with each weight representing the level of communication between two brain regions. These weighted graphs are typ- ically converted to unweighted graphs by dropping all edges with a weight below some threshold. The resulting graph can be analyzed for typical small- world properties: high average clustering coefficient and relatively low characteristic path length [82]. Medical conditions that have been studied using this technique include Alzheimer's disease [74, 77], brain tumors [4], and traumatic brain injury [13]. Weighted networks can also be studied directly, as done by Stam et al. [76] for Alzheimer's disease pa- tients. The authors further study two damage mod- els, Random Failure and Targeted Attack, through simulation and find that the Targeted Attack model best approximates the deterioration in brain con- nectivity observed in AD patients. A directed brain network can be obtained from EEG recordings of electrical activity in the cerebral cortex. This type of network has also been shown to have typical small-world properties [90]: high average clustering coefficient and low average path length. Various studies have shown deviations in connectivity when affected by certain medical con- ditions. For example, patients with epilepsy have more regular (i.e., not centralized) activity between brain regions during a seizure [85]. Spinal cord in- jured patients show larger levels of internal organi- zation and fault tolerance, possibly as compensa- tion triggered by the injury [24]. Graph analysis powers a variety of security appli- cations, most notably to identify vulnerabilities or anomalies in computer networks. Network vulnerability analysis: Phillips et al. [64] present a system for analyzing vulnerabil- ities in computer networks using attack graphs. They generate attack graphs from attack templates, i.e., specifications of the pre- and post-conditions of an attack. These templates are combined in a graph in which each node represents a combination of ma- chines, users, and/or permissions that the attacker has obtained and each edge represents an action that may be performed by the attacker to compro- mise a new machine, obtain more permissions, etc. A cost or probability of success may be associated with each edge to study the most likely paths of intrusion. The authors further describe a variety of techniques to improve security using their system, including selecting from a set of possible security measures the most cost effective, or determining a minimal set of monitors to place such that each at- tack may be detected by multiple monitors. Noel et al. [61] define a suite of metrics to quan- tify the vulnerability of a network based on its at- tack graph, including three metrics based on graph theoretical properties. First, they identify weakly connected components. The presence of separate components in the attack graph is indicative of a lack of vulnerabilities between multiple sets of ma- chines in the network. Second, they identify cycles. Infecting any machine in a cycle gives indirect ac- cess to all other machines in the cycle, which repre- sents a larger surface area for attacks. Third, they compute the diameter. A large diameter implies a large number of actions that an attacker needs to take to compromise the entire network. Malware detection: Kwon et al. [46] ana- lyze download graphs to identify droppers, malicious programs that download other programs (i.e., mal- ware, or other droppers) to a host machine. The download graph consists of programs as vertices, and download relationships as edges. The authors extract subgraphs, called influence graphs, rooted in a single program vertex and containing all other programs that have been directly or transitively downloaded by the root program. The authors use a variety of metrics to summarize each influencer graph and use machine learning techniques to clas- sify the root of each influence graph as a legitimate program or a dropper. Polonium [15] detects malware by analyzing a large, bipartite graph of machines and files found on those machines. Polonium uses a belief propagation algorithm to estimate the probability of a file being 5 malicious. This algorithm is seeded with external data on machine reputation and known malicious files. Botnet detection: Millions of computers worldwide have been infected by malicious soft- ware and are now part of networks of infected hosts called botnets. Many such botnets rely on peer-to- peer (P2P) communication to spread commands to members of the network. Nagaraja et al. [56] pro- pose a method for identifying a P2P botnet in a communication graph, i.e., a graph in which every host is a vertex and two vertices are connected by an undirected edge if the corresponding hosts have communicated during some period of time. First, the authors use random walks on the communi- cation graph to distinguish fast-mixing hosts (i.e., likely members of a P2P network) from slow-mixing hosts. Next, the vertices are clustered into sub- graphs using k-means, and the nodes are clustered using an extension of SybilInfer [CITE], an algo- rithm based on random walks to extract a strongly connected group of nodes from a graph. Anomaly detection: Jiang et al. [41] analyze DNS traffic to identify anomalies. They model DNS failures as a bipartite graph mapping hosts that have issued at least one failed DNS request to do- main names they have queried. Using a matrix factorization algorithm (tNMF), the authors de- compose the DNS failure graph into communities of hosts and domains. They analyze each commu- nity and identify typical structures: stars and bi- meshes. Further, they track the evolution of com- munities over time. Video surveillance: Calderara et al. [14] use spectral graph theory to analyze trajectories of peo- ple observed by video surveillance. The physical space observed in the video is quantized and the observed trajectories are translated to sequences of quantized locations. A graph is constructed with nodes representing a transition from one location to another and weighted edges representing the possi- bility of moving from one location to another loca- tion via precisely one intermediate location (shared by the source and target node). Spectral graph the- ory is used to filter out noisy trajectories from the graph and to determine if a new trajectory is either consistent with earlier observation or anomalous. 3.4 Software Engineering Graphs occur naturally in various aspects of soft- ware development, e.g., call graphs, control flow graphs, dependency graphs. We describe several applications of graph analysis in software develop- ment and related activities. Identifying and locating software bugs: Cheng et al. [16] localize bugs by mining software behavior graphs. Execution traces of a program are captured as method-level or block-level behav- ior graphs in which each vertex presents a method or basic block, respectively. Edges in software be- havior graphs can capture a variety of control flow relationships, e.g., one method calling another. The authors capture behavior graphs from multiple exe- cutions of the same program and label which behav- ior graphs correspond to faulty executions. Next, they mine the most discriminative subgraph(s) to localize the difference(s) in execution between cor- rect and faulty behavior. Maxwell et al. [53] identify memory leaks in heap dumps by mining recurring patterns of object ref- erences. Their heap graph representation contains a vertex for every object in the heap dump and an edge for every reference. The authors first reduce the graph by extracting the dominator tree and us- ing graph grammar reduction to compress typical (recursive) patterns. Next, they mine frequent sub- graphs to identify potential memory leaks. Eichinger et al. [23] locate software bugs in call graphs using graph mining. Their approach first re- duces call graphs by identifying sequences of identi- cal calls and merging the corresponding subgraphs. Edge weights are introduced to capture the frequen- cies of calls. Next, the authors use weighted fre- quent subgraph mining to identify differences be- tween successful and unsuccessful executions, thus revealing potential locations of bugs. Defect prediction: Zimmermann et al. [92] use network measures on software dependency graphs to identify critical binaries and predict defects. They find significant correlation between several network measures (e.g., eigenvector and degree cen- trality) and the number of defects in a binary. They find that network measures are able to predict 60% of defects, compared to 30% for traditional software complexity measures. Diagnosing distributed systems: G2 [30] is a graph processing system for analyzing large soft- ware execution graphs, i.e., graphs describing sys- tem events and their relationships. G2 can be pro- grammed to perform custom queries on an execu- tion graph. Underlying these queries are two key operations: slicing (i.e., extracting all events that are causally related to a queried event) and hier- archical aggregation (i.e., merging a set of related events into a single event). Software plagiarism detection: GPLAG [51] detects software plagiarism by representing pro- grams as program dependence graphs. Statements in the program are encoded as vertices, and control flow and data dependencies are encoded as directed edges. Type information is encoded as vertex and 6 edge properties. Commonalities between two pro- gram are detected using subgraph isomorphism. Developer collaboration: Surian et al. [78] analyze the SourceForge collaboration network to discover how well connected developers are, what topological structures characterize developer com- munities, etc. The authors first identify connected components and mark each as either a small or a large community. Second, they mine common pat- terns among the small communities. Third, they compute the frequency of each pattern in both the small and large communities. 3.5 Logistics & Planning Navigation systems are a stereotypical example of real-world graph analysis applications. More gen- erally, logistics and planning problems are often solved using graphs. Road networks: Urban street networks can be naturally modeled as a graph; intersections can be mapped to vertices and the roads connecting in- tersections can be mapped to edges. This is typi- cally referred to as the primal graph representation. For some applications an alternative representation may be preferred. The dual graph representation maps roads to vertices and intersections to edges. Porta et al. describe various methods for analyz- ing both the primal [67] and dual [66] urban street graphs. TrajGraph [35] uses graph-based visual analytics to study traffic in urban street networks, in par- ticular using taxi route data. It uses partitioning techniques to reduce the size of the graph for vi- sualization purposes. Further, TrajGraph provides automated analysis of traffic to identify hubs at dif- ferent points in time. Finally, it allows users to highlight arbitrary areas (i.e., subgraphs) to ana- lyze local traffic. General planning problems: GraphPlan [9] represents a planning problem as a Planning Graph, a leveled DAG in which nodes represent propo- sitions (states?), edges represent action, and lev- els represent timesteps in the produced plan. The graph is dynamically constructed and pruned one level at a time. A custom heuristic-based traversal algorithm is used to find valid plans. Hong et al. [34] propose a goal graph-based ap- proach to goal recognition, loosely based on Graph- Plan. They use an iterative two-stage algorithm to repeatedly extend the goal graph based on observed actions, followed by the identification of plans and goals that are consistent with the new graph. Helmert [32] proposes a greedy algorithm based on a causal graph for planning problems. The causal graph encodes state variables as vertices and possible causal relationships as directed edges (i.e., an edge from vertex A to vertex B indicates that the value of state variable B may depend on the value of state variable A). Further, every state variable has an associated domain transition graph with a vertex for every possible value of the vari- able and a directed edge for every transition, an- notated with the preconditions for the transition. A plan is found using a heuristic-based traversal of the causal graph. The heuristic includes repeated shortest path searches on domain transition graphs. Network routing: Daly et al. [19] apply social network analysis to routing in mobile ad hoc net- works (MANETs). Routing in MANETs is chal- lenging because the network graph is rarely con- nected. Efficiently delivering messages requires identifying devices that are likely to connect to many other devices, thus quickly spreading the message through the network. By using network analysis techniques, the authors identify devices in the network with high betweenness (i.e., short routes to many other devices) as key candidates for spreading messages. 3.6 Social Sciences Communication between people has long been stud- ied to understand how groups of people interact. One-on-one communication methods, including (e- )mail, phone calls, and text messaging, can be mod- eled as a social interaction network in which each vertex represent a person and edges represent that two people have communicated. Similarly, social media platforms like Facebook and Twitter natu- rally comprise a social interaction network, often with additional information on types of interactions (friendships, follower-relationships, likes, etc.). Schwartz et al. [75] analyze a directed interaction graph derived from mail traffic to discover shared interests. They apply typical SNA techniques, in- cluding extracting the largest weakly connected component, computing the diameter, average path length, etc. Further, they cluster the graph using Aggregate Specialization Graph Isolation and Spe- cialization Subgraph Derivation to identify commu- nities with shared interests. Recently, many studies have analyzed the Twit- ter graph to identify important users (influencers), authoritative users, etc. For example, TURank [87] ranks Twitter users based on authority scores. These scores are computed using a variation of PageRank, called ObjectRank, on the user-tweet graph consisting of users, tweets, follow relation- ships, post relationships, and retweet relationships. Khrabov et al. [43] identify influential Twitter users using a combination of PageRank and a custom 7 ranking based on a user's number of mentions. By using dynamic metrics, they identify key users by periods of consecutive, accelerated growth in in- fluence. Yang et al. [88] analyze retweets using a variation of the HITS algorithm to identify in- teresting posts, i.e., posts that may be of interest to a wider audience than the direct neighborhood of the user who posted it. They first identify au- thoritative users in the user-retweeted-user graph, and next identify interesting tweets based on the authority of their creator and retweets. They con- clude that, by considering both users and retweets, their method performs better than consider only retweets. 3.7 Psychology Mota et al. [55] analyze speech graphs derived from dream reports produced by schizophrenic, bipolar, and control subjects. A speech graph consists of a node for every unique word in a body of text and a directed edge for every consecutive pair of words. By comparing 14 attributes (e.g., largest connected component, repeated and parallel edges, cycles, clustering coefficient) of each speech graph, the authors achieve high accuracy in classifying the group of a subject based on their dream report. Verbal fluency tests are used to assess a person's ability to produce a sequence of words satisfying some task. For example, in a category fluency test, the subject is asked to list as many words fitting the given category as they can in a limited time. By converting this sequence of words to a speech graph, the subject speech patterns can be analyzed. Lerner et al. [49] study the results of category flu- ency tests taken by adults with mild cognitive im- pairment (MCI), with Alzheimer's disease (AD), or neither. They merged the speech graphs of all sub- jects in the same subject group. Analysis of the three resulting graphs, one for each subject group, reveals that they have typical small-world proper- ties, but that those properties are less prevalent for the MCI and AD groups. This is consistent with earlier research. Bertola et al. [5] perform a simi- lar study, but analyze each subject's speech graph individually. Using an extensive set of graph mea- sures, they can accurately classify a subject to be in one of the three subject groups. 3.8 Science By virtue of the incremental nature of scien- tific progress, publications naturally form networks through the citations that connect them. Such ci- tation networks have been studied for many sci- entific communities. Jacovi et al. [39] apply so- cial network analytics techniques to study the ci- tation graph of the CSCW conferences and related work. They identify communities and track their evolution over time. Further, they identify chasm- papers; papers that were influential outside the CSCW conferences, but overlooked in the CSCW community. Gondal [28] analyzes a citation net- work for an emergent research field. In addition to small-world properties, the author considers the presence of various patterns, including stars, papers sharing a large number of cited authors, and pa- pers citing primarily authors from a single country. Tsatsaronis et al. [80] apply Power Graph Analy- sis, a method originally developed to analyze and visualize biological networks, to study the DBLP citation network and its evolution. 3.9 Chemistry Molecules can be represented by graphs with atoms as vertices and the bonds connecting atoms as edges. Large databases of such molecular graphs and the properties of the associated molecules have been compiled and are used in, e.g., pharmaceu- tical research to identify (fragments of) molecules with desirable properties for a new drug. Nijssen et al. [60] propose a method based on frequent sub- graph mining to extract common molecule frag- ments from a set of molecules. This method may be used to identify molecule fragments that charac- terize a set of input molecules sharing a desirable property. Wegner er al. [84] propose a method for classifying molecules by mining their corresponding molecular graphs for maximum common substruc- tures. 3.10 Finance Iori et al. [37] study overnight inter-bank traffic of Italian banks between 1999 and 2002. They define a temporal graph in which each vertex corresponds to a bank and each edge indicates that at least one transfer occurred between two banks during the selected time period. Each edge is further anno- tated with the number and total volume of trans- fers. After analyzing various network measures, the authors conclude that while some microstructure characteristics were found (e.g., degree correlates strongly with the size of the bank), the network is somewhat random, which is indicative of an effi- cient system. Wang et al. [81] use a different ap- proach to study financial data as time series. They apply visibility graph analysis to study four time se- ries related to China's quarterly economic growth between 1992 and 2010. They identify small-world properties in all corresponding graphs. 8 3.11 Linguistics Jiang et al. [40] propose a graph-based approach to document classification. Each document is rep- resented by a graph containing a variety of vertex types (e.g., word, part of speech) and edge types (e.g., part of speech to a word, word order). The authors use frequent subgraph mining on document sets to group documents that share similar, un- common phrasing. Biemann [6] proposes Chinese Whispers, a graph clustering algorithm designed to address various natural language processing prob- lems. Example applications studied with Chinese Whispers include language separation (i.e., detect- ing languages in word co-occurrence graphs) and word class acquisition (i.e., clustering a word co- occurrence graph to detect classes of words). 3.12 Other We identified several other applications of graph analysis that do not fit any of the previously dis- cussed application domains. Cardiographs: Jiang et al. [42] study the im- pact of meditation on heartbeat dynamics using visibility graph analysis. They monitor the heart rate of volunteers before and during mediation. The authors find that meditation causes significant changes in heartbeat rhythms. Geometric constraint problem: Geometric constraint problems describe sets of geometric en- tities (e.g., points, lines) and constraints between pairs of entities (e.g., distance, angle) with the pur- pose of assigning to each object a position, orienta- tion, etc. such that all constraints are met. Lee et al. [48] propose an approach based on graph reduc- tion. Their algorithm initially constructs a graph containing each geometric entity as a vertex and each constraint as an edge. Next, it iteratively identifies clusters based on degrees of freedom anal- ysis (typically small cycles) and collapses them to a single pseudo-geometric entity until the graph is reduced to a single vertex. Knowledge-based systems: Rodriguez [70] analyzes the relationships between datasets main- tained by the Linked Data community. They create a graph in which every vertex represents a dataset and every directed edge indicates a reference from one dataset to another. They identify strongly connected communities that correspond well with known domains (e.g., biology, computer science). Recommendation systems: Mirza et al. [54] propose a method for evaluating recommendation systems by interpreting their outcomes as a pair of graphs: a social graph comprised of all users and a bidirectional edge for every pair of similar users, and a recommender graph which extends the social graph with all recommended artifacts. By analyzing the connected components in the recom- mender graph and comparing average path lengths from users to artifacts between the recommender graph and a random graph, the authors evaluate the effectiveness of a recommendation algorithm. Seismology: The visibility graph analysis method has been applied to seismology data to varying success. For example, analyzing earth- quakes in Italy between 2005-2010 reveals a long- range correlation in their magnitudes [79]. How- ever, time-clustering was not detected by the method. Video analysis: Yeung et al. [89] use a Scene Transition Graph to represent shots (as vertices) and the transitions between them (as directed edges). The authors identify strongly connected components as scenes in the analyzed video. Web usage mining: Website operators track the browsing patterns of visitors to study how vis- itors interact with the website, and consequently to identify changes that can be made to the web- site to improve the browsing experience. Heydari et al. [33] propose a graph-based approach to web usage mining. They capture each visitor's traversal through a website as a graph by representing web pages as vertices and links followed from one page to another as edges. Vertices are weighted by the time a user spent on the corresponding page. The authors mine a set of browsing graphs to identify common browsing habits. 4 Graph Features A graph is a structure consisting of a set of vertices and a set of vertex pairs (edges). Graphs are typ- ically used to represent a collection of entities and their pairwise relationships. Many applications ex- tend this model to encode additional information: the strength of a relationship, specific properties of an entity, differentiation of relationships types, etc. In this section we identify several commonly used graph features among the surveyed applica- tions presented in Section 3. We present typical use cases for each feature. 4.1 Edge Orientation indi- Edges in a graph may be either directed, cating a one-way relationship between two ver- tices, or undirected, indicating a two-way rela- tionship. The types of relationships used by the surveyed applications are diverse and we did not identify a clear classification of use cases of ei- 9 ther directed or undirected edges. However, we highlight several recurring relationship types and other observations. First, directed edges are fre- quently used in applications that analyze sequen- tial or causally-connected processes, such as trac- ing movement through time [14], analyzing software call graphs [23], finding valid plans in a planning graph [9], or capturing a person's speech to under- stand psychological disorders [5]. Directed edges are also prevalent in sociology graphs to represent social interactions that are typically initiated by one party. For some types of graphs we found both directed and undirected variations, e.g., some meth- ods for measuring brain activity do not capture the direction of communication, but other methods do. 4.2 Weighted Graphs Keywords used to validate manual weight, length, distance, strength. inspection: A typical extension of the graph model is the ad- dition of weights to edges (and, less commonly, to vertices). That is, the definition of a graph is ex- tended with a function that maps every edge (or vertex) to a single, typically real-valued, weight. Although weights may be used to model any prop- erty, we highlight two typical use cases of edge weights. First, edge weights are commonly used to rep- resent the strength of a relationship. For exam- ple, the edges in a brain network model com- munication paths between two regions. Their edge weights model the amount of activity, e.g., in [4,13,24,74,76,77,85]. Similarly, edges can model the frequency of a relationship's occurrence, e.g., the number of calls made to a function [23], the number of co-authored papers [80], or the number of bank transfers [37]. Second, edge weights may be used to represent the length or distance of a connection. The stereo- typical example for this use of edge weights is road networks. In such a network, edges often repre- sent roads and their weights represent the length of roads (or the expected time taken to travel from the start to the end of the road). This application has been described in [67] and many introductory text books on graph theory. Only the first use case of edge weights as a mea- sure of relationship strength was prevalent among the application presented in Section 3. However, shortest path queries, an important class of graph analysis methods described in Section 5.2, operate on either unweighted graphs or on weighted graphs representing distances. To accommodate shortest path queries on graphs with edge strengths, two ap- proaches are commonly used. First, the weighted graph may be converted to an unweighted graph by removing all edges with a strength below some threshold and removing the weights of all remaining edges. This approach is frequently used for brain networks [4, 13, 24, 74, 77, 85]. Second, the edge strengths may be converted to lengths by defin- ing the length of an edge to be the inverse of its strength. Thus, strong edges are short and a path along several strong relationships may be shorter than a direct path via one weak relationship. This approach has been applied to citation networks [58], brain networks [72], etc. 4.3 Heterogeneous Graphs By definition, graphs consist of one set of vertices and one set of edges. In some graphs, all vertices and edges are homogeneous. That is, they repre- sent instances of one type of entity or relationship, respectively. However, some applications include multiple types of entities and relationship which are combined in a single heterogeneous graph. These types may be encoded in the graph representation as vertex and edge labels2. To avoid confusion with other uses of graph labels, we use the terms ver- tex/entity type and edge/relationship type to distin- guish types of entities and relationships modeled by a heterogeneous graph. Heterogeneity can have significant impact on the structure of a graph. For example, some types of relationships may only occur between two partic- ular types of entities, some types of entities may not be able to have direct relationships with other types, and some types of relationships may be more numerous than others. Each of these examples in- troduces a bias in the number and location of rela- tionships in a graph that can not be explained by topological measures such as degree distribution. Examples of heterogeneity in vertex types include user and tweet vertices in a Twitter graph [87], hosts and domain names in a DNS network [41], and proteins and peptides in proteomics [91]. Examples of heterogeneity in edge types include dependencies between program statement in a call graph [51], causal relationships in diagnosing distributed sys- tems [30], and relationships between words in text classification [40]. 2In graph theory, labeling most commonly refers to as- signing a unique label (or identifier) to every vertex/edge, typically integers from the range [1, #vertices] or [1, #edges]. More generally, a vertex or edge labeling function assigns a label to every vertex or edge, respectively, without restric- tion. 10 4.4 Property Graphs Weighted and heterogeneous graphs both extend graphs with a function mapping vertices and/or edges to a single weight or type. Property graphs generalize this approach to an arbitrary number of functions mapping to arbitrary values. Each func- tion represents a property of the modeled entity or relationship. For example, in a social network one function maps each user vertex to its name and another function maps each friendship edge to the date the friendship was formed. In our characterization, we use a more restricted definition of property graphs; an application is characterized as using property graphs if and only if the analysis of the graph uses the values of these properties. Although the entities and relationships of almost all applications have properties, these properties are not typically used in the analysis of the corresponding graph. For example, a social net- work application may identify communities by con- sidering only the edges present in the graph and not considering the name, date of birth, or other personal information of each user. This application can use any graph analysis system without support for property graphs. Thus, we do not consider such an application to have a property graph. Examples of property graphs include chemical structure graphs annotated with atom and bond characteristics [60, 84], and an attack graph anno- tated with pre- and post-conditions for modeling attack vectors in a compute network [64]. 4.5 Temporal Graphs Keywords used to validate manual inspection: tem- poral, timestamp, evolution. In many real-world applications, graphs evolve over time as the entities and relationships captured in these graphs change. Most surveyed applica- tions do not address this evolution in their analysis; the graphs analyzed by these applications represent snapshots of the real-world networks they model. In contrast, some applications use the temporal na- ture of their graphs explicitly, e.g., to study the evo- lution of the network. Graphs that include tempo- ral data (e.g., the time at which a relationship was established) are known as temporal graphs3. We identify three use cases for temporal graphs. First, they are used to study the evolution of re- lationships in networks. For example, a citation 3In our taxonomy we classify an application as using tem- poral graphs if and only if the application explicitly uses timestamped data for analysis. That is, even if a graph con- sists of timestamped data or data collected over a period of time, it is not classified as a temporal graph if the temporal data is not explicitly analyzed. graph annotated with the publication date of each paper can reveal how scientific communities inter- act and co-evolve [39]. Second, some temporal graphs have static structures but dynamic weights or other properties, e.g., traffic data per hour in a road network [35], or brain activity levels cap- tured periodically [85]. Third, temporal graphs may be used to study sequences of events connected by causality relationships, e.g., communication via messages in a distributed systems [30]. 5 Methods for Graph Analysis Many applications that operate on graphs use graph analysis techniques to extract information from a graph that is not evident from individual en- tities or relationships. For example, the degree of a single vertex in a social network graph may inform us how many friends the corresponding user has, but by analyzing all relationships in the graph, we can determine whether the user is popular, how im- portant they are for cohesion in the network, what communities they are part of, etc. In this section we characterize the methods for graph analysis used by the applications presented in Section 3. 5.1 Neighborhood Statistics Keywords used to identify uses: clustering coeffi- cient, degree distribution, degree assortativity, local efficiency, local subgraph. Many graph-based applications use metrics to quantify a graph's structural properties. We refer to a common class of such metrics as neighborhood statistics. These statistics are computed for each vertex in a graph and depend only on the immedi- ate neighborhood of a vertex4. Two common neighborhood statistics are the de- gree distribution and local clustering coefficient of graph. The degree distribution of a graph is used across many application domains (e.g., biol- ogy [24], finance [81]) to support the hypothesis that a graph's structure is different from a random graph5. Similarly, the local clustering coefficient is 4The neighborhood of a vertex includes the vertex itself, all vertices with an edge to or from the target vertex, and all edges that connect two vertices included in the neighborhood 5Studies across many domains have found that their graphs are power-law graphs, i.e., that the degree distri- bution of the graph follows a power-law distribution. This matches the observations of Barab´asi and Albert [2] who pre- dicted the presence of power-law distribution across many large complex networks. However, the "power-law hypoth- esis" has frequently been argued against, including in a re- cent study by Broido and Clauset [11] which found strong evidence of power-law properties in only 4% of graphs they analyzed. 11 commonly used to characterize a graph as "small- world" [82], i.e., a graph consisting of clusters of highly connected vertices and few interconnections between clusters. Less commonly used statistics include local ef- ficiency [47] as a measure of efficient communica- tion among a vertex's neighbors (e.g., in brain net- works [13,24], road networks [66]) and degree assor- tativity [59] as a measure of how likely high-degree vertices are to be connected (e.g., in [37,66,70,81]). The performance of neighborhood analysis is of- ten sensitive to the structure of the input graph. Graph analysis systems can benefit from exploiting data locality if a vertex's neighborhood is small. However, the presence of several highly connected vertices (e.g., as found in power-law graphs) can lead to a significant imbalance in computation re- quired per vertex. 5.2 Paths and Traversals Keywords used to identify uses: path length, short- est path, breadth-first, depth-first, traversal, global efficiency, random walk. Many applications of graph analysis are not re- stricted to the neighborhood of vertices, but instead involve the analysis of paths between vertices. Of particular interest are shortest path queries, i.e., identify a path of minimal total length between given two vertices (or minimal number of edges in unweighted graphs). Although these queries can be answered individually using Dijkstra's algorithm (or breadth-first search on unweighted graphs), many applications require computing the shortest path between multiple or all vertex pairs (e.g., us- ing the Floyd-Warshall algorithm). We identify three primary uses of shortest path algorithms. First, shortest paths can be used directly, e.g., to find an attack path with the highest probability of success in a network attack graph [64]. Second, the average path length can be used to identify "small-world" properties [82] in a graph. Global efficiency [47], the inverse of the average path length, is used to determine the efficiency of communication between brain re- gions [24], to identify potential software defects [92], etc. Third, the maximum shortest path length (diameter) and related metrics (e.g., eccentricity) are used across many domains to study worst-case paths. We further identify two applications of path- based graph analysis. First, the enumeration of near-shortest paths (i.e., listing all paths between two vertices that are no longer than ρ times the shortest path for a given parameter ρ) is used to identify a broad set of security vulnerabilities in a network [64]. Second, the computation of num- ber of shortest paths between two vertices (i.e., the path multiplicity of a vertex pair) is computed as a measure of flexibility in communication between brain regions [90]. Closely related to path queries are graph traver- sals, i.e., traversing through a graph from a source vertex via its outgoing edges. Typical examples of traversals include breadth-first search and depth- first search, which are both commonly used as building blocks in more complex methods of anal- ysis. In the applications presented in Section 3 we further identified the use of random walks to identify sub-networks of bots in a larger net- work [56], and domain-specific traversals used for planning [9, 32, 34] and debugging distributed sys- tems [30]. 5.3 Connectivity Keywords used to identify uses: connected compo- nents. Instead of identifying how vertices in a graph are connected (i.e., discovering paths), some graph problems are concerned with determining if ver- tices are connected. The typical application of an- alyzing the connectivity of a graph is identifying its connected components. That is, dividing a graph into components such that two vertices belong to the same component if and only if a path exists be- tween them. For directed graphs we distinguish two types of connected components: weak and strong. In a weakly connected component, any pair of ver- tices is connected by an undirected path (i.e., a path that treats every directed edge as though it is undirected). In a strongly connected component, directed paths exist from each vertex to every other vertex in the component. We identify several use cases of identifying connected components in the reviewed articles. First, some applications decompose their graph into connected components to analyze components individually. For example, the largest compo- nent(s) in a communication network [75] or DNS failure graph [41] contain the vast majority of in- teresting vertices. By extracting only those com- ponents, any further analysis is not biased by a large number of isolated vertices. For other applica- tions all components are of interest, e.g., a match- ing problem in a bipartite protein-peptide graph can be split into one smaller sub-problem per con- nected component [91]. Second, the number of components or size of the largest component can be used as metrics to classify graphs. For example, the fraction of ver- tices that belong to the largest connected compo- 12 nent is a highly discriminative feature in classifying breast [8] or bone [7] tissue samples for cancer di- agnosis, or in classifying speech graphs [5, 55]. Third, a graph's components can be interpreted as communities or otherwise related entities. For example, strongly connected components in a scene transition graph correspond to story units [89] and components in a network attack graph corre- spond to sets of servers with vulnerable intercon- nections [61]. Other methods for detecting commu- nities in a graph are presented in Section 5.4. 5.4 Centrality and Ranking Keywords used to identify uses: centrality, PageR- ank, ranking, HITS. In most real-world networks, not all entities are of equal importance to the network. Key to numer- ous applications is identifying the most important entities in a network. This is typically achieved by assigning to each entity a score to signify its impor- tance and deriving a ranking from these scores. Most commonly-used measures of importance are based on vertex- or edge-centrality. The centrality of a vertex or edge is a measure of how important it is to the structure of a network. Three commonly used categories of centrality are betweenness cen- trality, closeness centrality, and degree centrality, as first popularized by Freeman [26] in the context of social networks6. More recently, PageRank cen- trality [62] has seen adoption across application do- mains after first being used to identify important websites in the Google search engine. Other measures for ranking used by reviewed ap- plications include: information centrality in soft- ware dependency graphs [92], straightness central- ity in road networks [67], ObjectRank as adap- tation of PageRank to a heterogeneous Twitter graph [87], and Hyperlink-Induced Topic Search (HITS) to identify hubs and authorities (e.g., on Twitter [88]). 5.5 Clustering Keywords used to identify uses: cluster(ing), com- munity/communities. Clustering is the act of identifying clusters (or groups) of entities in a graph. Clustering tech- niques are often used to extract groups of related entities from a graph based on the relationships 6Although Freeman's centrality measures were defined in earlier work by different authors, Freeman is often credited for providing an intuitive conceptual interpretation of cen- trality in the context of social networks and for identify- ing three types of centrality that cover important structural characteristics of social networks. they have formed. Because the definition of "re- lated entities" is application-specific, there exist many specialized algorithms for clustering. Among the surveyed applications, we identify two main ap- proaches. First, some applications decompose a graph into well-defined groups, e.g., connected com- ponents [78, 89, 91] or cliques [50, 71, 80]. We refer to this approach as rule-based clustering. Second, applications can use community detec- tion algorithms. Although there are many conflict- ing definitions of communities, a community is typ- ically characterized by a large number of internal relationships and a small number of relationships with entities outside the community. Applications of community detection include grouping related papers in a citation network [39], identifying city regions [35], and finding people with shared inter- ests [75]. We refer to this approach as community- based clustering. 5.6 Subgraph Isomorphism and Pat- terns Keywords used to identify uses: subgraph, isomor- phism, motif, pattern matching, cycle, clique, star, mesh. The subgraph isomorphism problem is the task of identifying a subgraph of the input graph that is isomorphic to a second graph (the pattern). The outcome of the subgraph isomorphism prob- lem may be used directly by applications, e.g., to lookup chemical compounds by structure in a database [60, 84], or to determine the similar- ity of two program dependence graphs for plagia- rism detection [51]. Subgraph isomorphism is also used as a component for solving other problems. For example, frequent subgraph mining uses sub- graph isomorphism to identify subgraphs that oc- cur frequently in a set of graphs. This technique can be used to discover common web browsing patterns [33], localize software bugs [23], classify text [40], etc. More recently, discriminative sub- graph mining algorithms have been developed to identify discriminative subgraphs, That is, given a set of labeled input graphs, these algorithms identify subgraphs that typically occur in graphs with one label, but not in graphs with another la- bel. An exemplary use case for discriminative sub- graph mining is locating bugs through program flow graphs, each labeled as either "triggered bug" or "did not trigger bug" [16]. Related to subgraph isomorphism is the problem of identifying subgraphs that match a more loosely defined pattern, e.g., a clique or a star. Unlike the patterns used as input to subgraph isomorphism, stars and cliques describe a general structure of ver- 13 tices and edges, but no fixed size7. We refer to this set of problems as pattern detection. Example ap- plications include identifying protein complexes as clique patterns [50] and identifying malicious hosts or domain names as star patterns in a DNS failure graph [41]. 5.7 Graph Mutation Many applications add properties to an input graph as part of their graph analysis method, e.g., by adding a distance attributed to every vertex in a shortest path computation, or a component iden- tifier as output of a connected components algo- rithm. In contrast, the structure of the graph is often static: vertices and edges are neither added nor removed. We identify several use cases for mu- tating a graph's structure as part of the analysis of a graph. We distinguish between graph construc- tion, i.e., extending the input graph or constructing a new graph algorithmically, and graph reduction, i.e., removing or merging vertices or edges from the input graph. In our taxonomy, we do not consider extracting a subgraph from the input graph to be graph mutation. Graph construction is used to dynamically gen- erate parts of a planning graph that are relevant to the analysis, especially when the full planning graph contains many irrelevant vertices and may not fit in memory [9, 34]. Graph reduction is often used to merge groups of related vertices into one vertex per group, thereby creating a new, smaller graph that hides relationships within groups and exposes relationships between groups. This ap- proach is used to group protein complexes in pro- tein interaction networks [71], communities of au- thors in citation graphs [80], city regions in a road network [35], etc. Other use cases include simulat- ing brain damage models by deleting edges from a brain network [76] and replacing frequently occur- ring patterns in a graph with a single copy and an associated count to shrink the graph [53]. 5.8 Other We identify three applications whose primary method of graph analysis does not match any of the aforementioned classes of methods. First, Calder- ara et al. [14] use spectral graph theory to charac- terize a graph constructed from paths formed by 7It is possible to identify these specific patterns by creat- ing stars or cliques of al possible sizes (up to the size of the graph) and using these as concrete patterns for a subgraph isomorphism algorithm. However, this process is inefficient and may not be feasible for more complex patterns. Inciden- tally, this approach proves the NP-completeness of subgraph isomorphism by reduction from the clique problem. moving people and to identify anomalous paths. Second, Polonium [15] uses an algorithm based on belief propagation to identify files that are likely to be malicious. Third, Zhang et al. [91] use a greedy set cover algorithm to identify a feasible set of pro- teins to explain the observed set of protein frag- ments. 6 Taxonomy As described in Section 2.3, we classified for every selected application the graph features and analy- sis methods they use. The results of this process are presented as a taxonomy in Table 3. The table depicts for each class of graph features (see Sec- tion 4) and analysis methods (see Section 5, except "other" methods) whether it is used by a given ap- plication, and, where applicable, which variants of a feature or method are used. The variants are listed in the caption of Table 3 and described in more detail in their respective subsections in Sec- tions 4 and 5. Table 4 summarizes the frequency of occurrence for each class and each variant of graph features and analysis methods. Overall, we find significant diversity in the graphs and analysis methods used by the surveyed appli- cations. As depicted in Table 4, all classes of graph features are present in at least 9 applications (15%), whereas all classes of analysis methods are present in at least 13 applications (∼22%). Variations of each class tend to differ significantly in the num- ber of occurrences, e.g., of applications using paths and traversals, all-pair shortest path algorithms are used by 19 applications, whereas only 1 application uses single-source shortest paths. As shown in Table 3, there is not only signifi- cant diversity in the graph features and analysis methods used, but also in the combinations of fea- tures and methods. Some combinations occur with high frequency, e.g., local clustering coefficient and all-pair shortest paths are combined in many ap- plications to identify "small-world" properties in a graph. Many other combinations are infrequent, but there is no clear segregation between classes of features or methods. This suggest that support for all features and methods should be supported in a single graph analysis platform. We observe that diversity was not found across all application domains. In particular, we find sig- nificant overlap in the approaches used within the neuroscience, psychology, and chemistry domains, although the number of surveyed articles in each domain is too small to make sound claims about the representativeness of our results for individual domains. 14 Table 3: Taxonomy of surveyed articles. A dot indicates that a graph feature or analysis method was not identified in an article. Legend by column: Weighted: vertex (V), edge (E), edge weights removed after filtering low weight edges from input ((cid:63)). Heterogeneous: vertex (V), edge (E). Properties: vertex (V), edge (E). Neighborhood Statistics: clustering coefficient (C), degree distribution (D), other ((cid:63)). Paths & Traversals: shortest path (S), average path length (A), maximum path length (M), traversal (T), other ((cid:63)). Connectivity: weakly connected components (W), strongly connected components (S). Centrality & Ranking: betweenness centrality (B), closeness centrality (C), degree centrality (D), PageRank (P), other ((cid:63)). Clustering: rule-based (R), community-based (C). Subgraph Isomorphism & Mining: pattern detection (P), subgraph isomorphism (S), frequent subgraph mining (F), discriminative subgraph mining (D). Graph Mutation: construction (C), reduction (R). Graph Features Graph Analysis Methods s e g d E d e t c e r i d e t h g i e [3] [7] [8] [45] [50] [65] [71] [91] [4] [13] [24] [74] [76] [77] [85] [90] W Ref. D · · · · · · ·  · ·  E · · · · · (cid:63) · E  (cid:63) · (cid:63) · E · (cid:63)  (cid:63) ·   E · · · · ·  · · ·   E ·   E ·  ·  ·  · · ·  [16] [23] [30] [51] [53] [78] [92] [14] [15] [41] [46] [56] [61] [64] Domain Biology Neuroscience Security Software Engineering A l a r o p m e T s e i t r e p o r P s l a s r e v a r T & s h t a P d o o h r o b h g i e N s c i t s i t a t S y t i v i t c e n n o C g n i k n a R & y t i l a r t n e C s u o e n e g o r e t e H · · · · · · · · · · · · · · · V · · · · · · · · · · · · ·  · · · · · V  V · · · · · · · · E · · E VE  · E · · · · · · · · C · CD AM W · CD AM W · · · · · · · · · · S T · · · W · · · W · · C A · · C(cid:63) A · · CD(cid:63) A · · A · · A · · A · · · · · A(cid:63) · · · · · · · · W · VE  CD(cid:63) M · · T · M WS · S(cid:63) VE · · · T · T · · · · · W · W BCD(cid:63) C C CD · CD · · · · · · · · · · · D C(cid:63) · · C · · · · · · B · · · · B · · · · · · · · · · · · · · V V · VE · · m s i h p r o m o s I h p a r g b u S s n r e t t a P & · · · F P · P · · · · · · · · · · · P · · · · D F · S F SF P n o i t a t u M h p a r G · · · · R R R R · · · · R · · · · · · · · · · · · R · R · · g n i r e t s u C l · · · · R · R R · · · · · · · C · · C · C · · · · · · · R · 15 Table 3: Continued. Graph Features Graph Analysis Methods s e g d E d e t c e r i Domain Ref. D d e t h g i e s u o e n e g o r e t e H Logistics & Planning Sociology Psychology Science Chemistry Finance Linguistics Other [9] [19] [32] [34] [35] [66] [67] [43] [75] [87] [88] [5] [49] [55] [28] [39] [80] [60] [84] [37] [81] [6] [40] [33] [42] [48] [54] [70] [79] [89]  ·    · ·     W · · · · V · E · · E · · · · · · E · · E · E V · · V · · · · · VE V ·  · · ·  · · ·  · · · · · · · · · · · ·  VE VE ·  · · · V  V ·  · · ·  V · · · · · · l a r o p m e T s l a s r e v a r T & s h t a P y t i v i t c e n n o C s c i t s i t a t S d o o h r o b h g i e N · · · · · CD(cid:63) · · · · · C(cid:63) C C(cid:63) · · T · · · · · T · · T · ·  · · A · · · · ·  · AM W · · · · · · · S A · · AM · A WS · · A · ·  · ·  · · · · · · ·  CD(cid:63) M · · A · · · · · · · · · · · · · · · · A W · AM WS · · · · · S CD(cid:63) · · · D · · D(cid:63) D · D · · · · s e i t r e p o r P · · · · · · · · · · · · · · V · · VE VE · · · · · · · · · · · g n i k n a R & y t i l a r t n e C · B · · BP · BCD(cid:63) P(cid:63) · P(cid:63) (cid:63) · · · · B · · · · D · · · · · · P · · g n i r e t s u C l · · · · C · · · · · · · · · · C R · · · C C · · · · · C · R m s i h p r o m o s I h p a r g b u S s n r e t t a P & · · · · · · · · · · · · · · · · P S S · · · F F · S · · · · n o i t a t u M h p a r G C · · C R · · · · · · · · · R · R · · · · · · · · R · · · · Finally, we note that two entries in the taxon- omy have no associated analysis methods: applica- tions [14] and [15] in the security domain. As de- scribed in Section 5.8, these applications use graph analysis methods that do not fit any of the identi- fied classes and are not used by any other applica- tion. 7 Future Research Directions Using the analysis of our taxonomy as presented in Section 6, we present several directions for fu- ture research in the development and tuning of graph analysis systems with a focus on functional- ity and performance. First, the significant diversity 16 Table 4: Summary of the number of applications that use a given graph feature or analysis method, derived from the taxonomy presented in Table 3. Total # Applications # Applications Per Option Graph Features Directed Edges Weighted Heterogeneous Properties Temporal Graph Analysis Methods Neighborhood Statistics Paths & Traversals Connectivity Centrality & Ranking Clustering Subgraph Isomorphism & Patterns Graph Mutation 31 19 13 9 9 23 30 15 13 14 16 13 : 31 V: 3, E: 12, (cid:63): 5 V: 10, E: 5 V: 9, E: 6 : 9 C: 18, D: 14, (cid:63):10 S: 1, A: 19, M:8, T: 7, (cid:63): 2 W: 12, S: 6 B: 7, C: 3, D: 3, P: 4, (cid:63): 5 R: 6, C: 8 P: 5, S: 5, F: 6, D: 1 R: 11, C: 2 in graph features, analysis methods, and their com- binations used in real-world applications suggests a need for graph analysis platforms with support for many classes of graphs and analysis methods. Re- cent developments of graph analysis platforms have focused on either graph databases (e.g., Neo4j [57]) or (parallel) graph processing platforms (Doekemei- jer et al. [21] surveyed many). Graph databases have extensive support for mutable, heterogeneous property graphs, for path queries, and for pattern matching. In contrast, graph processing platforms typically focus on static graphs and large-scale ana- lytics using methods such as centrality and cluster- ing. We do observe a trend towards bridging this gap, e.g., with Neo4j announcing support for graph algorithms in their database [36]. Second, many applications use more than one method of analysis on the same graph, so there is a need for platforms that allow either interactive analysis or workflows of algorithms for batch pro- cessing. Typical graph databases already offer this functionality by providing a service that can be in- teractively queried, but graph processing platforms typically require loading a copy of the graph from disk for each job (i.e., a single algorithm). Future research on graph processing platforms may study the reuse of a graph stored in memory to speed up sequences of jobs, or even multiple algorithms exe- cuting in parallel on the same graph. This research, as well as the development of new benchmarks to assess support for graph analysis workflows, may require additional insight in how practitioners use graph analysis platforms (e.g., do they define in ad- vance a set of algorithms to run, or is the selection of analysis methods guided by results of the previ- ous method?) Third, we observe that many graphs analyzed in practice share a common set of high-level fea- tures, as evident from our taxonomy, but that the structural properties of graphs vary widely and are known to impact significantly the perfor- mance of graph analysis [38]. Although some struc- tural characteristics are well-defined, e.g., bipar- tite graphs, there is not comprehensive set of met- rics that captures all structural properties relevant to graph analysis performance. Ongoing work on this topic includes the development of synthetic dataset generators that aim to replicate various structural properties of real-world datasets, e.g., DataSynth [68] and Darwini [22]. Finally, we find that many surveyed applica- tions operate on small graphs, i.e., under a mil- lion vertices and edges8. Most of the larger graphs, i.e., hundreds of millions of edges and more, were found in domains studying digital networks, in- cluding social media networks, software engineer- ing networks, and computer security networks. The largest graph we identified is used to identify mal- ware and consists of nearly 1 billion vertices and 37 billion edges [15]. These findings contradict a recent user study by Sahu et al. [73] which found that large-scale graphs are more frequent and can be found across many domains. Possible explana- 8Some surveyed articles do not explicitly state the size of their graph, or they present a general solution without a con- crete input graph. We have not quantified the precise scales of each application's graph, but draw conclusions based on estimations. 17 tions for this contradiction include the more recent data used by the user study9, a potential bias in [73] due to surveying users of specific software products (of which many explicitly target large-scale graph analysis), and a disparity between graphs used in academia versus industry. 8 Reproducibility To facilitate the validation and reproduction of our results, we provide the data collected and pro- duced while performing this survey as open-access data [31]. We provide a complete list of search re- sults obtained via Google Scholar, a shortlist of relevant identified results (see Section 2.2), and the resulting analysis and characterization (see Sec- tions 2.3, 6). 9 Conclusion The development and tuning of graph analysis plat- forms benefits greatly from knowledge of their prac- tical applications. However, such knowledge re- quires a broad view of graph analysis use cases across many domains and an in-depth view of the datasets and algorithms they use. Earlier work fo- cuses on few applications, provides a high-level view of many applications, or studies in depth a small set of algorithms. In this work we made a threefold contribution to- wards gaining insight in the practical use of graph analysis: (i) we defined and applied a systematic method for identifying and selecting relevant lit- erature on graph analysis applications across many domains, (ii) we presented a taxonomy of the graph features and graph analysis methods used in prac- tice, and (iii) we proposed several directions for fu- ture research in developing and tuning graph anal- ysis platforms. Our primary observation is the large diversity in the domains to which the identified applications be- long and in the classes of graph features and anal- ysis methods they use. From 5 classes of graph features and 7 classes of analysis methods, each was encountered in at least 15% of surveyed ap- plications. We further observe that most applica- tions use multiple analysis methods and that many 9The development of large-scale graph processing plat- forms did not gain significant traction until the publication of Pregel in 2010 [21], so we believe it is feasible that adop- tion of large-scale graph analysis techniques has increased between the publication of our surveyed articles (many of which appeared before 2010) and the 2017 study by Sahu et al. classes of analysis are combined in practice. In con- trast, some domains show significant homogeneity, especially neuroscience, a domain that focuses on the analysis of brain networks and has seemingly developed a common set of techniques for analyz- ing such networks. We conclude that future research in the develop- ment and tuning of graph analysis platforms should focus on integrating support for a wide range of graph features and analysis methods, in contrast to the dichotomy of graph databases and parallel graph processing frameworks that currently exists. Additionally, the combination of multiple analysis methods, interactively or as a workflow, should be further investigated and supported in future sys- tems. Finally, to understand the differences in graphs across domains and their impact on perfor- mance, additional research is needed to character- ize the structural characteristics of graphs beyond simple structures such as bipartite graphs. References [1] T. Aittokallio and B. Schwikowski. Graph- based methods for analysing networks in cell biology. Briefings in bioinformatics, 7(3):243– 255, 2006. [2] A.-L. Barab´asi and R. Albert. Emergence science, of scaling in random networks. 286(5439):509–512, 1999. [3] A. Barber´an, S. T. Bates, E. O. Casamayor, and N. Fierer. Using network analysis to ex- plore co-occurrence patterns in soil microbial communities. The ISME journal, 6(2):343, 2012. [4] F. Bartolomei, I. Bosma, M. Klein, J. C. Baayen, J. C. Reijneveld, T. J. Postma, J. J. Heimans, B. W. van Dijk, J. C. de Munck, A. de Jongh, K. S. Cover, and C. J. Stam. Disturbed functional connectivity in brain tu- mour patients: Evaluation by graph analysis of synchronization matrices. Clinical Neuro- physiology, 117(9):2039 – 2049, 2006. [5] L. Bertola, N. B. Mota, M. Copelli, T. Rivero, B. S. Diniz, M. A. Romano-Silva, S. Ribeiro, and L. F. Malloy-Diniz. Graph analysis of verbal fluency test discriminate between pa- tients with alzheimer's disease, mild cognitive impairment and normal elderly controls. Fron- tiers in aging neuroscience, 6:185, 2014. [6] C. Biemann. Chinese whispers: an efficient graph clustering algorithm and its applica- tion to natural language processing problems. 18 In Proceedings of the first workshop on graph based methods for natural language processing, pages 73–80. Association for Computational Linguistics, 2006. [7] C. C. Bilgin, P. Bullough, G. E. Plopper, and B. Yener. Ecm-aware cell-graph mining for bone tissue modeling and classification. Data mining and knowledge discovery, 20(3):416– 438, 2010. [8] C. C. Bilgin, C. Demir, C. Nagi, and B. Yener. Cell-graph mining for breast tissue modeling and classification. In Engineering in Medicine and Biology Society, 2007. EMBS 2007. 29th Annual International Conference of the IEEE, pages 5311–5314. IEEE, 2007. [9] A. Blum and M. L. Furst. Fast planning through planning graph analysis. Artif. Intell., 90(1-2):281–300, 1997. [10] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang. Complex networks: Structure and dynamics. Physics reports, 424(4-5):175–308, 2006. [11] A. D. Broido and A. Clauset. Scale-free net- works are rare. CoRR, abs/1801.03400, 2018. [12] E. Bullmore and O. Sporns. Complex brain networks: graph theoretical analysis of struc- tural and functional systems. Nature Reviews Neuroscience, 10(3):186, 2009. [13] K. Caeyenberghs, A. Leemans, M. H. Heit- ger, I. Leunissen, T. Dhollander, S. Sunaert, P. Dupont, and S. P. Swinnen. Graph analysis of functional brain networks for cognitive con- trol of action in traumatic brain injury. Brain, 135(4):1293–1307, 2012. [14] S. Calderara, U. Heinemann, A. Prati, R. Cuc- chiara, and N. Tishby. Detecting anomalies in people's trajectories using spectral graph anal- ysis. Computer Vision and Image Understand- ing, 115(8):1099–1111, 2011. [15] D. H. . Chau, C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos. Polonium: Tera- scale graph mining and inference for malware detection. In Proceedings of the 2011 SIAM In- ternational Conference on Data Mining, pages 131–142. SIAM, 2011. [16] H. Cheng, D. Lo, Y. Zhou, X. Wang, and X. Yan. Identifying bug signatures using dis- criminative graph mining. In Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA 2009, Chicago, IL, USA, July 19-23, 2009, pages 141–152, 2009. [17] D. Conte, P. Foggia, C. Sansone, and M. Vento. Thirty years of graph matching in pattern recognition. International journal of pattern recognition and artificial intelligence, 18(03):265–298, 2004. [18] L. d. F. Costa, O. N. Oliveira Jr, G. Travieso, F. A. Rodrigues, P. R. Villas Boas, L. An- tiqueira, M. P. Viana, and L. E. Correa Rocha. Analyzing and modeling real-world phenom- ena with complex networks: a survey of appli- cations. Advances in Physics, 60(3):329–412, 2011. [19] E. M. Daly and M. Haahr. Social network anal- ysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM Intera- tional Symposium on Mobile Ad Hoc Network- ing and Computing, MobiHoc 2007, Montreal, Quebec, Canada, September 9-14, 2007, pages 32–40, 2007. [20] M. Demange, T. Ekim, B. Ries, and C. Tanas- escu. On some applications of the selective graph coloring problem. European Journal of Operational Research, 240(2):307–314, 2015. [21] N. Doekemeijer and A. L. Varbanescu. A sur- vey of parallel graph processing frameworks. Delft University of Technology, page 21, 2014. [22] S. Edunov, D. Logothetis, C. Wang, A. Ching, and M. Kabiljo. Darwini: Generating realis- tic large-scale social graphs. arXiv preprint arXiv:1610.00664, 2016. [23] F. Eichinger, K. Bohm, and M. Huber. Min- ing edge-weighted call graphs to localise soft- ware bugs. In Machine Learning and Knowl- edge Discovery in Databases, European Con- ference, ECML/PKDD 2008, Antwerp, Bel- gium, September 15-19, 2008, Proceedings, Part I, pages 333–348, 2008. [24] F. D. V. Fallani, L. Astolfi, F. Cincotti, D. Mattia, M. G. Marciani, S. Salinari, J. Kurths, S. Gao, A. Cichocki, A. Colosimo, et al. Cortical functional connectivity net- works in normal and spinal cord injured pa- tients: evaluation by graph analysis. Human brain mapping, 28(12):1334–1346, 2007. [25] S. Fortunato. Community detection in graphs. Physics reports, 486(3-5):75–174, 2010. 19 [26] L. C. Freeman. Centrality in social net- Social net- works conceptual clarification. works, 1(3):215–239, 1978. [27] R. Garc´ıa-Domenech, J. V. de Juli´an-Ortiz, and L. Pogliani. Some new trends in chemical graph theory. Chemical Re- views, 108(3):1127–1169, 2008. J. G´alvez, [28] N. Gondal. The local and global structure of knowledge production in an emergent research field: An exponential random graph analysis. Social Networks, 33(1):20–30, 2011. [29] Y. Guo, M. Biczak, A. L. Varbanescu, A. Io- sup, C. Martella, and T. L. Willke. How well do graph-processing platforms perform? an empirical performance evaluation and analysis. In Parallel and Distributed Processing Sym- posium, 2014 IEEE 28th International, pages 395–404. IEEE, 2014. [30] Z. Guo, D. Zhou, H. Lin, M. Yang, F. Long, C. Deng, C. Liu, and L. Zhou. G2: A graph processing system for diagnosing distributed systems. In 2011 USENIX Annual Technical Conference, Portland, OR, USA, June 15-17, 2011, 2011. [31] T. Hegeman and A. Iosup. Dataset for sur- vey on applications of graph analysis. https: //doi.org/10.5281/zenodo.1298640, June 2018. [32] M. Helmert. A planning heuristic based on causal graph analysis. In Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), June 3-7 2004, Whistler, British Columbia, Canada, pages 161–170, 2004. [33] M. Heydari, R. A. Helal, and K. I. Ghauth. A graph-based web usage mining method consid- ering client side data. In Electrical Engineer- ing and Informatics, 2009. ICEEI'09. Inter- national Conference on, volume 1, pages 147– 153. IEEE, 2009. [34] J. Hong. Goal recognition through goal graph analysis. J. Artif. Intell. Res., 15:1–30, 2001. [35] X. Huang, Y. Zhao, C. Ma, J. Yang, X. Ye, and C. Zhang. Trajgraph: A graph-based visual analytics approach to studying urban network centralities using taxi trajectory data. IEEE Trans. Vis. Comput. Graph., 22(1):160–169, 2016. Hunger. Proudly Efficient Graph Algorithms [36] M. ing: Neo4j. efficient-graph-algorithms-neo4j/, August 3, 2017. Accessed: 2018-04-05. Releas- in https://neo4j.com/blog/ [37] G. Iori, G. De Masi, O. V. Precup, G. Gabbi, and G. Caldarelli. A network analysis of the italian overnight money market. Journal of Economic Dynamics and Control, 32(1):259– 278, 2008. [38] A. Iosup, T. Hegeman, W. L. Ngai, S. Heldens, A. Prat-P´erez, T. Manhardto, H. Chafio, M. Capota, N. Sundaram, M. Anderson, et al. Ldbc graphalytics: A benchmark for large- scale graph analysis on parallel and distributed platforms. Proceedings of the VLDB Endow- ment, 9(13):1317–1328, 2016. [39] M. Jacovi, V. Soroka, G. Gilboa-Freedman, S. Ur, E. Shahar, and N. Marmasse. The chasms of CSCW: a citation graph analysis of the CSCW conference. In Proceedings of the 2006 ACM Conference on Computer Sup- ported Cooperative Work, CSCW 2006, Banff, Alberta, Canada, November 4-8, 2006, pages 289–298, 2006. [40] C. Jiang, F. Coenen, R. Sanderson, and M. Zito. Text classification using graph mining-based feature extraction. In Re- search and Development in Intelligent Systems XXVI, Incorporating Applications and Inno- vations in Intelligent Systems XVII, Peter- house College, Cambridge, UK, 15-17 Decem- ber 2009, pages 21–34, 2009. [41] N. Jiang, J. Cao, Y. Jin, E. L. Li, and Identifying suspicious activities Z. Zhang. through DNS failure graph analysis. In Pro- ceedings of the 18th annual IEEE International Conference on Network Protocols, ICNP 2010, Kyoto, Japan, 5-8 October, 2010, pages 144– 153, 2010. [42] S. Jiang, C. Bian, X. Ning, and Q. D. Ma. Vis- ibility graph analysis on heartbeat dynamics of meditation training. Applied Physics Letters, 102(25):253702, 2013. [43] A. Khrabrov and G. Cybenko. Discovering in- fluence in communication networks using dy- namic graph analysis. In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE In- ternational Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, 20 Minnesota, USA, August 20-22, 2010, pages 288–294, 2010. [44] B. Kitchenham and S. Charters. Guidelines for performing systematic literature reviews in software engineering. Technical report, Keele University and Durham University Joint Re- port, 2007. [45] M. Koyuturk, A. Grama, and W. Szpankowski. An efficient algorithm for detecting frequent subgraphs in biological networks. Bioinformat- ics, 20(suppl 1):i200–i207, 2004. [46] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. Dumitras. The dropper effect: Insights into malware distribution with downloader graph analytics. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Com- munications Security, Denver, CO, USA, Oc- tober 12-6, 2015, pages 1118–1129, 2015. [47] V. Latora and M. Marchiori. Efficient behav- ior of small-world networks. Physical review letters, 87(19):198701, 2001. [48] K.-Y. Lee, O.-H. Kwon, J.-Y. Lee, and T.- W. Kim. A hybrid approach to geometric constraint solving with graph analysis and re- duction. Advances in Engineering Software, 34(2):103 – 113, 2003. [49] A. J. Lerner, P. K. Ogrocki, and P. J. Thomas. Network graph analysis of category fluency testing. Cognitive and Behavioral Neurology, 22(1):45–52, 2009. [50] X.-L. Li, C.-S. Foo, S.-H. Tan, and S.-K. Ng. Interaction graph mining for protein com- plexes using local clique merging. Genome In- formatics, 16(2):260–269, 2005. [51] C. Liu, C. Chen, J. Han, and P. S. Yu. GPLAG: detection of software plagiarism by program dependence graph analysis. In Pro- ceedings of the Twelfth ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, Au- gust 20-23, 2006, pages 872–881, 2006. [52] G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn, N. Leiser, and G. Cza- jkowski. Pregel: a system for large-scale graph processing. In Proceedings of the 2010 ACM SIGMOD International Conference on Man- agement of data, pages 135–146. ACM, 2010. In Proceedings of mining on heap dumps. the 16th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Min- ing, Washington, DC, USA, July 25-28, 2010, pages 115–124, 2010. [54] B. J. Mirza, B. J. Keller, and N. Ramakrish- nan. Studying recommendation algorithms by graph analysis. J. Intell. Inf. Syst., 20(2):131– 160, 2003. [55] N. B. Mota, R. Furtado, P. P. Maia, M. Copelli, and S. Ribeiro. Graph analysis of dream reports is especially informative about psychosis. Scientific reports, 4:3691, 2014. [56] S. Nagaraja, P. Mittal, C. Hong, M. Cae- sar, and N. Borisov. Botgrep: Finding P2P bots with structured graph analysis. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings, pages 95–110, 2010. [57] Neo4j, Inc. The Neo4j Graph Platform. https://neo4j.com/. Accessed: 2018-04-05. [58] M. E. Newman. Scientific collaboration ii. shortest paths, weighted net- Physical review E, networks. works, and centrality. 64(1):016132, 2001. [59] M. E. Newman. Assortative mixing in net- works. Physical review letters, 89(20):208701, 2002. [60] S. Nijssen and J. N. Kok. Frequent graph min- ing and its application to molecular databases. In Systems, Man and Cybernetics, 2004 IEEE International Conference on, volume 5, pages 4571–4577. IEEE, 2004. [61] S. Noel and S. Jajodia. Metrics suite for network attack graph analytics. In Cyber and Information Security Research Confer- ence, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014, pages 5–8, 2014. [62] L. Page, S. Brin, R. Motwani, and T. Wino- grad. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999. [63] B. Peng, L. Zhang, and D. Zhang. A survey of graph theoretical approaches to image segmen- tation. Pattern Recognition, 46(3):1020–1038, 2013. [53] E. K. Maxwell, G. Back, and N. Ramakrish- nan. Diagnosing memory leaks using graph [64] C. A. Phillips and L. P. Swiler. A graph-based system for network-vulnerability analysis. In 21 Proceedings of the 1998 Workshop on New Se- curity Paradigms, Charlottsville, VA, USA, September 22-25, 1998, pages 71–79, 1998. [65] A. Pinna, N. Soranzo, and A. de la Fuente. From knockouts to networks: Establishing di- rect cause-effect relationships through graph analysis. PLOS ONE, 5(10):1–8, 10 2010. [66] S. Porta, P. Crucitti, and V. Latora. The network analysis of urban streets: a dual ap- proach. Physica A: Statistical Mechanics and its Applications, 369(2):853–866, 2006. [67] S. Porta, P. Crucitti, and V. Latora. The net- work analysis of urban streets: a primal ap- proach. Environment and Planning B: plan- ning and design, 33(5):705–725, 2006. [68] A. Prat-P´erez, J. Guisado-G´amez, X. F. Salas, P. Koupy, S. Depner, and D. B. Bartolini. To- wards a property graph generator for bench- marking. In Proceedings of the Fifth Interna- tional Workshop on Graph Data-management Experiences & Systems, page 6. ACM, 2017. [69] T. Reps. Program analysis via graph reacha- bility1. Information and software technology, 40(11-12):701–726, 1998. [70] M. A. Rodriguez. A graph analysis of the linked data cloud. CoRR, abs/0903.0194, 2009. [71] L. Royer, M. Reimann, B. Andreopoulos, and M. Schroeder. Unraveling protein networks with power graph analysis. PLOS Computa- tional Biology, 4(7):1–17, 07 2008. [72] M. Rubinov and O. Sporns. Complex network measures of brain connectivity: uses and in- terpretations. Neuroimage, 52(3):1059–1069, 2010. [73] S. Sahu, A. Mhedhbi, S. Salihoglu, J. Lin, and M. T. Ozsu. The ubiquity of large graphs and surprising challenges of graph processing. Proceedings of the VLDB Endowment, 11(4), 2017. [74] E. J. Sanz-Arigita, M. M. Schoonheim, J. S. Damoiseaux, S. A. R. B. Rombouts, E. Maris, F. Barkhof, P. Scheltens, and C. J. Stam. Loss of small-world networks in alzheimer's disease: Graph analysis of fmri resting-state functional connectivity. PLOS ONE, 5(11):1–14, 11 2010. [76] C. Stam, W. De Haan, A. Daffertshofer, B. Jones, I. Manshanden, A.-M. van Cap- pellen van Walsum, T. Montez, J. Verbunt, J. De Munck, B. Van Dijk, et al. Graph the- oretical analysis of magnetoencephalographic functional connectivity in alzheimer's disease. Brain, 132(1):213–224, 2008. [77] K. Supekar, V. Menon, D. Rubin, M. Musen, and M. D. Greicius. Network analysis of intrinsic functional brain connectivity in alzheimer's disease. PLoS computational bi- ology, 4(6):e1000100, 2008. [78] D. Surian, D. Lo, and E. Lim. Mining collab- oration patterns from a large developer net- work. In 17th Working Conference on Re- verse Engineering, WCRE 2010, 13-16 Octo- ber 2010, Beverly, MA, USA, pages 269–273, 2010. [79] L. Telesca and M. Lovallo. Analysis of seis- mic sequences by using the method of vis- ibility graph. EPL (Europhysics Letters), 97(5):50002, 2012. [80] G. Tsatsaronis, I. Varlamis, S. Torge, M. Reimann, K. Nørvag, M. Schroeder, and M. Zschunke. How to become a group leader? or modeling author types based on graph min- ing. In Research and Advanced Technology for Digital Libraries - International Conference on Theory and Practice of Digital Libraries, TPDL 2011, Berlin, Germany, September 26- 28, 2011. Proceedings, pages 15–26, 2011. [81] N. Wang, D. Li, and Q. Wang. Visibility graph analysis on quarterly macroeconomic series of china based on complex network theory. Phys- ica A: Statistical Mechanics and its Applica- tions, 391(24):6543–6555, 2012. [82] D. J. Watts and S. H. Strogatz. Collec- tive dynamics of small-worldnetworks. nature, 393(6684):440, 1998. [83] J. Webster and R. T. Watson. Analyzing the past to prepare for the future: Writing a liter- ature review. MIS Quarterly, 26(2), 2002. [84] J. K. Wegner, H. Frohlich, H. M. Mielenz, and A. Zell. Data and graph mining in chemical space for adme and activity data sets. Molec- ular Informatics, 25(3):205–220, 2006. [75] M. F. Schwartz and D. C. M. Wood. Dis- covering shared interests using graph analysis. Commun. ACM, 36(8):78–89, 1993. [85] C. Wilke, G. Worrell, and B. He. Graph analy- sis of epileptogenic networks in human partial epilepsy. Epilepsia, 52(1):84–93, 2011. 22 [86] C. Wohlin. Guidelines for snowballing in systematic literature studies and a replica- tion in software engineering. In 18th Inter- national Conference on Evaluation and As- sessment in Software Engineering, EASE '14, London, England, United Kingdom, May 13- 14, 2014, pages 38:1–38:10, 2014. [87] Y. Yamaguchi, T. Takahashi, T. Amagasa, and H. Kitagawa. Turank: Twitter user rank- ing based on user-tweet graph analysis. In Web Information Systems Engineering - WISE 2010 - 11th International Conference, Hong Kong, China, December 12-14, 2010. Proceed- ings, pages 240–253, 2010. [88] M. Yang, J. Lee, S. Lee, and H. Rim. Finding interesting posts in twitter based on retweet graph analysis. In The 35th International ACM SIGIR conference on research and de- velopment in Information Retrieval, SIGIR '12, Portland, OR, USA, August 12-16, 2012, pages 1073–1074, 2012. [89] M. M. Yeung, B. Yeo, and B. Liu. Segmen- tation of video by clustering and graph analy- sis. Computer Vision and Image Understand- ing, 71(1):94–109, 1998. [90] G. Zamora-L´opez, C. Zhou, and J. Kurths. Graph analysis of cortical networks reveals complex anatomical communication substrate. Chaos: An Interdisciplinary Journal of Non- linear Science, 19(1):015117, 2009. [91] B. Zhang, M. C. Chambers, and D. L. Tabb. Proteomic parsimony through bipartite graph analysis improves accuracy and transparency. Journal of proteome research, 6(9):3549–3557, 2007. [92] T. Zimmermann and N. Nagappan. Predicting defects using network analysis on dependency graphs. In 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pages 531–540, 2008. 23
1902.09364
1
1902
2019-02-25T15:28:43
Transforming Collaboration Data into Network Layers for Enhanced Analytics
[ "cs.SI", "physics.soc-ph" ]
We consider the problem of automatically generating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the research collaborations. In this paper, we describe our data-to-networks method, which automatically generates a set of logical network layers from the relational input data using a linkage threshold. We, then, use a series of network metrics to analyze the impact of the linkage threshold on the individual network layers. Moreover, results from the network analysis also provide beneficial information to improve the network visualization. We demonstrate the feasibility and impact of our approach using real-world collaboration data. We discuss how the produced network layers can reveal insights and patterns to direct the data analytics more intelligently.
cs.SI
cs
Transforming Collaboration Data into Network Layers for Enhanced Analytics Saharnaz E. Dilmaghani1, Apivadee Piyatumrong2, Pascal Bouvry1, Matthias R. Brust1 1Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg 2National Electronics and Computer Technology Center (NECTEC), Thailand [email protected], [email protected], [email protected], [email protected] 9 1 0 2 b e F 5 2 ] I S . s c [ 1 v 4 6 3 9 0 . 2 0 9 1 : v i X r a Abstract -- We consider the problem of automatically gener- ating networks from data of collaborating researchers. The objective is to apply network analysis on the resulting network layers to reveal supplemental patterns and insights of the re- search collaborations. In this paper, we describe our data-to- networks method, which automatically generates a set of logical network layers from the relational input data using a linkage threshold. We, then, use a series of network metrics to analyze the impact of the linkage threshold on the individual network layers. Moreover, results from the network analysis also provide beneficial information to improve the network visualization. We demonstrate the feasibility and impact of our approach using real-world collaboration data. We discuss how the produced network layers can reveal insights and patterns to direct the data analytics more intelligently. I. INTRODUCTION Network structures have drawn significant attention in big data due to the possibility to apply network theory and analysis to obtain extra insights from the data. Networks are ubiquitous [27] in research areas from biology and neuroscience (e.g., brain networks [6]) to modeling and analyzing galaxy dis- tributions [17], and quantifying reputation in art [15]. These examples are use cases where network layers play an important role to represent and analyze the data. Networks offer several advantages. They provide adaptabil- ity for dynamic structures benefiting from local principles on nodes [9]. Additionally, network analysis discloses valuable information for data visualization by defining an appropri- ate link definition. Networks often provide computationally efficient algorithms with lower complexity in comparison to a tabular structure [13]. Furthermore, data transformed into network structures can help providing evidence for missing information [30], [21] as well as predicting forthcoming events [26]. Besides, there are numerous algorithms that can be applied on networks such as Louvain's algorithm which is a community detection algorithm [7] and Page Rank, that identifies the most influential object within a network. With these advantages of networks, we are confronted with the challenge on how to transform relational data into appro- priate networks, which exhibit advantages for data analytics as well as data visualization. The challenge is twofold: It is not only on how to represent the elements of a network, but also the specific construction principles, since, for each dataset, there are numerous ways be transformed into a network rep- resentation [10]. Each network reveals a particular perspective on the dataset. In this study, we investigate different linkage thresholds for the transformation of a collaboration dataset into networks. In this paper, we propose a method that transforms collab- oration data to network layers. Our approach favors scientific projects as nodes with links generated by using a specific linkage threshold. We apply our method on real-world data that describes collaboration of a renowned research institute. Our study uses different metrics to determine the influence of the network structure on the network properties. Additionally, we obtain results that provide information on better visualizing the produced networks and a possible interface to include privacy mechanisms into data analytics [28]. The remainder of this paper is structured as follows. Section II investigates related work. We describe our method to complement data with network layers in Section III. The experiment setup designed to analyze the proposed algorithm is represented in Section IV. Section V discusses the outcome and the opportunities for future work. Finally, Section VI concludes the paper. II. RELATED WORK The challenge of converting data to networks is a well- known issue when it comes to geographical data [14], [16]. Graph studies on spatial data reveal valuable information on route networks, complex urban systems [22] and the relationship between different urban areas [31]. Nevertheless, the raw dataset on geographical information is not enough by its own to conduct proper graph studies. Karduni et al. [18] focuses on this challenge and has introduced an approach for geographical systems by defining a protocol describing the network properties to convert the spatial polyline data into a network. In general, some of the studies have stressed the inference of links from relational data to design a network out of the relational data. Casiraghi et al. [11] developed a generalized hypergeometric ensembles approach to address the problem of inferring connections within relational data. The study represents a perspective of link prediction while applying predictive analysis. From a similar point of view, Xiang et al. [29] established a link-based latent variable model to infer the friendship relations within a social interaction. In addition, in another study [25] the international relations from a dataset consists of the news from different countries are extracted by a tensor factorization technique. Moreover, Akbas et al. [1] proposed a social network generation by proposing a model based on various interactions (e.g., phone calls) considering smartphone data. Given a weight to each type of interaction, the authors define a link value as the combination of various interaction types. Akbas et al. followed up their study on network generation from interaction patterns by studies on how to infer social networks of animal groups [2], [3], [4]. Initiating from these studies, in particular from [1], we followed a similar approach in order to define the linkage threshold to generate the network layers [5], [12]. Considering the collaboration data, Newman [19] has es- tablished networks considering authors and their collaboration on scientific papers. The scientific collaboration networks have been also studied in a particular network structure, hypergraphs, by Ouvrard et. al. [20]. The authors emphasized on enhancing the visualization of these networks considering network properties. III. PROPOSED METHODOLOGY: DATA-TO-NETWORK LAYERS We establish a method with the purpose to convert the relational data of research collaborations into network layers by describing a set of nodes and a linkage threshold to define the connections between nodes. Considering the thresholds we then generate different network layers and investigate each network with the network measurements. Using outcomes of the last phase we then visualize the networks for a better understanding of the relationship in our data. For this study, we have access to a real-world dataset of collaborative projects within National Electronics and Com- puter Technology Center (NECTEC). The dataset consists of various projects that have been completed with certain members of the institute. Investigating on the relationships and extracting the collaboration patterns are the outcomes that the networks will provide in order to improve performance of the research projects by using the possible resources inside the organization. We, therefore, retrieved different features from the dataset to feed our method and generate the network layers. In this study, our focus is particularly on the projects of the institute. Thus, we consider the elements of the network such that the projects are nodes of the network and the common members between the projects are represented as the links of the network. Each project is identified with an id, and a team of m members who contributed to the project, whereas the project members can participate in different projects at the same time. Contribution percentage is a feature extracted from the dataset that quantifies the contribution of a member within a project. k, ci We calculate the linkage threshold by looking at certain features from the dataset: (1) the project members, and (2) the contribution percentage of each project member in a project. Let mi k be the k-th member of project i and the contribu- tion percentage of the member in the project, respectively. Let 2, . . .) of project i ∈ ID. mi = (mi Next, we define P as the combination of features chosen to i(mi, ci). explain the explain linkage threshold, i.e., P = (cid:83) 2, . . .) and ci = (ci 1, mi 1, ci Then, the common members between two projects (e.g., i, j) is denoted as Mij = {(i, j) ∈ ID mi ∩ mj}. Finally, con- sidering the aforementioned parameters, the linkage threshold is defined as (cid:88) (cid:91) Tij = 1 nij T = k + cj ci k ∀k∈Mij 2 (Tij), i,j∈ID , (1) where Tij is the linkage threshold within the projects (i, j), nij is the number of common members calculated in Mij, and T is the linkage threshold for the whole dataset. Exploiting the linkage threshold, we propose Algorithm 1 to construct network layers with different linkage thresholds. Algorithm 1 Data-to-Network Layers Input: D, a dataset of research collaboration. Output: G, a vector of generated network layers. 1: procedure TRANSFORM-TO-NETWORK(D) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: nodesList ← ID P ← extract features from D trange ← generate a space vector from (min(T ), max(T )) for each threshold in trange do f ← Aggregate(P[nodes]) if f ≥ threshold then N etwork G ← GenN et(nodesList, edgesList) Insert G to G for each pair of nodes in nodesList do edgesList ← pair of nodes return G a) Description of the algorithm:: Assume D is the rela- tional dataset of collaborations. We need to define the nodes and the links extracting particular features from D to generate the network layers. To define the list of nodes nodesList, we extract the id of the entities which in this study we used the identities of research projects (see line 2 in Algorithm 1). In order to describe the links, we first need to define a linkage threshold t considering the list of features P. The linkage threshold of linear space vector consists of n points of threshold within the range of minimum and maximum values of P (see line 3− 4 in Algorithm 1). Additionally, each network from G is measured by the set of network metrics. We use the before mentioned collaboration data as input for the presented Algorithm 1. Then, we measure the network metrics and utilize them for a better visualization of data. The resulting generated network layers are visualized in Fig. 1. In this specific example, we consider 6 thresholds for defining the edges starting from 0 (the minimum collaboration observed in the dataset) to 100 by using the connected components to enhance the visualization of data. b) Complexity analysis: The complexity of Algorithm 1 depends on the two main parts of the algorithm: (1) Comparing each pair of nodes to find those that serve the determined condition for threshold is the most expensive one with the Fig. 1: Visualization of the generated networks. In each network, the size of the nodes represents the degree of a node and the color illustrates the components. Such that blue shows components with the highest number of nodes, whereas gray represents the smallest components of a network. Moreover, green and red describe components which have a number of nodes within the range of previous cases. complexity of O(n2). (2) The complexity of the network generation is linear such that for n nodes and m edges the complexity is O(n + m). IV. EXPERIMENT SETUP A. Dataset We benefit from a particular collaboration data derived from the National Electronics and Computer Technology Center (NECTEC) that presents different projects and collaborations in the area of R&D. The dataset is stored in a relational database consisting of research projects conducted between July 2013 and July 2018. Each project may consist of different deliverables: intellectual property (IP), papers, or prototypes as well as may comprise different members from different teams of the same institute. The dataset is the knowledge management about the project where the key information is to know (1) the type of the project, (2) project contributors and contributions. The dataset of combined team tables have almost 8k records which is the information of more than 2.3k projects. Among them 630 are related to IP, 1717 to papers, and 539 to prototypes. Overall, the institute has more than 1000 members who are contributing on different projects with certain features (e.g., contribution percentage) which have been defined within the organization to evaluate the contributions. One of the main features we have used is the contribution percentage. The total percentage assigned to each project is 100% that is divided between the project members according to their contribution on the project. Furthermore, IC-score is another feature that is developed by the institute and it illustrates the value of each project (e.g., prototype) based on its status (e.g., lab, industrial). To obtain the IC-score for each member, the total IC-score value of each project is divided by the contribution percentage of each member. The details regarding the values of both features (contribution percentage and IC-score) have been further discussed further in Section V. B. Network Metrics A network (or graph) G = (V, E) consists of a set of vertices V which are connected by the edges from set E. There exists different parameters (e.g., centrality measures) to analyze and study the networks. We choose centrality measures to analyze the generated network layers, which help to find the most important vertices within a network. Besides the centrality measures, we also consider other metrics such as network density and connected components to analyze the properties of the network. The following is a brief description of each metric. a) Closeness Centrality: defines the closeness of a node to other nodes by measuring the average shortest path from that node to the all other vertices within the network. Hence, the more central a node is, the closer it is to all other nodes [23] calculated as CC(v) = (cid:80) distance between vertices v and u. 1 d(v,u) , where d(v, u) is the y σst b) Betweenness Centrality: indicates the number of times a node acts as a bridge along the shortest path between two other nodes. For a given node the number of shortest paths that passes through the node implies the betweenness centrality of the node. Nodes with high betweenness may have significant influence in a network due to their control over the flow of information passing between others through them. In a network G = (V, E) betweenness centrality for node v is where σst total number of shortest paths from node s to node t and σst(v) is the number of those paths that pass through v. [8]: CB(v) = (cid:80) s(cid:54)=v(cid:54)=t∈V σst(v) c) Degree Centrality: identifies the number of direct links which are connected to a vertex within the network. The importance of the nodes with higher degree is due to the immediate risk of these node while some information is flowing through the network. The degree of a node v is represented as, CD(v) = deg(v). d) Clustering Coefficient: presents the likelihood of nodes in a network that tend to cluster together. The value of clustering coefficient lies between 0 and 1. When a network is clique which means that every two distinct vertices are adjacent, the value is 1, however, in a star network in which a node's neighbours are not connected to each other at all, clustering coefficient is 0. For an unweighted network, the clustering of a node v is the fraction of possible triangles deg(v)(deg(v)−1) where through that node that exist, CC(v) = T (v) is the number of triangles through node v and deg(v) is the degree of v [24]. 2T (v) 2m e) Network Density: is the ratio of potential links to existing links in a network. The range of this metric varies form 0 for a network with no links (sparse network) and 1 for networks with all possible links (dense network). nd = n(n−1) , where n is the number of nodes and m is the number of edges in network G. f) Connected Components: are sub-networks in which there are at least two vertices connected to each other through a path. In other words, two vertices are in the same sub-network if there is a path between them in the network. We use ncomp as a notation to address the connected components in this the paper. It is to be observed that the chosen metrics are (1) local when they are only considering a node itself and the informa- tion of its neighbour to calculate, centrality measures are of this category, or (2) global when they calculate a parameter considering the whole knowledge of network properties, nodes and edges, such as network density. Exploiting these metrics on networks generated from collaborative data, the purpose is to analyze the networks from different perspectives. Centrality measures are indicators to define the important node within a network. For instance, closeness centrality defines whether a project has a higher value for the institute such as delivering different outcomes (IP, papers, and prototypes). Moreover, there might be an argument regarding the topic of the project such that it is covering fundamental topics which other projects need to collaborate with. Degree centrality, represents the members' collaboration of a project with other projects. On the other hand, metrics like network density and connected components illustrates the general overview of a network. Network density represents how much a network is away from being a fully collaborative network in which all projects are connected together. V. RESULTS OF THE NETWORK ANALYSIS A. Data Analysis We perform a preliminary analysis on the data set in order to conduct on the linkage threshed. We exploit histograms to plot the frequency of the score and contribution percentage. Fig. 2 presents the histograms of IC-score and contribution per- centage for each member in the collaboration data regarding all projects. The histograms represent the number of members with a certain value of IC-score (or contribution percentage) in the dataset. Moreover, mean, standard deviation, and variance are calculated for IC-score which are 3.16, 4.24, and 1.79, respectively. For contribution percentage, the mean, standard deviation and variance are obtained as 23.30, 22.80 and 5.20, respectively. IC-score concentrates on lower values better than contribution percentage, nevertheless, contribution percentage represent the dataset better as the coverage range is broader. Thus, we construct the linkage threshold defined in Equation (III) considering the contribution percentage. B. Network Analysis We applied the proposed Algorithm 1 on our collaboration dataset. As a result, we obtained a vector of network layers, each represents a certain linkage threshold. For each network we calculated the set of network metrics which has been introduced in Section IV. We chose 6 linkage thresholds which are 0, 20, 40, 60, 80, and 100. For instance, with the linkage threshold equal to 20 two projects in the network are connected if the average con- tribution percentage of the common members between those projects is equal or greater than 20%. Thus, those two projects are neighbours in the network. While increasing the threshold, the number of nodes that could not satisfy the condition increases dramatically. Thus, the number of isolated nodes increases which impact the outcomes of network metrics. In order to analyze the network regardless of the influence of these nodes, the network metrics are applied after removing the isolated nodes. We measured Betweeness Centrality CB(v), Degree Centrality CD(v), Closeness Centrality CC(v), Clus- tering Coefficient CC(v), Network Density nd, and Connected Components ncomp for each network. Additionally, for the local metrics, we calculated the average of nodes for the whole network. We first applied our algorithm considering only IP projects data, and then on the combination of all projects (i.e., IP, paper, and prototype). Fig. 3 describes the metrics on networks that are constructed particularly on IP dataset and Fig. 4 provides the results for a similar setup while considering the combination of all projects. Fig. 2: Histograms of IC-score and contribution percentage in the collaboration dataset. Fig. 3: The effect of the set of network metrics, CC (v), CB(v), CD(v), CC(v), nd, ncomp, on the generated network layers from IP projects. The result in each plot represents the average for all the nodes within a network layer. Thus, the x-axis illustrates the linkage threshold in which the corresponding network has been created and the metric is measured. According to Fig. 3 starting from 0 as the linkage threshold increases the values of betweenness, degree and closeness centrality, clustering coefficient, network density decrease whereas the number of connected components increases until the linkage threshold is 60. However, the pattern of the results for all metrics have dramatically changed within the range of 40 to 60. Besides the outcomes from Fig. 3, that represents the result only for the IP projects, Fig. 4 provides the results of applying network metrics including all types of projects (IP, papers, and prototype). The results of both figures (Fig. 3 and 4) are representing the similar patterns. In other words, the topology of networks are not any different from one project type to another. Furthermore, although the linkage threshold equal to 0 provides detailed information of projects, the linkage threshold equal to 100 represents a particular perspective of the dataset which describes the main leaders contribution in different projects. C. Optimization and Future Work Our methodology to construct network layers from collabo- ration data reveals several optimization criteria. Optimizing the 0204060801000.0000.0010.0020.0030.0040.005BetweennessCentrality0204060801000.020.040.060.080.100.12DegreeCentrality0204060801000.020.040.060.080.100.12ClosenessCentrality020406080100LinkageThreshold0.500.550.600.650.700.750.80ClusteringCoeficeint020406080100LinkageThreshold0.020.030.040.050.06NetworkDenisty020406080100LinkageThreshold15202530354045ConnectedComponents Fig. 4: The effect of the set of network metrics on the generated network layers from IP, paper, and prototype projects. number of network layers while still containing the maximum on distinct information for enhanced analytics is a challenging task. Moreover, the linkage threshold we have defined in this paper can be generalized to a utility function to be performed on any given collaboration dataset. In addition, deciding on an optimal linkage threshold based on predefined criteria and conditions could further improve the performance, but also widen the applicability, of our algorithm. Additionally, we will consider different network representations for the same data in future work. We also plan on using more real-world collaboration data from distinct sources to further generalize our approach. VI. CONCLUSION The approach outlined in this paper infers possible researchers within projects of collaboration networks of an organization. Our method uses a linkage threshold to automatically generate these network layers from the relational input data. We conducted a network analysis on the produced networks using metrics such as clustering coefficient, closeness and betweenness centrality, and illustrate their impact on the different network layers. We, then, utilize the results of the metrics as an important input to visualize the generated graph in each configuration. We conclude that the linkage threshold has a crucial impact on the network properties and must be chosen with caution. Additionally, the influence of the linkage threshold on the results of the metrics indicates that the network representation can be optimized. Acknowledgement. This work is partially funded by the joint Trust for Smart-ICT. research programme UL/SnT-ILNAS on Digital REFERENCES [1] M. Akbas, M. Brust, and D. Turgut. Social network generation and role determination based on smartphone data. In IEEE International Con- ference on Computer Communications (INFOCOM) Student Workshop, 2012. [2] M. I. Akbas, M. R. Brust, C. H. C. Ribeiro, and D. Turgut. Deployment and mobility for animal social life monitoring based on preferential attachment. In IEEE Conference on Local Computer Networks, pages 484 -- 491, Oct 2011. [3] M. I. Akbas, M. R. Brust, C. H. C. Ribeiro, and D. Turgut. fapebook - animal social life monitoring with wireless sensor and actor networks. In IEEE Global Telecommunications Conference - GLOBECOM, pages 1 -- 5, Dec 2011. [4] M. I. Akbas, M. R. Brust, D. Turgut, and C. H. Ribeiro. A preferential attachment model for primate social networks. Computer Networks, 76:207 -- 226, 2015. [5] A. Andronache, M. R. Brust, and S. Rothkugel. Hycast-podcast discovery in mobile networks. In Proceedings of the 3rd ACM workshop on Wireless multimedia networking and performance modeling, pages 27 -- 34. ACM, 2007. [6] D. S. Bassett, P. Zurn, and J. I. Gold. On the nature and use of models in network neuroscience. Nature Reviews Neuroscience, page 1, 2018. [7] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast Journal of statistical unfolding of communities in large networks. mechanics: theory and experiment, 2008(10):P10008, 2008. [8] U. Brandes. A faster algorithm for betweenness centrality. Journal of mathematical sociology, 25(2):163 -- 177, 2001. [9] M. R. Brust, H. Frey, and S. Rothkugel. Adaptive multi-hop clustering in mobile networks. In Int. Conf. on mobile technology, applications, and systems, pages 132 -- 138. ACM, 2007. [10] C. T. Butts. Revisiting the foundations of network analysis. science, 325(5939):414 -- 416, 2009. [11] G. Casiraghi, V. Nanumyan, I. Scholtes, and F. Schweitzer. From relational data to graphs: Inferring significant links using generalized In International Conference on Social hypergeometric ensembles. Informatics, pages 111 -- 120. Springer, 2017. 0204060801000.000000.000250.000500.000750.001000.001250.001500.001750.00200BetweennessCentrality0204060801000.0050.0100.0150.0200.0250.0300.035DegreeCentrality0204060801000.020.040.060.080.100.12ClosenessCentrality020406080100LinkageThreshold0.550.600.650.700.750.800.85ClusteringCoeficeint020406080100LinkageThreshold0.0050.0100.0150.0200.0250.0300.0350.040NetworkDenisty020406080100LinkageThreshold405060708090100ConnectedComponents [12] J. Chen, M. R. Brust, A. R. Kiremire, and V. V. Phoha. Modeling privacy settings of an online social network from a game-theoretical In 9th IEEE International Conference on Collaborative perspective. Computing: Networking, Applications and Worksharing, pages 213 -- 220. IEEE, 2013. [13] J. G. Davis, J. K. Panford, and J. B. Hayfron-Acquah. Big and connected data analysis with graph and relational databases using collaborative filtering technique. Int. Journal of Computer Science and Information Security (IJCSIS), 15(12), 2017. [14] S. Derrible and C. Kennedy. Applications of graph theory and network science to transit network design. Transport reviews, 31(4):495 -- 519, 2011. [15] S. P. Fraiberger, R. Sinatra, M. Resch, C. Riedl, and A.-L. Barabási. Quantifying reputation and success in art. Science, 2018. [16] M. T. Gastner and M. E. Newman. The spatial structure of networks. The European Physical Journal B, 49(2):247 -- 252, 2006. [17] S. Hong, B. C. Coutinho, A. Dey, A.-L. Barabási, M. Vogelsberger, L. Hernquist, and K. Gebhardt. Discriminating topology in galaxy distributions using network analysis. Monthly Notices of the Royal Astronomical Society, 459(3):2690 -- 2700, 2016. [18] A. Karduni, A. Kermanshah, and S. Derrible. A protocol to convert spatial polyline data to network formats and applications to world urban road networks. Scientific data, 3:160046, 2016. [19] M. E. Newman. Scientific collaboration networks. i. network construc- tion and fundamental results. Physical review E, 64(1):016131, 2001. [20] X. Ouvrard, J.-M. L. Goff, and S. Marchand-Maillet. Networks of collaborations: Hypergraph modeling and visualisation. arXiv preprint arXiv:1707.00115, 2017. [21] L. Pan, T. Zhou, L. Lü, and C.-K. Hu. Predicting missing links and identifying spurious links via likelihood analysis. Scientific reports, 6:22955, 2016. [22] F. Peiravian, A. Kermanshah, and S. Derrible. Spatial data analysis of complex urban systems. In IEEE Int. Conf. on Big Data, pages 54 -- 59. IEEE, 2014. [23] G. Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 -- 603, 1966. [24] J. Saramäki, M. Kivelä, J.-P. Onnela, K. Kaski, and J. Kertesz. Gen- eralizations of the clustering coefficient to weighted complex networks. Physical Review E, 75(2):027105, 2007. [25] A. Schein, J. Paisley, D. M. Blei, and H. Wallach. Bayesian poisson tensor factorization for inferring multilateral relations from sparse dyadic In ACM Int. Conf. on Knowledge Discovery and Data event counts. Mining, 2015. [26] Z. Sha, Y. Huang, J. S. Fu, M. Wang, Y. Fu, N. Contractor, and W. Chen. A network-based approach to modeling and predicting product coconsideration relations. Complexity, 2018, 2018. [27] S. Shirinivas, S. Vetrivel, and N. Elango. Applications of graph theory in computer science an overview. International Journal of Engineering Science and Technology, 2(9):4610 -- 4621, 2010. [28] F.-J. Wu, M. R. Brust, Y.-A. Chen, and T. Luo. The privacy exposure In 2016 IEEE Global problem in mobile location-based services. Communications Conference (GLOBECOM), pages 1 -- 7. IEEE, 2016. [29] R. Xiang, J. Neville, and M. Rogati. Modeling relationship strength In Proceedings of the 19th international in online social networks. conference on World wide web, pages 981 -- 990. ACM, 2010. [30] J. Yang and X.-D. Zhang. Predicting missing links in complex networks based on common neighbors and distance. Scientific reports, 6:38208, 2016. [31] C. Zhong, S. M. Arisona, X. Huang, M. Batty, and G. Schmitt. Detecting the dynamics of urban structure through spatial network analysis. Int. Journal of Geographical Information Science, 28(11):2178 -- 2199, 2014.
1706.02186
2
1706
2017-06-17T15:29:17
Hierarchical Change Point Detection on Dynamic Networks
[ "cs.SI", "physics.soc-ph" ]
This paper studies change point detection on networks with community structures. It proposes a framework that can detect both local and global changes in networks efficiently. Importantly, it can clearly distinguish the two types of changes. The framework design is generic and as such several state-of-the-art change point detection algorithms can fit in this design. Experiments on both synthetic and real-world networks show that this framework can accurately detect changes while achieving up to 800X speedup.
cs.SI
cs
Hierarchical Change Point Detection on Dynamic Networks Yu Wang∗ Aniket Chakrabarti∗ David Sivako(cid:29)# ∗ Department of Computer Science and Engineering, The Ohio State University, Columbus, Ohio, USA [email protected],[email protected] Srinivasan Parthasarathy∗ # Department of Statistics 7 1 0 2 n u J 7 1 ] I S . s c [ 2 v 6 8 1 2 0 . 6 0 7 1 : v i X r a ABSTRACT This paper studies change point detection on networks with com- munity structures. It proposes a framework that can detect both local and global changes in networks e(cid:28)ciently. Importantly, it can clearly distinguish the two types of changes. The framework design is generic and as such several state-of-the-art change point detection algorithms can (cid:27)t in this design. Experiments on both synthetic and real-world networks show that this framework can accurately detect changes while achieving up to 800X speedup. CCS CONCEPTS • Information systems → Data mining; Social networks; • Computing methodologies → Modeling methodologies; KEYWORDS Anomaly Detection, Dynamic Social Networks, Community Detec- tion 1 INTRODUCTION Anomaly detection on networks is a problem arising in various areas: from intrusion detection [10] to fraud detection [6], from email network [17] to fMRI image [13]. One problem of particular interest is change point detection on dynamic social networks [1, 19]. Social networks are known to have the hierarchical structure, where the most well-known one is the community structure [9, 20]. Similar nodes are densely connected and form a community, while dissimilar nodes reside in di(cid:29)erent communities and are less likely to be connected. The interactions (or edges) among nodes can be classi(cid:27)ed as inter-community interactions and intra-community interactions. The intra-community interactions are more likely to be present (in unweighted networks) or have more weight (in weighted networks) than the inter-community interactions. Most state-of-the-art change point detection approaches [6, 10, 13, 14, 22] do not consider the hierarchical structure in a network, but treat the network structure as (cid:30)at. Hence they can hardly dis- tinguish changes in those two kinds of interactions (intra and inter). If there is an event associated with a particular community, the change happens within that community only, and may not a(cid:29)ect Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:27)t or commercial advantage and that copies bear this notice and the full citation on the (cid:27)rst page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:27)c permission and/or a fee. Request permissions from [email protected]. WebSci'17, June 25-28, 2017, Troy, NY, USA. © 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. 978-1-4503-4896-6/17/06...$15.00 DOI: http://dx.doi.org/10.1145/3091478.3091493 the global network too much due to its locality and small scale. (Toy example in Figure 1) Figure 1: Toy example to distinguish global change and local change on a two-community graph. The edges removal within c1 has only local impact, and hence is a local change; the edge removal across c1 and c2 has global impact (to disconnect the graph), and hence is a global change. For example, consider the email network of a very big computer science department. If a speci(cid:27)c lab is approaching a paper sub- mission deadline, the frequency of email exchange within this lab might outburst. Since the whole department is very big and the daily email throughput of the whole department is high, it is un- likely to detect the change associated with that lab at the global level using the aforementioned algorithms. On the other hand, if a single community is signi(cid:27)cantly larger than the others, a signi(cid:27)cant change in that community will domi- nate over the other smaller communities. Therefore, regardless of whether there is any change to the rest of the network, the afore- mentioned algorithms will classify this as a change point. That is, the above algorithms do not answer where the change comes from, neither can they answer if the change comes from within a huge community or from the inter-community interaction. Continuing with the previous email network example, if a lab consists of half the people in the department (either a big group or a small department), then the outburst of emails within this lab is highly likely to be detected as a global event. Meanwhile, if several groups are jointly working on a funding proposal, it will lead to the email burst between communities, and can also be detected as a global event. The above algorithms can not distinguish between these two global events. Here we see that the existing algorithms either miss minor and local changes, or fail to distinguish between strong local changes and global changes. A recent work ([15]) can answer which pairs of nodes result in change, but it fails to account for the community structure. Intuitively, the intra-community interaction captures local in- formation while the inter-community interaction captures global information. Hence, we expect to see the former one evolves di(cid:29)er- ently from the global evolution pattern while the latter one should be similar to the global evolution pattern [2]. In this paper, we show that the network evolution pattern can be decomposed into inter-community evolution and intra-community evolution. We show that running change point detection algorithms at the global level could miss changes associated with a community, and that change can be detected when we run the algorithms within that community. We also show that the inter-community interaction can be approximated by a hyper-network in which each hyper-node is a contracted community [3]. And this contraction also gives us computational bene(cid:27)ts. This paper is organized as follow: we (cid:27)rst review the related work, then describe the proposed framework. After that, we intro- duce the experiments and provide the analysis. Finally, we conclude the paper and discuss future works. 2 RELATED WORK There are two recent surveys [1, 19] on change point detection. Most state-of-the-art works [13, 22] do not consider the hierarchical struc- ture in a network; Other works [4, 16, 17] mention the hierarchy in their papers, and they all make speci(cid:27)c assumption about the under- lying generative model: Moreno's work [16] assumes a network is generated from a mixed Kronecker product graph model (mKPGM), which is generated recursively from a seed matrix. The block of the matrix at each level resembles the community. Peel's work [17] assumes a network is generated from a generalized hierarchical ran- dom graph model (GHRG), which organizes the network as a tree of which the leaves are nodes in the network and the internal nodes are communities. Bridges's work [4] assumes a network is gener- ated from the generalized block two-level Erdős-Rényi (GBTER) model, which posits the inter-community and intra-community edges are formed in di(cid:29)erent ways. Although they mention the hierarchical structure, they fail to distinguish between the change associated to a community and the change associated to the whole network. We design a framework that provides a systematic way to detect and distinguish between local and global changes. Our framework is generic and supports several state-of-the-art change point detection algorithms. Another drawback of these network hypothesis test based approaches is their low e(cid:28)ciency due to boot- strapping: Peel's work does not scale very well in our experiments, and its e(cid:28)ciency is improved up to 60 times when superimposed by our framework. Community detection [9] is also a time-consuming task. The Lou- vain method [3] alternatively contracts and detects communities on the networks, and has been one of the most e(cid:28)cient community detection algorithm for several years. Its e(cid:28)ciency comes from the network size reduction via contracting. We use the same idea for e(cid:28)cient change point detection. Another recent work ([15]) considers attributing the global change score to node pairs. It de(cid:27)nes change scores at edge level, (cid:30)ags out the top ranked edges and their neighbors as changed regions. That work does not consider the community structure, and its focus is on visualization. Our work distinguishes between inter-community interaction and intra-community interaction, and shows the former one can approximate the global evolution. Moreover, our framework reduces the running time of the state-of-the-art algorithms [13, 17, 22]. 3 METHODOLOGY We follow the Type 4, "Event and Change Detection", in [19], which is to (cid:27)nd snapshots from a network snapshot sequence that are "signi(cid:27)cantly" di(cid:29)erent from their predecessors. Like [22], we also assume each snapshot is generated from a generative model. Snap- shots from the same generative model resemble each other, although they are not identical due to randomness. The change of the gen- erative model leads to "signi(cid:27)cant change" of the snapshots. This assumption can be illustrated as a Markov network (Figure 2). Latent L1 Observed G1 L2 G2 ... ... L3 G3 Lt Gt Figure 2: Representation of the underlying generative process. Lt s are latent generative models, and Gt s are observed snapshots. Gt is assumed to be a sample (generated) from Lt . "Signi(cid:27)cant" change points are {t Lt (cid:44) Lt−1}. Note that graph snapshots and latent models can represent both local structure as well as global structure. Our work di(cid:29)ers from [22] in that we study networks with the community structure, where each snapshot observation consists of multiple components, corresponding to communities and their interactions. In Figure 2, the generative models are latent and we can only observe the generated snapshots. Existing approaches have two directions: to estimate the generative model from mul- tiple snapshots and then compare the estimated model [4, 17, 22]; or to compute the di(cid:29)erence of the snapshots directly [13]. Our framework supports both types of approaches. In both cases, the problem and the solution can be generalized as [19]: given a net- work snapshot sequence {Gt } and a dissimilarity function (outlier score) f : {Gt } × {Gt } → R, a change is de(cid:27)ned as a time point t, such that f (Gt , Gt−1)>th0, where th0 is some pre-speci(cid:27)ed thresh- old. Change point detection is to (cid:27)nd all time stamps ts at which changes occur. All the aforementioned works run on the original network, and hence detect changes at the global level. We de(cid:27)ne intra-community change and inter-community change in a similar fashion: let Cit be the community i at time t, the intra- community change point is de(cid:27)ned as a time point t such that fl(Cit , Ci,t−1) > th1. By contracting the community Cit in the network Gt into a hyper node ni, one gets a contracted network . The inter-community change point is de(cid:27)ned as a time point Gc t t such that fc(Gc t−1) > th2. Our goal is to (cid:27)nd both the intra- community change (local change) as well as the inter-community change (global change). Problem De(cid:27)nition Given a network sequence {Gt }T t =1, its com- munity assignment {thi}k i =1, and dissimilarity functions fl(·, ·), fc(·, ·), (cid:27)nd all the time points t ∈ {2, · · · ,T} such that either 1) fl(Cit , Ci,t−1) > th1, or 2) fc(Gc t−1)>th2 for some pre-speci(cid:27)ed threshold th1, th2. t , Gc t , Gc 3.1 Framework Description We propose the following framework (Algorithm 1) which reveals both the local change as well as the global change. In Line 1, we (cid:27)rst partition communities on the (cid:27)rst snapshot. We assume the community assignment does not change over time. If there really is a severe change in community assignment, the event will be detected as a global change. Between global changes, the commu- nity assignment will remain constant. Hence one can apply the local change detection part of the framework to the subsequences in which community assignment remains similar. One may argue that it is more robust to partition communities on the aggregated network from the (cid:27)rst couple of snapshots. Our reasoning is that if no global change happens during the (cid:27)rst couple of snapshots, the community assignment/structure should remain the same; other- wise we (cid:30)ag out that snapshot as abnormal (to be investigated), and redo the community partition on the new snapshot. The for-loop from Line 2 to Line 12 scans over all the snapshots. The original snapshot is contracted in Line 3 into a weighted (hyper-)network in which each hyper-node corresponds to a community in the orig- inal snapshot (Figure 3). If the original network is unweighted, the weight of the hyper-edge is the number of actual inter-community edges divided by the number of all possible inter-community edges. Otherwise the weight of the hyper-edge is the summation of the inter-community edge weights divided by the sizes of the two com- munities. The contraction operation is widely used in hierarchical community partition algorithms [9, 12]. The for-loop from Line 4 to Line 8 iterates over all the communities. The provided change point detection algorithm runs on the community level, and returns the dissimilarity score between two consecutive (sub-)networks. The branch in Line 9 detects the global change by running the detection algorithm on the contracted (hyper-) network. Algorithm 1 Hierarchical Change Point Detection Framework Input: network sequence {Gt }t1 , any change point detection algorithm change points Output: global change points chan❕eSet, 1: {ci }k1 = partition(G1); {community partition} 2: for t = 2 to T do 3: IsChanged(·,·) chan❕eSeti in community i local t =contract({ci }k1 ); Gc {Below: local change detection} for i = 1 to k do if IsChanged(cit , ci,t−1) then chan❕eSeti = chan❕eSeti ∪ {t }; end if end for {Below: global change detection} if IsChanged(Gc t−1) then t , Gc chan❕eSet = chan❕eSet ∪ {t }; 4: 5: 6: 7: 8: 9: 10: 11: end if 12: end for Community partitioning gives us e(cid:28)cacy while network con- traction gives us e(cid:28)ciency: each community is a (cid:27)ne-grained sub- network, and running detection algorithm on each community can avoid (cid:30)uctuation and noises from neighboring communities, and hence the detected change points are solely associated with this Figure 3: Toy example to illustrate contraction on the previ- ous two-community graph. Communities c1, c2 are contracted into hyper-node c1, c2 respectively. Global change in the original net- work (graph disconnection) is captured by the change in the con- tracted network. particular community; contraction signi(cid:27)cantly reduces network size, and in turn, reduces the running time of the algorithms whose complexity is proportional to the network size. On the other hand, network size reduction also implies information loss, and therefore the quality of change points detected on the contracted network is inferior to that on the original network. Fortunately, our exper- iments show that the ranking of outlier scores on the contracted network is similar to that on the original network, which implies that the inter-community evolution can indeed capture global evo- lution pattern. 3.2 Algorithms We superimpose the framework on three state-of-the-art algo- rithms [13, 17, 22], 3.2.1 DeltaCon. DeltaCon [13] computes the outlier score from the snapshots directly. It extracts a feature vector from each snap- shot using personalized PageRank, and computes the rooted Eu- clidean distance of two consecutive feature vectors. 3.2.2 LetoChange. LetoChange [17] assumes the network is generated from GHRG model in which the network has a tree-like structure: leaves correspond to nodes while internal tree nodes correspond to communities. The network sequence is partitioned into equal sized sliding windows, and the model parameters are estimated within a window. The outlier is (cid:30)agged out if the model parameters estimated change greater than a threshold. It bootstraps networks from the generative model to calculate a proper threshold. To sample multiple networks from a generative model is time- consuming. We bootstrap outlier scores for threshold determination, which gains much computational bene(cid:27)t (detailed at the end of this section). 3.2.3 EdgeMonitoring. EdgeMonitoring [22] follows LetoCh- ange's fashion: (cid:27)rst estimate the model parameters from a win- dow (several snapshots), then detect change points based on model parameters comparison. EdgeMonitoring estimates the edge prob- ability directly from each window (for the unweighted network) and calculates the Kullback-Leibler divergence of the sequences of two consecutive windows. We modify it to account for weighted networks: we normalize the weights at each snapshot, and average over snapshots within a window. This averaged weight is used as the probability estimate in the above KL divergence calculation. Algorithm 2 Hierarchical Change Point Detection Framework with Threshold Determination Input: network sequence {Gt }t1 , any change point detection algorithm change points change points chan❕eSet, Output: global 1: {ci }k1 = partition(G1); {community partition} 2: for t = 2 to T do 3: IsChanged(·,·) chan❕eSeti in community i local t =contract({ci }k1 ); Gc {Below: local change detection} for i = 1 to k do Outlier Scor ei,t = IsChanged(cit , ci,t−1) 4: 5: 6: end for {Below: global change detection} Outlier Scor et = IsChanged(Gc t−1) t , Gc 7: 8: end for 9: for i = 1 to k do T hr esholdi = Bootstrap(Outlier Scor ei).percentile(0.95) 10: chan❕eSeti = {t Outlier Scor ei,t > T hr esholdi } 11: 12: end for 13: T hr eshold = Bootstrap(Outlier Scor e).percentile(0.95) 14: chan❕eSet = {t Outlier Scor et > T hr eshold } Although DeltaCon and LetoChange have their own threshold determination strategies, the former one's normality assumption does not hold while the latter one's network bootstrap is too time- consuming. We use an e(cid:28)cient, permutation test based strategy. All the three algorithms use the same way to determine outlier scores: (cid:27)rst, run the algorithm on the whole snapshot sequence and obtain an outlier score sequence; then, use bootstrap to compute the 0.95 con(cid:27)dence level of the outlier scores. The rationale of this threshold determination is essentially the same as that of the permutation test [18]. The modi(cid:27)ed framework is displayed in Algorithm 2, in which the IsChanged(,) function again returns the dissimilar score. 4 EXPERIMENTS AND EVALUATION 4.1 Data We apply the framework to two synthetic networks and one real world network. For the synthetic networks, we test our framework on the Stochastic Block Model (SBM [11]) and the Block Two-Level Erdős-Rényi (BTER [21]) model. SBM assumes edge probability a function of the community membership of the two incident nodes; BTER model assumes the intra-community edges are sampled from Erdős-Rényi model [7], while the inter-community edges are sam- pled from Chung-Lu model [5]. For both experiments, we do not change community membership (as discussed in Section 3.1), and inject either global or local changes at di(cid:29)erent time stamps (Ta- ble 1). The SBM experiment has 1k nodes and 8 communities ranging from size 50 to size 300. The edge probability is determined by a Table 1: Changes Injected to the Synthetic Networks Event Order 1 Time Stamp 16 2 3 4 31 51 76 SBM (1k nodes, 8 commu- nities) connection rate in the largest community c0 reduced by 1/3 (Local Change) con- inter-community among nection rates c0, c1, c5, c6 reduced by 1/3 (Global) connection rates in two smallest communities c6, c7 doubled (Local) SBM matrix regenerated (Global) BTER (100 nodes, 5 com- munities) connection rate in the largest community c0 reduced by 1/3 (Local Change) Chung-Lu sequence in c0 change (Global) connection rates in two smallest communities c3, c4 doubled (Local) Chung-Lu sequence of all the nodes regenerated (Global) symmetric stochastic block matrix whose entries are sampled from Uniform(0, 1) with the restriction that main diagonal entries greater than o(cid:29)-diagonal entries. The BTER experiment has 100 nodes and 5 communities whose sizes are sampled from power a law distribu- tion [24], and range from 15 to 25. ER probability is sampled from a beta distribution [4], while CL sequence is sampled from another power law distribution [8]. Each snapshot is a weighted network where the edge weight is a sample from a binomial distribution and normalized to the range [0,1]. Since LetoChange does not support weighted network, we unweight each network by retaining the edges with probability equal to the edge weight. For the real world network, we use the international trade net- work1 from the year 2001 to the year 2014. We select 90 coun- tries/economies and represent them as nodes. The network is di- rected and weighted, where the direction speci(cid:27)es import/export and the weight is the trade volume. The network is near a clique since almost every two countries have bilateral trade between them. There are six ground truth communities in the network, cor- responding to free trade zone and/or geopolitics alike nations: Asia-Paci(cid:27)c Economic Cooperation (APEC), black sea economic cooperation (BSEC), (cid:27)fteen developed western European countries (EU15), Latin American Integration Association (LAIA) and South- ern African Development Community (SADC), Organization of Islamic Cooperation (OIC). The Louvain [3] community partition algorithm is also applied to this network and returns consistent partitions. 4.2 Experiments and Results 4.2.1 Synthetic Network. We apply our framework with the three aforementioned detection algorithms on the synthetic net- works. The generation process is described in the previous subsec- tion. We present both quality and time e(cid:28)ciency of our framework. We report time e(cid:28)ciency in Table 2, and use both qualitative and quantitative methods to validate the quality. Figure 4 shows the change points detected on the SBM net- work. Figure 4a is the result on the global (original) network, and Figure 4b is the result on the contracted network; the curves are 1www.worldbank.org DCG is calculated on the contracted network, while IDCG (refer- ence) is calculated on the original network. The outlier scores from two networks are sorted in descending order respectively. ri is the number of matches between the target ranking and the reference ranking within (cid:27)rst i scores, and T is the number of snapshots. The NDCG scores for EdgeMonitoring and DeltaCon are 0.832, 0.666 respectively, indicating reasonably good approximation. Figure 5: Change point detection on SBM in the largest community (300 nodes). All three algorithms are able to detect the local event 1(cid:13) at T=16. Figure 5 shows the change points detected on the largest com- munity. All three algorithms detect the local change ( 1 in Table 1) that edge probability reduces at time stamp 16 in C0. It's interesting to note that EdgeMonitoring detects the local change 1 on the original network (Figure 4a). This is because the change occurs in the largest community (consisting of 30% of all the nodes), and the node pairs in that community are more likely to be tracked. If we only run the algorithm on the original network, we would not be able to tell if the change corresponds to a global event or a local event. DeltaCon is more conservative in terms of (cid:30)agging out change points: it not only misses the local event 1 in Figure 4a, but also misses the global event 2 . Yet it is still able to detect the local change in Figure 5. Similarly, running algorithms within com- munity c6, c7 reveals local event 3 . This result is not included for brevity. Figure 6 shows the change points detected on the BTER network. We see that all three algorithms capture the global events 2 , 4 on the original network.EdgeMonitoring and LetoChange in addition capture the local event 3 , which corresponds to edge probability increase in the two smallest communities (Table 1). Although both 1 and 3 are local events, the largest community consists of 23% of all the nodes while the two smallest communities together consist of 35% of all the nodes. Intuitively, the latter should have more impact on the global network than the former. And from the algorithmic perspective, the node pairs of the latter have higher chance to be tracked than the former. Figure 6b shows that after contraction, all three algorithms only capture the global events. Running the algorithms within each community detects the local change and we do not include the result for brevity. The NDCG scores for EdgeMonitoring, DeltaCon and LetoChange are 0.832, 0.666 and 0.832 respectively. The snapshots before and after the global event 4 are visualized in Figures 7 and 8. We can see from Figure 7 that the inter-community interaction between the red community and the others is enhanced after the event, which is also revealed in the contracted network in Figure 8. (a) SBM Global (1k nodes, re-scalded and shifted for visualization). Local change 3(cid:13) in the two smallest communities are insigni(cid:27)cant at global level, and hence is ignored by both algorithms. (b) SBM Contract (8 hyper-nodes). EdgeMonitoring (black, top) detects two global events 2(cid:13) and 4(cid:13), while DeltaCon (green, middle) and LetoChange (red, bottom) detect only one. Figure 4: Change point detection on SBM at global level. outlier scores for various change point detection algorithms and the horizontal bars are corresponding thresholds. LetoChange can not (cid:27)nish within 48 hours (Table 2) on the original network, and hence is not displayed in Figure 4a. We can see that EdgeMoni- toring correctly captures two global changes and a local change in the largest community of the original network (Figure 4a). Af- ter contraction (Figure 4b), EdgeMonitoring only captures the two global changes. This is what we can expect since inter-community interaction re(cid:30)ects the global pattern, and contraction only pre- serves this global pattern. Although DeltaCon does not capture both the global changes, the quality of DeltaCon on the contracted network is the same as on the original network while achieving 830 times e(cid:28)ciency improvement! Note that the quality of change point detection on the original network is totally determined by the detection algorithm itself. Applying our framework (i.e. to contract the network) does not deteriorate the quality. A similar observation holds for LetoChange. We note that it is the outlier score ranking (say, top αs% as in [22]), rather than the absolute values, that matters in change point determination. Hence we use the Normalized Discounted Cumulative Gain (NDCG [23]) scores to evaluate how good the con- tracted one approximates the original one. NDCG score quanti(cid:27)es the di(cid:29)erence between two rankings, and perfect match results in NDCG = 1.0. DCGT = 2ri − 1 log2(i + 1) , IDCGT = 2i − 1 log2(i + 1) NDCGT = DCGT IDCGT , T i =1 where T i =1 Table 2: Time E(cid:28)ciency Comparison on Di(cid:29)erent Networks EdgeMonitoring1 Comm. Avg 3.7s 1.7s 0.5s Contr. (Speedup) 1.5s (60X) 1.5s (2X) 0.4s (50X) DeltaCon Contr. (Speedup) 0.6s (830X) 0.1s (50X) 1.3s (30X) Comm. Avg 24s 1.0s 1.2s LetoChange Contr. (Speedup) 2h (>60X) 2h (25X) 5m (30X) Comm. Avg N/A4 13h 9m Total N/A 67h 60m Data Orig. Total2 Orig. Total Orig. 85s 2.5s 22s 31s 10s 3.4s SBM BTER Trade 1 EdgeMonitoring and DeltaCon are implemented in MATLAB and run on a commercial desktop, while LetoChange is implemented in Python and runs on a cluster with 28 cores. Each running time averaged over 5 runs. 2 Total time = community time × number of communities. 3 The program runs for 120 hours, but still has no sign of (cid:27)nish, so we kill it. 4 LetoChange takes 110 hours to obtain the result in Figure 5. 500s 5s 42s 192s 5.1s 8.5s DNF3 51h 150m (a) BTER Global (100 nodes, re-scaled and shifted for visualization). Local change 1(cid:13) is ignored by all three algorithms, while 3(cid:13) is captured by Edge- Monitoring (barely) and LetoChange. (a) BTER network at T=75, before the global event 4(cid:13) (b) BTER Contract (5 hyper-nodes). EdgeMonitoring (black, top) and LetoChange (red, bottom) detect two global events, while DeltaCon (green, middle) detects only one global event 4(cid:13). Figure 6: Change point detection on BTER at global level. The two synthetic experiments above show that superimposing our framework on top of the aforementioned change point detection algorithms can indeed distinguish global and local change, and hence gives us (cid:27)ner granularity knowledge of the evolution of a dynamic network. 4.2.2 Real World Network. Figure 9 shows the result of change point detection on the original network and the contracted net- work using the international trade network. It can be seen that the majority algorithms on both the networks reveal the year 2009 as the most signi(cid:27)cant outlier. The year 2009 is a year immediately after the global (cid:27)nancial crisis, and the term "The Great Recession" (b) BTER network at T=76, after the global event 4(cid:13) Figure 7: Visualization of BTER network before and after the global event 4(cid:13). Edge width and transparency re(cid:30)ect interac- tion strength, and color represents community membership. Inter- community interaction is enhanced after the global event 4(cid:13), and the red community in particular has stronger interaction with all other communities after 4(cid:13). is applied to the global recession which started in that year.2 It is pretty clear that the global trade volume drops signi(cid:27)cantly during that year. The NDCG scores for EdgeMonitoring, LetoChange and 2http://www.cbpp.org/research/economy/chart-book-the-legacy-of-the-great- recession (a) Contracted BTER network at T=75, before the global event 4(cid:13) (b) Contracted BTER network at T=76, after the global event 4(cid:13) Figure 8: Visualization of contracted BTER network before and af- ter the global event 4(cid:13). The observation that the red community has stronger interaction with others in Figure 7 is nicely captured by the contracted network. DeltaCon are 0.960, 0.654 and 0.909 respectively, which suggests great approximation for EdgeMonitoring and LetoChange, and good approximation for DeltaCon. The speedup of the framework is reported in Table 2. (a) Original Network, both EdgeMonitoring (black star, top) and LetoChange (red diamond, bottom) detect the year 2009 as a change point, at which the international trade volume drops signi(cid:27)cantly (background bar); DeltaCon detects the year 2012 as abnormal. (re-scaled and shifted for visualization, explainable outliers are blue-boxed) Figure 10 compares global change point detection and local change point detection. Figure 10a is the result of running the detection algorithms on the original network. Figure 10b is the result of running the detection on the APEC community (Asia- Paci(cid:27)c region). We see that the two (sub-)networks have similar outliers: the 2009 recession is detected on both the networks. This is not surprising since this APEC community contributes 44% of the world trade,3 which can also be observed from the similarity of the two background trade volume bar charts. Here we see the impact of a "big", in terms of edge weight, community to the global network. Two detection algorithms also (cid:30)ag out the year 2010 as a local change point, which could be explained by the GDP growth rebound of the major economies in this region.4 Figure 11 visualizes the APEC trade network. We can see that the bilateral trade volume drops signi(cid:27)cantly post crisis, and several economics (cid:30)ip from trade surplus to trade de(cid:27)cit within the region. Comparing Figure 11c and Figure 11b, we see trade volume jumps among several economics, which is a sign of recovery. Figure 10c shows the result of local change point detection on the Middle East-North Africa community. Its evolution pattern (the trade volume bar chart, as well as the outlier score ranking distribution) is clearly di(cid:29)erent from that of the global network. This can also be expected given its relatively small scale economy size and relatively homogeneous economic structures. The year 2005 is (cid:30)agged as an outlier by EdgeMonitoring, which coincides with Iraq's purple revolution. 5 The year 2012 is (cid:30)agged as an outlier by both EdgeMonitoring and DeltaCon, which coincides with ISIS's rise in Syria.6 LetoChange (cid:30)ags the years 2013 and 2014 as outliers, we conjecture that might be due to the escalation of the situation with increasing international involvement. Both change points and outlier ranking distribution re(cid:30)ect net- work evolution pattern. From Figure 10 we see that while the evo- lution pattern of a major community might approximate that of the global network, the evolution patterns of other communities di(cid:29)er from that of the global network. We will miss the change points or events associated with a particular community if we only run the detection algorithm on the global network. 5 CONCLUSION In this paper, we study hierarchical change point detection on dynamic social networks. We distinguish the intra-community evo- lution and the inter-community evolution. Our framework detects global change points on the inter-community network, and local change points on the intra-community networks. This framework is compatible with several state-of-the-art change point detection algorithms. Extensive empirical evaluation on several networks (both synthetic and real world) show this framework has not only quality advantages but also signi(cid:27)cant computational bene(cid:27)ts. (b) Contracted Network, all three algorithms detect the year 2009 as a change point. Figure 9: Global change point detected on the international trade network, using both the original network and the contracted net- work. The Great Recession (global event) in the year 2009 is (cid:30)agged as abnormal on both the networks. The NDCG scores of the three algorithms on the two networks are 0.960, 0.654, 0.909 respectively, indicating good approximation of the contracted network. 3https://ustr.gov/trade-agreements/other-initiatives/asia-paci(cid:27)c-economic- cooperation-apec/us-apec-trade-facts 4http://data.worldbank.org/indicator/NY.GDP.MKTP.KD.ZG 5https://en.wikipedia.org/wiki/Colour_revolution 6https://en.wikipedia.org/wiki/Islamic_State_of_Iraq_and_the_Levant (a) Global network. (a) APEC trade network in 2008. (b) APEC sub-network. Both the years 2009 and 2010 are (cid:30)agged out as out- liers. We did not (cid:27)nd a good explanation for LetoChange's outlier at 2006. NDCG scores to the global network are 0.913, 0.827, 0.975 respectively. (b) APEC trade network in 2009. International trade volume drops signi(cid:27)- cantly (fewer heavy edges), and several economics (cid:30)ip between surplus and de(cid:27)cit (within the region). (c) OIC sub-network. The evolution pattern is signi(cid:27)cantly di(cid:29)erent from that of the global network in Figure 10a. NDCG scores to the global network are 0.826, 0.714, 0.906 respectively. Figure 10: Comparison of global vs local. APEC community's evo- lution resembles that of the global network in both trade volume and outlier ranking due to its major role (heaviest edges) in the global network. OIC community evolves di(cid:29)erently from the global network, and changes associated to OIC community is missing in the global network. ACKNOWLEDGMENTS The authors would like to thank Leto Peel for providing his code base, and Wenlei Bao and and Congrong Guan for helping col- lect the international trade data. The authors would also like to thank the anonymous referees for their valuable comments. This work is supported in part by NSF grant DMS-1418265, IIS-1550302 (c) APEC trade network in 2010. More and heavier edges emerge, sign of re- covery. Figure 11: Visualization of APEC trade network (weighted, undi- rected). Node size is proportional to the economic size, and red nodes have trade de(cid:27)cit while grey nodes have trade surplus. Edge width and transparency re(cid:30)ect bilateral trade volume (ex- port+import). and IIS-1629548. Any opinions, (cid:27)ndings, and conclusions or rec- ommendations expressed in this material are those of the authors and do not necessarily re(cid:30)ect the views of the National Science Foundation. REFERENCES [1] Leman Akoglu, Hanghang Tong, and Danai Koutra. 2014. Graph-based Anomaly Detection and Description: A Survey. Data Mining and Knowledge Discovery (DAMI) 28, 4 (2014). [2] Sitaram Asur, Srinivasan Parthasarathy, and Duygu Ucar. 2009. An event-based framework for characterizing the evolutionary behavior of interaction graphs. ACM Transactions on Knowledge Discovery from Data (TKDD) 3, 4 (2009), 16. [3] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008. [4] Robert A Bridges, John P Collins, Erik M Ferragut, Jason A Laska, and Blair D Sullivan. 2015. Multi-Level Anomaly Detection on Time-Varying Graph Data. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ACM, 579–583. [5] Fan Chung and Linyuan Lu. 2002. The average distances in random graphs with given expected degrees. Proceedings of the National Academy of Sciences 99, 25 (2002), 15879–15882. [6] William Eberle and Lawrence Holder. 2016. Identifying Anomalies in Graph Streams Using Change Detection. (2016). [7] Paul Erdős and A Rényi. 1960. On the evolution of random graphs. Publ. Math. Inst. Hungar. Acad. Sci 5 (1960), 17–61. [8] Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. 1999. On power-law relationships of the internet topology. In ACM SIGCOMM computer communica- tion review, Vol. 29. ACM, 251–262. [9] Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3 (2010), 75–174. [10] Christopher R Harshaw, Robert A Bridges, Michael D Iannacone, Joel W Reed, and John R Goodall. 2016. GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. In Proceedings of the 11th Annual Cyber and Information Security Research Conference. ACM, 15. [11] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community structure in networks. Physical Review E 83, 1 (2011), 016107. [12] George Karypis and Vipin Kumar. 1998. Multilevelk-way partitioning scheme for irregular graphs. Journal of Parallel and Distributed computing 48, 1 (1998), 96–129. [13] Danai Koutra, Neil Shah, Joshua T Vogelstein, Brian Gallagher, and Christos Faloutsos. 2016. Deltacon: Principled Massive-Graph Similarity Function with Attribution. ACM Transactions on Knowledge Discovery from Data (TKDD) 10, 3 (2016), 28. [14] Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2014. Anomaly Detection in Networks with Changing Trends. (2014). [15] Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2016. Generating Local Explanations of Network Anomalies via Score Decomposition. (2016). [16] Sebastian Moreno and Jennifer Neville. 2013. Network hypothesis testing using mixed Kronecker product graph models. In Data Mining (ICDM), 2013 IEEE 13th International Conference on. IEEE, 1163–1168. [17] Leto Peel and Aaron Clauset. 2014. Detecting change points in the large-scale structure of evolving networks. arXiv preprint arXiv:1403.0989 (2014). [18] Edwin JG Pitman. 1937. Signi(cid:27)cance tests which may be applied to samples from any populations. Supplement to the Journal of the Royal Statistical Society 4, 1 (1937), 119–130. [19] Stephen Ranshous, Shitian Shen, Danai Koutra, Steve Harenberg, Christos Falout- sos, and Nagiza F Samatova. 2015. Anomaly detection in dynamic networks: a survey. Wiley Interdisciplinary Reviews: Computational Statistics 7, 3 (2015), 223–247. [20] Yiye Ruan, David Fuhry, Jiongqian Liang, Yu Wang, and Srinivasan Parthasarathy. 2015. Community Discovery: Simple and Scalable Approaches. In User Commu- nity Discovery. Springer, 23–54. [21] C Seshadhri, Tamara G Kolda, and Ali Pinar. 2012. Community structure and scale-free collections of Erdős-Rényi graphs. Physical Review E 85, 5 (2012), 056109. [22] Yu Wang, Aniket Chakrabarti, David Sivako(cid:29), and Srinivasan Parthasarathy. 2017. Fast Change Point Detection on Dynamic Social Networks. International Joint Conference on Arti(cid:27)cial Intelligence (IJCAI) (2017). [23] Yining Wang, Liwei Wang, Yuanzhi Li, Di He, Wei Chen, and Tie-Yan Liu. 2013. A theoretical analysis of NDCG ranking measures. In Proceedings of the 26th Annual Conference on Learning Theory (COLT 2013). Jaewon Yang and Jure Leskovec. 2012. Community-a(cid:28)liation graph model for overlapping network community detection. In Data Mining (ICDM), 2012 IEEE 12th International Conference on. IEEE, 1170–1175. [24]
1510.03814
2
1510
2015-10-17T07:50:21
In-Network Neighborhood-Based Node Similarity Measure: A Unified Parametric Model
[ "cs.SI" ]
In many applications, we need to measure similarity between nodes in a large network based on features of their neighborhoods. Although in-network node similarity based on proximity has been well investigated, surprisingly, measuring in-network node similarity based on neighborhoods remains a largely untouched problem in literature. One grand challenge is that in different applications we may need different measurements that manifest different meanings of similarity. In this paper, we investigate the problem in a principled and systematic manner. We develop a unified parametric model and a series of four instance measures. Those instance similarity measures not only address a spectrum of various meanings of similarity, but also present a series of tradeoffs between computational cost and strictness of matching between neighborhoods of nodes being compared. By extensive experiments and case studies, we demonstrate the effectiveness of the proposed model and its instances.
cs.SI
cs
In-Network Neighborhood-Based Node Similarity Measure: A Unified Parametric Model Yu Yang School of Computing Science Simon Fraser University Burnaby, BC, Canada [email protected] Jian Pei School of Computing Science Simon Fraser University Burnaby, BC, Canada [email protected] 5 1 0 2 t c O 7 1 ] I S . s c [ 2 v 4 1 8 3 0 . 0 1 5 1 : v i X r a ABSTRACT In many applications, we need to measure similarity between nodes in a large network based on features of their neighborhoods. Al- though in-network node similarity based on proximity has been well investigated, surprisingly, measuring in-network node similar- ity based on neighborhoods remains a largely untouched problem in literature. One grand challenge is that in different applications we may need different measurements that manifest different mean- ings of similarity. In this paper, we investigate the problem in a principled and systematic manner. We develop a unified paramet- ric model and a series of four instance measures. Those instance similarity measures not only address a spectrum of various mean- ings of similarity, but also present a series of tradeoffs between computational cost and strictness of matching between neighbor- hoods of nodes being compared. By a set of extensive experiments and case studies, we demonstrate the effectiveness of the proposed model and its instances. 1. INTRODUCTION How can we measure the similarity between two nodes in a large network? The de facto established methods are based on the prox- imity between the two nodes in the network (e.g., shortest distance), or the relative proximity between the two nodes and the other an- chor nodes (e.g., SimRank [11] and its variations). However, in many applications, such as those where the access to the network is restricted, the proximity or relative proximity methods cannot be used. Moreover, in different applications we may need different measures, since the meaning of similarity may vary dramatically. EXAMPLE 1 (MOTIVATION EXAMPLES). In Twitter, how can we measure the similarity between two users u and v? In general, we cannot access the whole Twitter network, and thus we cannot compute the shortest distance between u and v or the Sim- Rank [11]. Instead, we can run neighborhood queries on selected users as nodes in the network. Consequently, we can obtain the neighborhoods of u and v, which contain the information about the neighbor users (those who follow or being followed by u and v, respectively) and the tweets sent by those neighbor users, and, if Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. necessary, the information about the neighbors' neighbors. Can we measure the similarity between u and v based on the neighborhood information? This is a fundamental challenge in analyzing many social networks where the network access is constrained. Even if assuming the access to a whole network, in many ap- plications, similarity may still involve neighborhood information. Consider a social network where nodes are users with their occu- pations as labels, and edges represent friendship relations, we are interested in finding users whose friends have similar distribution in occupation. Network proximity between two users does not help in measuring their similarity in this context. Instead, we have to mea- sure the similarity based on the neighborhoods of the two nodes being compared. As another example, in the Yelp network, to compare a leader of a community in Australia and a leader of another community in Vancouver in terms of the structures of the communities they are leading, the proximity between the two leaders or the proximity between the members in the two communities do not help, either. Instead, we have to compare the communities, which are neigh- borhoods of the two leaders in the social network, and use effective features, such as the distribution of different types of users and user connection patterns, to design a meaningful similarity measure. In the above examples and many similar scenarios, proximity measures (e.g., shortest distance) or relative proximity measures (e.g., SimRank or its variations) cannot be applied due to the access restrictions or cannot capture the application meaning of similarity, and thus cannot be used. Several recent studies [9, 5] assume a node-feature matrix and measure similarity between nodes accordingly. However, as il- lustrated before, different applications may use different node fea- tures. A general framework and a spectrum of similarity measures meeting needs in different applications are still missing. In this paper, orthogonal to the classical proximity-based and rel- ative proximity-based similarity measures, we tackle the problem of in-network neighborhood-based node similarity measures. To the best of our knowledge, this problem remains largely untouched. We make several technical contributions. First, we propose the notion of neighborhood-based node similarity measure. This is orthogonal to the well established proximity-based and rela- tive proximity-based node similarity measures. We give a gen- eral parametric model, which captures the critical components in neighborhood-based node similarity measurement. Different fea- tures about neighborhoods can be plugged into our model to pro- duce different instances for various needs in applications. Second, we examine a series of features popularly used in prac- tice, ranging from maximal common neighborhoods to neighbor- hood patterns, random walks, and k-hops neighbors. Correspond- ingly, we derive four instances of the neighborhood-based similar- ity measures. We explore some desirable and interesting proper- ties of those measures. We show that except for maximal common neighborhoods based similarity, they can be transformed to metrics. Moreover, they can all be transformed to normalized similarities. They all can identify automorphic equivalent nodes. Third, for the four similarity measures obtained, we analyze the tradeoffs between computational cost and topological matching. The analysis provides a useful guideline for similarity measure se- lection in practice. Last, we conduct extensive experiments to verify the effective- ness of the proposed similarity measures. The rest of the paper is organized as follows. Section 2 reviews the related work. Section 3 discusses the preliminaries. Section 4 presents out unified parametric model. Section 5 derives four in- stance similarity measures. Section 6 discusses their properties and relations. Section 7 reports an extensive experimental study. Sec- tion 8 concludes the paper. 2. RELATED WORK In-network similarity, which measures similarity between two nodes in a graph, is not a new problem at all, and enjoys many applications. The dominant methods are based on either proximity of the two nodes in question (e.g., shortest distance) or the relative proximities between the two nodes and the other anchor nodes. Node proximity is widely adopted as similarity measures in many data mining and machine learning tasks. Koutra et al. [16] proposed a unified framework of Guilt-by-Association. A wide range of popular proximity measures, such as Personalized PageRank [12], Random Walk with Restart [26] and General- ized Belief Propagation [27], are special cases or can be approxi- mated by Guilt-by-Association. The basic assumption behind those proximity-based measures is that nodes in a network influence each other through edges and paths. Thus, nodes within the same com- munity are often more similar than those from different communi- ties. Apparently, proximity-based measures cannot be used to solve the problems demonstrated in Example 1. A major group of in-network similarity measures are based on how the nodes in question are connected with the other nodes. Sim- Rank [11] is one of the most popularly used in-network similarity measures. It is based on the principle that two nodes are similar if they are linked to similar nodes. Specifically, to compute the sim- ilarity between nodes u and v, SimRank aggregates paths between other nodes w and u and between w and v, respectively. SimRank has an undesirable property: if the lengths of paths between u and v are all odd, then SimRank(u, v) = 0, that is, u and v cannot be perfectly similar to each other. To fix this issue, some variations of SimRank were proposed [13, 28]. Those variations are still based on aggregation of paths between nodes. PathSim [24], a recently proposed similarity measure, employed a similar idea of counting paths following predefined patterns between nodes to derive sim- ilarity. In SimRank and its variations, as well as PathSim, two nodes may not be similar even if their neighborhoods are isomor- phic. Those methods cannot be used to measure the similarity in the applications in Example 1. Recently, Henderson et al. [9] proposed RolX, which applied Non-Negative Matrix Factorization to softly cluster nodes in a net- work. It assumes a node-feature matrix, which is obtained by re- cursive feature extraction [10]. RolX factorizes the node-feature matrix into a node-role matrix and a role-feature matrix. Then, the node-role matrix can be exploited to compute similarities between nodes. Gilpin et al. [5] introduced supervision to RolX. Since these methods assume a node-feature matrix, they are not specific for in- network neighborhood-based similarity measurement. In a broader scope, the social science community studied the role of node problem [18]. The approaches are mainly based on finding an equivalence relations on nodes so that the nodes can be grouped into equivalent classes. Sparrow [23] and Borgatti and Everett [1] proposed algorithms for finding structural equivalence and regu- lar equivalence classes in which automorphic equivalent nodes are assigned to the same class. However, an equivalence relation on nodes cannot provide node-pair similarities. Thus, those methods cannot be applied in many data mining and machine learning tasks. Another line of research related to our study is graph similarity measures. Comparing graphs directly is computationally costly. A major idea of comparing graphs is to convert graphs to feature vectors. For example, Fei and Huan [3] used frequent subgraphs as features of graphs. The most widely studied graph similar measures are graph kernels [4, 14, 21, 22], which project graphs into a feature space of finite or infinite dimensionality, and use the inner product of the feature vectors of the two graphs as the similarity score. The features in graph kernels are often substructures of graphs, e.g., walks, subtrees or graphlets. In Section 4.1, we will illustrate why such graph similarity measures cannot be used directly to solve the in-network node similarity problem. 3. NOTATIONS AND PRELIMINARIES In this paper, we focus on labeled graphs, and use the terms "graph" and "network", and "node" and "vertex" interchangeably. DEFINITION 1 (LABELED GRAPH). A labeled graph (graph for short) is a tuple G = hV, E, L,S i, where V is a set of nodes, E ⊆ V ×V is a set of edges, S is a function mapping a node u ∈ V to a label l ∈ S . We often write the set of vertices and the set of edges of a graph G as V (G) and E(G), respectively. is a set of labels, and L : V → S The above definition assumes labels on nodes only. Our meth- ods, however, can be easily extended to graphs with labels on both nodes and edges, or on edges only. DEFINITION 2 (NEIGHBORHOOD). In a labeled graph G = hV, E, L,S i, for a node u ∈ V , the r-neighborhood of u (r ≥ 1) is a labeled graph NHr(u)=hVu, Eu, LVu,S i, where Vu = {v v ∈ V, dist(u, v) ≤ r}, dist(u, v) is the shortest distance from u to v, Eu = {(v1, v2) (v1, v2) ∈ E, v1, v2 ∈ Vu ∪{u}}, and LVu : Vu → S is the function L with restriction on Vu. We call u the center node of NHr(u). For the sake of brevity, we sometimes omit r and simply write NH(u) when r does not play a role in the discussion. Some neighborhoods may share some common subgraphs. To capture common subgraphs shared by neighborhoods of multiple nodes, we define neighborhood patterns. DEFINITION 3 (NEIGHBORHOOD PATTERN). A neigh- borhood pattern is a tuple G = hH, ci, where H is a labeled connected graph, and c ∈ V (H) is called the center node of G . To keep our presentation concise, we denote by V (G ) = V (H) and E(G ) = E(H). Trivially, a neighborhood hNH(u), ui itself is a neighborhood pattern. For any subgraph H of NH(u) that contains u, that is, u ∈ V (H), hH, ui is a neighborhood pattern that captures part of the neighborhood of u. Please note that Han et al. [7, 8] defined a similar concept, pivoted graph. The matching between a neighborhood pattern and a neighbor- hood is intuitively defined using subgraph isomorphism. Figure 1: Neighborhood subgraph isomorphism. DEFINITION 4 (NEIGHBORHOOD PATTERN MATCHING). A neighborhood pattern G = hH, ci is neighborhood subgraph isomorphic (NS-isomorphic for to a neighborhood NH(u)=hVu, Eu, LVu,S i, there exists an injective mapping function f : V (H) → Vu, such that (1) f (c) = u; (2) ∀v ∈ V (H), L(v) = L( f (v)); and (3) ∀(v1, v2) ∈ E(H), ( f (v1), f (v2)) ∈ Eu. short) if EXAMPLE 2 (NS-ISOMORPHISM). Figure 1 shows a graph and a neighborhood pattern. The 2-neighborhoods of nodes u1 and u9 are highlighted. The neighborhood pattern is NS-isomorphic to the 2-neighborhoods of u1 and u9 under the following injec- tive mapping functions, respectively, f1(v2) = u3, f1(v3) = u5, f1(v4) = u6 and f2(v1) = u9, f2(v2) = u8, f2(v3) = u7, f2(v4) = u10. f1(v1) = u1, We define the equivalence of two neighborhood patterns, which is needed when we try to define a set on neighborhood patterns. DEFINITION 5 (NEIGHBORHOOD PATTERN EQUIVALENCE). Two neighborhood patterns G1 = hH1, c1i and G2 = hH2, c2i are said to be equivalent there exists such a bijective mapping function that (2) ∀v ∈ V (H1), L(v) = L( f (v)); and (3) ∀v1, v2 ∈ V (H1), (v1, v2) ∈ E(H1) if and only if ( f (v1), f (v2)) ∈ E(H2). : V (H1) → V (H2), to each other f (c1) = c2; (1) if f Automorphic equivalent nodes are often considered as "identi- cal" in many applications [1, 18, 13]. DEFINITION 6 (AUTOMORPHIC EQUIVALENCE). Given labeled graph G = hV, E, L,S i, ∀u, v ∈ V , u and v are automorphic equivalent if there exists a bijective mapping function f : V → V , such that (1) f (u) = vV f (v) = u; (2) ∀v ∈ V , L(v) = L( f (v)); and (3) ∀v1, v2 ∈ V, (v1, v2) ∈ E if and only if ( f (v1), f (v2)) ∈ E. a In addition to neighborhood patterns, another important feature in graphs is walks. DEFINITION 7 (LABELED WALK). Given a labeled graph G = hV, E, L,S i, a walk W is a sequence of nodes (u1, u2, . . . , um), in which ∀i = 1,2, . . . , m− 1, (ui, ui+1) ∈ E. A labeled walk LW is a sequence of labels (l1, l2, . . . , lm), in which ∀i = 1,2, . . . , m, li ∈ The length of LW is LW = m − 1. For a given walk . W = (u1, u2, . . . , um), the corresponding labeled walk is L(W ) = (L(u1), L(u2), . . . , L(um)), and W is called an instance of L(W ). We also need the concept of product graph, which is widely used in graph kernels. DEFINITION 8 graphs G1 and G2, (PRODUCT GRAPH). Given labeled the product graph G1 × G2 is a labeled two Figure 2: An Example graph such that (1) V (G1 × G2) = {hu′, v′i u′ ∈ V (G1), v′ ∈ V (G2), L(u′) = L(v′)}; (2) E(G1 × G2) = {(hu1, v1i,hu2, v2i) hu1, v1i,hu2, v2i ∈ V (G1 × G2), (u1, u2) ∈ E(G1), (v1, v2) ∈ E(G2)}; and (3) ∀hu′, v′i ∈ V (G1 × G2), L(hu′, v′i) = L(u′) = L(v′). Please note that a walk may use one node more than once. An important property of product graph is that every walk (that is, a path) in product graph G1 × G2 corresponds to two walks with the same label sequence in G1 and G2, respectively, and vice versa. Last, we define k-hops neighbor set as follows. DEFINITION 9 (k-HOPS NEIGHBORS). For a node u in a la- beled graph G, the set of k-hops neighbors of u is a multi-set of nodes {v : wv wv is the number of walks from u to v of length k}. 4. A UNIFIED PARAMETRIC MODEL In this section, we first examine why the existing graph compar- ison methods cannot be used directly to solve the problem. Then, we introduce our unified parametric model. 4.1 Neighborhood Comparison versus Gen- eral Graph Comparison Conceptually, in-network neighborhood-based node similarity measurement is intuitive -- we just need to compare the neigh- borhoods of two nodes, each neighborhood being a labeled graph. However, one critical point is that center nodes play special roles in neighborhoods and their comparison. When we compare two neighborhoods as labeled graphs and try to "match" them, the two center nodes have to correspond to each other. Similar to the general problem of graph comparison, in many ap- plication scenarios, comparing two neighborhoods directly by iso- morphism testing is not desirable. A large network is almost for sure to contain noise and randomness. The noise edges and ver- tices severely affect the reliability of measuring similarity by graph matching. Instead, as a general principle, to measure similarity in a meaningful way, we have to extract structural features from neigh- borhoods that reflect structural properties of the target nodes. Then, a neighborhood is transformed into a feature vector, and similarity between the induced features can be measured to capture the simi- larity between the target nodes. One may wonder whether neighborhood comparison can be tackled using the existing graph comparison methods, such as graph kernels. Unfortunately, general graph comparison methods ignore correspondences between nodes, and thus cannot be used directly in neighborhood comparison. EXAMPLE 3 (NEIGHBORHOOD COMPARISON). Consider the graph in Figure 2, where a and b are nodes labels. For each S node, the 2-neighborhood is the whole graph. Therefore, graph kernels give the identical similarity score on every pair of nodes. However, it is easy to see that u1 is uniquely different from the other nodes in the graph. Moreover, since u1 has a label different from all the others, one may even argue that the similarity between u1 and any other nodes in the graph is very low. Clearly, this intuition cannot be captured by applying a graph comparison method directly on the neighborhoods. Although neighborhood comparison is very different from gen- eral graph comparison, many well established ideas in general graph comparison are very useful in neighborhood comparison. In the rest of the paper, we will use structural features involving center nodes to assess in-network node similarity. We will show that the desirable structural features can be obtained by putting more con- straints on features extracted for general graph comparison. We will answer some interesting questions related to general graph comparison, such as whether we can have kernels on nodes within a network analogous to kernels on graph and how those constraints affect the computational cost of similarity computation. 4.2 A Unified Parametric Framework How can we measure the similarity between two target nodes based on their neighborhoods? We assume that similarity is based on the structural features of the target nodes, that is, the topological structures of the neighborhoods and how labels are distributed in the neighborhoods. There are many possible structural features that can be used in in-network node similarity measures. Importantly, different appli- cations may use different structural features and assemble features in different ways. Instead of proposing many yet another similar- ity measures, we are interested in a fundamental scientific prob- lem: is there a general framework about the mechanism measuring neighborhood-based similarity? The general framework should be parametric -- specific features and specific methods of feature as- sembling are configurable parameters. Moreover, the framework should generalize a series of meaningful similarity measures. In general, we make the following basic assumptions about mea- suring in-network neighborhood-based node similarity. ASSUMPTION 1 (FEATURES). In-network neighborhood- based node similarity can be measured by aggregation over a set of features. RATIONALE. We assume that there exists a set of features F such that the overall similarity between two nodes is an aggregation of the similarity scores between the two nodes over individual fea- overall distance is an aggregation of the distances in all individual tures G ∈ F . This is analogous to Minkowski distance where the dimensions (i.e.,(cid:0)(cid:229) dimension d(distance on d)p(cid:1)1/p). This is a nat- ural and popularly used way to measure similarity and distance in a multidimensional space in a divide and conquer manner. is a scoring function returning the similarity score between • F is a set of features used in the similarity measure; • s u and v in the evidence of elements s and t on feature G ∈ F , where variables s and t are elements, that is, either nodes or edges, in NH(u) and NH(v), respectively; • X • F is an aggregate function defining how the scores with re- is another aggregate function specifying how the features spect to various element pairs are summarized, and are assembled in measuring the overall similarity. In Equation 1, we aggregate the similarity scores over all fea- tures G ∈ F to derive the overall similarity between two nodes u and v. To derive the similarity score on each feature G , we consider every pair of elements in the neighborhoods of u and v, where the elements used are either nodes or edges, and may vary from one measure to another. For elements s from NH(u) and t from NH(v), we calculate a similarity score s (u, v, s,t,G ) that is the similarity between u and v reflected by s and t on feature G . The similarity score between u and v on feature G is an aggregation of the similar- ity scores over all pairs (s,t). In the next section, we will present four instances of the model, which will illustrate the possible im- plementations and flexibility of the model clearly. 5. FOUR INSTANCE SIMILARITY MEA- SURES In this section, we present four instances of the general model (Definition 10) as interesting and practically useful similarity mea- sures. Unlike [10, 9, 5], where features are basically statistics of nodes' neighbourhoods, we focus on graph substructure features like subgraphs and walks. The reason we choose this kind of fea- tures is that they have better interpretability. By checking features of u and v, we know how many common substructures, such as subgraphs, subtrees, and walks, are shared by their neighborhoods. This information provides an intuitive explanation why u and v are similar. While for statistical features in [10, 9, 5], it is not easy to find what they really capture in the physical world. 5.1 Similarity by Maximum Common Neigh- borhood Pattern (MCNP) A simple idea to evaluate the similarity between two nodes is to measure the size of the largest common subgraph shared by the neighborhoods of the two nodes. DEFINITION 11 (MCNP SIMILARITY). Given a network G, for nodes u, v ∈ V (G), a neighborhood pattern G = hH, ci is a max- imal common neighborhood pattern (MCNP for short) of u and v if G is NS-isomorphic to both NH(u) and NH(v), and E(G ) is maximized. The MCNP similarity between u and v is Based on the above assumption, we propose the following gen- eral parametric model. SimMCNP(u, v) = E(G ), where G is a MCNP of u and v. DEFINITION 10 (A GENERAL SIMILARITY MODEL). Given a graph G and two nodes u, v ∈ V (G), the similarity between u and v is measured by s (u, v, s,t,G )(cid:17) (1) s is an element of NH(u) t is an element of NH(v) Sim(u, v) = F G ∈F(cid:16) where four parameters are used MCNP similarity is meaningful in many applications. For exam- ple, in a friendship network G, the similarity between two nodes u and v can be measured by the size of a maximal common subgraph shared by the neighborhoods of u and v, which has the largest num- ber of friendship links. EXAMPLE 4 (MCNP SIMILARITY). In Figure 1, it happens that the neighborhood pattern is a MCNP of u1 and u9. The MCNP similarity between u1 and u9 is 4. X THEOREM 1. Given a graph G, for two nodes u, v ∈ V (G), where f −1 u and f −1 v are pseudo-inverses of fu and fv, respectively. ∧ H is connected} MCNP similarity is an instance of the general similarity model in Definition 10. Specifically, given a graph G and a node u, let SNP(u) = {G = hH, ci G is NS-isomorphic to NH(u) (2) be the set of neighborhood patterns that are NS-isomorphic to the neighborhood of u. For two nodes u, v ∈ V (G), a neighborhood pat- tern G = hH, ci ∈ SNP(u)∩ SNP(v) if there exist G1 = hH1, c1i ∈ SNP(u) and G2 = hH2, c2i ∈ SNP(v) such that H and H1 are iso- morphic and c and c1 correspond to each other in the isomorphism bijective mapping, H and H2 are isomorphic and c and c2 corre- spond to each other in the isomorphism bijective mapping. Appar- ently, we have the following. DEFINITION 12 (PSEUDO-INVERSE). Let f : A → B be an injective function. A function f −1 : B → (AS{nil}) is a pseudo- inverse of f , if for each b ∈ B, f −1(b) =(nil ∀x ∈ A, f (x) 6= b a ∈ AV f (a) = b a SimMCNP(u, v) = maxG =hH,ci∈SNP(u)∩SNP(v) w.r.t. injective mapping functions fu:V (H)→V(NH(u)) and fv:V (H)→V(NH(v)) (x,y)∈E(NH(u)) (x′,y′)∈E(NH(v)) (x) = f −1 v u (y) = f −1 f −1 v (cid:16)(cid:229) I(cid:0) f −1 v (x′) 6= nil∧ (y′) 6= nil(cid:1)(cid:17), where I(P) is an indicator function, which takes 1 if P is true and 0 otherwise, and f −1 are pseudo-inverses of fu and fv, u respectively. and f −1 v In Theorem 1, fu(c) = u and fv(c) = v because G is NS- isomorphic to both NH(u) and NH(v). This condition actually is the key property that general graph comparison methods do not guarantee. It ensures that when we assess the similarity between NH(u) and NH(v), u and v always correspond to each other. 5.2 Similarity by Neighborhood Patterns In some application scenarios [7], one may want to use patterns as features, and measure the similarity of two nodes by compar- ing the common features occurring in their neighborhoods. This is analogous to, for example, using frequent subgraphs as features in graph comparison [3]. DEFINITION 13 (NP SIMILARITY). Given a network G and a set of a neighborhood patterns S, for nodes u, v ∈ V (G), the neighborhood pattern similarity (NP similarity for short) between u and v is SimNP(u, v) = where SNP() is defined in Equation 2. G ∈(cid:0)S∩SNP(u)∩SNP(v)(cid:1) E(G ) NP similarity enables users with the full flexibility to specify neighborhood patterns as features. There are many ways to select S. For example, we may use neighborhood patterns that are frequent in neighborhoods of all nodes in the whole graph [7]. We may set S as a set of predefined subgraphs, such as Meta-Path [24]. It is also feasible to use graphlets [21] to form S. The NP similarity is an inner product of two feature vectors, that is, SimNP(u, v) = vecNP(u)T vecNP(v), where the j-th element of the feature vector of node u is vecNP(u) j =(pE(G j) G j is NS-isomorphic to NH(u) otherwise 0 and G j is the j-th neighborhood pattern in S. It is easy to show that SimNP is an instance of the general simi- larity model in Definition 10. THEOREM 2. Given a graph G and a set of neighborhood pat- terns S, for two nodes u, v ∈ V (G), SimMCNP(u, v) = (cid:229) G =hH,ci∈SNP(u)∩SNP(v)∩S w.r.t. injective mapping functions fu:V (H)→V(NH(u)) and fv:V (H)→V(NH(v)) (cid:16)(cid:229) I(cid:0) f −1 f −1 v (x,y)∈E(NH(u)) (x′,y′)∈E(NH(v)) u (x) = f −1 v (y) = f −1 v (x′) 6= nil∧ (y′) 6= nil(cid:1)(cid:17) Similar to SimMCNP, when using SimNP to compute the sim- ilarity of NH(u) and NH(v), u and v always correspond to each other. 5.3 Similarity by Labeled Walks Walks are popularly used as structural features in network anal- ysis. Can we measure the similarity between two nodes based on the walks in their neighborhoods? DEFINITION 14 (LW FEATURE VECTOR). Given a graph is G = hV, E, L,S i and a parameter r, the labeled walk feature set S = {LW = (l1, l2, . . . , lm) 1 ≤ LW ≤ r,∀i = 1,2, . . . , m, li ∈ S }. The labeled walk feature vector (LW feature vector for short) of node u ∈ V is a S-dimensional vector vecLW (u), in which vecLW (u) j =ql LWj∗{W = (u1, u2, . . . , um) u1 = u, L(W ) = LWj} LWj ∈ S, and l 1,l 2, . . . ,l r are parameters such that ∀i = 1,2, . . . , r, l i ≥ 0 and (cid:229) A user can use parameters l i's to control how walks of different lengths contribute to the similarity. In many applications, shorter walks are regarded contributing more to the final similarity score than longer ones [4]. l i = 1. r i=1 Apparently, the set of all possible labeled walks of length up to r is finite provided that the set of labels is finite. Using LW feature vectors, we define labeled walk similarity. DEFINITION 15 (LW SIMILARITY). Given a graph G = hV, E, L,S i, for nodes u, v ∈ V (G), the labeled walk similarity (LW similarity for short) between u and v is SimLW (u, v) = vecLW (u)T vecLW (v) = (cid:229) vecLW (u) j ∗ vecLW (v) j. LWj∈S We can show that SimLW is also an instance of our general sim- ilarity model in Definition 10. (cid:229) THEOREM 3. Denote by AG×G the adjacency matrix of the product graph G× G. SimLW (u, v) = r(cid:229) i=1 u′∈V (NH(u)) v′∈V (NH(v)) l iAi G×G(hu, vi,hu′, v′i) PROOF. Denote by Wu→ a walk starting at node u, and by Wu→v a walk from u to v. SimLW (u,v) = (cid:229) vecLW (u) j ∗ vecLW (v) j vecLW (u) j ∗ vecLW (v) j T u vecKN(u) = (pl 1n1 T ), where vector u ∀i = 1,2, . . . , r, ni u)l is the sum of multiplicities of nodes with label l in u's i-hops neighbor set, and l 1,l 2, . . . ,l r are parameters such that ∀i = 1,2, . . . , r, l i ≥ 0 and (cid:229) , . . . ,√l rnr -dimensional vector that (ni ,pl 2n2 u is a S l i = 1. T u r i=1 The multiplicity of a node v in u's k-hops neighbor set is the number of walks from u to v of length k, according to Definition 9. Thus, we obtain nk u = nk−1 v v∈Neighbor(u) Therefore, u's k-hops neighbor features can also be explained as recursive features [10] that are recursively built by aggregations of u's neighbors' information. Based on the k-hops neighbor feature vectors, we can define the k-hops neighbor similarity. DEFINITION 17 (KN SIMILARITY). Given a graph G = hV, E, L,S i, for nodes u, v ∈ V (G), the k-hops neighbor similarity (KN similarity for short) between u and v is SimKN(u, v) = vecKN(u)T vecKN(v) The roles of parameters l i's are the same as in SimLW . In a way similar to the proof of Theorem 3, we can also show that SimKN is an instance of our general similarity model in Definition 10. THEOREM 4. Denote by AG the adjacency matrix of G. SimKN(u, v) = r i=1 u′∈V (NH(u)) v′∈V (NH(v)) l iAi G(u, u′)Ai G(v, v′)∗ I(L(u) = L(v)∧ L(u′) = L(v′)) LWj∈S r(cid:229) = = i=1 r(cid:229) i=1 j:LWj=i j:LWj=i i=1 j:LWj=i r(cid:229) = = = = = r(cid:229) i=1 r(cid:229) i=1 r(cid:229) i=1 r(cid:229) i=1 u′∈V (NH(u)) v′∈V (NH(v)) u′∈V (NH(u)) v′∈V (NH(v)) u′∈V (NH(u)) v′∈V (NH(v)) u′∈V (NH(u)) v′∈V (NH(v)) l i{Wu→ L(Wu→) = LWj}∗{Wv→ L(Wv→) = LWj} l i (cid:229) u′∈V (NH(u)) v′∈V (NH(v)) l i {Wu→u′ L(Wu→u′ ) = LWj}∗{Wv→v′ L(Wv→v′ ) = LWj} j:LWj=i{Wu→u′ L(Wu→u′ ) = LWj}∗{Wv→v′ L(Wv→v′ ) = LWj} l i j:LWj=i{Whu,vi→hu′,v′i L(Whu,vi→hu′,v′i) = LWj} l i{Whu,vi→hu′,v′i Whu,vi→hu′,v′i = i} l iAi G×G(hu,vi,hu′,v′i) Here {Wu→u′ L(W ) = LWj} ∗ {Wv→v′ L(W ) = LWj} = {Whu,vi→hu′,v′i L(W ) = LWj} is due to the property of product graph. G×G(hu, vi,hu′, v′i). As shown in Theorem 3, the features are labeled walks of length i, the elements for similarity computing are nodes in neighbor- hoods, and the scoring function is l iAi SimLW is related to walk based graph kernels: the features used are labeled walks. However, in SimLW , we have more constraints on instances of labeled walks (i.e., walks) used. First, all walks selected in a neighborhood for computing similarity must have the center node as the start point. This constraint not only ensures that all features are related to the center nodes, but also guarantees that the center nodes always play the same role in features. Second, we only use walks of limited lengths. This constraint ensures that all walks used for computing similarity are within the neighborhoods of the center nodes. 5.4 Similarity by k-hops Neighbors label walks may be huge, in O(S SimLW uses labeled walks as features. The number of possible is the set of labels. To reduce the number of features, we can relax the labeled walk features by only considering the endpoints of walks. r), where S DEFINITION 16 (k-HOPS NEIGHBOR FEATURE VECTOR). Given a graph G = hV, E, L,S i and a parameter r, the k-hops neighbor feature vector of node u is an rS -dimensional Similar to SimLW , our constraints on features make sure that the center nodes are always matched to each other when computing similarity. 6. RELATIONS AMONG THE FOUR SIMI- LARITIES In this section we discuss important properties of the four simi- larities proposed in Section 5, as well as the relations among them. 6.1 Normalization In many applications, such as K-means clustering, where a met- ric is needed, it is highly desirable that a similarity measure can be normalized to a distance metric. Except for SimMCNP, the simi- larities proposed can be normalized to metrics. THEOREM 5 (METRIC). Let SimLW (·,·) or SimKN(·,·). Define Sim(·,·) be SimNP(·,·), Dist(u, v) =pSim(u, u)− 2Sim(u, v) + Sim(v, v) Dist(·,·) is a metric. (3) PROOF. According to the definitions, SimNP(·,·), SimLW (·,·) and SimKN(·,·) are all inner products in their corresponding feature spaces. Immediately, we can plug each of those inner products into Equation 3 to obtain an Euclidean distance between nodes [2], which is a metric. (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) (cid:229) Moreover, in many applications, it is desirable to have a similar- ity that can recognize automorphic equivalence [1, 18, 13]. How- ever, some well-known similarity measures, such as SimRank [11], do not have this properly. Nicely, all the four measures proposed here can be easily normalized to have the property. THEOREM 6 SimMCNP(·,·), SimNP(·,·), SimLW (·,·) or SimKN(·,·). Define (NORMALIZED SIMILARITY). Let Sim(·,·) be NSim(u, v) = Sim(u, v) Sim(u, u) + Sim(v, v)− Sim(u, v) (4) Then, 0 ≤ NSim(u, v) ≤ 1 and if u and v are automorphic equiva- lent, NSim(u, v) = 1. PROOF. Obviously, ∀u, v ∈ V , Sim(u, u) ≥ Sim(u, v) ≥ 0. Thus, Sim(u, u) + Sim(v, v)− Sim(u, v) ≥ Sim(u, u) ≥ Sim(u, v). Then, we have, ∀u, v ∈ V , 0 ≤ NSim(u, v) ≤ 1. If u and v are automorphic equivalent, Sim(u, u) = Sim(u, v) = Sim(v, v) because NH(u) and NH(v) must be isomorphic. Thus, NSim(u, v) = Sim(u,u) Sim(u,u)+Sim(u,u)−Sim(u,u) = 1. We can further obtain a generalized Jaccard similarity mea- sure [6] by plugging SimNP(·,·) into Equation 4. (GENERALIZED JACCARD SIMILARITY). THEOREM 7 NSim(·,·) = Jaccard similarity measure. SimNP(·,·) SimNP(·,·)+SimNP(·,·)−SimNP(·,·) is a generalized [6] Jaccard similarity generalized PROOF. The form J(x, y) = i min (xi,yi) i max (xi,yi) , where has the x = (x1, x2, ..., xn) and y = (y1, y2, ..., yn) are two vectors and xi, yi ≥ 0 are For each node u ∈ V , we create a vec- real numbers. tor x(u) with the same dimensionality as vecNP(u) and set x(u)i = vecNP(u)2 i . Then, for two nodes u and v, straightforwardly, min (x(u)i, x(v)i) = vecNP(u)ivecNP(v)i and max (x(u)i, x(v)i) = vecNP(u)2 Therefore, J(x(u), x(v)) = i − vecNP(u)ivecNP(v)i. SimNP(u,u)+SimNP(v,v)−SimNP(u,v) = NSim(u, v). i + vecNP(v)2 SimNP(u,v) 6.2 Relations between SimLW and SimKN Both SimLW and SimKN use walks as the structural features. The difference is that SimKN only considers the end points while SimLW considers the whole labeled walks. SimKN considers a sub- set of information that is considered by SimLW . Intuitively, if two nodes are similar in SimLW , they must be also similar in SimKN, but not the other way. We establish this relationship formally. THEOREM 8 (SimLw AND SimKN). Under the same param- eters r and l i's, SimLW (u, v) ≤ SimKN(u, v). PROOF. We only need to prove Ai Ai G(u, u′)Ai arise. G×G(hu, vi,hu′, v′i) ≤ G(v, v′)∗I{L(u) = L(v)V L(u′) = L(v′)}. Two cases may Case 1: L(u) = L(v) and L(u′) = L(v′). According to the prop- erty of product graphs, Ai G×G(hu, vi,hu′, v′i) is the number of walk pairs (W1,W2) in G such that W1 is from u to u′ and has length i, W2 is from v to v′ and has length i, and the label sequences of the two walks are the same. Clearly, Ai G×G(hu, vi,hu′, v′i) ≤ G(u, u′)Ai Ai G(u, u′) is the total number of walks of length i from u to u′. Case 2: G×G(hu, vi,hu′, v′i) = 0. Moreover, because both Ai Ai and Ai G(u, u′)Ai In this case, G(u, u′) Ai G×G(hu, vi,hu′, v′i) ≤ non-negative, G(v, v′) holds immediately. L(u) 6= L(v) or L(u′) 6= L(v′). G(v, v′) holds because Ai Ai G(v, v′) are 6.3 Computational Cost We first show that both SimMCNP and SimNP intractable. Then, we discuss the computation cost of SimLW and SimKN using pre- processing, and thus show that SimLW and SimKN are tractable. Last, we discuss the tradeoff among the four similarity measures about features used and computational cost. 6.3.1 Intractability of SimMCNP and SimNP THEOREM 9 (SimMCNP). Given a labeled graph G, nodes u, v ∈ V (G), r ≥ 1, and l > 0, the decision problem on whether SimMCNP(u, v) ≥ l is NP-hard. PROOF. We prove by a reduction from the NP-hard clique prob- lem, which is to decide if a given clique G2 is subgraph isomorphic to a given graph G1. Suppose we have an oracle that, given a labeled graph G = hV, E, L,S i, two nodes u ∈ V and v ∈ V , and l > 0, when the con- stant r ≥ 1, can return if SimMCNP(u, v) ≥ l in polynomial time with respect to the size of G. For any instance (G1 = hV1, E1i, G2 = hV2, E2i) of the clique problem, where G2 is a clique graph having V2 nodes, first we assign one same label to all nodes. Then, we create a new labeled graph G = G1SG2. Note that the nodes in V2 are automorphic equivalent. Thus, for any two nodes u1 ∈ V2 and u2 ∈ V2, and an arbitrary other node v, SimMCNP(u1, v) = SimMCNP(u2, v). So we pick an arbitrary node u ∈ V2. Then, for each node v ∈ V1, we call the oracle to see if SimMCNP(u, v) ≥ E2. Clearly G2 is sub- graph isomorphic to G1 if and only if there exists at least one node v ∈ V1 such that SimMCNP(u, v) ≥ E2. So we can call the oracle at most V1 times to decide if G1 has a clique with size V2. Each calling of the oracle takes polynomial time with respect to the size of G, which means in total we can use polynomial time to decide the clique probelm. This means deciding if SimMCNP(u, v) ≥ l is NP-hard. THEOREM 10 (SimNP). Given a graph G, a neighborhood pattern set S, nodes u, v ∈ V (G), r ≥ 1, and l > 0, the decision problem on whether SimNP(u, v) ≥ l is NP-hard. PROOF. The proof is similar to the proof of Theorem 9. For an instance (G1 = hV1, E1i, G2 = hV2, E2i) of the clique problem, we just create an instance of computing SimNP by setting the neigh- borhood pattern set S = {G2}. 6.3.2 Preprocessing for SimLW and SimKN Both SimLW and SimKN are inner products of feature vectors. Therefore, to speed up the computation of those similarities, we can materialize feature vectors for all nodes offline. Please note that r, the radius of neighborhood, is a predefined parameter. Due to the well recognized small world phenomenon [15], the parameter r should be set to a small number like 2. Otherwise, a neighborhood can easily involve a large portion of the whole graph. Normally ≪ V. Let us investigate the cost of processing for SimLW and SimKN. S Preprocessing for SimLW. We do not need to explicitly build the adjacent matrix of G× G G×G (1 ≤ i ≤ r), which takes O(V6) time. We and compute Ai can first index all possible labeled walks considered, and search the neighborhood of each node to count the frequencies of the labeled walks. A straightforward implementation is to conduct a breadth- first search on the neighborhood of each node to enumerate all la- beled walks. (cid:229) (cid:229) The number of walks of length i, starting from a center node u and ending at a node v ∈ Vu, is no more than Vui−1. The cost of computing the labeled walk feature vector vecLW (u) is O((cid:229) r−1 i=1 Vui−1Eu) = O(Vur−2Eu). Therefore, the total cost of computing all labeled walk feature vectors is O((cid:229) u∈V Vur−2Eu), which is definitely bounded by O(Vr−1E). Preprocessing for SimKN. To analyze the time complexity of materializing k-hops neigh- bor features, we follow the recursive computation of vecKN(u) in- troduced in section 5.4. Clearly, computing all n1 u's takes O(E) time. Computing all ni E) time. In total the overall time complexity of preprocessing is only O(rS for i ≥ 1 takes O(S v∈N(u) ni−1 E) time. u = (cid:229) v Please note that the above methods using preprocessing are just to show the tractability of SimLW and SimKN. Efficient and scal- able algorithms computing the similarity measures are beyond the capacity of this paper, and are reserved as future work. 6.3.3 Tradeoffs SimMCNP is a very strict similarity measure -- two nodes are similar if and only if their neighborhoods share a large common subgraph. SimNP poses a weaker requirement. Two nodes are sim- ilar if some selected patterns appear in the neighborhoods of the nodes. The neighborhoods of the nodes may have very different topological structures and do not have to share a large common subgraph. SimLW is even weaker since it only considers labeled walks. Two neighborhoods with very different topological struc- tures may still share many common labeled walks. As indicated by Theorem 8, SimKN is even weaker than SimLW . Roughly speak- ing, the strictness of requiring topological matching between neigb- horhoods in the similarity measures decreases from SimMCNP to SimNP, to SimLW and to SimKN. At the same time, computing SimMCNP and SimNP are much harder than computing SimLW and SimKN. Moreover, SimLW is more costly than SimKN. Therefore, the four similarity measures present meaningful tradeoffs between strictness of matching and computational cost. 7. EMPIRICAL RESULTS In this section, we report a series of empirical studies on the four similarities proposed using both synthetic data and real data. First, we use a synthetic data set to illustrate some interesting pairs of nodes whose neighborhoods are similar in one way or another. Second, we employ three data analytic tasks, namely similar au- thors search, anomaly nodes ranking, and nodes clustering, to il- lustrate the effectness of our proposed similarity measures in real applications. We find that, even the four similarities are all based on struc- tural features from neighborhoods, the semantics of similarity cap- tured by them have some important differences. Therefore, for each similarity, there are some applications suitable. By exploring the experimental results and the semantics captured by each proposed similarity in the tasks, our empirical studies provide a useful guide- line on selecting the appropriate similarity measures according to application needs. 7.1 Experimental Settings Due to the well recognized small world phenomenon [15], the parameter r should be set to a small number. In our experiments, we set r = 2. Figure 3: The neighborhoods of nodes u36 and u56. Because of the high computational cost in SimMCNP, we only use it in the experiments reported in Section 7.2, where the graph size is the smallest. For SimNP, the set S consists of neighbor- hood patterns G such that (1) G is connected; (2) G has at most n edges; and (3) G is NS-isomorphic to the neighborhoods of at least t nodes in G. The values of t and n depend on the scale of G, which will be specified when specific experiments are discussed. We implemented an algorithm similar to the one in [7] to find all neighborhood patterns in S from G. For SimLW and SimKN, we set parameters l i's so that shorter la- beled walks and k-hops neighbors of smaller value of k have heavier a Z , where 0 < a < 1 is a con- weights. Sepecifically, we set l i = stant and the normalized term Z = (cid:229) i. In our experiments, we always set a = 0.5. r i=1 a i In our experiments, we normalized all similarities proposed be- cause similarities after normalization have many desirable prop- erties like automorphism recognition. Specificaly, we normalized SimMCNP and SimNP to NSimMCNP and NSimNP using Equa- tion 4 so that their ranges are in [0,1], because SimMCNP cannot be transformed to a distance metric, and the number of features in SimNP are normally very large so that the generalized Jaccard similarity is more suitable than a distance metric. Moreover, we normalized SimLW and SimKN to metrics DSimLW and DSimKN using Equation 3. 7.2 Case Studies Using Synthetic Data We generated a synthetic graph with 64 nodes {u0, u1, . . . , u63} and 115 edges using the Kronecker graph model [17]. In this syn- thetic graph, there are 4 labels and each label is applied on 16 nodes. For each node u in the synthetic graph, we searched the top-5 nodes that are most similar to u. For SimNP, we set t = 3 and n = 5. It is not surprising that similarities based on different structural features lead to different search results. To observe the differences among similarity measures, we report some cases of similar node pairs returned by different similarities. We show neighborhoods of similar node pairs in Figures 3-5, all center nodes are marked in shadow. In those figures, we use letters a, b, c and d to represent labels. Figure 3 shows the neighborhood of node u36. All similarities identify that node u56 is the most similar one to u36, whose neigh- borhood is also shown in the figure. Comparing these two neigh- borhoods, they share a big neighborhood pattern of 7 edges, high- lighted by the dashed polygons in the figure. Moreover, the distri- butions of the labels over the neighborhoods are also similar. Please note that the similarity between u36 and u56 cannot be found using the similarity measures based on proximity or relative proximity. Figure 4 shows another interesting example. SimMCNP, SimLW and SimKN all indicate that u3 is the most similar node to u39. At Figure 4: The neighborhoods of u39, u3 and u63 7.3 Similar Authors Search We conducted similar authors search in the DBLP data set re- leased by Sun et al. [25] using the similarities we proposed. This DBLP data set contains 28,702 authors, 28,569 papers and 20 con- ferences from the areas of databases, data mining, machine learn- ing and information retrieval. There are only two types of edges in this network, edges between authors and their papers, and edges between papers and conferences where papers were published. We treat this network as a labeled graph with 22 labels, which are "au- thor", "paper", and the identities of the 20 conferences. Note that each conference only corresponds to one node, because we do not distinguish the conference held in different years. This DBLP data set contains data up to 2009, which means all papers in the data set were published before 2009. We chose 3 young researchers who graduated around the year of 2009 as query authors. They are Hong Cheng, Spiros Papadimitriou, and Jure Leskovec. The reason we do not chose well established researchers like Christos Faloutsos, Jiawei Han and Jennifer Widom is that they are very famous and many methods have been proposed to find authors similar to them. We used our proposed similarities to find the top-5 similar au- thors to the 3 young researchers. We do not report the results of SimMCNP, since it cannot handle large neighborhoods in a reason- able amount of time. For SimNP, we set t = 100 and n = 5. Table 1 shows the results. Due to the structure of this DBLP data set and r = 2, labeled walks features and k-hops neighbors features happen to be identical. Consequently, the results of SimLW and SimKN are identical. We report them in the columns of SimLW /KN. From Table 1 we find that the results of SimNP and those of SimLW /KN are quite different. They capture similarity in differ- ent senses. This observation echoes the motivation of this paper -- similarity has different meanings for different people in different scenarios. SimNP identifies some authors who graduated from the same group or very similar groups as the query author. For instances, Hong Cheng and Xifeng Yan were both from Professor Jiawei Han's group, Jure Leskovec and Deepayan Chakrabarti were both Professor Christos Faloutsos's students. Athough Spiros Papadim- itriou and Xifeng Yan were not from the same group, the two groups (Christos Faloutsos's group and Jiawei Han's group) they did their Ph.D. studies in are similar in terms of publication venues and collaborators. The neighborhood patterns in this DBLP data set reflect some patterns of an author's publication style, such as publishing with a certain number of co-authors in a certain confer- ence and co-authoring a certain number of papers with a specific researcher. For young researchers, especially when they were still Ph.D. students, such publication patterns were often deeply influ- Figure 5: Neighborhoods of u0, u28 and u48. the same time, SimNP picks u63 as the most similar node to u39. Figure 4 shows the neighborhoods of those nodes. Both u39 and u63 are hubs in their neighborhoods, but u3 is not a hub. SimNP can identify similarity between hub nodes because it uses neighbor- hood patterns frequent in the graph. Hub nodes likely share many patterns in their neighborhoods. SimLW and SimKN do not use any features that distinguish hub nodes from other nodes, and thus are not sensitive to similarity between hub nodes. SimMCNP considers the largest common neighborhood pattern. It happens that u39 and u3 share a large common neighborhood pattern of 10 edges in their neighborhood. That also affect the feature vectors using labeled walks and k-hops nodes in SimLW and SimKN. The last example illustrates the difference between SimLW and SimKN. Figure 5 shows the neighborhoods of nodes u0, u28 and u48. According to SimLW , the most similar node to u0 is u48. Ac- cording to SimKN, the one most similar to u0 is u28. From SimLW 's perspective, u0 and u28 are not similar at all because there are no common labeled walks starting from u0 and u28. For SimKN, al- though the 1-hop neighbors of u0 and u28 are totally different, the 2-hops neighbors of them are similar in labels. Thus SimKN indi- cates that u0 and u28 are similar. The above examples show the common properties and differ- ences of our proposed similarities. The results indicate that those similarities are reasonable to some extent from their own perspec- tives, and capture different types of similarity. An application has to pick the measure fitting the meaning of similarity in the applica- tion the best. Rank SimNP Hong Cheng Xifeng Yan Jimeng Sun Jiong Yang SimLW/KN Gao Cong Alexey Pryakhin Jörg Sander 1 2 3 4 5 Table 1: The top-5 similar authors. Spiros Papadimitriou SimNP SimLW/KN SimNP Jure Leskovec Xifeng Yan Jimeng Sun Jaideep Srivastava George Kollios Michail Vlachos Gautam Das Jiong Yang Deepayan Chakrabarti Gang Wu Ji-Rong Wen Sugato Basu SimLW/KN Glenn Fung Inderjit S. Dhillon Matthias Schubert Dong Xin Spiros Papadimitriou Boualem Benatallah Hong Cheng David W. Cheung Prasan Roy David W. Cheung Jignesh M. Patel Arindam Banerjee Roberto J. Bayardo Jr. Table 2: Probability adjacency matrix of G1. Professor(0) Graduate(1) Researcher(2) Engineer(3) Professor(0) Graduate(1) Researcher(2) Engineer(4) 0.9 0.25 0.15 0.1 0.25 0.9 0.15 0.15 0.15 0.15 0.9 0.2 0.1 0.15 0.2 0.9 enced by their advisors. Thus, from the publication pattern per- spective, the most similar authors are likely those graduated from the same group or very similar groups. SimLW /KN captures another interesting meaning of similar- ity. These measures return authors who share similar publication venues with the query authors. Due to the structure of this DBLP network data set, the labeled walks of length 1 do not have much impact on the similarity score -- there is only one type of labeled walk of length 1, "author-paper". Labeled walks from authors to conferences are the features playing the major role in SimLW /KN. 7.4 Anomaly Nodes Ranking We generated a labeled graph using the Kronecker graph model [17]. Then, we added some abnormal nodes to it. Our task is to check whether those proposed similarity measures can help to find those abnormal nodes. Specifically, the initiator graph G1 has 4 nodes with labels "Professor", "Graduate", "Researcher" and "En- gineer", respectively. The probability adjacency matrix (P1)4×4 is shown in Table 2. Here "Professor(0)" denotes that the 0-th node in G1 is with la- bel Professor. Using this probability adjacency matrix, we applied the Kronecker graph generator [17] to generate the probability ad- jacency matrix P of KG4, which is a 256× 256 matrix, because in KG4 there are 44 = 256 nodes. The entry in P follows P(u, v) = P 4 i=1P1(⌊ u 4i−1 ⌋(mod 4),⌊ v 4i−1 ⌋(mod 4)) (5) The label of node u is L(u) = L(u(mod4)), where L(0)=Professor, L(1)=Graduate, L(2)=Researcher and L(3)=Engineer as in the pro- totype graph G1. KG4 was generated according to P. We preserved every potential edge (u, v) with probability P(u, v) independently. From Equation 5, one can see that a node is more likely linked to nodes that have the same label. We add some abnormal nodes that violate this tendency. We randomly picked 4 nodes in KG4, one for each label, and switch their labels. Specifically, for a node picked randomly, if its label is "Professor", we changed it to "Engineer"; if its label is "Graduate", we changed it to "Researcher"; if its label is "Researcher", we changed it to "Professor"; and if its label is "Engineer", we changed it to "Graduate". From the probability adjacency matrix of G1 in Tabel 2 and Equation 5, we can see that after switching labels, those picked nodes may look "weird" based on their connections in the network. Thus, we call these 4 nodes planted anomaly nodes. We designed a very simple algorithm which ranks nodes accord- ing to how abnormal they look like. Specifically, we first parti- tioned nodes into 4 groups according to their labels. Note that for each group we have 64 nodes. Then, for each node u, we computed the top-5 nodes that are most similar to u from the group u belongs to. We calculated the sum of similarity scores between u and its top-5 similar nodes, and used this total to measure how "normal" u is. We call this total the normality index of u. For SimLW and SimKN, since we used the distance metrics DSimLW and DSimKN, the normality index of u is the negated sum of the distances between u and u's top-5 closest nodes. Last, for each group, we sorted all nodes in the group in the normality index ascending order. Those top-ranked nodes in every group are regarded as most abnormal. Clearly, the higher those 4 planted anomaly nodes are ranked, the better our methods are. We randomly generated 5 data sets, denoted by KG4(1)-KG4(5), and we used SimNP, SimLW and SimKN to rank nodes. For SimNP, we set t = 3 and n = 5. Table 3 reports the results of anomaly nodes ranking, where col- umn "Label" lists the labels of the planted anomaly nodes after label switching, column "Original Label" lists the original labels of the planted anomaly nodes. For each planted anomaly node, we report two ranks, the rank without switching the label and the one with switching the label. It is expected that by switching the label, the change of the rank is significant. The columns SimNP, SimLW and SimKN list the ranks of the planted anomaly nodes with switching the labels, while the columns "SimNP (Orignial Group)", "SimLW (Orignial Group)", and "SimKN (Orignial Group)" list the ranks of the planted anomaly nodes dwithout switching the labels. The row "Average Rank Promotion" provides the average number of positions elevated for a planted anomaly node by switching the label. Please node that some planted nodes are ranked high and some are ranked low even without switching the labels. Therefore, we believe that our results are representative. From Table 3, we observe that SimLW ranks the planted anomaly nodes high (in top-10) most of the cases (19 of the 20 cases in 5 trials). To this extent, SimLW is capable of catching the planted anomaly nodes, and likely is capable of catching this type of anomaly nodes in general. SimNP does not rank those planted anomaly nodes high. At the same time, as expected, all the three proposed similarity measures promote the anomaly ranks of the planted anomaly nodes substantially, as indicated by the row "Av- erage rank promotion". Although the neighborhood patterns of nodes in the randomly generated graphs are unknown, according to Equation 5 and P1 (Ta- ble 2), the model generating the graphs encourages nodes to link to nodes with the same labels. The neighbors of nodes in the graphs KG4(1) KG4(2) KG4(3) KG4(4) KG4(5) ID 146 43 165 156 38 55 213 136 66 167 153 164 134 39 197 244 158 183 189 16 Label Professor Graduate Researcher Engineer Professor Graduate Researcher Engineer Professor Graduate Researcher Engineer Professor Graduate Researcher Engineer Professor Graduate Researcher Engineer Researcher Engineer Graduate Professor Researcher Engineer Graduate Professor Researcher Engineer Graduate Professor Researcher Engineer Graduate Professor Researcher Engineer Graduate Professor # High Rank Cases (in Top-10) # Low Rank Cases (not in Top-20) Average Rank Promotion Original Label SimNP SimNP (Original Group) SimLW SimLW (Original Group) SimKN SimKN (Original Group) Table 3: Anomaly nodes ranking results. 10 6 11 12 4 24 30 10 3 14 25 7 6 20 6 5 30 23 34 1 10 6 45 28 57 56 45 27 37 35 2 52 55 54 24 22 16 38 29 53 53 2 2 17 2 6 1 2 1 5 8 4 9 8 8 7 14 1 3 5 6 1 8 3 19 0 21 19 1 23 29 4 30 15 16 24 27 28 19 5 31 25 14 1 26 27 4 11 6 6 1 2 2 3 11 6 11 8 8 6 13 1 4 5 11 2 9 1 16 0 22.45 14.15 11.15 22 12 1 23 17 6 15 20 20 14 31 29 23 3 24 19 12 2 24 22 4 8 tend to have some underlying patterns. In SimLW , the labeled walks of length 1 as features capture neighbors, and so do 1-hop neigh- bors in SimKN. Therefore, these two methods are capable in this anomaly nodes ranking task. 7.5 Nodes Clustering The last experiment conducted is nodes clustering in social net- works. We adopted the netscience co-author network [19] as our data set, which contains 1589 authors and 2743 edges. One may note that this network is unlabeled, but unlabeled graphs can be seen as labeled graphs with only one type of label on all nodes. We can still run our proposed methods on the netscience co-author net- work. Since all nodes are with the same label, labeled walks and k-hops neighbors degenerate into counting k-hops degree of nodes. Thus, in this experiment, we only use neighborhood patterns as fea- tures for clustering nodes. We computed the normalized similarity (Theorem 7) between every pair of nodes in the network using SimNP. To decide the fea- ture set S of neighborhood patterns, we set t = 10 and n = 5. Then, we built a node-node similarity matrix and ran a simple spectral clustering algorithm [20] by setting the number of clusters to 5. Figure 6 shows the result on the largest connected component of the netscience co-author network, which has 379 nodes. We use different colors to indicate nodes in different clusters. Using SimNP, we partitioned nodes into groups according to their structural roles in the network. Most of the nodes in the dark- blue cluster are hub-like nodes, most of the nodes belonging to the yellow cluster are isolated nodes (outliers), most of the nodes in the green cluster are less isolated nodes, and most of the nodes in the light-blue cluster are main-stream nodes. Only one node is as- signed to the red cluster, which is a hub-like node. The results here are similar to the results in [9]. Please note that, unlike the tradi- tional hub/outlier detection algorithms on graphs, our method did not use the whole topological information of the graph, but only used similarity between pairs of nodes. Unlike [9], we did not con- duct feature selection/engineering or model selection. We just ap- plied a simple spectral clustering algorithm on the node-node sim- ilarity matrix. This set of experimental results demonstrate that the node similarity based on neighborhood patterns is promising for distinguishing nodes with different structural roles. Figure 6: Nodes clustering result on the largest connected com- ponent of the NetScience co-author network. 8. CONCLUSIONS In this paper, we systematically investigated the problem of mea- suring in-network node similarity based on neighborhoods. Neigh- borhood based node similarities can capture various meanings of similarity that are different from most of the existing proximity or relative proximity based similarities, such as SimRank and Guilt- by-Association. We proposed a unified parametric model for neigh- borhood based similarity, which is flexible for plugging in differ- ent features and assembling functions to obtain similarities with different meanings. At the same time, the model remains simple. Four different similarities based on different features were devel- oped and proved to be instances of our unified parametric model. We explored desirable properties of our proposed similarities, such as how to transform them into distance metrics and normalization. We also discussed the computational costs of different similarities and analyzed interesting tradeoffs between topological matching and computational efficiency. Last, extensive empirical studies on both synthetic data and real-world data were conducted, and the results demonstrated the effectiveness of our proposed similarities. This paper is the beginning of an exciting journey on developing in-network similarity measures and applications. There are a series interesting and important problems for future work. For example, it is interesting to explore efficient and scalable algorithms to com- pute and approximate the similarity measures over large graphs. Moreover, it is useful to further refine the spectrum of similar- ity measures representing more tradeoffs between computational cost and strictness of neighborhood matching and addressing mean- ingful application needs. Systematic applications of the proposed model and similarity measures in social network mining applica- tions will also be exciting. 9. REFERENCES [1] S. P. Borgatti and M. G. Everett. Two algorithms for computing regular equivalence. Social Networks, 15(4):361 -- 376, 1993. [2] M. M. Deza and E. Deza. Encyclopedia of distances. Springer, 2009. [3] H. Fei and J. Huan. Structure feature selection for graph classification. In Proceedings of the 17th ACM conference on Information and knowledge management, pages 991 -- 1000. ACM, 2008. [4] T. Gärtner, P. Flach, and S. Wrobel. On graph kernels: Hardness results and efficient alternatives. In Learning Theory and Kernel Machines, pages 129 -- 143. Springer, 2003. [5] S. Gilpin, T. Eliassi-Rad, and I. Davidson. Guided learning for role discovery (glrd): framework, algorithms, and applications. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 113 -- 121. ACM, 2013. [6] R. A. M. Gregson. Psychometrics of similarity. Academic Press, New York, NY, USA, 1975. [7] J. Han and J.-R. Wen. Mining frequent neighborhood patterns in a large labeled graph. In Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, pages 259 -- 268. ACM, 2013. [8] J. Han, J.-R. Wen, and J. Pei. Within-network classification using radius-constrained neighborhood patterns. In Proceedings of the 23nd ACM international conference on Conference on information & knowledge management. ACM, 2014. [9] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li. Rolx: structural role extraction & mining in large graphs. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1231 -- 1239. ACM, 2012. [10] K. Henderson, B. Gallagher, L. Li, L. Akoglu, T. Eliassi-Rad, H. Tong, and C. Faloutsos. It's who you know: graph mining using recursive structural features. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 663 -- 671. ACM, 2011. [11] G. Jeh and J. Widom. Simrank: a measure of structural-context similarity. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 538 -- 543. ACM, 2002. [12] G. Jeh and J. Widom. Scaling personalized web search. In Proceedings of the 12th international conference on World Wide Web, pages 271 -- 279. ACM, 2003. [13] R. Jin, V. E. Lee, and H. Hong. Axiomatic ranking of network role similarity. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 922 -- 930. ACM, 2011. [14] H. Kashima, K. Tsuda, and A. Inokuchi. Marginalized kernels between labeled graphs. In ICML, volume 3, pages 321 -- 328, 2003. [15] J. Kleinberg. The small-world phenomenon: An algorithmic perspective. In Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 163 -- 170. ACM, 2000. [16] D. Koutra, T.-Y. Ke, U. Kang, D. H. P. Chau, H.-K. K. Pao, and C. Faloutsos. Unifying guilt-by-association approaches: Theorems and fast algorithms. In Machine Learning and Knowledge Discovery in Databases, pages 245 -- 260. Springer, 2011. [17] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. The Journal of Machine Learning Research, 11:985 -- 1042, 2010. [18] F. Lorrain and H. C. White. Structural equivalence of individuals in social networks. The Journal of mathematical sociology, 1(1):49 -- 80, 1971. [19] M. E. Newman. Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104, 2006. [20] A. Y. Ng, M. I. Jordan, Y. Weiss, et al. On spectral clustering: Analysis and an algorithm. Advances in neural information processing systems, 2:849 -- 856, 2002. [21] N. Shervashidze, T. Petri, K. Mehlhorn, K. M. Borgwardt, and S. Vishwanathan. Efficient graphlet kernels for large graph comparison. In International Conference on Artificial Intelligence and Statistics, pages 488 -- 495, 2009. [22] N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt. Weisfeiler-lehman graph kernels. The Journal of Machine Learning Research, 12:2539 -- 2561, 2011. [23] M. K. Sparrow. A linear algorithm for computing automorphic equivalence classes: the numerical signatures approach. Social Networks, 15(2):151 -- 170, 1993. [24] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu. Pathsim: Meta path-based top-k similarity search in heterogeneous information networks. VLDB, 2011. [25] Y. Sun, Y. Yu, and J. Han. Ranking-based clustering of heterogeneous information networks with star network schema. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 797 -- 806. ACM, 2009. [26] H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with restart and its applications. In Proceedings of the 6th International Conference on Data Mining, pages 613 -- 622. IEEE, 2006. [27] J. S. Yedidia, W. T. Freeman, and Y. Weiss. Constructing free-energy approximations and generalized belief propagation algorithms. Information Theory, IEEE Transactions on, 51(7):2282 -- 2312, 2005. [28] W. Yu, X. Lin, W. Zhang, L. Chang, and J. Pei. More is simpler: Effectively and efficiently assessing node-pair similarities based on hyperlinks. Proceedings of the VLDB Endowment, 7(1), 2013.
1608.03371
2
1608
2017-05-06T16:58:22
Learning Sentimental Influences from Users' Behaviors
[ "cs.SI" ]
Modeling interpersonal influence on different sentimental polarities is a fundamental problem in opinion formation and viral marketing. There has not been seen an effective solution for learning sentimental influences from users' behaviors yet. Previous related works on information propagation directly define interpersonal influence between each pair of users as a parameter, which is independent from each others, even if the influences come from or affect the same user. And influences are learned from user's propagation behaviors, namely temporal cascades, while sentiments are not associated with them. Thus we propose to model the interpersonal influence by latent influence and susceptibility matrices defined on individual users and sentiment polarities. Such low-dimensional and distributed representations naturally make the interpersonal influences related to the same user coupled with each other, and in turn, reduce the model complexity. Sentiments act on different rows of parameter matrices, depicting their effects in modeling cascades. With the iterative optimization algorithm of projected stochastic gradient descent over shuffled mini-batches and Adadelta update rule, negative cases are repeatedly sampled with the distribution of infection frequencies users, for reducing computation cost and optimization imbalance. Experiments are conducted on Microblog dataset. The results show that our model achieves better performance than the state-of-the-art and pair-wise models. Besides, analyzing the distribution of learned users' sentimental influences and susceptibilities results some interesting discoveries.
cs.SI
cs
Learning Sentimental Influences from Users' Behaviors Shenghua Liu,1 Houdong Zheng,2 Huawei Shen,1 Xiangwen Liao,2 Xueqi Cheng1 1CAS Key Laboratory of Network Data Science & Technology Institute of Computing Technology, Chinese Academy of Sciences 2Mathematics and Computer Science School, Fuzhou University [email protected], [email protected], [email protected], [email protected] 7 1 0 2 y a M 6 ] I S . s c [ 2 v 1 7 3 3 0 . 8 0 6 1 : v i X r a ABSTRACT Modeling interpersonal influence on different sentimental po- larities is a fundamental problem in opinion formation and viral marketing. There has not been seen an effective solu- tion for learning sentimental influences from users' behav- iors yet. Previous related works on information propagation directly define interpersonal influence between each pair of users as a parameter, which is independent from each oth- ers, even if the influences come from or affect the same user. And influences are learned from user's propagation behav- iors, namely temporal cascades, while sentiments are not associated with them. Thus we propose to model the inter- personal influence by latent influence and susceptibility ma- trices defined on individual users and sentiment polarities. Such low-dimensional and distributed representations natu- rally make the interpersonal influences related to the same user coupled with each other, and in turn, reduce the model complexity. Sentiments act on different rows of parameter matrices, depicting their effects in modeling cascades. With the iterative optimization algorithm of projected stochastic gradient descent over shuffled mini-batches and Adadelta update rule, negative cases are repeatedly sampled with the distribution of infection frequencies users, for reducing com- putation cost and optimization imbalance. Experiments are conducted on Microblog dataset. The results show that our model achieves better performance than the state-of-the-art and pair-wise models. Besides, analyzing the distribution of learned users' sentimental influences and susceptibilities results some interesting discoveries. Keywords opinion propagation; influence; susceptibility; cascade 1. INTRODUCTION Collective opinions concisely form by a repeated process that a user who sees and agrees with a sentimental content, forwards, shares, or "Likes" to feed her virtual community, resulting in a temporal cascade of users' behaviors. As such, users who have taken actions become infective to others in their communities, encouraging their communities to a cer- tain extend to take the same action by interpersonal influ- ences. Each pair of users has a specific influence, especially when there exits some kind of social relation [19, 2]. There- fore, both opinion formation [39, 5] and viral marketing [31, 27] see the importance of learning sentimental influences be- tween users, with which one can better model the dynamics of cascades [19], and maximize influence [24, 14, 6]. Figure 1: Motivations underlying our model. Exam- ple of cascades to illustrate the overfitting problem suffered by pair-wise models. Among the existing works, it seldom sees an effective one for estimating sentimental influence between pairs of users as far as we are concerned. Most of studies focus on the pro- cess how users repeatedly update their opinions, the con- sensus they can reach [10, 34, 5], and opinion influence maximization [14], assuming that the interpersonal influ- ences as edge weights are given or equally assigned. In the related domain of information propagation, influences learning has been studied, without consideration of different propagation behaviors on sentiments, although some stud- ies modeled them on the distribution of content topics [29, 11]. Moreover, Goyal et. al [19] "learned" interpersonal in- fluences by counting the successful propagation pairs. And with Bernoulli or Jaccard Index model, they estimated the influences as propagation probabilities. However, there usu- ally record the times of users getting infected, while such successful propagation pairs that user v infects user u are rarely observed, or hardly traced. It limits the application of such a method. And NetInf [19] used an exponential or power-law form of incubation time between a pair of infected users to estimate the interpersonal influence, with empiri- cally assigned parameters. Afterward, more novel models were proposed to learn interpersonal influence by maximiz- ing the likelihood of observed cascades, which were proved to be more effective [33, 15, 18]. However, they used a free scalar parameter directly defined on a pair of users to repre- sent the interpersonal influence. On one hand, the param- eters are independent, even if the influences are acted by or apply to the same user. On the other, such a pair-wise parameter cannot be trained if there are no observations of propagations between the user pair, e.g. users c and d do not appear in the same cascade, infected in Cascade1 and Cascade2 respectively, as Figure 1 shows. In that case, even though c and d have a relationship, and c, e and d form a social triangle, a zero or some empirically small constant is assigned, implying that it is never or seldom to successfully propagate between them in the future. In another way, Aral and Walker [2] proposed to model the interpersonal influence by engineered features and corresponding linear coefficients learned for individual users other than user pairs directly. But users' properties may not be available or easy to ex- tract in other applications. To fill the blank of previous works, we thus propose to learn distributed representations of users' influences and sus- ceptibilities on sentiments. With such representations, we model the interpersonal influences and their decaying with the elapsed time in the hazard function of survival model, and maximize the likelihood of the observed the behaviors of users taking or not taking the actions in sentimental cas- cades. Hence, the interpersonal influences, between two pairs of users, and with the same acting or applied user, can be coupled due to the corresponding representation of the same user. For example, the interpersonal influence of users c to d, couples with that of users c to e by the cor- responding representation defined on user c as in Figure 1. Besides, it requires much fewer parameters, i.e., O(n) for n users, instead of O(n2) parameters for user pairs, beneficial to reducing the model complexity, and in turn combating the overfitting problem of assigning an empirical propaga- tion probability. Moreover, the number of infected users in a cascade is usually much less than that of uninfected ones as negative cases. Considering all the negative users pre- vents the model from being applied to a real large dataset and balancing the optimization. Thus a negative sampling is employed to consider the expectation of negative cases instead, emphasizing the frequently infected users in other cascades. Finally a mini-batch Stochastic Gradient Decent (SGD) algorithm with Projected Gradient (PG) is designed to learn the model, and Adadelta is used to adjust the learn- ing rate adaptively. In such a scheme, negative sampling is repeated in each iteration with a small number of samples each time, to approximate the expectation. A set of cascades with different sentiments are collected from Microblog, covering a group of users who interact at a frequent level. Comparing with the state-of-the-art mod- els, including above Bernoulli and Jaccard Index estimation methods, and pair-wise models, our model achieves better performances on the tasks of predicting cascade dynamics, "who will be retweeted", and cascade size with users' repre- sentations. Besides, it can be seen that learning influences separately on different sentimental polarities, mostly bene- fits the performances on both tasks, even if more parameters are brought in. As last, users' representations on different sentiments are analyzed as well. And we find that users may have different influences on different sentiments, and are sus- ceptible to different polarities. The "original influentials" are creative to post original attractive messages, while the "sec- ondary influentials" gain their influence credits by hunting and advertising for interesting messages that already exists in the system. The rest of the paper is organized as follows. Section 2 studies the existing and related works, and the motivation and our model are described in section 3, which the param- eter learning algorithm is given. At last, experiments and result analysis are reported in section 4, and section 5 con- cludes the whole work. 2. RELATED WORK Sentiment propagation and opinion formation have at- tracted many research works. [40, 25] experimentally showed that users' sentiments were influenced by that of others sur- rounding them on LiveJournal dataset and Facebook dataset separately. [4] used Granger causality analysis to show that sentiment change of audiences were related to the landscape of popular users in Twitter. As for modeling opinion dy- namics, successful models were proposed, including Sznajd model [35], Deffuant model [9], and Hegselmann and Krause model [21], which produced agreeing results. Moreover, [32] extended Sznajd model to complex networks. Deffuant et al. [9] modeled the process of opinion dynamics that ran- domly select two users, and change their opinions to reduce the difference. [22] modeled to change users' opinions ac- cording to the arithmetic average of that of their neighbors, and Fortunato et al. [13] extended the model with multi- dimensional opinion vector, instead of a scalar opinion value. Besides, Suchecki et al. [34] studied Voter model in scale-free network, small-world network, and random network. A re- cent work [5] by Bindel et al. discovered that traditional models including DeGroot model [10] finally converged to a state of consensus under a set of general conditions, while it is rare in real opinion dynamics. Hence it proposed to model with users' intrinsic beliefs in a game theory, which coun- terbalanced the opinions at Nash equilibrium. In addition, Gionis et al. [14] studied the overall positive opinion maxi- mization problem, adopting the game model [5] of opinion dynamics. [1] modeled that a user's opinion was generated from her latent opinion distribution, based on self-excited Hawkes process influenced by her neighbors. The body of above works is mostly on opinion dynam- ics and maximization, assuming the sentimental influences between connected users were equal. It does not confirm to our observations in real life, in which a minority of influential users infect an exceptional number of their peers [23], and there are a mass of easily influenced users [39]. Thus, as a fundamental problem, sentimental influences were ever esti- mated by counting under Bernoulli assumption, or a thresh- old rule [39]. As far as we know, an effective method of learn- ing sentimental influences from users' behaviors remains un- explored. Nevertheless, there were quite a few successful works on estimating interpersonal influences in the related domain of information propagation. Some of them made efforts to ex- tract features that are related to propagation probability and learned from the observed information cascades. Crane et al. [8] measured the response function of information prop- agation dynamics in social systems with endogenous and exogenous factors. Artzi et al. [3] predicted whether a user would respond to or retweet a message, i.e. get influenced, by classifying with demographic and content features. In a way other than feature extractions, Tang et al. [36] proposed topic factor graph (TFG) to model the generative process of the topic-level social influence on large networks, by find- ing a topic distribution for each user. And [29] proposed a probabilistic factor graph to model the direct and indirect influences between adjacent and non-adjacent users of het- erogeneous network. Saito et al. [33] learned the propagation probability between neighbors of a directed network under independent cascade model, using the orders of users getting influenced as training data. And Goyal et. al [19] proposed to estimate the interpersonal influences in a counting man- ner, with assumptions of Bernoulli model and Jaccard Index separately. They estimated the influences as propagation probabilities. NetInf [16] adopted both exponential and a power-law incubation time models with fixed parameters as pair-wise probability to infer the underlying network. Be- sides, there are also a series of works learning a propagation probability between any pair of users with survival model and its variants to infer underlying networks with the trans- mission rates. NetRate [15] used survival theory to model transmission rate between every pair of users, which was viewed as an edge weight for the pair. And [17] then mod- eled the hazard rate in survival model with additive and multiplicative risks separately to improve the performance of cascade size prediction. Afterward, InfoPath [18] was pro- posed to learn time-varying transmission rates for user pairs as the edge weights of the hidden dynamic network. Taken together, these methods work in a pair-wise manner, i.e., they learned the propagation probability between pairs of users, fundamentally different from the proposed method in this paper which focuses on inferring user-specific influence and susceptibility from historical cascades. The features in influence and susceptibility representations were analyzed by [2], showing that propagation probability were determined by the two feature vectors, and learned the correlations be- tween users' attributes to identify influential or susceptible users. [38] then proposed a sequence model to learn a user's latent representation of influence and susceptibility, based on the orders of users' getting infected. In this work, we propose to learn the distributed representations of a user on sentiments, and continuous time model is employed to con- sider the infected times of users and the effect of the elapsed time on interpersonal influences, rather than their orders only. 3. LEARNING SENTIMENTAL INFLUENCE A cascade is the snapshot of a propagation process, record- ing the times that users take actions on the same target, such as a piece of information, or product. Users taking actions become infected, and may influence others since such actions are publicly visible or pushed to the related users on pur- pose, by the online service. Thus we define a cascade C for actions on a target as a temporal sequence C = {(v1, t1), (v2, t2), · · · , (vN , tN )t1 ≤ t2 ≤ · · · ≤ tN }, where vi is the user who take the action at time ti, and N is the total number of infected users, i.e. cascade size. Since social networks are not always available or existing in many applications, such as blogs, Yelp, Youtube, and online shopping, to make our model generally applicable, network structures are ignored. That is to say, the influence between any pair of users is modeled, and a very small value of influences can capture the underlying disconnections of the user network, and vice versa. Moreover, in the following we can see that our model can honor social network as well in the objective. In addition, a special time tE > tN is defined as the biggest time window which we observe cascade C in, namely the time when we take the snapshot for cascade C. 3.1 Motivations a), (b, t2 b ) (e, t2 f ) (d, t2 a), (c, t1 c), (e, t1 e), (f, t2 e), (f, t1 Interpersonal influences are quite different especially when existing some social relationships. Most existing works in- tuitively model the interpersonal influences in a pair-wise manner with n2 independent variables to learn, assuming that interpersonal influence between different pairs of users are independent from each other, even if the influences are related to a common user. Such an overfitting problem be- comes severe, when there is not observed any propagation between a pair of connected users. Taking Figure 1 as an example, two cascades {(a, t1 f )} and {(a, t2 d)} are observed. It is not seen that user c is infected before user d did, even though there is a social link from user c to user d. In such a case, most existing models took the propagation probability or transmission rate between them as zero, or some empiri- cally small value [20], implying that it would never or sel- dom see successful propagation between the two users in the future. Nevertheless, with the witness of propagation from users c to e in one cascade, and from users e to d in another, user c probably influences user d like the triangle pattern in friendship relations. Thus, with the distributed representa- tions of influence and susceptibility defined for every user, interpersonal influences can be correlated by the shared rep- resentations of the same user. As shown in the example of Figure 1, the influences between user pairs (c, d) and (c, e) are coupled with a shared representation of user c's influ- ence. And the interpersonal influence from user c to d can be intuitively estimated by the learned representations of c's influence and d's susceptibility, other than a small empirical constant or zero. At last, not all the users take actions in a cascade, so let the total number of users be M , and there are always a large number of users immune to a contagion, i.e., M − N ≫ N , who are treated as negative cases and informative to reflect the interpersonal influences from the infected users to them. Without network constants, considering all the uninfected users takes much more computational costs, even unable to tackle. Moreover, the severe imbalanced positive (infected) cases and negative (uninfected) cases make the negative likelihood dominate the optimization of the whole objective, losing focus on positive cases as the following. N c M c−N c maxXc ln L =Xc X ln Lc pos+Xc neg(dominate) X ln Lc where superscript c is used to show that the values are re- lated to cascade C. It is seen that the right term in summa- tion easily dominates the objective, since M is relatively very large. So we use sampled users as negative cases. Neverthe- less, the infected frequency of a user indicates how easily she could get infected again. Thus observing a frequently infected user immune to a contagion, provides more infor- mation in the likelihood. And sampling negative cases from the distribution of users' infected frequencies is then a better choice for learning influences. 3.2 Survival Analysis Model We begin to briefly introduce the preliminary knowledge on Survival Analysis Model [26, 17]. We consider the hap- pening time T of a user taking the action as a continuous random variable, defined over [0, ∞). Let f (t) and F (t) de- note the probability density function (p.d.f) and the cumula- tive density function (c.d.f.) separately. And the probability P r(T ≤ t) = F (t). So, the probability of a user not taking the action until time t is defined by the survivor function S(t) = P r(T ≥ t) = 1 − F (t) =Z ∞ t f (x)dx. A hazard function h(t) is defined as the instantaneously in- fecting rate in time interval [t, t + ε), where ε is an infinites- imal elapsed time, given a user survives until time t. h(t) = lim ε→0 P r(t ≤ T < t + εT ≥ t) ε = f (t) S(t) . Noticing that f (t) = −S′(t) and S(0) = 1 , the survivor function can be expressed as ln S(x) = −Z t 0 h(x)dx. 3.3 Modeling sentimental cascades With the analysis above, we model the interpersonal influ- ence by two non-negative K × D matrices Ii and Si defined on each user vi, where K is the number of sentiment classes, and D is the dimension of users' representations on each sentiment class. For a message with sentimental opinion, we define a one-hot vector o with K dimensions, representing its exclusive sentiment class. Thus, for a cascade with senti- ment o, the transmission rate function φ(·) from users vj to vi, is defined as equation (1), which indicates the likelihood of successful propagation between them. Although the orig- inal concept of transmission rate is not necessarily between 0 and 1, we scale it for regularization. φ(Ij, Si, o) = 1 − exp{−oT Ij ST i o} (1) where matrices Ij and Si are parameters to separately cap- ture the influence of user vj and the susceptibility of user vi. Let Hji denote the set of parameters {Ij , Si, o} for sim- plification. With transmission rate φ(Hji), we can define the hazard function from users vj to vi in Survival Analysis Model, at time t as follows. h(ttj ; φ(Hji)) = φ(Ij , Si, o) 1 t − tj + 1 , (2) where t − tj + 1 depicts the hazard function monotonously decaying with the time elapsed from tj, and adding 1 avoids unbounded hazard rate due to a zero or infinitesimal value of t − tj . Noticing that equation (2) holds only when t ≥ tj , we define hazard rate h(ttj; φ(Hji)) = 0, when t < tj , namely, user vj has not been infected at time t. Moreover, we can consider social network by defining hazard function h(ttj ; φ(Hji)) = 0 as well, if user vi and user vj are not connected. And then the survivor function S(ttj; φ(Hji)) of user vi surviving later than time t and under the influence of user vj , satisfies Figure 2: A concise representation of dependencies of users' behaviors in the model. Solid nodes are infected users, and hollow nodes are the immune ones (negative) to the contagion. Model parameters are omitted for simplicity. Finally, the probability density function of user vi happen- ing (getting infected) at time t, given user vj happening (infected) at time tj is calculated as follows. f (ttj ; φ(Hji)) = h(ttj; φ(Hji))S(ttj; φ(Hji)). With the assumption that a user is only infected by one of the previously infected ones [17], the likelihood of user vi, i > 1, being infected at time ti in a cascade is f (tit; φ(H)) = Xj:tj <ti = Xj:tj <ti f (titj ; φ(Hji)) Yk6=j,tk<ti h(titj; φ(Hji) · Yk:tk<ti S(titk; φ(Hki)) S(titk; φ(Hki)).(4) So the joint likelihood of observing the whole cascade, given the user v1 firstly taking the action at time t1 is f (t \ t1t1; φ(H)) = Yi>1 Xj:tj <ti Yk:tk<ti h(titj ; φ(Hji)) · S(titk; φ(Hki)). Considering the negative cases that users are not infected at the end, the probability of user vl surviving later than time tE is S(tEt; φ(H)) = Yi:ti≤tN S(tEti; φ(Hil)). And the log-likelihood of a cascade is as follows, considering negative cases. ln L(I, S; o) = Xi>1 ln  Xj:tj <ti Xi>1 Xk:tk<ti X Evl∼P (u)" N Xj=1 L φ(Ij, Si, o) 1 ti − tj + 1  − φ(Ik, Si, o) · ln(ti − tk + 1) − φ(Ij, Sl, o) · ln(tE − tj + 1)# ln S(ttj ; φ(Hji)) = −Z t 0 h(xtj; φ(Hji))dx = φ(Ij , Si, o) · ln(t − tj + 1) (3) There are a large number of negative users comparing to the number of infected ones in a cascade. Maximizing the likelihood of all the negative cases limits the scalability of our model, and the imbalance between positive and nega- tive cases may mislead the optimization direction. Thus we sample L users as negative cases according to the distribu- tion P (u) ∝ R3/4 [30], where Ru is the frequency of user u infected in cascades. It is worth noticing that sampling negative cases are repeated in every optimization iteration to honor the expectation. To give a direct understanding of the likelihood, the dependencies are concisely represented in Figure 2. u Finally, the optimization problem of learning users' senti- mental influences and susceptibilities ln Lc(I, S; oc) min I,S s.t. −XC Iki ≥ 0, Ski ≥ 0, ∀k, i. (5a) (5b) where superscript c is used to indicate that the value or function are related to cascade C. 3.4 Optimization Optimization algorithm is the key to learn the distributed representations of users' influences. First of all, the gradients of transmission rate function (1) on Iv and Su are K × D matrices. ∂φ(Iv, Su, o) ∂Iv ∂φ(Iv, Su, o) ∂Su = (1 − φ(Iv, Su, o))ooT Su = (1 − φ(Iv, Su, o))ooT Iv where only the k-th row in both matrices can have non- zero gradients, when a cascade belongs to the k-th sentiment class, i.e, ok = 1. Furthermore, if user v get infected in a cascade, t1 ≤ tv ≤ tN , the gradients of the log-likelihood on matrix Iv may have non-zero gradients. And the gradients of the log-likelihood on matrix Sv may be non-zeros, if user v is infected and t1 < tv ≤ tN , or she is a negative user. Oth- erwise, the gradients are always zeros. As the negative cases for a cascade is repeatedly sampled in every iteration, we define [Vc s]τ as the set of negative users at the τ -th iteration of algorithm for cascade C. [Vc s]τ = {vl ∼ P (u)}L, where L is the set size. Therefore, the gradients of the objective function (5a) on matrices Iv and Sv are as follows. 1(tc v ≤ tc N ) ∂Lc(I, S; oc) 1(tc 1 < tc v ≤ tc N ) ∂Iv ∂Lc(I, S; oc) ∂Sv 1(v ∈ [Vc s]τ ) · +Xc gIv = −Xc gSv = −Xc Xj=1 N c (1 − φ(Ij, Sv, oc)) · ln(tc E − tc j + 1)ococT Ij where 1(·) is an indicator function, outputting 1 if the ar- gument is true, and 0 otherwise. gIv and gSv are K × D matrices, containing partial derivations of objective function (5a) on each elements of matrices Iv and Sv separately. The framework of Stochastic Gradient Decent (SGD) over shuffled mini-batches is employed for efficient optimization. The mini-batch size is set 12 cascades. In order to solve the non-negative constraints on parameters, Projected Gradient (PG) [28] is used to adjust the gradients. Let the parameter + updates be ∆Iv and ∆Sv for each user v. And matrices I, S ∈ RK×DM are the concat of Iv and Sv for all users v. M is the user count as defined previously. Thus the updates will be reduced by a rate 0 < β < 1, namely, β∆Iv and β∆Sv, if the following condition does not hold. O([E]τ +1) − O([E]τ ) ≤ σ · T r(∇O([E]τ )T ([E]τ +1 − [E]τ )) (6) where [·]τ means the parameter in the τ -th iteration. With E = {I, S} ∈ RK×2DM , O(E) is the simplified representa- tion of objective function (5a). T r(·) is the trace of a matrix, and σ is a constant between 0 and 1. Moreover, since deciding learning rate is not trivial, so we choose Adadelta [41] to adaptively tune the learning rate. Let ρ be decay rate and ǫ be a small constant. The accumu- late gradients are E[g2 E[g2 Iv ]τ = ρE[g2 Sv ]τ = ρE[g2 2]τ = ρE[∆Iv 2]τ = ρE[∆Sv Iv ]τ −1 + (1 − ρ)[g2 Sv ]τ −1 + (1 − ρ)[g2 Iv ]τ Sv ]τ 2]τ −1 + (1 − ρ)[∆Iv 2]τ −1 + (1 − ρ)[∆Sv 2]τ 2]τ E[∆Iv E[∆Sv And with the definition of function RM S[x]τ =pE[x2]τ + ǫ, the update values are calculated as [∆Iv]τ = − RM S[∆Iv]τ −1 RM S[gIv ]τ [gIv ]τ [∆Sv]τ = − RM S[∆Sv]τ −1 RM S[gSv ]τ [gSv ]τ Let the project function ψ(x) be defined as projecting x into non-negative space, namely, ψ(x) = 0 if x < 0; other- wise ψ(x) = x. Therefore, the algorithm of learning users' sentimental influences is listed in Algorithm 1. Algorithm 1 Algorithm of learning users' sentimental in- fluences. Given 0 < ρ, β < 1, constants σ and ǫ; initialized parameters Iv and Sv for each user v; Cascade set C. Iteration index τ := 0; E[g2 Sv ]0, E[∆Iv repeat Iv ]0, E[g2 2]0, E[∆Sv 2]0 = 0; Randomly shuffle C; Split C into groups by mini-batch size; for each group do Compute gradients [gIv ]τ , [gSv ]τ ; Accumulate gradients and updates: 2]τ , E[∆Sv Sv ]τ , E[∆Iv Parameter update values: Iv ]τ , E[g2 E[g2 2]τ ; [∆Iv]τ , [∆Sv]τ Update [Iv]τ +1 = ψ([Iv]τ + [∆Iv]τ ); Update [Sv]τ +1 = ψ([Sv]τ + [∆Sv]τ ); while not Condition (6) do decreasing update values: [∆Iv]τ = β[∆Iv]τ , [∆Sv]τ = β[∆Sv]τ Update [Iv]τ +1 = ψ([Iv]τ + [∆Iv]τ ); Update [Sv]τ +1 = ψ([Sv]τ + [∆Sv]τ ); end while τ := τ + 1 end for until parameters converged, or maximum epoch. 4. EVALUATIONS Microblog data is used to evaluate our model. To make the application more general, we assume that the retweeting relations and following relations are not available in the eval- uations, only keeping the temporal sequence of users taking actions, i.e., retweet, and their infected times as the dataset. We then demonstrate the performance of our model at the well-known tasks, by comparing to the state-of-the-art mod- els, and the learned sentimental influences are analyzed as well. 4.1 Data Description Figure 3: The distribution of emoticon frequency. Several strategies are taken to collect Microblog data from Sina Weibo 1. We initially collected about 315.6 million records including posting, retweeting, and mentioning mes- sages between Nov 1st, 2013 to Feb 28, 2014 from the time- line of 312,000 users sampled from Sina Weibo database. Since emoticons in cascade messages are usually used as the sentiment indicator, we filtered the messages with fre- quently used emoticons and active users, and crawled the full records of retweeting cascades of those remaining messages. Emoticons are split into positive sentiment set and nega- tive sentiment set according to a dictionary of emoticons. And sentiments of messages are intuitively assigned accord- ing to emoticons in our experimental settings. Otherwise, one can use any reliable sentiment classifier, such as Opin- ionFinder [7] to decide the sentiments. Meanwhile, retweet- ing relations are also extracted from the auto-generated con- tents, which help to preprocess data, and are used for ground truth in later evaluations. And we define the activeness Av of a user v as the summation of the frequency of user v getting infected (retweeting others), A·v, and that of user v influencing others (being retweeted), Av·, in current cas- cades. Av = A·v + Av·. Afterward, in a way of "onion peeling", we repeated to delete for each cascade, the records of the users with activeness less than 5, and so did those of the users retweeting them. In each iteration, the cascades of sizes less than 8 are deleted as well, since very short cascades are considered as accidents. Table 1: Data Statistics (a) Time span 10/31/13 -3/3/14 Total Total users cascade size Positive Negative Sentiment 6219 44021 325 412 (b) User activeness median mode 5 4 Cascade size median mode 37 10 With such a heuristic way, we finally get a set of cascades over a virtual community of active users from Oct 31, 2013 to Mar 3, 2014. As listed in Table 1(a), there are 6,219 users, and 44,021 cascade records totally. The number of cascade messages with positive emoticons is 325, and the 1Sina Weibo (http://www.weibo.com) is the biggest site for Microblog service in China. number of those with negative ones is 412, keeping a bal- anced observations for learning sentimental influences. And Figure 3 illustrates the distributions of top frequently used emoticons in the messages of cascades, indicating their pos- itive sentiments or negative sentiments. Furthermore, the median and mode values of the distribution of users' active- ness are 5 and 4 separately as in Table 1(b), indicating that users' behaviors are not rarely observed in our dataset to guarantee a successful learning. And it also gives the me- dian and mode of the distribution of cascade sizes as well, showing the sufficiency of involved users in a cascade. The cascades in the dataset are evenly split into 10 groups, and 10-fold cross testing are used for evaluations, alternatively with 9 of 10 groups as training, and the remaining one as testing. 4.2 Evaluation Models In the experiments, we choose the following models for comparison. - CT Bernoulli and CT Jaccard models [19]: They are continuous time models that the propagation prob- ability Pab from user a (infected) to b decays with the elapsed time. For a fair comparison, we use the same decaying function, i.e., Pab = P 0 ab/(tb − ta + 1), and the same assumption that a user is only infected by one of the infective users. CT Bernoulli model as- sumes that an initial propagation probability P 0 fol- · lows Bernoulli distribution, i.e. the fraction of num- ber of successful propagation over the total number of trials, from one user to another. And CT Jaccard model defines an initial propagation probability P 0 in · a form of Jaccard Index, which is the number of suc- cessful propagation divided by the total number of cas- cades with at least one infected between a pair of users. Since there only observes a temporal sequence of users getting infected in training dataset, we assume that successful propagation takes place from every earlier infected users to the current one. - NetRate[15]: It directly define a scalar parameter as interpersonal influence between a pair of users, and learned them with Survival model. Since Jaccard In- dex was reported as a better estimator of propaga- tion probability [19], we use Jaccard Index to initialize the transmission rates at the beginning of the learning stage, to get a better fine tune. - CT LIS: We ignore the differences of latent influence and susceptibility on sentiments of cascade messages, and define two D-dimensional vectors, Iv and Sv, for transmission rate function φ(·) instead. Such parame- ters were ever defined by [38], which used a static way to model the orders of users' behaviors. So we use "CT LIS" to indicate our upgrade version for continu- ous time model. - Sent LIS: It is our model that learns sentimental in- fluences considering all the negative cases. And we use "Sent LIS (neg sample)" to indicate ours with negative sampling. 4.3 Tasks and evaluation metrics The following tasks are used to evaluate the effectiveness of our learned sentimental influences and the improvements comparing to the other models. And the metrics for each task are introduced as well. PCD: predicting cascade dynamics. The happening times and infected users of cascade dynamics are both pre- dictable by our model. However, in order to make the task simple and easy to evaluate, we design the task that aims at predicting whether a user v will be infected at a given time t, knowing the previous truth, i.e. the users who have been infected, and their happening times before time t. Thus on one hand, the task can be treated as a set of binary classifica- tion problems, and we evaluate the results, with the infected users as the positive cases, and finally uninfected users until time tE as the negative ones. As for the positive cases, the likelihood of an infected user v at given time tv, is given by f (tvt; φ(H·v)). The likelihood of a negative user vl, if she had been infected right after the positive ones, i.e., at time tN + ǫ, would be calculated as f (tN + ǫt; φ(H·l)), where ǫ is a very small constant. Thus with the likelihood values for all the users, true positive (TP) rate and false positive (FP) rate can be calculated given any threshold. And then AUC (the area of under the ROC curve) can be evaluated as [12], where ROC is drawn with TP rate and FP rate as the coordinates. On the other hand, given time t, and the observation of cascades before that time, we can calculate the infected like- lihood for candidates v, by f (tt; φ(H·v)). Thus with ranking the candidates with their likelihood values, the top ones are the most probably infected, and a well-performed model can give a high rank to those users happened at the moment. In such a way, Mean Reciprocal Rank (MRR) [37] for rankings at all times of users getting infected in cascades is calculated as the metric. WBR: who will be retweeted. Microblog users get in- fected and take actions to retweet the message from one of their followees who posts or retweets it previously. Thus the task predicting "who will be retweeted" is a way to exam- ine interpersonal influence under quantitative understand- ing. In the scene of multi-exposures, high interpersonal in- fluence will have high probability to be forwarded. As such, given (vi, ti), namely, user vi happened at time ti, the infec- tive user that vi retweets is arg max j:tj <ti f (titj ; φ(Hji)) We therefore deal with the prediction task as a ranking prob- lem of interpersonal influence. The user with higher rank is more probable to be retweeted. We evaluate the predic- tion performance by metrics of average Accuracy (Acc) of top-one prediction and MRR. The ground truth of retweets can be extracted from the content of Microblog messages. Larger values of Acc and MRR indicate better predictions. CSP: Cascade size prediction. Cascade size predic- tion, as a key part of influence maximization and viral mar- keting, is one of the most important applications based on modeling cascade dynamics. In our settings of CSP task, we choose the first P users and acting times of each cas- cade as the initialization, and predict the cascade size at time tN , tN > tP , where tP is the actinig time of the P -th user vP . The simulatioin method is used to predict the cas- cade size by dynaimics models. The prediction time span tN − tP is evenly splited and marked by time scales. Thus starting after time tP , an infected user u tries to influence an uninfected user v at each time scale τi > tP , with the probability P r(T ≤ τitu; φ(Hu,v)) = R τi f (ttu; φ(Hu,v))dt τi−1 S(τi−1tu; φ(Hu,v)) . And if user v is infected at time sacle τi with such a sam- pling, she will be added as infected users at the following time scales. The simulatioins are repeated, and the average cascade size is reported as the prediction. Thus the pred- ction can be evaluated by mean absolute percentage error (MAPE), where a smaller value indicates a better predic- tion. 4.4 Evaluation results. As the description of dataset, we split the whole datasets into 10 groups for cross testing. Thus each experiments are repeated 10 times, and the average metrics and the Standard Deviation (SD) are reported. And the dimension of users' representations on a sentimental polarity is D = 8 in the following evaluations for computational efficiency. 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 e t a r e v i t i s o p e u r T 0 0 0.2 CT Bernoulli CT Jaccard NetRate LIS Sent LIS Sent LIS(neg sample) 0.4 0.6 False positive rate 0.8 1 Figure 4: The ROC curves of evaluation models on PCD task. PCD: Figure 4 illustrates the ROC curves of the evalu- ation models for one of the 10-fold cross tests. It visually shows that our models "CT LIS", "Sent LIS" and "Sent LIS (neg sample)" can achieve better performance in the formu- lation of binary classification. And NetRate with Jaccard Index as parameter initialization improves the performance of "CT Jaccard" model. As for the over all evaluations for 10- fold cross tests, Table 2 lists the average results and SDs of Table 2: Average MRRs and AUCs of PCD task for 10-fold cross testing. Average SD Average SD MRR AUC CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS 0.0062 ±0.0029 0.8732 ± 0.0658 0.0071 ± 0.0038 0.8718 ± 0.0730 0.0064 ±0.0036 0.8621 ± 0.0802 0.0196 ± 0.0039 ± 0.0033 ± 0.0044 0.8793 ± 0.0207 ± 0.0152 ± 0.0156 0.8983 0.8992 Sent LIS 0.0216 Sent LIS (neg sample) 0.0265 Table 3: Average accuracies and MRRs of WBR task for 10-fold cross testing. Average SD Average SD Acc MRR CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS 0.1221 0.4123 ± 0.0874 ± 0.1255 ± 0.1392 ± 0.0365 0.4696 0.2592 ± 0.0703 ± 0.0876 ± 0.1269 ± 0.1348 0.3000 ± 0.0964 0.4349 ± 0.1275 0.3005 ± 0.0961 0.4354 ± 0.1273 Sent LIS 0.3840 0.4920 0.4822 Sent LIS (neg sample) 0.3980 all the models, with the best and the second best MRRs and AUCs in bold text. It is seen that our model achieves 0.0216 and 0.0265 in the metric of MRR, overwhelming other mod- els with significance test, p-value < 0.01. And our negative sampling model get the best, thanks to its effort in balanc- ing positive and negative cases. By examining the results generated from "CT Bernoulli" and "CT Jaccard", it shows a consistent result that Jaccard Index can beat the Bernoulli model in the estimation of propagation probability, as [19] reported. In the measurement of binary classification, "Sent LIS" and "Sent LIS (neg sample)" both outperforms the oth- ers in AUC, which are 0.8992 and 0.8983 separately, with the former achieving a slightly better result. Besides, the machine learning model NetRate can further tune the Jac- card Index to achieves better MRR and AUC values. Most important of all, in both ranking and classification formu- lations of predicting cascade dynamics, it is worth noticing that pair-wise models, namely, "CT Bernoulli", "CT Jac- card" and NetRate limits their performance, comparing to the proposed models that learning distributed representa- tions of users, showing our advantages in the remission of overfitting and model complexity reduction. WBR: With the extraction of retweeting relations from retweet content, the evaluation results of WBR task are re- ported in Table 3, based on the ground truth. The top- one accuracies (Acc) and MRRs of all cascades are averaged for the 10-fold cross tests as well, and the significance is tested. The bold numbers are the best and second best performances. Again we can see that with distributed rep- resentations of users, "CT LIS", "Sent LIS", and "Sent LIS (neg sample)" outperforms the pair-wise models that suf- fer from the overfitting problems on unobserved propaga- tion pairs. Compared with NetRate, the three LIS models improves 37.2%, 27.8% and 32.4% separately on accuracies of predicting "who will be retweeted", while increasing the MRRs by 7.9%, 10.7% and 13.0% separately. Besides, with the comparison among pair-wise models, "CT Jaccard" still takes her advantages to "CT Bernoulli" in both metrics, and "NetRate (Jaccard)" is the best of the three, thanks to the machine learning with Survival model. At last, with neg- ative sampling, "Sent LIS (neg sample)" can on one hand balance the positive cases and negative cases, and on the other consider the information of negative cases in an ex- pectation, resulting a better choice of decent gradient. And in turn, it achieves a better performances in both accuracies and MRRs than "Sent LIS", which testifies the advantages of our model. CSP: In the experiments, we choose first P = 10 infected users as the initialization for prediction, and the times of simulatioins for each cascade is 100 for efficiency. Thus the averaged cascade sizes are reported with 10-cross testing for all methods in Table 4. It is seen that "CT LIS", "Sent LIS" without and with negative sampling outperform other pair- wise models, achieving 0.6259, 0.6259 and 0.6362 separately in MAPE. Moreover, compared to the best-performed pair- wise model, we reduce MAPE by more than 10.46%, which shows the advantage of our learned representations of users' influences in cascade size prediction. Nevertheless, to show the differences of transmission rates learned by our model "Sent LIS (neg sample)" and pair-wise model NetRate, we separately calculate the transmission rates of ours on positive sentiment and negative sentiment, by latent sentimental influence and susceptibility matrices of equation (1). For each pair of users, there is a point with our transmission rate as X-coordinates, and that of NetRate as Y-coordinates. And we count the number of points falling in each lattice cell, as illustrated in Figure 5 (a) and (b), which cells are colored from cold color to warm color based on the point counts. Thus it is seen that a very warm and long line lying on the X-axis from 0.1 to 0.4 for both figures of positive sentiment and negative sentiment. It tells that a lot of overfitting transmission rates by NetRate assigning a zero or small constant, can be estimated by the distributed representations of users, which varies between different user pairs. Besides, the higher transmission rates from NetRate can also have a discriminative distribution in the transmis- sion rates of ours, as those horizontally aligned warm cells shows. And the same solution can also be concluded from Figure 5 (c) and (d). All above gives an evidence that our learned sentimental influences have more abilities to discrim- inate in the influential and the susceptible, resulting good performances in the above evaluation tasks. 4.5 Analysis of users' sentimental influences and susceptibilities Besides the comparisons of evaluation models, we inves- tigate our learned distributed representations of users on sentiments, matrices Iv and Sv for each user v. For each row in matrices Iv and Sv, it is the representation of user v's influence and susceptibility on the corresponding senti- ment, denoted as "Positive I", "Negative I", "Positive S", and e t a R t e N 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.85 x10^7 0.68 0.51 0.34 0.17 0 0.5 e t a R e N t 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.85 x10^7 0.68 0.51 0.34 0.17 0 0.5 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 d r a c c a J 0.1 0.4 Ours(negative sentiment) 0.2 0.3 0.1 0.2 0.4 Ours(positive sentiment) 0.3 0.1 0.4 Ours(positive sentiment) 0.2 0.3 0.85 x10^7 0.68 0.51 0.34 0.17 0 0.5 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 d r a c c a J 0.85 10^7 0.68 0.51 0.34 0.17 0 0.5 0.1 0.4 0.2 0.3 Ours(negative sentiment) (a) Our transmission rates on positive sentiment v.s. that of NetRate (b) Our transmission rates on negative sentiment v.s. that of NetRate (c) Our transmission rates on positive sentiment v.s. that of Jaccard (d) Our transmission rates on negative sentiment v.s. that of Jaccard Figure 5: Analysis of transmission rates. Table 4: Average MAPE of CSP task for 10-fold cross testing. MAPE Average SD CT Bernoulli CT Jaccard NetRate (Jaccard) CT LIS 0.6259 0.7199 ± 0.0270 ± 0.0883 ± 0.1458 ± 0.0.2252 Sent LIS 0.6259 0.7105 ± 0.0333 0.7109 ± 0.0350 Sent LIS (neg sample) 0.6362 "Negative S". And we use L1-norm of those row vectors to measure the degrees of influence and susceptibility on senti- ments. Once more, we construct points of users with those L1-norm values as coordinates, and count the number of points falling into a predefined lattice cell. Thus the con- tour maps are draw accordingly in Figure 6. Figure 6 (a) and (b) are the contour maps of users' influences v.s. sus- ceptibilities on positive sentiment and negative sentiment respectively. There are two peaks in both contour maps. It is interesting to see the peaks nearby "Positive I" and "Neg- ative I" axises, which show that amount of influential users who are not susceptible to others as [2] claimed. We name them as original influentials in both positive sentiment and negative sentiment. On the other side, there are another part of influential users in the other two peaks located at the upper right of the contour maps, who are susceptible and active to retweet others' messages, named secondary influentials in both sentiments. In another word, the sec- ondary influentials may take a lot of efforts on retweeting attractive messages to gain their reputations and influences. And the original influentials focus on composing attractive and initial messages for the system. Thus the original influ- entials are the primitive power of the system to bring new resources, and the secondary influentials are good advertis- ers to let people get information. Finally, we show a main peak in the contour maps of Fig- ure 6 (c) and (d) in a 2-dimensional view, which give a distribution of users' influences on positive sentiment and negative sentiment in (c), and that of users' susceptibili- ties on both sentiments in (d). From Figure 6 (c), it is seen that users could have higher influences on positive sentiment, while lower ones on negative sentiment, and vice versa, al- though a certain amount of them have almost the same high influences on both sentiments. Figure 6 (d) gives the sim- ilar solution on susceptibilities, which some users are more sensitive to positive sentiments, and others are sensitive to negative ones. And it seems that more users have the same high susceptibilities on both sentiments than whom have the same high influences in the dataset. We propose a model to learn the distributed representa- tions of users' influences on sentiments from their history behaviors. By explicitly characterizing the sentimental in- fluence and susceptibility of each user with two matrices respectively, the model reduces the complexity of pair-wise models, and in turn remits the overfitting problem. We also design an effective algorithm to train the model based on maximizing logarithmic likelihood of information cascades. Adadelta method is used to estimate an efficient learning rate adaptively, and PG method guarantees the constants of non-negative parameters. Our model does not require the knowledge of social network structure, hence having wide applicability to the scenarios with or without explicit social networks. Explicit social network can be added as indica- tors in the likelihood of a user getting infected by the con- nected and infective ones. We evaluated the effectiveness of our model on Microblogging dataset from Sina Weibo, the largest social media in China. Experimental results demon- strate that our model consistently outperforms existing pair- wise methods at predicting cascade dynamics, "who will be retweeted", and cascade size prediction. Moreover, with the analysis of users' sentimental influences and susceptibilities, we find that there are two peaks in the contour maps, indi- cating original influentials and secondary influentials. The former only create initial and high-quality messages to in- fluence others, while the latter attract others' attentions by retweeting interesting messages. Besides, users may have different reactions on messages with different sentiments. In the future, we would like to apply the distributed represen- tations of users to more imaginative applications. 6. ACKNOWLEDGMENTS This work was funded by National Grand Fundamental Research 973 Program of China (No. 2013CB329602, No. 2013CB329606), and the National Natural Science Founda- tion of China with Nos 61572467, 61232010. The authors thank the Crowd-sourcing platform (http://www.cnpameng.com/) providing initial Sina Weibo data. 5. CONCLUSIONS 7. REFERENCES (a) Positive influence v.s. positive susceptibility (b) Negative influence v.s. negative susceptibility ) m r o n − 1 L ( I e v i t a g e N 2 1.9 1.8 1.7 1.6 1.5 1.4 1.3 1.2 1.2 1.4 Positive I(L1−norm) 1.6 1.8 50 40 30 20 10 0 2 2 1.9 1.8 1.7 1.6 1.5 1.4 1.3 ) m r o n − 1 L ( S e v i t a g e N 1.2 1.2 40 32 24 16 8 0 1.8 1.4 Positive S(L1−norm) 1.6 2 (c) Positive influence v.s. nega- tive influence (d) Positive susceptibilities v.s. negative susceptibility Figure 6: Analysis of L1-norm of latent sentimental influences and susceptibilities. [1] Learning opinion dynamics in social networks. arXiv preprint arXiv:1506.05474, 2015. [2] S. Aral and D. Walker. Identifying influential and susceptible members of social networks. Science, 337(6092):337 -- 341, 2012. [3] Y. Artzi, P. Pantel, and M. Gamon. Predicting responses to microblog posts. In Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics, pages 602 -- 606, 2012. [4] Y. Bae and H. Lee. Sentiment analysis of twitter audiences: Measuring the positive or negative influence of popular twitterers. Journal of the American Society for Information Science and Technology, 63(12):2521 -- 2535, 2012. [5] D. Bindel, J. Kleinberg, and S. Oren. How bad is forming your own opinion? Games and Economic Behavior, 92:248 -- 265, 2015. [6] S. Cheng, H. Shen, J. Huang, G. Zhang, and X. Cheng. Staticgreedy: Solving the scalability-accuracy dilemma in influence maximization. In Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management, pages 509 -- 518, 2013. [7] Y. Choi, C. Cardie, E. Riloff, and S. Patwardhan. Identifying sources of opinions with conditional random fields and extraction patterns. In Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing, pages 355 -- 362, 2005. [8] R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. Proceedings of the National Academy of Sciences, 105(41):15649 -- 15653, 2008. [9] G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch. Mixing beliefs among interacting agents. Advances in Complex Systems, 3(01n04):87 -- 98, 2000. [10] M. H. DeGroot. Reaching a consensus. Journal of the American Statistical Association, 69(345):118 -- 121, 1974. [11] N. Du, L. Song, H. Woo, and H. Zha. Uncover Topic-Sensitive Information Diffusion Networks. In Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, pages 229 -- 237, 2013. [12] T. Fawcett. An introduction to roc analysis. Pattern Recognition Letters, 27:861 -- 874, 2006. [13] S. Fortunato, V. Latora, A. Pluchino, and A. Rapisarda. Vector opinion dynamics in a bounded confidence consensus model. International Journal of Modern Physics C, 16(10):1535 -- 1551, 2005. [14] A. Gionis, E. Terzi, and P. Tsaparas. Opinion maximization in social networks. In SDM, pages 387 -- 395. SIAM, 2013. [15] M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering the Temporal Dynamics of Diffusion Networks. In Proceedings of the 28th International Conference on Machine Learning, pages 561 -- 568, 2011. [16] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 1019 -- 1028, 2010. [17] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf. [30] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and Modeling information propagation with survival theory. In Proceedings of the 30th International Conference on Machine Learning, pages 666 -- 674, 2013. J. Dean. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems, pages 3111 -- 3119, 2013. [18] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf. [31] M. Richardson and P. Domingos. Mining Structure and dynamics of information pathways in online media. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining, pages 23 -- 32, 2013. knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 61 -- 70, 2002. [19] A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning [32] F. A. Rodrigues and L. DA F. COSTA. Surviving influence probabilities in social networks. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining, pages 241 -- 250, 2010. [20] A. Goyal, F. Bonchi, and L. V. Lakshmanan. A data-based approach to social influence maximization. Proceedings of the VLDB Endowment, 5(1):73 -- 84, 2011. [21] R. Hegselmann, U. Krause, et al. Opinion dynamics and bounded confidence models, analysis, and simulation. Journal of Artificial Societies and Social Simulation, 5(3), 2002. [22] M. R. Hestenes. Multiplier and gradient methods. Journal of optimization theory and applications, 4(5):303 -- 320, 1969. [23] E. Katz and P. F. Lazarsfeld. Personal Influence, The part played by people in the flow of mass communications. Transaction Publishers, 1955. [24] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137 -- 146, 2003. [25] A. D. Kramer, J. E. Guillory, and J. T. Hancock. Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24):8788 -- 8790, 2014. [26] J. F. Lawless. Statistical Models and Methods for Lifetime Data, volume 362. 2011. [27] J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Transactions on the Web, 1(1), May 2007. [28] C. J. Lin. Projected gradient methods for nonnegative matrix factorization. Neural Computation, 19(10):2756 -- 2779, 2007. [29] L. Liu, J. Tang, J. Han, M. Jiang, and S. Yang. Mining Topic-level Influence in Heterogeneous Networks. October, pages 199 -- 208, 2010. opinions in sznajd models on complex networks. International Journal of Modern Physics C, 16(11):1785 -- 1792, 2005. [33] K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In Knowledge-Based Intelligent Information and Engineering Systems, pages 67 -- 75, 2008. [34] K. Suchecki, V. M. Egu´ıluz, and M. San Miguel. Voter model dynamics in complex networks: Role of dimensionality, disorder, and degree distribution. Physical Review E, 72(3):036132, 2005. [35] K. Sznajd-Weron and J. Sznajd. Opinion evolution in closed community. International Journal of Modern Physics C, 11(06):1157 -- 1165, 2000. [36] J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 807 -- 816, 2009. [37] E. M. Voorhees. The TREC8 Question Answering Track Report. In Text REtrieval Conference, 1999. [38] Y. Wang, H. Shen, S. Liu, and X. Cheng. Learning user-specific latent influence and susceptibility from information cascades. In Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. [39] D. J. Watts and P. S. Dodds. Influentials, networks, and public opinion formation. Journal of consumer research, 34(4):441 -- 458, 2007. [40] R. Zafarani, W. D. Cole, and H. Liu. Sentiment propagation in social networks: a case study in livejournal. In Advances in Social Computing, pages 413 -- 420. Springer, 2010. [41] M. D. Zeiler. Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701, 2012.
1906.04580
1
1906
2019-06-09T07:08:20
Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks
[ "cs.SI", "cs.CL", "stat.ML" ]
Events are happening in real-world and real-time, which can be planned and organized occasions involving multiple people and objects. Social media platforms publish a lot of text messages containing public events with comprehensive topics. However, mining social events is challenging due to the heterogeneous event elements in texts and explicit and implicit social network structures. In this paper, we design an event meta-schema to characterize the semantic relatedness of social events and build an event-based heterogeneous information network (HIN) integrating information from external knowledge base, and propose a novel Pair-wise Popularity Graph Convolutional Network (PP-GCN) based fine-grained social event categorization model. We propose a Knowledgeable meta-paths Instances based social Event Similarity (KIES) between events and build a weighted adjacent matrix as input to the PP-GCN model. Comprehensive experiments on real data collections are conducted to compare various social event detection and clustering tasks. Experimental results demonstrate that our proposed framework outperforms other alternative social event categorization techniques.
cs.SI
cs
Fine-grained Event Categorization with Heterogeneous Graph Convolutional Networks Hao Peng1,2, Jianxin Li1,2, Qiran Gong1,2, Yangqiu Song3, Yuanxing Ning1,2, Kunfeng Lai4 and Philip S. Yu5,6 1 Beijing Advanced Innovation Center for Big Data and Brain Computing, Beihang University 2 State Key Laboratory of Software Development Environment, Beihang University 3 Department of Computer Science and Engineering, Hong Kong University of Science and Technology 4 Platform and Content Group, Tencent 5 Institute for Data Science, Tsinghua University 6 Department of Computer Science, University of Illinois at Chicago {penghao, lijx, ningyx}@act.buaa.edu.cn, allen [email protected], [email protected], [email protected], [email protected] Abstract Events are happening in real-world and real-time, which can be planned and organized occasions in- volving multiple people and objects. Social me- dia platforms publish a lot of text messages con- taining public events with comprehensive topics. However, mining social events is challenging due to the heterogeneous event elements in texts and explicit and implicit social network structures. In this paper, we design an event meta-schema to char- acterize the semantic relatedness of social events and build an event-based heterogeneous informa- tion network (HIN) integrating information from external knowledge base, and propose a novel Pairwise Popularity Graph Convolutional Network (PP-GCN) based fine-grained social event cate- gorization model. We propose a Knowledgeable meta-paths Instances based social Event Similar- ity (KIES) between events and build a weighted adjacent matrix as input to the PP-GCN model. Comprehensive experiments on real data collec- tions are conducted to compare various social event detection and clustering tasks. Experimental results demonstrate that our proposed framework outper- forms other alternative social event categorization techniques. 1 Introduction Events are happening in real-world and real-time, which can be planned and organized occasions involving multiple peo- ple and objects, such as a social gathering, celebrity ac- tivities or a sports competition in some specific location at a particular time. Nowadays, social media platforms have become major sources for publicizing events. Events an- nounced on social media usually attract comments and re- posts with opinions and emotions, and such content can re- flect public opinion about many social, political, economic issues, etc. Mining of social media posts, such as fine-grained social event categorization, will benefit a lot of real applica- tions, such as information organization, predictive analysis, disaster risk analysis, and others [Atefeh and Khreich, 2015; Aggarwal and Subbian, 2012; Allan, 2012]. In general, fine- grained social event categorization focus on event detection and event clustering. The tasks of fine-grained social event categorization are more challenging than traditional text mining or social net- work mining, since social event is a combination of social network and the information flows (in terms of short mes- sages) over it. On the one hand, modeling social events is very complicated and ambiguous. Social events are described in short texts and usually contain different types of entities, such as person, location, organization, number, time, etc [Al- lan, 2012; Ji and Grishman, 2008; Yu et al., 2017]. More- over, events are commented or retweeted by social network users. Thus, modeling social event needs to consider het- erogeneous elements as well as explicit and implicit social network structures within social posts. On the other hand, models of fine-grained event categorization often have bot- tlenecks in which the number of the categories is large and the number of samples per class is small. Thus, fine-grained event categorization needs to address the accuracy of the de- veloped algorithms. Currently, fine-grained text classification is more difficult and lacks related research work than the fine- grained object recognition in other fields such as computer vision [Zhang et al., 2014]. A handful of studies [Ritter et al., 2012; Chandola et al., 2009; Becker and Gravano, 2011; Shao et al., 2017] have investigated leveraging homogeneous graphs or man- ually defined frames for social event modeling and extract- ing. The first line of thought is to treat social event as ho- mogeneous words/elements co-occurrence graph [Chandola et al., 2009; Aggarwal and Subbian, 2012; Angel et al., 2012; Liu et al., 2019]. Typically, they construct a homogeneous words/elements co-occurrence graph, and then consider dif- ferent scales of abnormally connected subgraph structures (under different names such as k-clique, motifs or graphlets) as the social events. Despite the compelling results achieved by these studies, their categorization accuracies remain un- satisfactory for building reliable and open domain event de- tection and clustering systems in practice. The second line of thought is to use manually defined frames-based event def- initions applying the well-defined techniques for extracting social event frames from news [Kim et al., 2009; Ji and Gr- ishman, 2008]. The frame-based event extraction can extract entities and their relationships, but uses only a limited num- ber of event types, such as earthquake disaster, stock market, venues, politics, etc. Moreover, it uses complicated machine learning models, usually a pipeline of them, to incorporate different levels of annotation and features. Compared to traditional methods, the proposed models have several advantages: (1) By modeling social events based Social media events can be regarded as a co-occurrence of event elements including themes, dates, locations, peo- ple, organizations, keywords and social behavior participants. The simplest way to monitor social media events is to repre- sent events as bags-of-words, but it will be more semanti- cally meaningful if we can annotate words and multi-word- expressions as entities with types. For example, in the tweet "China Seismological Network: The earthquake struck at 21:19:46 China Standard Time on 8 August 2017 in Zhangzha Town in Jiuzhaigou County with magnitude 7.0", there are multiple event elements: Time: 21:19:46; Date: August 8, 2017; Timezone: China Standard Time; Town: Zhangzha; County: Jiuzhaigou; Nation: China; Magnitude: 7.0; Poster: China Seismological Network. Obviously, the above event's elements are of different types. Moreover, in addition to intuitive co-occurrence relationship, after extracting enti- ties, we can make use of external knowledge base [Auer et al., 2007; Xu et al., 2017] to complement more relationships be- tween entities, such as "located-in" relationships with other locations, "attribute-of" relationships with magnitude and earthquake, etc. Thus, a message mentioning an event can be related to its keywords, entities (and their relations), topics, etc. Furthermore, the social network users posting messages are also connected with different relationships, such as fol- lowing/followed and retweeting. Thus we can model social media events as HIN [Shi et al., 2017]. In this paper, we first present event instance (shown in short text message) as hyper-edge in an HIN, where all the key- words, entities, topics and social users can be connected by this hyper-edge, and define an event meta-schema to charac- terize the semantic relatedness of social event instances and build event-based HIN. In order to enrich the HIN, we extract some information as a complement of the relationships based on the external knowledge base and algorithms. Based on the event HIN, we define a weighted Knowledgeable meta-paths Instances based Event Similarity measure, namely KIES, from semantically meaningful meta-paths. In order to accu- rately measure the weights between meta-paths and perform fine-grained event detection, we then design a novel Pairwise Popularity Graph Convolutional Network model, namely PP- GCN, to learn the representation of each event instance. Fi- nally, under the HINs-based event modeling, we present a KIES-measure based fine-grained event clustering. on a HIN, the proposed framework can integrate event el- ements, such as keywords, topic, entities, social users and their relations, in a semantically meaningful way, and can also calculate the similarity between any two event instances. (2) By modeling pairwise popularity graph convolutional net- work, the model achieves state-of-the-art results and avoids overfitting in fine-grained event detection tasks. (3) The pro- posed KIES with learned weights between meta-paths by the PP-GCN can boost the performance of fine-grained social events clustering compared to existing state-of-the-art base- lines methods. The code of this work is publicly available at https://github.com/RingBDStack/PPGCN. 2 Heterogeneous Event Modeling In this section, we define the problem of modeling social events in heterogeneous information network (HIN) and in- troduce several related concepts and necessary notations. 2.1 Event Modeling in HIN The definition and characterization of "social event" have received substantial attention across academic fields, from language [Miller, 1998] to cognitive psychology [Zacks and Tversky, 2001]. A social event generally refers to influen- tial facts that appear on social networks and occur in the real world, including creators (posters), named entities such as participants, organizations, festival, specific times, places, currency, address, etc., and other elements such as keywords and topics. We name the above elements as event-oriented elements. However, extracting the event-oriented elements from the original social text message with NLP tools1,2 is still a prior processing work. Even within most of the events, there are some relationships between event-oriented elements, such as relationships between entities, relationships between key- words, relationships between topics, explicit and implicit re- lationships between social users, and so on. We name the above relationships as event-elements relationships. We use the manually organized synonyms3 to add syn- onym relationship among keywords in the event-based HIN. For hierarchical topic structures and the affiliation relation- ship between keywords and topics in the event-based HIN, we employ the hierarchical latent Dirichlet allocation tech- nologies [Griffiths et al., 2004; Blei et al., 2010] based on the existing toolbox4 (with about 30 most probable words for each topic). In order to build the relationship between enti- ties in the event-based HIN, we consider both accuracy and efficiency, and tackle the problem by following three-steps. First, we retrieve the same entity candidate from knowledge base, such as the Chinses CN-DBpedia [Xu et al., 2017]. Sec- ond, we use word embeddings [Mikolov et al., 2013] based Word Mover's Distance technology [Kusner et al., 2015] to measure the similarity between context of entity in the social text and description of entity in the candidate, and choose the entity from the candidate with highest similarity. Third, we 1https://github.com/stanfordnlp/CoreNLP 2https://github.com/NLPIR-team/NLPIR 3https://github.com/huyingxi/Synonyms 4https://github.com/joewandy/hlda (a) Example of two event instances connected by different types of nodes and edges (b) Meta-schema of event-based HIN Figure 1: Illustration of events as a HIN, where event instances are represented as hyper-edges. query the relationship between aligned entities in the knowl- edge base as the final relationship of entities in event-elements relationships. In order to establish the relationship between entities and keywords in the event-based HIN, we extract the keywords in the relevant description of each entity in the knowledge base and use this affiliation as the relationship be- tween the entity and the keywords. For the relationship be- tween social users, we consider users with a large number of friends, and store the relationship between users in advance. After extracting the above event-oriented elements and event-elements relationships from event instances, we build an event-based HIN, as shown in Figure 1(a). The social event can be regarded as a co-occurrence of event-oriented el- ements, and the event-elements relationships are conducive to explaining the relationship between various elements. Thus, an event instance can be treated as a subgraph of the whole HIN. One particular advantage of the HIN is that meta-paths defined over types (e.g., a typical meta-path "event-entity- event" represents the event similarity based on overlapped entities between two event instances) can reflect semantically meaningful information about similarities, and thus can natu- rally provide explainable results for event modeling. 2.2 Preliminaries from previous We works [Sun and Han, 2013; Shi et al., 2017], and give some event-HIN examples. Definition 2.1 A heterogeneous information network (HIN) is a graph G = (V, E) with an entity type mapping φ : V → A and a relation type mapping ψ : E → R, where V denotes the entity set, E denotes the link set, R denotes the relation type set and A denotes the entity type set. The number of entity types A > 1 or the number of relation types R > 1. For example, Figure 1(a) shows an example of two event in- stances connected with different types of entities, keywords, topics, social users and relationships. After giving a complex HIN for event modeling, it is necessary to provide its meta level (i.e., schema-level) description for better understanding. Definition 2.2 Given an HIN G = (V, E) with the entity mapping φ : V → A and the relation type mapping ψ : some basic definitions introduce E → R, the meta-schema (or network schema) for network G, denoted as TG = (A, R), is a graph with nodes as entity types from A and edges as relation types from R. For example, Figure 1(b) shows an example of the HIN meta- schema characterizing events on social messages. Another important concept is the meta-path which systematically de- fines relationships between entities at the schema level. Definition 2.3 A meta-path P is a path defined on the graph R2−→ of network schema TG = (A, R) of the form AI A3 ··· AL RL−→ AL+1 which defines a composite relation R = R1·R2·····RL between objects A1, A2, A3 ··· AL+1, where · denotes relation composition operator, and L+1 is the length of P . For simplicity, we use object types connected by → to denote the meta-path when there are no multiple relations between a pair of types: P = (A1 − A2 − ··· − AL+1). We say that a meta-path instance p = (v1 − v2 − ··· − vL+1) between v1 and vL+1 in network G follows the meta-path P , if ∀l, φ(vl) = Al and each edge el =< vl, vl+1 > belongs to each relation type Rl ∈ P . We call these paths as path instances of P , denoted as p ∈ P . R−1 represents the reverse order of relation Rl. We will introduce more semantically meaningful meta-paths that describe event relations in next section. R1−→ A2 l 3 The Proposed Model In this section, we introduce definitions about knowledge- able meta-paths instances based event similarity measure, and present the technical details about Pairwise Popularity GCN. 3.1 Event Similarity Measure Before definite the social event similarity, we first present the definition of CouP as following, Definition 3.1 CouP: Given a meta-path P = (A1 − A2 ··· AL+1), CouP is a function of the count of meta-path instances such that CouPP (vi, vj) = MP (vi, vj) where MP = WA1A2 · WA2A3 ··· WALAL+1 and WAkAk+1 is the adjacency matrix between types Ak and Ak+1 in the meta- path P . Event Instance 1Event Instance 2HypernymSynonymEntitiesSub-topicFriendsWordsTopicsUsersEntitiesWordsUsersEventTopics For example, for event instance similarity based on event- oriented elements and event-element relationships, the com- posite relation of two event instances containing the same event element and co-occurrence relationship can be de- scribed as "event Instance - Element - event Instance (IEI)" for simplicity. This meta-path simply gives us EI, which is the dot product be- MIEI = WIEW T tween event instances, where WEI is the event Instance- Element co-occurrence matrix. The similarity based on this meta-path instances is accurate because different ele- ments and lengths are considered. The more meta-paths enumerated by the meta-schema, the higher accuracy of the similarity metric is. We can give more event re- lated meta-paths over different lengths, e.g., P1: Event- (posted by)-Social user-(post)-Event, P2: Event-(having)- Washington DC-(capital of)-United States-(contained by)- Event, P3: Event-(belong to)-Politician-(relevant)-president- (member of)-Ruling Party-(contained by)-Event, etc. P1 means two event instances are similar if they are posted by the same social user. P2 means two event instances are simi- lar if they mention Washington DC and the United States, re- spectively, where Washington DC is the capital of the United States. P3 means two event instances are similar if they can be associated by a chain of three event elements with mean- ingful relationships. Note that the meta-path does not need to satisfy symmetry. Here, we enumerate 22 symmetric meta- paths in the meta-schema of event-based HIN. However, if the counts are not normalized for different meta-paths, it is difficult to compare over different meta-path- based similarities. Then, similar to the HIN-based document similarity [Wang et al., 2018], we also define our knowl- edgeable meta-paths instances based social event similarity measure, namely KIES. Intuitively, if two event instances are more strongly connected by the important (i.e., highly weighted) meta-paths, they tend to be more similar. Definition 3.2 KIES: a knowledgeable meta-paths in- stances based social event similarity. Given a collection of meaningful meta-paths, denoted as P = {Pm}M(cid:48) m=1, the KIES between two event instances ei and ej is defined as: 2 × CouPPm (ei, ej) M(cid:48)(cid:88) KIES(ei, ej) = ωm , m=1 CouPPm (ei, ei) + CouPPm (ej, ej) (1) where CouPPm(ei, ej) is a count of meta-path Pm between event instances ei and ej, CouPPm(ei, ei) is that between event instances ei and ei, and CouPPm (ej, ej) is that be- tween event instances ej and ej. We use a parameter vec- tor (cid:126)ω = [ω1, ω2, . . . , ωM(cid:48)] to denote the meta-path weights, where ωm is the weight of meta-path Pm. KIES(ei, ej) is defined in two parts: (1) the semantic overlap in the numera- tor, which is defined by the number of meta-paths between event instances ei and ej; and (2) the semantic broadness in the denominator, which is defined by the number of to- tal meta-paths between themselves. Therefore, we can give a KIES distance with weights for any two event instances. 3.2 Pairwise Popularity GCN Model Next, we show how to implement fine-grained event detection on social message texts through the pairwise popularity GCN Figure 2: An overview of the proposed Pairwise Popularity Graph Convolutional Network (PP-GCN). H (l+1) = σ((cid:101)D− 1 2 (cid:101)A(cid:101)D− 1 model (PP-GCN), and learn the weights (cid:126)ω for meta-paths, to overcome the problems of a large number of categories and a small number of samples per class. After computing the distance of any two event instances by the KIES, we can construct a N × N weighed adja- cent matrix A for manually annotated social event instances, where N is the number of event instances and Aij = Aji = KIES(ei, ej). Then, we train the Doc2vec [Le and Mikolov, 2014] representation as generalized event instance feature. So, we can construct a N × d feature matrix X, where d is the dimension of event instance feature. Obviously, so far, we can use the popular GCN [Kipf and Welling, 2017] archi- tecture to learn discriminating event representation based on the interactions among event instances and generalized event instance features in node classification task. The input to the GCN model includes the A and X matrices. Here, one class represents one social event class. In order to construct preliminary GCN model, we utilize the popular multi-layer GCN with the following layer-wise propagation rule [Kipf and Welling, 2017]: (2) where (cid:101)A = A + IN , (cid:101)D is diagonal matrix such that (cid:101)Dii = (cid:80) j (cid:101)Aij are the adjacency matrix, IN is the identity matrix, 2 H (l)W (l)), W is the parameter matrix, and l is the number of layers. Let Z be an output N × F feature matrix, where F is the dimension of output representation per event instance. The input layer to the GCN is H (0) = X, X ∈ RN×d, which contains original event instance feature, H (l) = Z, and Z is graph-level output. And σ denotes an activation function such as Sigmoid or ReLU. However, the real-world social events naturally have two problems of sparsity: the small number of event instances for each classification and a large number of categories. So, we sample event instances pair and judge whether the pair be- longs to one event to train a pairwise GCN model. As shown in Figure 2, we present the proposed PP-GCN model. Before explaining the PP-GCN model, we show how to implement a pairwise sampling to generate training samples. We assume that if a pair of event instances ei and ej belongs to the same event classification, we name the pair ei and ej as a positive- pair sample. If a pair of event instances ei and ej belongs to two different events classification, we name the pair ei and ej as a negative-pair sample. As shown in Figure 2, if the pair is Doc2vecfeature matrixWeightedadjacent matrixAXGCNNNNd·10…10f(x)+VeiVejVeiVejBatchPairwise Sampling00 a positive-pair sample, we represent its by two red lines; if the pair is negative-pair sample, we use both gray line and blue line to represent it. After explaining the training samples, we first randomly select R (i.e., 1000) event instances as a preliminary set, then randomly select two event instances for each event instance in the set to form one positive-pair sample and one negative-pair sample, and finally we can construct a 2R event instance pairs set from training samples. Here, both the positive-pair and negative-pair samples are equal to R. Second, we randomly sample the B (i.e., 64) samples from the 2R (i.e., 2000) event instance pairs set to form a batch to forward propagation of our proposed model. Third, the sec- ond step is cycled E (i.e., 32) times to form an epoch. For next epoch, we loop through the above three steps. 1 However, the above pairwise sampling based GCN model can not guarantee that the model avoids over-fitting during training. Suppose that any event classification has an aver- age of r event instances, the probability that any event in- stance selected into a positive-pair sample is 1 r , and the prob- ability of being selected into a negative-pair sample is about N−r in general. Obviously, the N−r . We note that 1 negative-pair samples have more diversity than the positive- [Papadopoulos et al., 2012] has observed the pair samples. phenomenon that the connected probability of a sample de- termines the popularity of it. Inspired by these observations, we assume that in feature representation learning, the mod- ulus of the learned feature vector is larger if the popularity is greater. So, the two modulus of learned event instances feature vectors of positive-pair will be closer. r (cid:29) 1 For discriminate feature learning of our GCN model, we utilize the popularity of the output event instance feature vec- tor in Z to distinguish different classes. As shown in the Figure 2, for any two learned event instance vectors Vei and Vej that satisfy Vei ≥ Vej, we employ a ratio of modu- Vei Vej as the input of a nonlinear mapping function lus x = f (x) = −log(x − 1 + c), where the coefficient c is 0.01 to avoid no upper bound output. We assume that the ratio of modulus of positive-pair will belong to [1, 2). So, the non- linear mapping function f (x) can map the above ratio x from [1, 2) to (0, 2], and [2, +∞) to (-∞, 0). Next, we add a Sig- moid function to map the output of the nonlinear mapping layer to 0 or 1 by a threshold 0.5. As shown in the Figure 2, one positive-pair or negative-pair input sample can only be paired with an output of 0 or 1. For one batch (64 pairs) sam- ples, our model can generate one batch size (1 × 64) of one- zero output vector. So, we can use a cross entropy function as our model's loss function, and employ the popular stochas- tic gradient descent (SGD) method to iterate all parameters. The learned weights (cid:126)ω will be used to measure similarity for any two social event instances. To verify the avoidance of over-fitting ability of our model, we can perform over 7000 epochs, and observe that the evaluation criteria of the model changes over time in Section 4. For the testing of any event instance t from the test set of the original N samples, we first assume that there are a total of C event classes in the original N event instances. Secondly, we calculate the ratio of the modulus of the rep- resentation vectors for t and the remaining N − 1 samples, respectively. Then, for each event class, we can get a prob- ability that event instance t most likely belongs to it. If all of the ratios of modulus are 0, the sample itself is a sepa- rate event class. Finally, we select the event class with the highest probability as the test output for the event instance t. Note the fact that the event category of the test set may not be included in the event category of the training set. After the previous analysis, we can calculate a similarity for any two event instances under the event-HIN and the weights (cid:126)ω. Since our meta-paths have better interpretability, we also can implement a semi-supervised and fine-grained event cluster- ing based on the learned weights of meta-paths and distance- based clustering models. 4 Experiments In this section, we evaluate the proposed PP-GCN model and similarity measure KIES using real surveillance data col- lected in two enterprise systems. Datasets Tencent Weibo Train 17,438 6,000 Validation 5,813 2,000 Test 5,812 2,000 Class 9,941 5,470 Table 1: Description of evaluation datasets. 4.1 Datasets and Settings We select two independent social media platforms, news APP from Tencent (a popular APP for young people) and Sina Weibo (a hybrid of Twitter and Facebook, the Twitter of China and Chinese Social Media), to collect datasets. Each event instance is a non-repeating social message text. One event is a set of event instances that contain semantically identical information revolving around a real world incident. An event always has a specific time of occurrence. It may involve a group of social users, organizations, participating persons, one or several locations, other types of entities, key- words, topics, etc. In our work, social events cover a wide variety of types, including a large number of events that oc- cur in the real world and spread on social networks, such as earthquakes, national policies, economic crises, and so on. Each event class refers to a unique event. For example, social media's tweet about Tiger Woods winning the 2019 Masters of Golf is an influential event in the real world and unlike Patrick Reid's 2018 Masters of Golf. These are two different events that happen in the real world and belong to different event categories. The event labels for the Weibo and Ten- cent datasets are labeled by the outsourcing companies. Both entities and keywords have been manually extracted for the Tencent dataset. Note that the anonymized social users and their friend relationships involved in these two datasets are granted by the two companies for scientific research purposes only. For both of the two datasets, we use 60% of samples as training set, 20% of samples as development set and the re- maining 20% of as test set. The statistics of the two datasets is shown in Table 1. We can see that the total number of class is large and the number of samples in per class is small. We conduct the experiments on event detection and event clustering on these two datasets. The operating system and software platforms are Ubuntu 5.4.0, Tensorflow-gpu (1.4.0) and Python 2.7. The metrics used to evaluate the performance of event detection are the accuracy and F1 score. The metric used to evaluate the performance of event clustering is the normalized mutual information (NMI). 4.2 Baseline Methods Since the work of fine-grained social event categorization is relatively small, we briefly describe the baseline methods of text matching and text distance. For all the baselines, we use the implementations or open source codes of these models released by authors and other researchers, and report the best performance of the results. Support Vector Machine with TF-IDF feature (SVM): Support Vector Machine with pair document TF-IDF features is the most classical approach for classification task. We ex- tract the TF-IDF features for social messages, and then use the SVM classifier to implement the multi-class event clas- sification. Convolutional Matching Architecture-I (ARC- I) [Hu et al., 2014]: It encodes text pairs by CNNs, and com- pares the encoded representations of each text with a MLP. Convolutional Matching Architecture-II (ARC-II) [Hu et al., 2014]: It builds directly on the interaction space between two texts, and models all the possible combinations of them with 1-D and 2D convolutions. Match by Local and Dis- tributed Representations (DUET) [Mitra et al., 2017]: It matches two texts using both local representation and learned distributed representation. Multiple Positional Semantic Matching (MV-LSTM) [Wan et al., 2016]: It matches two texts with multiple positional text representations, and ag- gregates interactions between different positional represen- tations. Convolutional Deep Structured Semantic Models (C-DSSM) [Shen et al., 2014]: It learns low-dimensional se- mantic vectors for input text by CNNs. Deep Structured Semantic Model (DSSM) [Huang et al., 2013]: It utilizes a deep neural network to map high-dimensional sparse features into low-dimensional features, and calculates the semantic similarity of the document pair. Siamese Encoded Graph Convolutional Network (SE-GCN) [Liu et al., 2018]: It learns vertex representations through a Siamese neural net- work and aggregates the vertex features though GCNs to gen- erate the document matching. Term Frequency-Inverse Document Frequency (TF- IDF): It uses the bag-of-words representation divided by each word's document frequency. Latent Dirichlet Allocation (LDA) [Blei et al., 2003]: is a celebrated generative model for text documents that learns representations for documents as distributions over word topics. Marginalized Stacked De- noising Autoencoder (mSDA) [Chen et al., 2012]: It is a representation learned from stacked denoting autoencoders. Componential Counting Grid (CCG) [Perina et al., 2013]: It is a generative model that models documents as a mix- ture of word distributions and LDA. Word Move Distance (WMD) [Kusner et al., 2015]: It measures the dissimilarity between two documents as the minimum amount of distance that words of one document need to travel to reach words of another document. Knowledge-driven document similarity Algorithms ARC-I ARC-II DUET DSSM C-DSSM MV-LSTM SVM SE-GCN PP-SE-GCN PA-GCN PP-GCN Accuracy 0.5384 0.5437 0.5625 0.5808 0.6017 0.5562 0.7581 0.7901 0.8319 0.8818 0.9252 F1 0.4868 0.3677 0.5237 0.6468 0.4857 0.6383 0.7361 0.7893 0.8383 0.8801 0.9231 Tencent Weibo Accuracy 0.4910 0.5277 0.5397 0.5765 0.6170 0.6252 0.6511 0.7063 0.7317 0.7567 0.8000 F1 0.4857 0.5137 0.5523 0.5411 0.5814 0.6613 0.6268 0.7015 0.7384 0.7591 0.8134 Table 2: Accuracy and F1 results of event detection. measure (KnowSim) [Wang et al., 2016]: It's also a meta- paths instances based document similarity, and hasn't consid- ered the impacts of social users. The weights of meta-paths are estimated by the Laplacian scores of documents. 4.3 Performance Analysis Table 2 shows the accuracy and F1-score of different algo- rithms on the task of event detection in Tencent and Weibo datasets. Overall, the proposed PP-GCN model consistently and significantly outperforms all baselines in terms of ac- curacy and F1. In the Tencent dataset, PP-GCN achieves 13% -- 56% improvements in terms of accuracy and F1 over all baselines. In the Weibo dataset, PP-GCN achieves 10% -- 33% improvements in terms of accuracy and F1 over all baselines. The improvements can be attributed to the three charac- teristics of proposed models. First, the knowledgeable HIN is better modeling social events than traditional text model- ing methods, such as bag-of-words (SVM), N-gram (ARC-I, ARC-II and C-DSSM) and sequence-of-words (MV-LSTM). Our PP-GCN has improved overall by more than 10% in the event detection over the SE-GCN model incorporating struc- tural and conceptual semantics. Second, the combination of KIES based weighted adjacent matrix and Doc2Vec is better for fine-grained event instance representation learning than for feature extraction on text pairs, such as DUET. Third, the classifier based on the ratio of modulus of generated rep- resentations of event instances is better than the traditional pairwise distances. Here, we replace the regression module of SE-GCN model by our proposed popularity based clas- sifier, named by PP-SE-GCN, and the performances can be improved 3%-5% in Tencent and Weibo. The 10%-14% im- provements from the SE-GCN to the PP-GCN demonstrate the advantages of knowledgeable HIN modeling and the pair- wise popularity based feature learning framework. Furthermore, our PP-GCN model can avoid over-fitting in training. We replace our classifier in PP-GCN by the angle of generated event instances feature vectors based classifier, namely PA-GCN. In Figure 3, we visualize the test accuracies of the PP-GAN and PA-GCN in Tencent and Weibo in 7000 epochs. From Figure 3, we observe that the overall trend of the accuracies of the PP-GCN model is continuously increas- Datasets TF-IDF Tencent 0.6686 0.5824 Weibo LDA 0.6979 0.6014 mSDA 0.7545 0.6518 CCG WMD KnowSim KIES 0.9012 0.7715 0.7820 0.6973 0.8166 0.7261 0.8059 0.7191 KIES(T) 0.8937 0.8041 Table 3: NMI results of event clustering. method, but not the other way around. We believe the rea- son is that Tencent dataset has more applicable meta-path weights by training with manually labeled entities and key- words. Based on the learned weights and the interpretable distance metric KIES, we have achieved the best performance of semi-supervised event clustering. 5 Conclusion In this paper, we propose a knowledgeable HIN based so- cial event modeling framework, and design a novel pairwise popularity GCN model to learn both meta-paths weights and discriminant event instance representation, and achieves fine- grained social event categorization with state-of-the-art per- formances. By using the proposed PP-GCN model, we are able to overcome the problems of large category size and sparse small number of samples per class and preventing overfitting in our tasks. Experimental results show that our PP-GCN and KIES similarity measure can significantly out- perform state-of-the-art baselines methods on two real-world social datasets. In the future, we plan to study the inter- pretability of the different importance of meta-paths, and ex- tend our framework to other complex parameter leaning and applications. Acknowledgements The corresponding author is Jianxin Li. This work is sup- ported by NSFC program (No.61872022, No.61421003) and SKLSDE-2018ZX-16. Yangqiu Song is supported by the Early Career Scheme (ECS, No. 26206717) from Research Grants Council in Hong Kong. Philip S. Yu is supported by NSF through grants IIS-1526499, IIS-1763325, and CNS- 1626432, and NSFC No.61672313. References [Aggarwal and Subbian, 2012] Charu C Aggarwal Karthik Subbian. Event detection in social streams. SDM, 2012. and In [Allan, 2012] James Allan. Topic Detection and Tracking: Event-based Information Organization. Springer Publish- ing Company, Incorporated, 2012. [Angel et al., 2012] Albert Angel, Nikos Sarkas, Nick Koudas, and Divesh Srivastava. Dense subgraph mainte- nance under streaming edge weight updates for real-time story identification. PVLDB, 2012. [Atefeh and Khreich, 2015] Farzindar Atefeh and Wael Khreich. A survey of techniques for event detection in twitter. Computational Intelligence, 31(1):132 -- 164, 2015. [Auer et al., 2007] Soren Auer, Christian Bizer, Georgi Ko- bilarov, Jens Lehmann, Richard Cyganiak, and Zachary Figure 3: Illustration of the Accuracy for PP-GCN and PA-GCN. ing, but the accuracies of the angle-based PA-GCN model have periodic fluctuations. Essentially, the ratio of the modu- lus between vectors is more stable than the angle in iterations. Compared to the angle-based classifier, the popularity-based classifier has better ability to learn discriminating and stable event instance feature and prevent overfitting. One advantage of the proposed PP-GCN compared to other methods is that the weights (cid:126)ω between the meta-paths can be learned according to the event detection task. Due to the inter- pretability of the meta-path and similarity measure KIES, the learned weights (cid:126)ω can be utilized in other applications. Here, we make use of different similarity measures including KIES and other methods discussed in Section 4.2, and leverage the popular k-means algorithm to cluster the events. For the KIES distance metric, we use the two weights (cid:126)ω learned in the event detection tasks of Tencent and Weibo datasets, and then cal- culate the KIES distances between event instances by Eq. 1 to implement a semi-supervised fine-grained event clustering. Note that the test data did not participate in the training when learned the meta-path weights (cid:126)ω in PP-GCN. As shown in Table 3, our proposed similarity measure KIES achieves the best performances on the two clusters tasks in terms of NMI. Moreover, among the baselines, the WMD, mSDA and CGG measures have been verified to achieve state-of-the-art effects in text similarity in [Kusner et al., 2015]. Compared to other similarity measures, our KIES based k-means method achieves 6% -- 24% improvements in terms of NMI. We even implement a meta-path weights trans- fer experiment between Tencent dataset and Weibo dataset. We see that the performance of the Weibo dataset are im- proved more than 2% when employing the weights of the Tencent dataset to the Weibo by the KIES(T) based k-means Epoch#01000200030004000500060007000Accuracy#0.650.70.750.80.850.90.95PP-GCN in TencentPP-GCN in WeiboPA-GCN in TencentPA-GCN in Weibo Ives. Dbpedia: A nucleus for a web of open data. ASWC, 2007. In [Becker and Gravano, 2011] Hila Becker and Luis Gravano. Identification and characterization of events in social me- dia. Columbia University, 2011. [Blei et al., 2003] David M Blei, Andrew Y Ng, and Michael I Jordan. Latent dirichlet allocation. Journal of machine Learning research, 3(Jan):993 -- 1022, 2003. [Blei et al., 2010] David M Blei, Thomas L Griffiths, and Michael I Jordan. The nested chinese restaurant process and bayesian nonparametric inference of topic hierarchies. JACM, 2010. [Chandola et al., 2009] Varun Chandola, Arindam Banerjee, and Vipin Kumar. Anomaly detection: A survey. ACM computing surveys (CSUR), 2009. [Chen et al., 2012] Minmin Chen, WUSTL EDU, and Zhix- iang Eddie Xu. Marginalized denoising autoencoders for domain adaptation. In ICML, 2012. [Griffiths et al., 2004] Thomas L Griffiths, Michael I Jordan, Joshua B Tenenbaum, and David M Blei. Hierarchical topic models and the nested chinese restaurant process. In NIPS, 2004. [Hu et al., 2014] Baotian Hu, Zhengdong Lu, Hang Li, and Qingcai Chen. Convolutional neural network architectures for matching natural language sentences. In NIPS, 2014. [Huang et al., 2013] Po-Sen Huang, Xiaodong He, Jianfeng Gao, Li Deng, Alex Acero, and Larry Heck. Learning deep structured semantic models for web search using click- through data. In CIKM, 2013. [Ji and Grishman, 2008] Heng Ji and Ralph Grishman. Re- fining event extraction through cross-document inference. Proceedings of ACL, pages 254 -- 262, 2008. [Kim et al., 2009] Jin-Dong Kim, Tomoko Ohta, Yoshinobu Kano, and Jun'ichi Tsujii. Overview of bionlp'09 shared task on event extraction. In BioNLP, 2009. [Kipf and Welling, 2017] Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. In ICLR, 2017. [Kusner et al., 2015] Matt Kusner, Yu Sun, Nicholas Kolkin, and Kilian Weinberger. From word embeddings to docu- ment distances. In ICML, 2015. [Le and Mikolov, 2014] Quoc Le and Tomas Mikolov. Dis- In tributed representations of sentences and documents. ICML, 2014. [Liu et al., 2018] Bang Liu, Ting Zhang, Di Niu, Jinghong Lin, Kunfeng Lai, and Yu Xu. Matching long text docu- ments via graph convolutional networks. arXiv, 2018. [Liu et al., 2019] Yaopeng Liu, Hao Peng, Jianxin Li, Yangqiu Song, and Xiong Li. Event detection and evolu- tion in multi-lingual social streams. Frontiers of Computer Science, 2019. [Mikolov et al., 2013] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Distributed rep- resentations of words and phrases and their composition- ality. In NIPS, 2013. [Miller, 1998] George Miller. WordNet: An electronic lexical database. MIT press, 1998. [Mitra et al., 2017] Bhaskar Mitra, Fernando Diaz, and Nick Craswell. Learning to match using local and distributed representations of text for web search. In WWW, 2017. [Papadopoulos et al., 2012] Fragkiskos Papadopoulos, Mak- sim Kitsak, M ´Angeles Serrano, Mari´an Bogun´a, and Dmitri Krioukov. Popularity versus similarity in growing networks. Nature, 489(7417):537, 2012. [Perina et al., 2013] Alessandro Perina, Nebojsa Jojic, Manuele Bicego, and Andrzej Truski. Documents as multiple overlapping windows into grids of counts. In NIPS, 2013. [Ritter et al., 2012] Alan Ritter, Oren Etzioni, Sam Clark, et al. Open domain event extraction from twitter. In KDD, 2012. [Shao et al., 2017] Minglai Shao, Jianxin Li, Feng Chen, Hongyi Huang, Shuai Zhang, and Xunxun Chen. An ef- ficient approach to event detection and forecasting in dy- namic multivariate social media networks. In WWW, 2017. [Shen et al., 2014] Yelong Shen, Xiaodong He, Jianfeng Gao, Li Deng, and Gr´egoire Mesnil. Learning seman- tic representations using convolutional neural networks for web search. In WWW. ACM, 2014. [Shi et al., 2017] Chuan Shi, Yitong Li, Jiawei Zhang, Yizhou Sun, and Philip.S Yu. A survey of heterogeneous information network analysis. TKDE, pages 17 -- 37, 2017. [Sun and Han, 2013] Yizhou Sun and Jiawei Han. Mining heterogeneous information networks: a structural analysis approach. Acm Sigkdd Explorations Newsletter, 2013. [Wan et al., 2016] Shengxian Wan, Yanyan Lan, Jiafeng Guo, Jun Xu, Liang Pang, and Xueqi Cheng. A deep ar- chitecture for semantic matching with multiple positional sentence representations. In AAAI, 2016. [Wang et al., 2016] Chenguang Wang, Yangqiu Song, Hao- ran Li, Ming Zhang, and Jiawei Han. Text classification with heterogeneous information network kernels. In Thir- tieth AAAI Conference on Artificial Intelligence, 2016. [Wang et al., 2018] Chenguang Wang, Yangqiu Song, Hao- ran Li, Ming Zhang, and Jiawei Han. Unsupervised meta- path selection for text similarity measure based on hetero- geneous information networks. Data Mining and Knowl- edge Discovery, 32(6):1735 -- 1767, 2018. [Xu et al., 2017] Bo Xu, Yong Xu, Jiaqing Liang, Wanyun Cui, and Yanghua Xiao. Cn-dbpedia: A never-ending chi- nese knowledge extraction system. In IEA/AIE, 2017. [Yu et al., 2017] Weiren Yu, Jianxin Li, Md Zakirul Alam Ring: Bhuiyan, Richong Zhang, and Jinpeng Huai. Real-time emerging anomaly monitoring system over text streams. IEEE Transactions on Big Data, 2017. [Zacks and Tversky, 2001] Jeffrey M Zacks and Barbara Tversky. Event structure in perception and conception. Psychological bulletin, 2001. [Zhang et al., 2014] Ning Zhang, Jeff Donahue, Ross Gir- shick, and Trevor Darrell. Part-based r-cnns for fine- grained category detection. In ECCV, 2014.
1803.05046
1
1803
2018-03-13T21:07:52
Caveat Emptor, Computational Social Science: Large-Scale Missing Data in a Widely-Published Reddit Corpus
[ "cs.SI" ]
As researchers use computational methods to study complex social behaviors at scale, the validity of this computational social science depends on the integrity of the data. On July 2, 2015, Jason Baumgartner published a dataset advertised to include ``every publicly available Reddit comment'' which was quickly shared on Bittorrent and the Internet Archive. This data quickly became the basis of many academic papers on topics including machine learning, social behavior, politics, breaking news, and hate speech. We have discovered substantial gaps and limitations in this dataset which may contribute to bias in the findings of that research. In this paper, we document the dataset, substantial missing observations in the dataset, and the risks to research validity from those gaps. In summary, we identify strong risks to research that considers user histories or network analysis, moderate risks to research that compares counts of participation, and lesser risk to machine learning research that avoids making representative claims about behavior and participation on Reddit.
cs.SI
cs
Caveat Emptor, Computational Social Science: Large-Scale Missing Data in a Widely-Published Reddit Corpus Devin Gaffney Network Science Institute, Northeastern University 177 Huntington Avenue Boston, MA, 02115 8 1 0 2 r a M 3 1 ] I S . s c [ 1 v 6 4 0 5 0 . 3 0 8 1 : v i X r a Abstract As researchers use computational methods to study complex social behaviors at scale, the validity of this computational social science depends on the integrity of the data. On July 2, 2015, Jason Baumgartner published a dataset advertised to include "every publicly available Reddit comment" which was quickly shared on Bittorrent and the Internet Archive. This data quickly became the basis of many academic pa- pers on topics including machine learning, social behavior, politics, breaking news, and hate speech. We have discov- ered substantial gaps and limitations in this dataset which may contribute to bias in the findings of that research. In this paper, we document the dataset, substantial missing ob- servations in the dataset, and the risks to research validity from those gaps. In summary, we identify strong risks to research that considers user histories or network analysis, moderate risks to research that compares counts of participa- tion, and lesser risk to machine learning research that avoids making representative claims about behavior and participa- tion on Reddit. The Baumgartner Reddit Corpus Trace data sourced from online platforms has become an essential component for many forms of research ranging from sentiment analysis (Pak and Paroubek 2010) to epi- demiological modeling (Abdullah and Wu 2011) and eco- nomics (Bollen, Mao, and Zeng 2011). Dominant social platforms such as Twitter and Facebook have provided re- searchers with opportunities to directly study complex phe- nomena that, at their root, rely strongly on the nature of so- cial interaction (Bond et al. 2012). The reason for this, as Tufekci argues, is that large platforms (specifically Twitter, in this analogy) serve as a model organisms for the social sciences, ones that allow for ideal conditions for measure- ment of many phenomena in a relatively accessible form. On July 2, 2015, a new model organism was provided to researchers by Jason Baumgartner – a "complete" copy of one of the largest forums, Reddit, which has gained high visibility in the past several years due to events such as the Reddit blackout (Matias 2016; Newell et al. 2016; Baumgartner 2016) and the Gamergate controversy (Massa- This work is licensed under a Creative Commons "Attribution- NonCommercial-ShareAlike 3.0 Unported" License. J. Nathan Matias Princeton University Peretsman-Scully Hall Princeton, NJ, 08540 nari 2015a). Subsequently, many researchers have adopted the dataset, and have used it to study a wide range of ques- tions, including the evolution of social networks (Fire and Guestrin 2016), user migration through online platforms (Tan and Lee 2015; Newell et al. 2016), hate speech (Saleem et al. 2016), and online behavior research methodology (Bar- bosa et al. 2016b), among others. As a social news platform, Reddit hosts discussions about text posts and web links across hundreds of communi- ties called "subreddits" (Leavitt and Clark 2014; Massanari 2015c) Discussions from public subreddits are aggregated by a variety of news aggregators to create the "front page of the web" that Reddit was founded to provide to its readers (Massanari 2015b). While the site also provides chatrooms and features for live discussions of breaking news (Leavitt and Robinson 2017), the most common reddit experience is centered around top-level submissions and the comnents that people post when discussing those submissions within their subreddit communities. The Baumgartner dataset fol- lows this common experience and includes submissions and comments. Researchers are drawn to the Baumgartner Reddit dataset for its completeness. In principle, a complete dataset im- proves research validity by avoiding the ambiguities of sam- ples provided by platform application programming inter- faces (APIs) and third-party data resellers (Lotan et al. 2011; Diaz et al. 2016). In this paper, we show that this dataset, as distributed and used by researchers, is not as complete as re- ported. We report on gaps in this data, categorize the risks to research validity from these gaps, and share collaborative re- analyses of peer-reviewed papers that have used this dataset. Finally, we conclude with reflections on the sensitivity of online behavioral research to the kinds of gaps we found in the Baumgartner Reddit Dataset. Sequential ID Analysis The Baumgartner Reddit dataset came about through a con- vergence of factors: a mostly-public conversation platform, engineering details specific to the design of the Reddit system, and a creative data scientist who capitalized on these characteristics to contribute a unique dataset to pub- lic knowledge. Many databases include the concept of an Identity col- umn, or a column that generates an internal ID to serve as a unique reference to the row, or object, within the database. In many cases, this value auto-increments – the first value in the database assumes a value of 1, the next, a value of 2, and so forth. This number can be artificially shifted within the space – for instance engineers may partition early IDs of 1-1,000,000 for experimenting with data, for some reason, and start all production-system data created by users with ID 1,000,001. Aside from this possibility, if an object con- tains an ID of n, then it is plausible to assume that there are at least n objects within the database. In personal correspondence, Baumgartner explained that this intuition led him to develop systems designed to systematically-collect all data on Reddit. Baumgartner's al- gorithm batches up 100 integers, converts them to the Base 36 representation that Reddit uses to represent their objects, and then queries for those objects. Reddit then returns the request with a set of all public, found objects. Baumgart- ner's algorithm can be run in a highly parallel environment – many batches of 100 IDs can be concurrently requested, with no need to interact with one another. On other plat- forms, some error may be returned if data has been deleted. With Reddit, no error is returned – instead, a truncated object reflecting that this deletion has occurred is returned. There- fore, barring technical issues, this method should provide a complete accounting for every ID within the range 1-n for all public comments and submissions within the dataset. Using this method, Baumgartner archived the public record of red- dit comments and submissions from the platform's creation through July 2015. Baumgartner has continued to provide this data as a freely-available resource. In this analysis, we consider The full dataset as released by Baumgartner in July 2015, supplemented with updates published by Baumgartner through the end of February 2016. We also include a followup analysis extended to June 2017. Diagnosing Missing Data Because reddit comments and submissions have unique, se- quential IDs, we can analyze gaps in the sequence to evalu- ate the completeness of the dataset. We observed two kinds of missing information: dangling references (known un- knowns) and gaps indicated by the absence of information that we would expect to exist given the use of sequential integers to index comments and submissions (unknown un- knowns). We discovered the completeness problem when work- ing with this dataset for our own research. Taking a ran- dom sample of subreddits and generating a timeline of daily comments and submissions, plots showed impossible results given the architecture of Reddit: some comment timelines started earlier than their corresponding submission time- lines. The first kind of gap we discovered were dangling refer- ences. On Reddit, comments can only occur within a dis- cussion of a submission and can only refer to other com- ments or submissions. In all cases, a submission would have to exist for a comment to refer to it, a relationship that is unidirectional in time. By traversing these relationships, we Data Type Dangling References (to Feb 2016) Unknown Unknowns (to Feb 2016) Unknown Unknowns (to Jun 2017) Comments 101,257 943,755 35,801,325 Submissions 405,911 1,539,583 27,795,423 Table 1: Totals for missing data in the Baumgartner dataset observed many references to missing comments and submis- sions. These can be thought of as "known unknowns:" com- ments which refer to other comments or to a parent submis- sion, where the referred-to comment or parent submission is not contained within the Baumgartner dataset. We also observed a second kind of gap: objects that are never referenced in the dataset but are likely missing. If all comments and submissions are given sequential integer IDs, we would expect an unbroken sequence of integers to be associated with information in the dataset. This is not the case. Consider the comments dataset: the earliest comment in the Baumgartner dataset is comment #2 and the highest is #29,484,960,643. In October 2007, the Reddit Company incremented the comment IDs by several billion IDs. When accounting for this difference, we assume that any other gaps in the sequence of comment IDs can be attributed to gaps in the dataset: we count 943,755 total potentially-missing com- ments up to February 2016. Missing comment IDs could be attributed to many possi- ble causes. These IDs could be dangling references, public information that for some reason were not returned by Red- dit's systems to Baumgartner's software at that moment, or information that was part of a community that had set its dis- cussions to be private. These missing IDs are not associated with deleted content, since the Reddit platform returns infor- mation about deleted data, which is included in the Baum- gartner dataset. For submissions, we are less confident about the mag- nitude of missing unknown unknowns. While we have ob- served 1,539583 "gaps" in the space of IDs for submissions through February 2016, the first submission in the Baum- gartner dataset starts at 9,970,002. When searching for sub- missions between #1 and #9,970,001, we have successfully found some submissions, leading us to believe that millions of submissions from the early history of Reddit may be ab- sent from this dataset. Figure 1: Histograms of sampled user Submission and Com- ment counts Deleted content, which is included in this dataset, repre- sents a risk to validity that we do not consider here. A user who deletes even one comment in their posting history intro- duces many of the problems we describe in this paper, even if the fact of the comment is recorded in the Baumgartner dataset. The Per-User Risk of Missing Data How likely is a researcher to encounter these gaps? To ad- dress this question, we estimate the per-user risk of miss- ing data, using a random sample of 7,400 accounts from the Baumgartner dataset. The average user in this sample commented 6.8 times and commented 96.6 times from late January 2006 through February 2016. These averages occur on a highly skewed distribution, as illustrated by the log-histograms in 1. Based on table 1, the known maximum amount of missing com- ments and submissions is 943,755 and 1,539,583, respec- tively – dangling references are a subset of "unknown unknowns." Across the entire Baumgartner dataset, only 0.043% and 0.65% of comments and submissions, respec- tively, are missing. The issue has a compounding effect, since a small number of users create a large amount of the content on the platform. The more posts and comments someone produces, all else being equal, the more likely their histories will be affected by the missing data issue. As we have also showed, unknown unknowns expanded dramati- cally in the 16 months following February 2016 and now in- clude 36 million missing comments and 28 million missing submissions. c rc and(cid:80)n rc being missing simply by(cid:80)n What is the probability of data loss for an individual Red- ditor history? While in reality the missing data is not uni- formally distributed throughout the corpus, we can estimate the effect by compounding probabilities to assess the degree to which a user could be affected by only a small amount of missing data. Using the averages from earlier, we can cal- culate the risk of any individual submission rs or comment s rs, respectively. In this case, the "average" Redditor may be exposed to a total maximum risk level of ∝ 4.18% likelihood for miss- ing at least one comment and ∝ 4.46% for missing at least one submission. In the 7,400 individual set, approximately 2% of the sampled users had a 50% or greater chance of having a missing comment, and 2.6% of the sampled users had a 50% or greater chance of having a missing submis- sion. These estimates were based on the census of dangling references and unknown unknowns from the beginning of the corpus to February 2016; we expect relatively similar rates in later data, since the rate of missed content has been consistent for the past several years. We offer these rough approximations to communicate a qualitative sense of how this missing data issue may create an appreciable problem for some forms of research. We include a more detailed ty- pology of possible errors below. Distribution of Gaps Across Time Far from being uniformally distributed throughout the dataset, the instances of missing data appear to be "bursty" – clustered at certain moments of time. Consequently, cer- tain spaces in the Reddit network or certain time periods Figure 2: Burstiness of missing submissions and comments per month, 2005-June 2017 may be at greater risk of missing data than others. Impor- tantly, we found significant gaps for comments at key mo- ments in Reddit history that have been subjects of research, including the SOPA/PIPA protests (Benkler et al. 2015) and the months leading up to the Reddit blackout (Matias 2016). Leaning on Jo et al., we employ a measure of "burstiness" which considers the relative dispersion of errors throughout the ID space per each month of gathered data. This mea- sure is bounded from [-1,1], where a score of -1 indicates completely evenly dispersed errors, and a score approach- ing 1 indicates that errors are located in a more concentrated set of missing blocks. Figure 2 shows many high positive burstiness scores, indicating that missing blocks are often distributed unevenly within months throughout the dataset. Figure 3: Varied measures of missing submissions per month. Medium blue circles denote the percent of submis- sions missing for each month of data, bright blue squares denote the rolling average percent of missing submissions, and dark blue stars denote the cumulative total number of missing submissions to date. Overall, figures 3 and 4 illustrate an initially erratic distri- bution of errors throughout the dataset. These errors appear to occur directly within periods of substantial research inter- est and may affect several published results (Matias 2016; 2005-122006-062006-122007-062007-122008-062008-122009-062009-122010-062010-122011-062011-122012-062012-122013-062013-122014-062014-122015-062015-122016-062016-122017-061.000.750.500.250.000.250.500.751.00Missing Submissions2006-012006-072007-102008-042008-102009-042009-102010-042010-102011-042011-102012-042012-102013-042013-102014-042014-102015-042015-102016-042016-102017-040%20%40%60%80%100%Missing Submissions Variable Total Content Month Subreddit Created Constant Observations R2 Adjusted R2 Note: Comments Submissions 0.212∗∗∗ (0.008) 0.005∗∗∗ (0.001) 1.198∗∗∗ (0.094) 8,176 0.086 0.086 ∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01 0.217∗∗∗ (0.006) 0.002∗∗ (0.001) −0.518∗∗∗ (0.095) 4,341 0.306 0.305 Figure 4: Varied measures of missing comments per month. Medium blue circles denote the percent of comments miss- ing for each month of data, bright blue squares denote the rolling average percent of missing comments, and dark blue stars denote the cumulative total number of missing com- ments to date. Figure 5: Gaps are not evenly distributed across communi- ties. The total historical counts of comments per community comments are mildly correlated with the number of dangling references, while submissions are not very correlated with the number of dangling references. Newell et al. 2016). While the rate of error was particularly erratic in early years, and the distribution of errors per ID gap continues to be erratic (figure 2), the error rate per month has evened out to around 1% missing data per month. Distribution of Gaps Across Communities We also considered the degree to which missing content dif- ferentially affects individual subreddits. If data from some communities were more affected by gaps than others, the gaps could influence the results of comparative research about populations communities (Hill and Shaw 2017). If gaps affected communities equally, we would expect that the number of missing pieces of content monotonically rises with the number of overall pieces of content posted to a sub- reddit. As figure 5 shows, we find only marginal evidence for such a supposition. While more missing content is positively and significantly associated with larger subreddits, we do not find a direct relationship. One confounding factor may be the temporal "center of gravity" of a subreddit – older subred- dits are positioned at a time when more content was missing, on average, which may differentially affect older subreddits. Table 2: Regression exploring the relationship between amount of missing content per subreddit and total amount of known content per subreddit, and month in which the sub- reddit was created. We expect that these two variables would have meaningful explanatory power for where missing con- tent is – we find that this appears to be the case for missing comments but not for missing submissions, as evidenced by the relative R2 values. We attempted to control for subreddit age in a multiple lin- ear regression which accounted for the size of subreddits as well as the time at which those subreddits were created; we did not find any meaningful increase in explanatory power in the adjusted model. Table 2 . The time at which a subred- dit was created, however, is a poor proxy for the true "center of gravity" of content (i.e. the time at which a subreddit was most active), a characteristic that these models do not ac- count for. In the above sections, we have considered the influence of potentially-missing content on analyses of users, behav- ior over time, and groups. We observed numerous sources of potential bias in research: a substantial percentage of users could be affected by these gaps, the gaps are not evenly distributed across time, and gaps are not evenly distributed across communities. How Missing Data Affects Common Research Methods in Computational Social Science How might these gaps influence research in practice? We ex- pect that researchers asking different kinds of questions will face different kinds of risks from missing data. In the follow- ing sections, we categorize published literature that uses this dataset and offer a typology of the risks that these gaps rep- resent to common research methods in computational social science. User history analysis papers face the highest risks from missing data, since a missing comment or submission could hide an important part of that user's history. A network anal- ysis may fail to include a user's participation in a particular community or interaction with a key user. Furthermore, sur- vival analyses might mis-estimate the moment of a person's departure or their participation level. Network analysis pa- pers also face high risks, since the presence or absence of a tie could be dependent on the missing data. Sum analyses that count the size or incidence rate of participation in sub- 2005-122006-062006-122007-062007-122008-062008-122009-062009-122010-062010-122011-062011-122012-062012-122013-062013-122014-062014-122015-062015-122016-062016-122017-060%20%40%60%80%100%Missing Comments reddits or the use of certain kinds of language face moder- ate risk, especially when analyzing small communities and rare events. Content analysis that involves training machine learning systems on Reddit comments face minimal risk be- cause their research rarely includes claims about the popu- lation of Reddit users. Risk to User History Analyses Papers that test hypotheses based on user histories on Red- dit may have substantial gaps in the histories that they seek to test. Analyses on user histories that consider the history in full are, in general, exposed to the highest risk – analyses that are especially sensitive to high-volume users are very likely, on average, to consider users whose histories have gaps. Hessel, Tan, and Lee, for example, observes and com- pares sums of comment participation between subreddits, and observes the full chain of user history – Hessel et al. adopts a similar approach. Barbosa et al. compares year co- horts of individual-level behavior across all of Reddit, and as has been shown, some years are more affected by gaps than others. Additionally, the large number of potential miss- ing submissions from Reddit's earliest years may also affect these findings. If a user history analysis requires the com- plete posting history between subreddits for a given user, gaps in such transmissions may constitute meaningful gaps in explaining a wide array of hypotheses. Risks to Network Analyses Some papers test network hypotheses by constructing inter- action networks between users or communities, sometimes over time. Data gaps also represent a high risk to these pa- pers, since missing submissions may result in unobserved ties in the network. Tan and Lee observes histories of user accounts participating in different communities, while Fire and Guestrin observe network ties over time modeled on user histories. Substantial blocks of missing data, includ- ing the potentially large amount of missing submissions from Reddit's nascency could redraw the map of community ties on the platform. Tree structures reconstructing threads are also similarly affected, such as work by Hessel, Lee, and Mimno and Fire and Guestrin, which through linkages of comments and submissions similarly face issues due to missing submissions (i.e. parents of threads) or comments. Risks to Research That Counts and Compares Participation Between Communities Other papers test hypotheses based on participation sums within communities. Gaps that are biased toward partic- ular communities will represent a risk to the validity of these studies. Matias observes levels of subreddit partici- pation by moderators, observes relative participation lev- els of subreddit commenters in other subreddits, and ob- serves moderator participation in "metareddits". Newell et al. observes comment volumes within subreddits. Barthel observes comments about political candidates across Red- dit during a period where many submissions are within the dataset. Barbaresi analyzes German language text to iden- tify relative commenting rates about places in Germany. Horne and Adali considers posts within /r/worldnews to de- termine linguistic characteristics of why some news frames are more visible than others. Dosono, Semaan, and Hems- ley considers a specific set of communities associated with self-expression of Asian-American Pacific Islander (AAPI) identity on the platform. As we showed in figure 5, gaps do not appear to be evenly distributed across communities, since the number of missing comments and submissions per community is not strongly correlated to the number of observed comments and sub- missions in that community. While a simple statistical re- gression between the total counts of missing data and known data shows the relationship to be significant, the R2 is low enough in both cases to lead us to conclude that studies on some subreddits could lead towards very biased results due to higher than random amounts of missing data. In practice, we observe 78 subreddits where at least 20% of the comments are missing, and 1,755 subreddits where at least 20% of the submissions are missing. Among sub- reddits that have any dangling references, on average they are missing at least 35% of their submissions. The R2 score in a model predicting the volume of a community's missing observations from the volume of observed comments and submissions only explains 30% of the variance of missing comments and 10% of the variance of missing submissions (figure 5). The risk to any specific study will depend on the distribution of gaps across the specific communities being compared. Risks to Machine Learning Models Finally, some studies train machine learning models and conduct linguistic analysis of the Baumgartner dataset. In- sofar as these studies do not make claims about populations, gaps represent a minimal risk to the validity of this research. For example, Saleem et al. trains machine learning models on comments from particular subreddits that have since been quarantined or banned by Reddit for harmful behavior. In our observations of communities where the mass of missing data is pooled, it seems to trend towards such communities – across the three subreddits considered in their work, one of those subreddits has a large number of dangling references: observed comments refer to 696,642 unique missing submissions in the dataset for this one com- munity alone. Among comments, 1,100 of 1,585,014 total comments were known to be missing. Saleem, Dillon, Be- nesch, and Ruths have re-analyzed their data after filling some gaps and fail to find any substantial differences in the performance of their machine learning models (citation forthcoming). Furthermore, since the purpose of this kind of machine learning research is to make inferences about out- of-sample observations rather than to test hypotheses about a population, such research may be less sensitive to variation due to missing data. Discussion All datasets have biases, no matter how complete we wish them to be. In the process of designing research, conscien- tious researchers will study those biases, document them, and account for them as best as possible. In this paper, we have shown ways in which an influential public dataset does not represent the "complete" record that its publisher and users aspired to. We have documented per-user risks of miss- ing data, risks from the uneven distribution of missing data over time, and risks in the uneven distribution of missing data across communities. We have outlined the risks to re- search validity represented by these data gaps, including some of our own work. We have raised these issues in direct conversation with Baumgartner, who has quickly and graciously re-processed ID blocks with missing data and filled in any gaps that are able to be filled. By publication time of this paper, we be- lieve that any missing data that can be filled will have been done so for datasets provided directly by Baumgartner up to February 2016. Data shared from any other source may still include these missing observations. Since any missing data that Reddit does not provide will still be missing from the corrected datasets, we encourage researchers to check the integrity of your data when publishing results from this dataset. More widely, the case of this so-called complete dataset draws attention to the risks to validity from research cultures that move fast to produce new results when new data is re- leased. While many researchers have utilized Baumgartner's generous work on this Reddit dataset to investigate impor- tant questions, too few of us questioned a "completeness" statement that shouldn't have been accepted as truth. This dataset has numerous omissions, and those issues affect dif- ferent research agendas with varying levels of severity. As researchers, we need to protect ourselves from the daz- zling scale of large datasets. We encourage more people in Baumgartner's position to collect data, share it in an ethical manner, and contribute to knowledge through the research that it enables. It will not always be possible or reasonable to place strict methodological expectations upon such citi- zen scientists – that responsibility lies firmly on academics. We hope this paper will encourage other researchers to test their assumptions and document data quality when conduct- ing social scientific research with large datasets that they did not collect. Acknowledgements The authors wish to thank Jason Baumgartner for provid- ing the dataset and for corresponding with us to check our analyses. We are also grateful to Haji Mohammad Saleem and Derek Ruths, for valuable discussion on the risks to ma- chine learning research. Finally, we wish to thank Jack Hes- sel, Lillian Lee, David Mimno, and Chenhao Tan for provid- ing a careful examination of their previous work, which they discuss in Appendix A. References [Abdullah and Wu] Abdullah, S., and Wu, X. 2011. An epi- demic model for news spreading on twitter. In 2011 IEEE 23rd International Conference on Tools with Artificial Intel- ligence, 163–169. IEEE. 2016. [Barbaresi] Barbaresi, A. 2015. Collection, description, and visualization of the german reddit corpus. In 2nd Workshop on Natural Language Processing for Computer-Mediated Communication, 7–11. [Barbosa et al.] Barbosa, S.; Cosley, D.; Sharma, A.; and Ce- sar Jr, R. M. 2016a. Averaging gone wrong: Using time- aware analyses to better understand behavior. In Proceed- ings of the 25th International Conference on World Wide Web, 829–841. International World Wide Web Conferences Steering Committee. [Barbosa et al.] Barbosa, S.; Cosley, D.; Sharma, A.; and Ce- sar Jr, R. M. 2016b. Averaging gone wrong: Using time- aware analyses to better understand behavior. In Proceed- ings of the 25th International Conference on World Wide Web, 829–841. International World Wide Web Conferences Steering Committee. [Barthel] Barthel, M. How the 2016 presidential campaign is being discussed on reddit pew research center. http:// www.pewresearch.org/fact-tank/2016/05/ 26/\how-the-2016-presidential-campaign\ -is-being-discussed-on-reddit/. Accessed: 2011-11-07. I have every [Baumgartner] Baumgartner, J. publicly available reddit comment for research. 1.7 billion comments at 250 gb compressed. any interest in this? : datasets. https://www.reddit.com/r/ datasets/comments/3bxlg7/\i_have_every_ publicly_available_reddit_comment/. Ac- cessed: 2011-11-07. [Benkler et al.] Benkler, Y.; Roberts, H.; Faris, R.; Solow- Niederman, A.; and Etling, B. 2015. Social mobilization and the networked public sphere: Mapping the sopa-pipa debate. Political Communication 32(4):594–624. [Bollen, Mao, and Zeng] Bollen, J.; Mao, H.; and Zeng, X. 2011. Twitter mood predicts the stock market. Journal of Computational Science 2(1):1–8. [Bond et al.] Bond, R. M.; Fariss, C. J.; Jones, J. J.; Kramer, A. D.; Marlow, C.; Settle, J. E.; and Fowler, J. H. 2012. A 61-million-person experiment in social influence and politi- cal mobilization. Nature 489(7415):295–298. [Diaz et al.] Diaz, F.; Gamon, M.; Hofman, J. M.; KÄ´scÄ´s- man, E.; and Rothschild, D. 2016. Online and Social Media Data As an Imperfect Continuous Panel Survey. PLOS ONE 11(1):e0145406. [Dosono, Semaan, and Hemsley] Dosono, B.; Semaan, B.; and Hemsley, J. 2017. Exploring aapi identity online: Po- litical ideology as a factor affecting identity work on red- dit. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2528– 2535. ACM. [Fire and Guestrin] Fire, M., and Guestrin, C. 2016a. Time Is of the Essence: Analyzing the Effect of Vertex-Joining arXiv preprint Time on Complex Network Evolution arXiv:1603.07445. [Fire and Guestrin] Fire, M., and Guestrin, C. 2017. The rise and fall of network stars. arXiv preprint arXiv:1706.06690. the third ACM international conference on Web search and data mining, 251–260. ACM. [Newell et al.] Newell, E.; Jurgens, D.; Saleem, H. M.; Vala, H.; Sassine, J.; Armstrong, C.; and Ruths, D. 2016. User migration in online social networks: A case study on reddit during a period of community unrest. In Tenth International AAAI Conference on Web and Social Media. [Pak and Paroubek] Pak, A., and Paroubek, P. 2010. Twitter as a corpus for sentiment analysis and opinion mining. In LREc, volume 10, 1320–1326. [Saleem et al.] Saleem, H.; Dillon, K.; Benesch, S.; and Ruths, D. 2016. A web of hate: Tackling hateful speech in online social spaces. In First Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS 2016). [Saleem et al.] Saleem, H. M.; Dillon, K. P.; Benesch, S.; and Ruths, D. 2017. A web of hate: Tackling hateful speech in online social spaces. arXiv preprint arXiv:1709.10159. [Tan and Lee] Tan, C., and Lee, L. 2015. All who wander: On the prevalence and characteristics of multi-community engagement. In Proceedings of the 24th International Con- ference on World Wide Web, 1056–1066. ACM. [Tufekci] Tufekci, Z. 2014. Big questions for social media big data: Representativeness, validity and other methodolog- ical pitfalls. arXiv preprint arXiv:1403.7400. Appendix A [Hessel et al.] Hessel, J.; Schofield, A.; Lee, L.; and Mimno, D. 2015. What do democrats do in their spare time? la- tent interest detection in multi-community networks. arXiv preprint arXiv:1511.03371. [Hessel, Lee, and Mimno] Hessel, J.; Lee, L.; and Mimno, D. 2017. Cats and captions vs. creators and the clock: Com- paring multimodal content to context in predicting relative In Proceedings of the 26th International Con- popularity. ference on World Wide Web, 927–936. International World Wide Web Conferences Steering Committee. [Hessel, Tan, and Lee] Hessel, J.; Tan, C.; and Lee, L. 2016. Science, askscience, and badscience: On the coexistence of In Tenth International AAAI highly related communities. Conference on Web and Social Media. [Hill and Shaw] Hill, B. M., and Shaw, A. 2017. Studying Populations of Online Communities. The Handbook of Net- worked Communication. Oxford University Press, New York, NY. [Horne and Adali] Horne, B. D., and Adali, S. 2017. The impact of crowds on news engagement: A reddit case study. arXiv preprint arXiv:1703.10570. [Jo et al.] Jo, H.-H.; Karsai, M.; Kertész, J.; and Kaski, K. 2012. Circadian pattern and burstiness in mobile phone communication. New Journal of Physics 14(1):013055. [Leavitt and Clark] Leavitt, A., and Clark, J. A. 2014. Up- voting hurricane Sandy: event-based news production pro- cesses on a social news site. In Proceedings of the SIGCHI conference on human factors in computing systems, 1495– 1504. ACM. [Leavitt and Robinson] Leavitt, A., and Robinson, J. J. 2017. The Role of Information Visibility in Network Gatekeeping: Information Aggregation on Reddit during Crisis Events. In CSCW, 1246–1261. [Lotan et al.] Lotan, G.; Graeff, E.; Ananny, M.; Gaffney, D.; Pearce, I.; et al. 2011. The arab spring the revolutions were tweeted: Information flows during the 2011 tunisian and egyptian revolutions. International journal of commu- nication 5:31. [Massanari] Massanari, A. 2015a. # gamergate and the fap- pening: How redditâ A ´Zs algorithm, governance, and cul- ture support toxic technocultures. New Media & Society 1461444815608807. [Massanari] Massanari, A. 2015b. # Gamergate and The Fap- pening: How Redditâ A ´Zs algorithm, governance, and cul- ture support toxic technocultures. New Media & Society 1461444815608807. [Massanari] Massanari, A. 2015c. Participatory Culture, Community, and Play: Learning from Reddit. New York: Peter Lang Publishing Inc., 2 edition edition. [Matias] Matias, J. N. 2016. Going dark: Social factors in collective action against platform operators in the reddit In Proceedings of the 2016 CHI Conference on blackout. Human Factors in Computing Systems, 1138–1151. ACM. [Mislove et al.] Mislove, A.; Viswanath, B.; Gummadi, K. P.; and Druschel, P. 2010. You are who you know: inferring In Proceedings of user profiles in online social networks. Hi Devin and Nate, We would first like to thank you again for bringing this issue to our attention. Your systematic evaluation was quite thorough and much appreciated. As social media datasets continue to increase in size, more work like yours should be completed, and we very much appreciate your constructive and careful efforts. We definitely agree that "all datasets have biases, no matter how complete we wish them to be;" more explicit qualifications of this dataset's shortcomings in future work would be appropriate. While we do think that this dataset's ambition, scale, cleanliness, and reach outweigh the downsides, i.e., we don't think that scraping errors should preclude future work, users of this dataset should be explicit about the possible caveats in working with it. 1.We could not agree more that the responsibility of data validation and cleaning should not fall to Jason Baumgartner. He has done a tremendous amount of work and we are all in his debt. Future data collection and cleaning should not automatically fall to him. 2.Although we began with RedditAnalytics, as we acknowledged in Tan & Lee 2015, we constructed our (Tan & Lee 2015, from which​ ​Hessel, Tan and Lee 2016, Hessel et al. 2016, and Hessel, Lee, and Mimno 2017​ ​were derived) reddit submissions dataset prior to Jason B. releasing the full post set on pushshift.io, and our dataset differs from it. In fact, prior to our experimental work we ran a number of consistency and validation tests on the initially extracted data, contacted Jason to alert him of some inconsistencies that were revealed by our tests, and re-scraped some systematically missing submission data (for example, the ​README for our data release describes the re-scraping of all 1reddit posts for a month). 3.That being said, while the systematic biases you discover may differ from the pushshift.io post set to the one we use, it's possible that the set we are using also has similar biases. We will go back and check properties of our set. When we were constructing these datasets, we were aware of a small amount of potential missing data, though we judged that the amount of it was relatively insignificant in light of several other dataset characteristics. There are several well-known shortcomings of reddit data, including the issue of deleted posts. For example, in the dataset we use, there are 101M submissions, of which around 25M are deleted with no author information available. The missing comments/submission values you report (.043% and .65% respectively) were similar to the values we discovered in our own validations. Given that deleted posts (~25%) are a well-known shortcoming of any study using reddit data, we estimated that the small amount of missing data due to scraping errors (~1%) was less significant, and was a factor we ignored after correcting for large, systematic problems. In some cases, we ran additional experiments controlling for the likely more impactful factor of deleted posts, e.g., ​footnote 18 in Hessel, Lee, and Mimno 2017. In Tan and Lee 2015, since 2we knew of such issues, we should not have glossed over them by being so free in 1 https://chenhaot.com/data/multi-community/README.txt 2 https://arxiv.org/pdf/1703.01725.pdf saying "all posts"; similar problematic shorthand in follow-up work should not have been used. 4.Even after Jason's latest re-scraping, though, there still are some inexplicable findings that call into question the possibility of absolute completeness of a corrected version of this dataset. Here are few observations we have made based on a reading of your work and some previous analyses we had conducted. a.In the new reddit 0-10M post scrape, only 955K (9.5%) of posts are found. Here are some (base36, base10) submissions that were found within the first 10M ids: (2pjh7, 4550875), (2pjhg, 4550884), (2pjhq, 4550894); under the one-id-per-post metric, there clearly are still a significant number of missing posts -- perhaps up to 90%. If one attempts to access posts in between these values (e.g., (2pjh8, 455086)) either via the ​browser or via the API, a 404 error is returned (as of 33/9/2018). We've run into similar questions before, and attempted to find out why posts might be missing. b.To be concrete: after reading your work, we conducted a test with our own set. How many of the "gaps" in our data could be filled by re-querying the API? Using a random test set of 400 uniformly sampled post ids in the base36-sequential gaps in our set, we found that only 53/400 (13%) were accessible -- the remaining 347 (87%) posts were errors (we checked to see if this was reproducible in the browser -- for the posts we checked, it was). It's not entirely clear as to what this means. This observation invites many questions, e.g., are posts always assigned a continuous sequence of base36 ids? Can reddit moderators fully delete posts? Does the availability of posts according to the API change over time? Were the 13% of found posts unavailable for some reason in 2014? Have practices remained consistent since 2007? Do these potentially missing posts mean that future reddit studies are not to be trusted? c.Among the 347 failed API queries, there was a mixture of 404 and 403 errors (specifically: 289 404 errors (generally -- these were from earlier posts), 58 403 errors (generally -- these were from later posts)). According to the reddit python API documentation, a 403 error can be caused by a variety of circumstances, e.g., if the subreddit is private and the requesting user doesn't have access to it. According to the reddit python API, a 404 error occurs if the resource does not exist; it's plausible that a non-existent resource could be caused by an id that was never allocated, though it's hard to say why this happens. We have attempted to search through cached internet resources in search of missing posts (e.g., the internet archive) to no avail. d.We have also noticed some odd patterns in early reddit ids that could plausibly be indicative of future discontinuities, particularly if the id assignment scheme has remained consistent over time. For example, when sorting the very first posts made to reddit according to Jason's latest scrape by the created_utc field, the post ids up to post 28128 appear to be in base 10 (in base36, they are highly 3 http://reddit.com/r/reddit.com/comments/1l3tm/broken_link/ inconsistent). Then, the next post's id is "sqh" which would be post 37241, made 71 minutes after. Scrolling through this list reveals many more discontinuities; in time, the following post sequence appears: 101x, 5yb9e (200 seconds later), 5yb98 (300 seconds later), 102c (50 seconds later). These oddities continue, too; for instance, here is a ​post from the new re-scraping that is impossible -- the 4comment was made 4 years prior to the post. e.Anecdotally, it seems that most of the oddities in the dataset occur before 2008. Jan. 2008 is when Reddit started to allow users to create their own communities. We have found that most of the missing data after 2008 are due to 403 errors, which means that these submissions are likely not publicly available. As a result, we think that the Reddit dataset curated by Jason B. is amenable to studies focused on user-created communities, particularly in comparison to other publicly available datasets. In closing, we think that your work has raised an interesting research question: given that it's generally impossible to know if one has collected a "complete" set of information (be it posts by a reddit user, a user's tweets, wikipedia talk comments, etc.) are there methods of evaluation that simultaneously allow us to ask interesting questions while making sure observations are insensitive to often-overlooked (and, in the case of reddit, potentially un-avoidable) scraping gaps? We would be happy to discuss this topic going forward! And, one bureaucratic point: if you found this email (or followup conversations) helpful, we would be happy about that, but ask that if you were to acknowledge us in any paper or the like, please include a disclaimer that we do not necessarily agree with every point made in your paper. (Obviously, you don't have to acknowledge us at all if this wasn't helpful!) Signed (alphabetically), Jack Hessel Lillian Lee David Mimno Chenhao Tan 4 http://reddit.com/r/reddit.com/comments/1l3tm/broken_link/
1311.3085
1
1311
2013-11-13T11:25:18
Community detection thresholds and the weak Ramanujan property
[ "cs.SI" ]
Decelle et al.\cite{Decelle11} conjectured the existence of a sharp threshold for community detection in sparse random graphs drawn from the stochastic block model. Mossel et al.\cite{Mossel12} established the negative part of the conjecture, proving impossibility of meaningful detection below the threshold. However the positive part of the conjecture remained elusive so far. Here we solve the positive part of the conjecture. We introduce a modified adjacency matrix $B$ that counts self-avoiding paths of a given length $\ell$ between pairs of nodes and prove that for logarithmic $\ell$, the leading eigenvectors of this modified matrix provide non-trivial detection, thereby settling the conjecture. A key step in the proof consists in establishing a {\em weak Ramanujan property} of matrix $B$. Namely, the spectrum of $B$ consists in two leading eigenvalues $\rho(B)$, $\lambda_2$ and $n-2$ eigenvalues of a lower order $O(n^{\epsilon}\sqrt{\rho(B)})$ for all $\epsilon>0$, $\rho(B)$ denoting $B$'s spectral radius. $d$-regular graphs are Ramanujan when their second eigenvalue verifies $|\lambda|\le 2 \sqrt{d-1}$. Random $d$-regular graphs have a second largest eigenvalue $\lambda$ of $2\sqrt{d-1}+o(1)$ (see Friedman\cite{friedman08}), thus being {\em almost} Ramanujan. Erd\H{o}s-R\'enyi graphs with average degree $d$ at least logarithmic ($d=\Omega(\log n)$) have a second eigenvalue of $O(\sqrt{d})$ (see Feige and Ofek\cite{Feige05}), a slightly weaker version of the Ramanujan property. However this spectrum separation property fails for sparse ($d=O(1)$) Erd\H{o}s-R\'enyi graphs. Our result thus shows that by constructing matrix $B$ through neighborhood expansion, we regularize the original adjacency matrix to eventually recover a weak form of the Ramanujan property.
cs.SI
cs
Community detection thresholds and the weak Ramanujan property Laurent Massoulié Microsoft Research–Inria Joint Centre [email protected] November 14, 2013 Abstract The present work is concerned with community detection, that is reconstruction of hidden components, in random graph models. Decelle et al. [1] conjectured the existence of a sharp threshold on model parameters for community detection in sparse random graphs drawn from the stochastic block model. Mossel, Neeman and Sly [2] established the negative part of the conjecture, proving impossibility of meaningful reconstruction below the threshold. The positive part of the conjecture remained elusive so far: results of Co ja-Oghlan [3] imply that a particular spectral method applied to the graph’s adjacency matrix achieves non-trivial reconstruction, but this applies only when above the conjectured threshold by a possibly large constant. In this work we solve the positive part of the conjecture. To that end we introduce a modified adjacency matrix B based on neighborhood expansion. Specifically B counts simple, or self- avoiding paths of a given length ℓ between pairs of nodes. We then prove that for logarithmic length ℓ, the leading eigenvectors of this modified matrix provide a non-trivial reconstruction of the underlying structure, thereby settling the conjecture. A key step in the proof consists in establishing a weak Ramanujan property of the constructed matrix B . Namely, the spectrum of B consists in two leading eigenvalues ρ(B ), λ2 and n−2 eigenvalues of a lower order O(nǫpρ(B )) for all ǫ > 0, ρ(B ) denoting B ’s spectral radius. Graphs are called Ramanujan when they are d-regular with second eigenvalue λ ≤ 2√d − 1. Random d-regular graphs were shown to have a second largest eigenvalue λ of 2√d − 1 + o(1) by Friedman [4], thus being almost Ramanujan. Erdős-Rényi graphs with average degree d at least logarithmic (d = Ω(log n)) were shown by Feige and Ofek [5] to have a second eigenvalue of O(√d), a slightly weaker version of the Ramanujan property. However this spectrum separation property fails for sparse (d = O(1)) Erdős-Rényi graphs, whose spectrum is dominated by the presence of high-degree nodes. Our result thus shows that by constructing matrix B through neighborhood expansion, we regularize the original adjacency matrix to eventually recover a weak form of the Ramanujan property. 3 1 0 2 v o N 3 1 ] I S . s c [ 1 v 5 8 0 3 . 1 1 3 1 : v i X r a 1 Introduction 1.1 Background Community detection, like clustering, aims to identify groups of similar items from a global popu- lation. It is a useful primitive for performing recommendation, e.g. of contents or contacts to users of online social networks. The stochastic block model has been introduced by Holland et al. [6] to represent interactions between individuals. It consists of a random graph on n nodes, each node i ∈ N = {1, . . . , n} being assigned a type σi from some fixed set Σ. Conditionally on node types, edge (i, j ) is present with probability p(σi , σj ) independently of other edges, for some matrix of probabilities (p(σ, σ ′ )). It constitutes an adequate testbed for community detection. Indeed the performance of candidate detection schemes, captured by the fraction of nodes i for which estimated types σi and true types σi coincide, can be compared and analysed on instances of the stochastic block model. Such analyses can in turn suggest new schemes. Recently Decelle et al. [1] conjectured the existence of a phase transition in the sparse regime where the graph’s average degree is O(1). Specifically, they predicted that for parameters below a certain threshold, no estimates σi of node types existed that would be positively correlated with true types σi , while above the threshold, belief propagation algorithms could determine estimates σi achieving such a positive correlation. Their conjecture is formulated on a simple symmetric instance of the stochastic block model featuring two node types {+1, −1}. The phenomenon appears more general though: Heimlicher et al. [7] extended the conjecture to the more general setup of labeled stochastic block models. The study of this phenomenon is important for two reasons. First, by localizing precisely the transition point below which no useful signal is present in the observations, one thus characterizes how much subsampling of the original graph can be performed before all information is lost. Second, algorithms leading to estimates σi that achieve positive correlation all the way down to the transition are expected to constitute more robust approaches than alternatives which would fail before the transition. It is therefore important to determine such algorithms. The negative part of the conjecture has been proven by Mossel, Neeman and Sly [2]. Essentially they established that existence of estimates σi positively correlated with true types σi would imply feasibility of a reconstruction problem on a random tree model describing the local statistics of the original random graph. However by results of Evans et al. [8] such reconstruction is infeasible below the conjectured transition point. Until now, positive results in the sparse case did not apply down to the transition point. The best results to date (see [2]) relied on Co ja-Oghlan [3], showing that spectral clustering applied to the adjacency matrix, suitably trimmed by removal of high degree nodes, yields positively correlated estimates. However this does not apply down to the conjectured threshold. This limitation stems from the following fact. Spectral methods perform well on matrices en- joying a spectral separation property, namely the spectrum should comprise a few large eigenvalues whose associated eigenvectors reflect the sought structure and all other eigenvalues should be neg- ligible. The prototype of such separation is the Ramanujan property, according to which d-regular graphs have the second eigenvalue λ no larger than 2√d − 1 in absolute value. Friedman [4] es- tablished that random d-regular graphs almost satisfy this, in that for them λ ≤ 2√d − 1 + o(1). Erdős-Rényi graphs with average degree d are such that λ ≤ O(√d), provided d = Ω(log n) (see Feige and Ofek [5]), but such Ramanujan-like separation is lost for smaller d. This lack of separation inherently limits the power of spectral methods in the sparse case. 1 1.2 Main results We focus on the stochastic block model in Decelle et al. [1]. The graph is denoted G , node types (or spins) σi are uniformly and i.i.d. drawn from {−1, +1}. An edge is present between any two nodes i,j with probability a/n if σi = σj , and b/n if σi = −σj , constants a and b being the model parameters. The conjectured transition point is specified by quantity τ = (a − b)2 /[2(a + b)]: for τ < 1 it is known that positively correlated detection is impossible; we set out to prove that it is feasible for τ > 1. We shall make use of the notations α := (a + b)/2, β := (a − b)/2. The detectability condition τ > 1 can be restated as β 2 > α. (1) As mentioned, Co ja-Oghlan regularizes the adjacency matrix of the random graph by removing high degree nodes before applying spectral clustering. In contrast, we regularize the initial data through path expansion. Namely, we do not work directly with the adjacency matrix of the orginal graph. Instead we form matrix B (ℓ) , where B (ℓ) ij counts the number of self-avoiding paths of graph edges of length ℓ connecting i to j . Our main result is then the following ov(σ, σ ) := Theorem 1.1. Assume Condition (1) holds. Set the path length parameter ℓ such that ℓ ∼ c log(n) for a constant c such that c log(α) < 1/4. Let x be a normed eigenvector corresponding to the second largest eigenvalue of B (ℓ) . There exists t such that, defining the spin estimates σi as σi = (cid:26) +1 if xi√n ≥ t, −1 otherwise, the empirical overlap between the true and estimated spins defined as 1 n Xi∈N converges in probability to the set {−r, +r} for some strictly positive constant r > 0 as n → ∞. It proves the positive part of Decelle et al.’s conjecture. It further identifies a specific spectral method based on the path-expanded matrix B (ℓ) . An auxiliary result consists in showing that matrix B (ℓ) enjoys a spectral separation property, that is a weak version of the Ramanujan property. Namely, denoting by ρ(B (ℓ) ) the spectral radius of B (ℓ) , we show that the third largest eigenvalue λ of matrix B (ℓ) satisfies for all positive constant ǫ: λ ≤ nǫqρ(B (ℓ) ). We note that computation of B (ℓ) and hence of the σi can be done in polynomial time: as shown in Lemma 4.2 the ℓ-neighborhood of any i contains at most one cycle so that each B (ℓ) is readily ij evaluated by suitable breadth-first search. σi σi (2) (3) 1.3 Paper organization Section 2 contains the intermediate results involved in the proof and how they combine to establish Theorem 1.1. Section 3 proves Theorem 2.2, which expresses matrix B (ℓ) as an expansion in terms 2 of the matrices B (m) , m < ℓ, together with bounds on the spectral norm of the matrix coefficients involved. Section 4 contains the so-called “local analysis” of node neighborhoods. Specifically it gives controls on the vectors B (m) e and B (m)σ , where e is the all-ones vector and σ is the vector of spins, establishing a quasi-deterministic growth pattern with respect to m. Section 5 concludes. 2 Proof structure Our key ob jective is to determine the spectral structure of B (ℓ) . Specifically we wish to establish Theorem 2.1. Assume (1) and ℓ = c log n with c log(α) < 1/4. (i) The leading eigenvalue of B (ℓ) is up to logarithmic factors Θ(αℓ ), with corresponding eigen- vector asymptotical ly paral lel to B (ℓ) e. (ii) Its second eigenvalue is Ω(β ℓ ) up to logarithmic factors, with corresponding eigenvector asymptotical ly paral lel to B (ℓ)σ . (iii) There is a random variable X with unit mean and variance 1/(β 2 /α − 1) such that for al l x that is an atom of neither X ’s nor −X ’s distribution, the fol lowing convergence in probability holds for any normed vector y asymptotical ly aligned with B (ℓ)σ : n pnE(X 2 ) ) → 1 (yi ≥ 1 x 1 Xi=1 [P(X ≥ x) − P(−X ≥ x)] . 2 n (iv) For any ǫ > 0, al l other eigenvalues are of order nǫ√αℓ . Before we describe the steps used to establish this, let us verify how it implies Theorem 1.1. Note that since E(X ) = 1, writing E(X ) = Z ∞ (P(X ≥ x) − P(−X ≥ x)) dx, 0 we see that inequality P(X ≥ x) − P(−X ≥ x) > 0 must hold on a set of x’s of positive Lebesgue measure. Since the points x at which the distribution of either X or −X has an atom is at most countable, there thus exists an x at which neither distribution has an atom, and the desired inequality P(X ≥ x)−P(−X ≥ x) > 0 holds. Letting t = x/pE(X 2 ) and r = P(X ≥ x)−P(−X ≥ x) we readily have by (4) that the empirical overlap in (3) must converge to {−r, +r}. Theorem 2.1 will follow from the combination of two analyses. Let ¯A denote the expectation of the graph’s adjacency matrix conditional on the spin vector σ , that is (ee′ + σσ ′ ) − I (cid:21) + n (cid:20) 1 a 2 The first analysis establishes the following (ee′ − σσ ′ ). b 2n ¯A = (4) (5) Theorem 2.2. Matrix B (ℓ) verifies the identity B (ℓ) = ∆(ℓ) + ℓ ℓ Xm=1 Xm=1 for matrices ∆(ℓ) , Γℓ,m such that for ℓ = O(log n) and any fixed ǫ > 0, with high probability ρ(∆(ℓ) ) ≤ nǫαℓ/2 , ρ(Γℓ,m ) ≤ nǫ−1α(ℓ+m)/2 , m = 1, . . . , ℓ. (∆(ℓ−m) ¯AB (m−1) ) − Γℓ,m , (6) (7) (8) 3 A local analysis is then needed to establish properties of the ℓ-neighborhoods of nodes in graph G . The key quantities in this analysis are the following St (i) = {j : dG (i, j ) = t}, Dt (i) = Pj dG (i,j )=tσj . 1 They are close (in a sense made precise in Section 4) to the corresponding quantities (B (t) e)i , (B (t)σ)i , and are easier to analyze. In particular, they enjoy a quasi-deterministic growth property: Theorem 2.3. Under Condition (1) for some suitable constants C and ǫ, with probability 1−O(n−ǫ) the fol lowing holds for al l i ∈ N and ℓ = O(log n): ≤ C log(n)αt , t = 1, . . . , ℓ, St (i) Dt (i) ≤ C log(n)β t , t = 1, . . . , ℓ. St (i) = αt−ℓSℓ (i) + O(log(n) + plog(n)αt ), t = 1, . . . , ℓ, Dt (i) = β t−ℓDℓ (i) + O(log(n) + plog(n)αt ), t = 1, . . . , ℓ. This, combined with Theorem 2.2, yields the key intermediate step: Theorem 2.4. Let ℓ = c log(n), where constant c is such that c log(α) < 1/4. Under Condition (1) the matrix B (ℓ) counting simple paths satisfies the fol lowing weak Ramanujan property x=1,x′B (ℓ) e=x′B (ℓ) σ=0 B (ℓ)x ≤ nǫαℓ/2 . sup Another key ingredient consists in coupling the neighborhoods of nodes in graph G with a random tree process, and performing a martingale analysis of this tree process. This is done in Section 4.3. It establishes (see Theorem 4.2) that the vector (β−ℓDℓ (i)) is close in some sense to a vector (σiDi ) where the Di are i.i.d., distributed as the limit of a martingale. This limiting martingale distribution is precisely that of variable X in the statement of Theorem 2.1. (11) (10) (9) (12) 3 Matrix expansion and spectral radii bounds Our aim in this section is to establish Theorem 2.2. Denoting ξij the indicator of edge (i, j )’s presence in G we can write ℓ B (ℓ) ij = Xi0 ,i1 ,...,iℓ∈N Yt=1 Denote by Pij the set of all so-called self-avoiding, or simple paths iℓ 0 := {i0 , . . . , iℓ } from i to j appearing in the above sum. Let 1i0=i1iℓ=j 1{i0 ,...,iℓ }=ℓ+1 ξit−1 it . (13) ℓ (A − ¯A)it−1 it := Xiℓ Yt=1 0∈Pij where ¯A is as in (5). We then have the expansion: ∆(ℓ) ij (14) ∆(ℓ) ij = B (ℓ) ij − ℓ Xm=1 Xiℓ 0∈Pij ℓ−m (A − ¯A)it−1 it Yt=1 ¯Aiℓ−m iℓ−m+1 ℓ Yt=ℓ−m+2 Ait−1 it . (15) 4 ij of paths iℓ Introduce the set Qm 0 defined by: 0 ∈ Qm iℓ ij ⇔ i0 = i & iℓ = j & {i0 , . . . , iℓ−m } = ℓ − m + 1 & {iℓ−m+1 , . . . , iℓ} = m. ij are thus concatenations of simple paths iℓ−m Paths in Qm and iℓ ℓ−m+1 . Note that Pij ⊂ Qm ij . Let 0 0 such that both iℓ−m Rm ij denote the set difference Qm and iℓ ij \ Pij . It then consists of paths iℓ ℓ−m+1 0 are simple, and further verify that the intersection of the corresponding sets is not empty. Define matrix Γℓ,m as Γℓ,m ij ¯Aiℓ−m iℓ−m+1 ℓ Yt=ℓ−m+2 ℓ−m (A − ¯A)it−1 it := Xiℓ Yt=1 0∈Rm ij With these notations at hand, one obtains from (15): ∆(ℓ) ij = B (ℓ) ij Qℓ−m ij − Pℓ ¯Aiℓ−m iℓ−m+1 Qℓ t=1 (A − ¯A)it−1 it m=1 Piℓ t=ℓ−m+2 Ait−1 it 0∈Qm ij Qℓ−m ¯Aiℓ−m iℓ−m+1 Qℓ + Pℓ t=1 (A − ¯A)it−1 it m=1 Piℓ t=ℓ−m+2 Ait−1 it 0∈Rm = B (ℓ) m=1 Γℓ,m m=1 (∆(ℓ−m) ¯AB (m−1) )ij + Pℓ ij − Pℓ , ij where we noticed that the summation over paths in Qm ij of the corresponding products yields the (ij )-entry of the product matrix ∆(ℓ−m) ¯AB (m−1) . This is precisely expansion (6). We then have the following Ait−1 it . (16) (17) Proposition 3.1. For al l integers k , ℓ ≥ 1, it holds that kℓ+1 kℓ (cid:21)e−v+1 n (cid:17)v−1 (cid:20) max(a, b) nv [(v + 1)2 (ℓ + 1)]2k(1+e−v+1) (cid:16) α E hρ(∆(ℓ) )2k i ≤ Xv=ℓ+1 Xe=v−1 n The proof uses the trace method, bounding ρ(∆(ℓ) )2k by the trace of (∆(ℓ) )2k and a specific encoding of circuits involved in this trace computation. The fact that circuits consist in concate- nations of simple paths of length ℓ is then leveraged to control which codes of circuits have to be considered in the trace bound. The details are provided in the Appendix. Inequality (7) readily follows from Proposition 3.1. Indeed for ℓ = O(log(n)) and fixed ǫ > 0, choose an integer k > 0 such that ǫ > 1/(2k). By (18), it holds that (18) · Thus E(ρ(∆(ℓ) )2k ) ≤ (1 + o(1))nαkℓ [(kℓ + 2)2 (ℓ + 1)]2k . P(ρ ≥ nǫαℓ/2 ) ≤ E(ρ2k ) n2kǫαkℓ ≤ (1 + o(1) nαkℓ [(kℓ+2)2 (ℓ+1)]2k n2kǫαkℓ ≤ (1 − o(1))n1−2kǫ [(kℓ + 2)2 (ℓ + 1)]2k = o(1), since we chose k so that 2kǫ > 1 and the last term is polylogarithmic in n. This establishes (7). We now establish a bound on the spectral radius of the matrix Γℓ,m previously introduced. Specifically, we have 5 E((ρ(Γℓ,m )2k ) ≤ Proposition 3.2. For al l k , ℓ ≥ 1 and m ∈ {1, . . . , ℓ} we have the fol lowing k(ℓ+m) 1+k(ℓ+m) n (cid:19)2k+e−v+1 Xe=v−1 (cid:18) a ∨ b v2k [(v + 1)2 (ℓ + 1)]4k(1+e−v+1) nv (cid:16) α n (cid:17)v−1 Xv=m∨(ℓ−m+1) (19) The proof, postponed to the appendix, again uses the trace method, a specific encoding of circuits involved in the trace bound, and then leverages the constraints on circuits appearing in this bound. It readily implies inequality (8). Indeed for ℓ = O(log(n)), and any fixed ǫ > 0, choose k > 0 such that ǫ > 1/(2k). By (19) it holds that E(ρ(Γℓ,m )2k ) ≤ (1 + o(1))nαk(ℓ+m) (cid:20) a ∨ b n P(ρ ≥ nǫ−1α(ℓ+m)/2 ) ≤ E(ρ(Γℓ,m )2k ) n2k(ǫ−1)αk(ℓ+m) ≤ (1 + o(1))n1−2kǫ (cid:2)(a ∨ b)(k(ℓ + m) + 2)5 (ℓ + 1)2 (cid:3)2k , and this last bound decays to zero as a power of n by the condition 2kǫ > 1 and the fact that the last term in the product is polylogarithmic in n. This completes the proof of Theorem 2.2. (k(ℓ + m) + 2)5 (ℓ + 1)2(cid:21)2k Thus . . 4 Local Analysis: structure of expanded neighborhoods This section is devoted to the structure of the local neighborhoods of nodes. We start with general bounds. We then relate vectors of interest B (ℓ) e and B (ℓ)σ to the neighborhood structures. The martingale analysis of neighborhood structures follows. 4.1 Preliminaries For any k ≥ 0, the number of nodes with spin ± at distance k (respectively ≤ k) of node i is k (i) (respectively, U ± denoted U ± ≤k (i)). We thus have (20) t (i) − U − t (i) + U − t (i), Dt (i) = U + St (i) = U + t (i). We shall omit indices i when considering quantities related to a fixed node i. In the remainder of the section we condition on the spins σ of all nodes. We denote n± as the number of nodes with spin ±. t , U − For fixed i ∈ N it is readily seen that, conditionally on Fk−1 := σ(U + t , t ≤ k − 1), we have: ≤k−1 , 1 − (1 − a/n)U + k−1 (1 − b/n)U − k−1 (cid:17) , k ∼ Bin (cid:16)n+ − U + U + k−1 (1 − b/n)U + ≤k−1 , 1 − (1 − a/n)U − k−1 (cid:17) . k ∼ Bin (cid:16)n− − U − U − Theorem (2.3) is established based on these characterizations by extensive use of Chernoff bounds for binomial variables. Its proof is deferred to the Appendix. The next technical result establishes approximate independence of neighborhoods of distinct It is instrumental in Section 4.3 e.g. in establishing weak laws of large numbers on the nodes. fraction of nodes satisfying a given property. (21) 6 Lemma 4.1. Consider any two fixed nodes i, j with i 6= j . Let ℓ = c log(n) where constant c is such that c log(α) < 1/2. Then the variation distance between the joint law of their neighborhood processes L((U ± k (i))k≤ℓ , (U ± k (j ))k≤ℓ ) and the law with the same marginals and independence between them, denoted L((U ± k (i))k≤ℓ ) ⊗ L((U ± k (j ))k≤ℓ ), goes to zero as a negative power of n as n → ∞. k (i))k≤ℓ ) and (U ± Proof. Take two independent realizations of the processes (U ± k (j ))k≤ℓ ). Use them to perform a joint construction of the two processes as follows. Having constructed the sets U ± t (i) ⊂ N , U ± t (j ) ⊂ N for t = 1, . . . , k − 1 and assuming the i-sets and the j -sets have not yet met, we construct them at step k as follows. To construct U ± k (i) we select a size U ± k (i) subset uniformly at random from N ± \U ± ≤k−1 (i). We do similarly for j . The construction can proceed based on the independent inputs so long as the resulting i-sets and j -sets do not intersect. However on ∩t≤k {St (i)∨St (j ) ≤ C log(n)}, the expected size of the intersection will be upper-bounded by O(log2 (n)α2k /n) = O(log2 (n)n−2ǫ , where c log(α) = 1/2 − ǫ. The controls in the proof of Theorem 2.3 ensure that the probability of ∩t≤k {St (i) ∨ St (j ) ≤ C log(n)} is 1 − O(n−ǫ) and the result follows. We now state a lemma on the presence of cycles in the ℓ-neighborhoods of nodes. It will be instrumental in bounding the discrepancy between vectors B (ℓ) e (resp. B (ℓ)σ) and {Sℓ (i)} (resp. {Dℓ (i)}). Its proof, deferred to the Appendix, relies on the previous coupling Lemma 4.1. Lemma 4.2. Assume ℓ = c log(n) with c log(α) < 1/2. Then with high probability the number of nodes i whose ℓ-neighborhood contains one cycle is O(log4 (n)α2ℓ ). Assume further that c log(α) < 1/4. Then with high probability no node i has more than one cycle-edge in its ℓ-neighborhood. 4.2 From neighborhood variables St and Dt to path matrix B (ℓ) We first state how to transport the deterministic growth controls (11) of Theorem 2.3 to vectors B (m−1) e and B (m−1) σ , a key step in the proof of Theorem 2.4. One has the following Lemma 4.3. Let B denote the set of nodes i whose ℓ-neighborhood contains a cycle. Then for m ≤ ℓ, ℓ = c log n with c log α < 1/4: : i /∈ B ⇒ (cid:26) (B (m−1) e)i = Sm−1 (i) = αm−1−ℓ (B (ℓ) e)i + O(log(n)) + O(plog(n)αm−1 ), (B (m−1)σ)i = Dm−1 (i) = βm−1−ℓ (B (ℓ)σ)i + O(log(n)) + O(plog(n)αm−1 ), m Xt=0 Si (t) = O(log(n)αm ). i ∈ B ⇒ (B (m) σ)i ≤ (B (m) e)i ≤ 2 Proof is in the Appendix, together with that of the following Corollary: (22) (23) Corollary 4.1. For al l m ∈ {1, . . . , ℓ} it holds with high probability that x=1,x′B (ℓ) e=x′B (ℓ) σ=0 e′B (m−1)x = O (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17) , sup x=1,x′B (ℓ) e=x′B (ℓ) σ=0 σ ′B (m−1)x = O (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17) . sup We are now ready to prove Theorem 2.4: (24) (25) 7 ρ(Γℓ,m ). Proof. (of Theorem 2.4). Using identity (6), write for unit norm x: ℓ ℓ Xm=1 Xm=1 ρ(∆(ℓ−m) ) ¯AB (m−1)x + B (ℓ)x ≤ ρ(∆(ℓ) ) + We can ignore the terms ρ(∆(ℓ) ) and ρ(Γℓ,m ), known to be less than nǫαℓ/2 from (7) and (8). Recalling the expression (5) of ¯A, one has: a ¯AB (m−1)x ≤ n B (m−1) x + O(n−1/2 [σ ′B (m−1)x + e′B (m−1)x]). Using the bounds (24,25), the right-hand side is no larger than n B (m−1) x + O (cid:16)n−1/2 (cid:16)log3 (n)αℓ+m−1 + √n[log(n) + plog(n)αm−1 ](cid:17)(cid:17) . a By the previous inequalities (10,22,23) and the row sum bound, we have that ρ(B (m−1) ) = O(log(n)αm−1 ). This thus yields + log3 (n)αℓ+m−1 ¯AB (m−1)x ≤ O (cid:16) log(n)αm−1 n n1/2 = O(log(n) + plog(n)αm−1 ). We thus have B (ℓ)x ≤ nǫαℓ/2 + Pℓ m=1 ρ(∆(ℓ−m) )O(log(n) + plog(n)αm−1 ) ≤ nǫαℓ/2 + Pℓ m=1 nǫα(ℓ−m)/2O(log(n) + plog(n)αm−1 ) ≤ nǫαℓ/2O(1 + 2ℓ log(n)). The result readily follows. + log(n) + plog(n)αm−1 (cid:17) We now state two Lemmas which will allow to establish Theorem 4.1. (26) Lemma 4.4. The fol lowing evaluations hold whp for ℓ = c log n with c log α < 1/4: B (ℓ) e − {Sℓ (i)}i∈N = o (cid:0)B (ℓ) e(cid:1) , B (ℓ)σ − {Dℓ (i)}i∈N = o (cid:0)B (ℓ)σ (cid:1) , < B (ℓ)e, B (ℓ)σ > = o (cid:0)B (ℓ) e × B (ℓ)σ (cid:1) Lemma 4.5. The fol lowing inequalities hold for ℓ = c log n with c log α < 1/4: Ω(αℓ )B (ℓ) e ≤ B (ℓ)B (ℓ)e ≤ O(log2 nαℓ )B (ℓ) e Ω(β ℓ )B (ℓ)σ ≤ B (ℓ)B (ℓ)σ ≤ O(log4 (n)β ℓ )B (ℓ)σ . Using these, we now establish the following Theorem 4.1. For ℓ = c log n with c log α < 1/4, the two leading eigenvectors of B (ℓ) are asymptoti- cal ly aligned with vectors {Sℓ (i)}, {Dℓ (i)}, with corresponding eigenvalues of order up to logarithmic terms Θ(αℓ ) and Ω(β ℓ ). Al l other eigenvalues are O(nǫ√αℓ ) for any fixed ǫ > 0. Proof. Estimates (27–28) and the weak Ramanujan property of Theorem 2.4 imply that the leading eigenvector is aligned with B (ℓ) e and has eigenvalue αℓ up to logarithmic terms. The second eigen- vector is necessarily asymptotically in the span of {B (ℓ) e, B (ℓ)σ} and with eigenvalue Ω(β ℓ ). By asymptotic orthonormality of vectors B (ℓ) e and B (ℓ)σ and their asymptotic alignment with {Sℓ (i)}, {Dℓ (i)} respectively, the conclusion regarding the first two eigen-elements follows. The bound on the magnitude of other eigenvalues follows from Theorem 2.4 and the Courant-Fisher theorem. (27) (28) 8 4.3 Coupling with Poisson tree growth process Introduce the stochastic process {V ± t }t≥0 defined by 0 = 1, V − V + 0 = 0, , V − V + independent conditionally on Gt−1 , t t L(V ± Gt−1 ) = Poi((a/2)V ± t−1 + (b/2)V ∓ t−1 ) t where Gt−1 = σ(V ±k , k ≤ t − 1). We then have the following Lemma 4.6. Let i ∈ N be fixed with spin σi = σ . For a constant c > 0 such that c log(α) < 1/2, t (i))t≤ℓ and (V ±σ and ℓ = c log(n), the fol lowing holds. The variation distance between (U ± )t≤ℓ goes t to zero as a negative power of n as n → ∞. The proof given in the Appendix relies on the Stein-Chen method for Poisson approximation. Define now the processes (29) t + V − Mt = α−t (V + t ), t − V − ∆t = β−t (V + t ), is as defined in (29). We then have the following where V ± t Lemma 4.7. The two processes {Mt }, {∆t } are Gt -martingales. Process {Mt } is uniformly inte- grable under Condition α > 1. Under Condition β 2 > α, process {∆t } is also uniformly integrable. Corollary 4.2. Under α < β 2 the martingale {∆t} converges almost surely to a unit mean random variable ∆∞ . Moreover this random variable has a finite variance 1/(β 2 /α− 1) to which the variance t − ∆2 of ∆t converges. It further holds that E∆2 ∞ → 0 as t → ∞. Together these properties allow to establish the following (30) (31) (32) (33) Theorem 4.2. One has the fol lowing convergence in probability lim n→∞ 1 n β−2ℓD2 ℓ (i) = E(∆2 ∞). n Xi=1 For al l τ ∈ R that is a point of continuity of the distribution of both ∆∞ and −∆∞ , one has the fol lowing convergence in probability for both signs ± 1 yi≥τ /√nE(∆2 n Xi∈N :σi=± ∞ ) = 1 Let y ∈ Rn be the normed vector defined as Dℓ (i) qPn j=1 Dℓ (j )2 Let x be a vector in Rn such that we have the convergence in probability P(±∆∞ ≥ τ ). , i = 1, . . . , n. lim n→∞ yi = 1 2 n→∞ x − y = 0. lim (34) 9 Define the spin estimates σi = (cid:26) + if xi ≥ t/pnE(∆2 ∞), − otherwise. For each t that is an atom of neither ∆∞ ’s or −∆∞ ’s distribution, the fol lowing convergence in probability holds n 1 1 Xi=1 n 2 To convey the main ideas of the proof (deferred to the Appendix), we now indicate how to establish a property similar to (32), namely for a continuous bounded function g we establish convergence in probability (P(∆∞ ≥ t) − P(−∆∞ ≥ t)) . lim n→∞ σi σi = (35) (36) 1 2 (37) Eg(±∆∞ ). g(β−ℓDℓ (i)) → 1 n Xi∈N ”′ σi=± The expectation of the sum in the left-hand side reads n± n hEg(±∆ℓ )1coupling + O(g ∞ )(1 − P(coupling))i where the event {coupling} refers to coupling as in Lemma 4.6. By this Lemma, the martingale convergence property of ∆ℓ , the fact that n±/n → 1/2 and continuity of g , this expectation converges to (1/2)Eg(±∆∞ ). Now the expectation of the square of the empirical average in (37) reads ∞ ) + 2(cid:18)n± n2 (cid:20)n±O(g 2 2 (cid:19)Eg(β−ℓDℓ (i))g(β−ℓDℓ (j ))(cid:21) 1 where i 6= j are two fixed nodes with spin ±. By the coupling lemma 4.1 it holds that Eg(β−ℓDℓ (i))g(β−ℓDℓ (j )) = (cid:16)Eg(β−ℓDℓ (i))(cid:17)2 + O(n−ǫ)g 2 ∞ . It follows that the variance of the empirical average in (37) goes to zero as n → ∞. Its announced convergence in probability to (1/2)Eg(±∆∞ ) then follows by Tchebitchev’s inequality. Theorems 4.1 and 4.2 readily imply Theorem 2.1. 5 Conclusions The methods developed here may find further applications, e.g. to prove the more general conjecture by Heimlicher et al. [7] of a phase transition in the labeled stochastic block model. More generally one might ask what is the range of applicability of our path expansion approach to “fix” spectral methods by recovering Ramanujan-like spectral separation properties. It is likely that a similar regularization would occur by considering matrix B defined by Bij = 1dG (,ij )=ℓ but we have not been able to prove this yet. acknowledgements: The author gratefully acknowledges stimulating discussions on the topic with Marc Lelarge and Charles Bordenave. 10 References [1] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborova, “Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applications,” Physics Review E, vol. 84:066106, 2011. [2] E. Mossel, J. Neeman, and A. Sly, “Stochastic block models and reconstruction,” Feb. 2012, available at: http://arxiv.org/abs/1202.1499. partitioning “Graph [3] A. Co ja-oghlan, Probab. Comput., 19, no. 2, vol. http://dx.doi.org/10.1017/S0963548309990514 via pp. adaptive 227–284, spectral 2010. techniques,” Comb. [Online]. Available: [4] J. Friedman, “A proof of alon’s second eigenvalue conjecture and related problem,” Mem. Amer. Math. Soc., no. 910., 2008. “Spectral techniques applied to sparse random graphs,” Random [5] U. Feige and E. Ofek, Struct. Algorithms, [Online]. Available: Sept. 2005. no. 2, pp. 251–275, vol. 27, http://dx.doi.org/10.1002/rsa.v27:2 [6] S. L. Paul W. Holland, Kathryn Blackmond Laskey, “Stochastic blockmodels: First steps,” Social Networks, vol. 5, no. 2, pp. 109–137, 1983. [7] S. Heimlicher, M. Lelarge, and L. Massoulié, “Community detection in the labelled stochastic block model,” Nov. 2012, avaiable at: http://arxiv.org/abs/1209.2910. [8] W. Evans, C. Kenyon, Y. Peres, and L. Schulman, “Broadcasting on trees and the ising model,” pp. 410–433, 2000. [9] D. Williams, Probability with martingales. Cambridge University Press, 1991. 11 A Proof of Proposition 3.1 Proof. We control the spectral radius of ∆(ℓ) using the trace method. Specifically chose k > 0. It holds that (38) E(ρ(∆(ℓ) )2k ) ≤ ETr(∆(ℓ) )2k ). Note that Tr(∆(ℓ) )2k ) is the sum over circuits of length 2k of the products of the entries ∆(ℓ) e over the edges e in the circuit. Moreover, given the definition of ∆(ℓ) , these correspond to products of entries Ae − ¯Ae over edges e of circuits of length 2kℓ satisfying the property that consecutive length ℓ-paths are simple. We bound the expectation of the corresponding sum as follows. Let v (respectively, e) be the number of nodes (respectively, edges) traversed by a particular circuit. The quantity c = e − v + 1 is the so-called “tree excess”, counting the number of edges that are traversed while not being part of the tree consisting of edges whose first traversal strictly augments the number of spanned nodes. We represent the corresponding circuit as follows. We number nodes by the order in which they are met by the circuit, starting with node 1. We break each length ℓ-simple path into consecutive sequences consisting of • a path using only edges already used in the circuit, and lying on the tree of new node discoveries • a path of discoveries of new nodes • a cycle edge connecting the end of the two previous steps to a node already spanned. Such a cycle edge may have already been traversed by the circuit one or several times. Given the tree previously spanned, and the current position on it, the first part of the sequence is characterized by the node label of its end: indeed, since on this subsequence we enforce the condition that the paths are simple, back-tracking is forbidden. Hence there is only one path on the tree going from the origin to the destination. We thus represent the first part by the number of the destination node if this part is non-empty, and by zero otherwise. The second part of the sequence is simply represented by its length, which is constrained to lie in {0, . . . , ℓ}. Indeed, it cannot exceed ℓ, as we consider sequences that lie within a length ℓ-simple path. Finally, the third part of the sequence is simply characterized by the number characterizing its end point, and by zero if this part is not present. We must allow for this case, as when we break up a length ℓ-simple path into constituting such sequences, the last such sequence may not end up by traversal of such a redundant edge. Let us now use this representation to bound the number of corresponding sequences. An in- dividual sequence is represented by a triplet (p, q , r) with p ∈ {0, . . . , v}, q ∈ {0, . . . , ℓ}, and r ∈ {0, . . . , v}. Note further that each such sequence corresponds to either the end of an indi- vidual length ℓ-simple path, or the traversal of a redundant edge. The number of such edges is c = e − v + 1, and each edge can be traversed at most 2k times by the constraint that circuits are formed from length ℓ simple paths. Thus the number of valid circuits corresponding to v and e is at most [(v + 1)2 (ℓ + 1)]2k(1+e−v+1) . For a given number of nodes v and edges e, the number of corresponding nodes in {1, . . . , n} is upper-bounded by nv . For a given edge present with multiplicity m ∈ {1, . . . , 2k}, the corresponding 12 expectation is zero if m = 1, and for m ≥ 2, we have a(σi , σj ) E((ξij − E(ξij σ))m σ) ≤ · n Here a(σi , σj ) equals a if σi = σj and b otherwise. For the cyclic edges we use the upper bound max(a, b)/n. There are e− v + 1 such factors. We are left with a tree with v − 1 edges, for which upon averaging over σ we get a contribution (α/n)v−1 . Now the number of nodes v on any configuration whose contribution in expectation does not vanish must lie between ℓ + 1 and kℓ + 1: indeed each node discovery costs one edge, but this edge must be doubled for the contribution not to vanish. Since there are in total 2kℓ edges, at most kℓ nodes can be discovered in addition to the original node of the circuit. The number of distinct edges is similarly bounded by kℓ in any configuration with non-vanishing expectation. This gives the bound kℓ kℓ+1 n (cid:19)e−v+1 n (cid:17)v−1 (cid:18) a ∨ b [(v + 1)2 (ℓ + 1)]2k(1+e−v+1) nv (cid:16) α Xe=v−1 Xv=ℓ+1 E(ρ(∆(ℓ) )2k ) ≤ as announced. B Proof of Proposition 3.2 Proof. By the trace method again, we have that ρ(Γℓ,m )2k is upper-bounded by the trace of [Γℓ,m (Γℓ,m )′ ]k . The latter corresponds to sum over circuits of length 2ℓk of products of terms that can be either Ae − ¯Ae , ¯Ae or Ae . The constraints are that a length ℓ chunk of the circuit is the concatenation of two simple paths of length m − 1 and ℓ − m, and that the two of them have a non-empty intersection. We represent such contributions as follows. We let v denote the number of nodes traversed by the circuit, and by e the number of edges traversed by the circuit, while ignoring edges that are weighed by an ¯A-term. Note that by the constraint that the concatenated simple parts of each length ℓ-chunk intersect, the corresponding graph is necessarily connected. We adopt the following representation of the corresponding circuits. Nodes are again denoted by the order in which they are first met, starting with node 1. We represent each simple path that constitutes the circuit by sequences of three phases as before. Note that there are now 4k such simple paths: each length ℓ chunk of the original circuit is broken into an m − 1- and an ℓ − m-path. We adopt the same representation as before, except that we must now also incorporate the label of the starting point after traversal of an ¯A-edge. Thus we have the upper bound on the number of valid circuit labels with v nodes and e edges: v2k [(v + 1)2 (ℓ + 1)]4k(1+e−v+1) . Let us bound the values that v and e can take. Necessarily, v ≥ max(m, ℓ − m + 1): indeed, each length ℓ chunk comprises simple paths of length m − 1 and ℓ − m. Moreover, there are overall 2k(ℓ − 1) edges (recall that we discount the ¯A-edges). Out of these, 2k(ℓ − m) must be doubled for the expectation not to vanish. There are thus at most 1 + k(ℓ + m) nodes v in total, and at most k(ℓ + m) distinct edges in total. We thus obtain the upper bound k(ℓ+m) n (cid:19)2k Xe=v−1 (cid:18) a ∨ b n (cid:19)e−v+1 n (cid:17)v−1 (cid:18) a ∨ b v2k [(v+1)2 (ℓ+1)]4k(1+e−v+1) nv (cid:16) α 13 E[(ρ(Γℓ,m )2k ] ≤ 1+k(ℓ+m) Xv=m∨(ℓ−m+1) . C Proof of Theorem 2.3 The following inequality is easily verified to hold for any non-negative U , V , a, b, n such that a/n, b/n ≤ 1, and will be instrumental in the sequel: (cid:19)2 2 (cid:18) aU + bV aU + bV 1 ≤ 1 − (1 − a/n)U (1 − b/n)V ≤ − n n Next lemma is the key ingredient to establish Theorem 2.3. aU + bV n . (39) Lemma C.1. The fol lowing properties hold with high probability for al l i ∈ N and al l t ≤ ℓ, with ℓ = C log(n). Let T = inf {t ≤ ℓ : St ≥ K log(n)} for some constant K . Then ST = Θ(log(n)). Let ǫt := ǫα−(t−T )/2 for some constant ǫ > 0. Then for al l t, t′ ∈ {T , . . . , ℓ}, t > t′ , the vector t , U − Ut = (U + t ) verifies the coordinate-wise bounds: Ut ∈ " t (1 − ǫs )M t−t′ +1Ut′ , Ys=t′+1 where M denotes the matrix (a/2 b/2, b/2 a/2). t and U − Proof. Recall that conditionally on Ft−1 the random variables U + t are independent, dis- tributed according to t−1 (cid:17) . t ∼ Bin (cid:16)n± − U ± t−1 (1 − b/n)U ∓ <t , 1 − (1 − a/n)U ± U ± Let T be the first instant t for which Ut ≥ K log(n), for some K to be specified. By definition of T , necessarily UT −1 < K log(n). Thus t (1 + ǫs )M t−t′+1Ut′ # , Ys=t′+1 (40) K log(n) U ± T ≤ Bin(n± , (a ∨ b) n The mean of the Binomial distribution in the right-hand side of the above is equivalent to (a ∨ b)(1/2)K log(n) and less than κ log(n) for κ = (a ∨ b)K . Hence by Chernoff ’s inequality, for h(x) := x log(x) − x + 1, ). T ≤ K ′/2 log(n)FT −1 ) ≤ e−κ log(n)h(K ′ /2κ) . P(U ± Take K ′ so that κh(K ′ /2κ) > 2. The right-hand side of the above is then no larger than n−2 . Thus properties (10) clearly hold for t ≤ T . We now establish that they hold with sufficiently large probability for larger t. Conditional on FT , the binomial distribution of U ± T +1 has mean T (1 − b/n)U ∓ <T +1 ] × [1 − (1 − a/n)U ± [n± − U ± T ]. Using the inequalities (39) we obtain that this mean lies in the interval [(a ∧ b) 1 3 K log(n), (a ∨ b)K ′ log(n)]. 14 For a given ǫ > 0, we can choose K sufficiently large so that (a ∧ b) It follows that U ± T +1 admits a relative deviation from its conditional mean by ǫ with probability at most n−2 . We now define K h(1 + ǫ) > 2. 1 3 ǫt = ǫα−(t−T )/2 , t−1+bU ∓ aU ± and consider the events At := {U ± t−1 }. Conditionally on AT , . . . , At , the t ∈ [1 − ǫt , 1 + ǫt ] 2 t , U − vector Ut = (U + t ) verifies the announced inequality (40). Given that α is the spectral radius of M , it follows from this condition that U ± t ≥ (1 − O(ǫ))αt−T K ′′ log(n). We then check that Chernoff ’s bound applies to show that the condition holds at step t with high enough probability. It suffices to ensure that h(ǫt ) ≥ 2 log(n), U ± t where we take h(u) := min[(1 + u) log(1 + u) − u, (1 − u) log(1 − u) + u). However as we just saw the left-hand side of this expression is lower-bounded by (1 − O(ǫ))αt−T K ′′ log(n)h(ǫt ) ≥ (1 − O(ǫ))αt−T K ′′ log(n)K ′′′ ǫ2 t , where we took a second-order expansion of h around 0. The condition is therefore met as soon as (1 − O(ǫ))K ′′K ′′′ ǫ2 ≥ 2. For K large enough this holds. Proof. (of Theorem 2.3). For t ≤ ℓ, if t ≤ T , we necessarily have that St , Dt = O(log n). Consider then t > T . Note that matrix M is such that 2 (cid:18) αk + β k αk − β k αk − β k αk + β k (cid:19) · 1 Using (40), we readily have for t, t′ ≤ T , with t > t′ : s=t′+1 (1 + ǫs )(1, 1)M t−t′ St ≤ Qt s=t′+1 (1 + ǫs )αt−t′ = Qt St′ . A similar lower bound holds with −ǫs in place of +ǫs . Setting t′ = T in the upper bound, since ST = O(log(n), the upper bound (10) follows for St , as Qt s=T +1(1 + ǫs ) = O(1). Note now that max t t (1 − ǫs)! = O(ǫt′ ) = O(α−t′ /2 ). Ys=t′+1 Ys=t′+1 (1 + ǫs) − 1, 1 − It readily follows that (11) holds for St . Consider now Dt . Using (40) again, we have M k = Ut′ Iterating, we obtain Dt−1 − αǫtSt ≤ Dt ≤ βDt−1 + αǫtSt . Dt − β t−t′ Dt′ ≤ t Xs=t′+1 15 αβ t−s ǫsSs . (41) Since Ss = O(log(n)αs−T ), DT = O(log(N ) and ǫs = O(α−(s−T )/2 ), we obtain for t′ = T : t Xs=T +1 Dt = O(log(n)β t + where we have used the assumption that β 2 > α to bound Pu>0 β−uαu/2 . Property (10) thus holds for Dt . Finally, the right-hand side of (41) is of order t Xs=t′+1 Thus setting t = ℓ, for ℓ > t′ ≥ T we have Dt′ = β t′−ℓDℓ + O(log(n)αt′ /2 ). β t−sα(s−T )/2 log(n) = O(log(n)β t−t′ β t−s log(n)α(s−T )/2 ) = O(log(n)β t ), αt′ /2 ). Since for t′ < T we readily have Dt′ = O(log(n) by definition of T , property (11) follows for Dt . D Proof of Lemma 4.2 Proof. There are two ways for creating cycles within the distance k-neighborhood of i: an edge may be present between two nodes at distance k − 1 of i, or two nodes at distance k − 1 may be connected to the same node at distance k of i. The number of edges of the first type is stochastically dominated by Bin(S 2 k−1 , a ∨ b/n). Its expected number conditionally on Ωk−1(i), defined as Ωk−1 (i) = {Sk−1 (i) ≤ C (log n)αk−1} is at most O(log2 (n)α2ℓ /n). Thus by the union bound the probability that there is such an edge in the ℓ-neighborhood of i is at most: ℓ × O(log2 (n)α2ℓ /n) + (1 − P(Ωk (i))) = O(log3 (n)α2ℓ /n). ℓ Xk=1 As for the second type of cycles, its number is stochastically dominated by Bin(n, (a ∨ b/n)2S 2 k−1 ). On Ωk−1(i) its conditional expectation is O(log2 (n)α2ℓ ). By the same argument, the probability that there are two cycle-edges within the ℓ-neighborhood of i is upper-bounded by O(log6 (n)α4ℓ /n2 ). By the union bound we readily have that with high probability no node has two cycle-edges within its ℓ-neighborhood as soon as log6 (n)α4ℓ ≪ n, which holds for ℓ = c log(n) with c log(α) < 1/4. Let Zi denote the event that the ℓ-neighborhood of i contains a cycle. On the event ∩i∈N ∩k≤ℓ Ωk (i), the ℓ-neighborhoods of an arbitrary pair of distinct nodes i, j are disjoint with probability 1 − O(log2 (n)α2ℓ /n), conditionally upon which the probability that they both have a cycle in their 16 neighborhood is upper-bounded by O(log6 (n)α4ℓ /n2 ). Conditionally on the event that their neigh- borhoods meet, the expectation of the product ZiZj is still upper-bounded by O(log3 (n)α2ℓ /n). Eventually Markov’s inequality yields E(Pi Zi )2 P(Pi Zi ≥ m log3 (n)α2ℓ ) ≤ m2 log6 (n)α4ℓ ≤ nE(Z1 )+n2E(Z1Z2 ) m2 log6 (n)α4ℓ ≤ O(log3 (n)α2ℓ )+n2 [O(log6 (n)α4ℓ /n2 )+(log2 (n)α2ℓ /n)(log3 (n)α2ℓ /n) m2 log6 (n)α4ℓ = O( 1 m2 ). Taking m = log(n) (say), then with high probability Pi Zi = O(log4 (n)α2ℓ ). E Proof of Lemma 4.3 Consider first those indices i /∈ B whose ℓ-neighborhood is a tree. For any k and any m ≤ ℓ, B (m) ik can take values only 0 or 1 (there is at most one simple path connecting i to k), and B (m) ik = 1 if and only if dG (i, k) = m. For such i, one therefore has the following identities: i /∈ B ⇒ (cid:26) (B (m) e)i = Si (m), (B (m)σ)i = Di (m), Relations (22) readily follows from Theorem 2.3. Let us now consider an index i ∈ B whose ℓ- neighborhood is not a tree. We know from Lemma 4.2 that such nodes have in their ℓ-neighborhood only one cycle. Clearly only nodes at distance at most ℓ of i can be counted in (B (ℓ) e)i , and they can be counted at most twice because the neighborhood contains only one cycle. Control (23) readily follows. (42) F Proof of Corollary 4.1 Proof. Let B denote the set of nodes i such that their ℓ-neighborhood contains a cycle. Let x be a normed vector such that x′B (ℓ)e = 0. We then have e′B (m−1) x = Pi∈N xi (B (m−1) e)i ≤ Pi∈B xi (B (m−1) e)i + Pi∈B xiαm−1−ℓ (B (ℓ) e)i + Pi∈N xi [αm−1−ℓ (B (ℓ) e)i + O(log(n) + plog(n)αm−1 ). Using the bound (23) for i ∈ B , we can bound the first summation, using Cauchy-Schwarz’s in- equality by Pi∈B xi [(B (m−1) e)i ≤ O(log(n)αm−1 )pB ≤ O(log3 (n)αℓ+m−1 ), where we have used the bound on the size of B derived in Lemma 4.2. The second summation in(43) is similarly bounded. As for the third summation, using the fact that e′B (ℓ)x = 0, it is upper-bounded by Xi∈N xiO(log(n) + plog(n)αm−1 ). 17 (43) By Cauchy-Schwarz again, this is no larger than O (cid:16)√n(log(n) + plog(n)αm−1 )(cid:17) . The announced bound (24) on e′B (m−1) x follows. Similarly, the bound (25) on σ ′B (m−1)x follows by using property σ ′B (ℓ)x = 0 instead of property e′B (ℓ)x = 0. G Proof of Lemma 4.6 Proof. We assume that σi = +, the case σ = − being similar. Introduce the events Ωk = {Sk ≤ C log(n)αk }, k ≥ 1, where constant C is as in Theorem 2.3. As established in the proof of Theorem 2.3, the probability of each Ωk is 1 − o(n−2 ). k , U − Let us evaluate, conditionally on Fk−1 and on Ωk−1 the variation distance between (U + k ) and a pair of (conditionally on Fk−1 ) independent random variables with respective distributions k ∼ Poi aU − k−1 + bU − ! . ! , W − k ∼ Poi aU + k−1 + bU + k−1 k−1 W + 2 2 The Stein-Chen method enables to bound the variation distance between a Bin(n, λ/n) and a Poi(λ) random variables by n min(1, λ−1 )(λ/n)2 ≤ λ/n. Furthermore, two Poisson random variables with respective parameters λ, λ′ have variation distance at most λ − λ′ . This entails the bounds k ) ≤ h1 − (1 − a/n)U + k−1 (1 − b/n)U − k−1 i k , W + dvar (U + (cid:12)(cid:12)(cid:12)(cid:12) + (cid:12)(cid:12)(cid:12)(cid:12) ≤k−1 )[1 − (1 − a/n)U + k−1 (1 − b/n)U − (n+ − U + k−1 ] − We now use (39) to obtain dvar (U + k , W + k ) ≤ aU + k−1+bU − k−1 2 aU + k−1+bU − k−1 n ≤k−1 − n/2[1 − (1 − a/n)U + k−1 (1 − b/n)U − +n+ − U + k−1 ] k−1 + bU − 4n (aU + + 1 k−1 )2 . (44) . Let us now specify constant c such that c log(α) < 1/2, i.e. there is ǫ > 0 such that c log(α) ≤ 1/2−ǫ. For k ≤ ℓ = c log(n), on Ωk−1 , it holds that Sk−1 ≤ C log(n)n1/2−ǫ . This, together with the bound n/2 − n+ ≤ O(log(n)n1/2 ) ensures the upper bound k ) ≤ O(log(n)n−ǫ). dvar (U + k , W + k , W − The same bound is readily established for the variation distance dvar (U − k ). These bounds readily establish by induction that the variation distance between the two sequences (U ± k )k≤ℓ and (V ± k )k≤ℓ are upper-bounded by O(log2 (n)n−ǫ), establishing the Lemma. 18 H Proof of Lemma 4.7 Proof. Write 2 V ± 2 V ∓ E(V ± t + b t+1 Gt ) = a t αtMt±β t∆t αtMt∓β t∆t + b = a 2 2 2 2 = αt+1Mt ± β t+1∆t . It readily follows that both processes {Mt }, {∆t } are martingales. To establish uniform integrability we shall show that both processes have uniformly bounded variance. To that end we use the conditional variance formula Var(X ) = Var(E(X F )) + E(Var(X F )), and the fact that the variance of a Poisson random variable equals its mean. Thus Gt−1 ) = Var(V ± t This yields by the conditional variance formula E(V ± t Gt−1 ) = aV ± t−1 + bV ∓ t−1 2 . Var(Mt ) = Var(Mt−1 ) + E(α−tMt−1 ) = Var(Mt−1 ) + α−t . Since Var(M0 ) = 0, it follows by induction that 1 − α−t α − 1 The latter is uniformly bounded for α > 1 hence the uniform integrability of {Mt } under this condition. Write now Var(Mt ) = , t > 0. t − V − Var(∆t ) = Var(∆t−1 ) + E(β−2tVar(V + t = Var(∆t−1 ) + E(β−2tαtMt−1 ) = Var(∆t−1 ) + β−2tαt . Gt−1 )) It thus follows by Var(∆0 ) = 0 and induction that 1 − (α/β 2 )t β 2/α − 1 thus establishing uniform integrability of martingale {∆t }. Var(∆t ) = , t > 0, I Proof of Corollary 4.2 Proof. Convergence almost surely and in L1 is guaranteed under uniform integrability by the martin- gale convergence theorem ( [9]). Finiteness of the limiting variable’s variance under uniform bounds on the variance is also standard; it follows from Fatou’s lemma. Convergence of the variances is established as follows. The limiting variable satisfies a distributional equation given by Poi(a/2) i ∆ = β−1  X1 ∆′   Poi(b/2) Xi=1 ∆i − (45) 19 where the ∆i , ∆′ i are i.i.d. and distributed as ∆. The only solution for the variance of ∆, apart from the degenerate solution 0, is then readily seen to be 1/(β 2 /α − 1), which is indeed the limit t to ∆2 of the variance of ∆t . The L1 -convergence of ∆2 ∞ is then a direct consequence of Scheffé’s lemma. J Proof of Theorem 4.2 Write Proof. Note that with probability of order 1−O(n−ǫ ) for fixed positive ǫ, σ(i)β−ℓDℓ (i) coincides with ∆ℓ by the coupling lemma 4.6. When this coupling fails, by the bounds established in Theorem 2.3, it holds that β−ℓDℓ (i) is O(log(n)). This entails that the left-hand side of (31) verifies ℓ (i)! = O(log2 (n))n−ǫ + E(∆2 E 1 β−2ℓD2 ℓ n n Xi=1 ℓ − ∆2 ∞ + E(∆2 ∞ ≤ E∆2 1coupling ) − E(∆2 E(∆2 ∞ ℓ By Corollary 4.2, we have that the first term in the right-hand side goes to with ℓ; the second term goes to zero with the probability that coupling fails (e.g. using Hardy-Littlewood-Polya’s rearrangement inequalities). Thus the expectation converges to E∆2 ∞ . Let us now consider the second moment of the empirical sum: ℓ !2 E 1 β−2ℓD2 n We break it into two terms, the first being 1no coupling ). n Xi=1 1coupling ). . E 1 n2 β−4ℓD4 ℓ (i). n Xi=1 Using Lemma 4.6 and Theorem 2.3, using similar arguments as before we can bound this term by 1 O(log2 (n)) (cid:2)E(∆2 ∞) + o(1)(cid:3) n which clearly goes to zero as n → ∞. The second term is given by β−4ℓE(D2 ℓ (i)D2 ℓ (j )). 2 n2 Xi<j ℓ (i)D2 For given i < j , using Lemma 4.1 and Theorem 2.3, we bound the product D2 ℓ (j ) by O(log4 (n)β 4ℓ on the event that the coupling with independent copies fails, and by E(D2 ℓ (i))E(D2 ℓ (j )) on the event that it succeeds. We then bound each of the individual terms in this product as in the control of the expectation done in the first half of the proof, thus obtaining the upper bound for the second moment: o(1) + 2 n2 Xi<j (cid:2)O(n−2ǫ log4 (n)) + (E(∆2 ∞ ))2 + o(1)(cid:3) . 20 It readily follows that lim n→∞ n E " 1 Xi=1 n The convergence in probability (31) follows. We now turn to establishing (32). We shall only consider the case of sign +, the other being han- dled similarly. Fix some arbitrarily small δ > 0. Because τ is a continuity point of the distribution of ∆∞ , we can find two bounded Lipschitz-continuous functions f , g such that ∞)#2 β−2ℓD2 ℓ − E(∆2 = 0. f (u) ≤ 1u≥τ ≤ g(u), u ∈ R (46) and Consider then the empirical sum 0 ≤ E(g(∆∞ ) − f (∆∞)) ≤ δ. 1 n Xi∈n+ yi = , Writing by at most f (yipnE(∆2 ∞)). β−ℓDℓ (i) qPn j=1 β−2ℓD2 ℓ (j ) we have that this empirical sum differs from the simpler one 1 n Xi∈n+ f (β−ℓDℓ (i)) β−ℓ Dℓ (i) × (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) A (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 − r E(∆2 1 ∞ ) n Xi∈n+ where K is the Lipschitz continuity constant of function f and A is the empirical sum in (31). This correction tends to zero in probability by dominated convergence. Indeed, convergence to zero of 1−pE(∆2 ∞ )/A has just been established. By similar arguments as before based on Theorem 2.3 and Lemmas 4.6 and 4.1), the empirical average of the β−ℓDℓ (i) is bounded. Convergence in probability of (46) to (1/2)E(f (∆∞ )) is then established by evaluating the first and second moments of this sum as previously done. The same argument can be applied to g , eventually leading to the convergence in probability 1 n Xi∈n+ g(yipnE(∆2 ∞)) = E(g(∆∞ )). lim n→∞ K , 1 2 It readily follows that n→∞ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 n Xi∈n+ lim sup As δ is arbitrary, this establishes (32). yi≥τ /√nE(∆2 ∞ ) − 1 1 2 P(∆∞ ≥ τ )(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤ δ. 21 Pick again an arbitrary δ > 0, two pairs of Lipschitz-continuous functions f± and g± such that and f± (u) ≤ 1±u≥t ≤ g± (u), 0 ≤ E(g± (±∆∞ )) − E(f±(±∆∞ )) ≤ δ. The empirical overlap (36) reads n   1  (cid:16)2 · 1 ∞ )≥t − 1(cid:17) . xi√nE(∆2 − Xi∈n−  Xi∈n+ The difference (n+ − n− )/n is of order 1/√n and thus vanishes. We upper-bound the remaining terms by ∞)) n  2 ∞)) − Xi∈n−  Xi∈n+ f− (xi (−pnE(∆2 g+ (xipnE(∆2  Letting K denote the Lipschitz-continuity constant for both g+ and f− , this last display differs from f−(−β−ℓDℓ (i)) n  2 g+ (β−ℓDℓ (i)) − Xi∈n−  Xi∈n+  n + β−ℓ Dℓ (i) × (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) A (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 − r E(∆2 ∞) ∞)(cid:12)(cid:12)(cid:12) Xi=1 (cid:12)(cid:12)(cid:12) (xi − yi )pnE(∆2 Because of the assumed convergence in probability limn→∞ x − y = 0, the first error term neces- sarily tends to zero in probability by Cauchy-Schwarz inequality. The second term is dealt with as mentioned in the proof of the previous lemma. Finally, using the coupling lemmas 4.6 and 4.1, by evaluating the first and second moments of (47), we obtain the convergence in probability f−(−β−ℓDℓ (i)) n  2 g+ (β−ℓDℓ (i)) − Xi∈n−  Xi∈n+  = E(g+ (∆∞ ) − f−(∆∞ )). The latter term is then an upper bound on the lim sup of the empirical overlap. By the same approach, we obtain a lower bound of by at most 2K n lim n→∞ (47) . (48) E(f+(∆∞ ) − g− (∆∞ )) on the lim inf of the overlap. These upper and lower bounds differ by at most 2δ , and differ from P(∆∞ ≥ t) − P(∆∞ ≤ −t) by at most δ . Since δ is arbitrary, this establishes the announced convergence in probability of the empirical overlap to quantity x where x = P(∆∞ ≥ t) − P(∆∞ ≤ −t) is strictly positive by our choice of t. 22 K Proof of Lemma 4.4 Proof. The first and second evaluations follow by noting that the vectors whose difference is con- sidered in the left-hand side agree on the set of entries i whose ℓ-neighborhood is cycle-free. Thus B (ℓ)e − {Sℓ (i)} ≤ pB O(log(n)αℓ ) ≤ O(log3 (n)α2ℓ ), and the same bound holds for B (ℓ)σ − {Dℓ (i)}. This upper bound is o(√nβ ℓ ) so that the first two assertions follow, by further noticing that {Dℓ (i)} = Θ(β ℓ ), as follows from combining Theorem 2.3 with Lemmas 4.6 and 4.1 as in the proof of Theorem 4.2. For the third assertion, consider the scalar product < {Sℓ (i)}, {Dℓ (i)} >. Using the same arguments as in the proof of Theorem 4.2 we obtain that this scalar product is indeed o({Sℓ (i)} × {Dℓ (i)}. L Proof of Lemma 4.5 Proof. To establish the lower bound of (27), note that by Cauchy-Schwarz, < e, B (ℓ)B (ℓ)e >≤ e × B (ℓ)B (ℓ)e. However the left-hand side reads B (ℓ)e2 . Thus B (ℓ)B (ℓ)e ≥ B (ℓ) e2 · e However it holds that B (ℓ) e = Θ(√nαℓ ) (this follows from the methods in the proof of Theo- rem 4.2). Since e = √n, the lower bound in (27) follows. For the upper bound, we note that by Lemma 4.3 and Theorem 2.3, the max row sum for matrix B (ℓ) is of order O(log(n)αℓ ). The lower bound in (28) is established similarly, from the inequality < σ, B (ℓ)B (ℓ)σ >≤ σ × B (ℓ)B (ℓ)σ The upper bound requires additional arguments. Assuming the 2ℓ-neighborhood of i is cycle-free, the i-th entry of vector B (ℓ)B (ℓ)σ can be written as σj {k : dG (i, k) = dG (j, k) = ℓ}. ℓ Xd=0 Xj :dG (i,j )=2d We control the magnitude of this quantity in the tree model; using coupling we will then transpose the corresponding estimates to the original scenario. Let then T denote a branching process with offspring Poi(α). The process of spins is then constructed by sampling uniformly the root’s spin, and then propagating spins in a Markovian fashion with transition matrix (a/(a + b)b(a + b), b(a + b), a(a + b)) that is α−1M . Its eigenvalues are thus (1, β /α). The variable of interest is written ℓ Xd=0 Xj :d(j,i)=2d X = σj {k : d(j, k) = d(i, k) = ℓ}. 23 We evaluate its second moment conditionally on T by writing X 2 as X 2 = Pℓ d=0 Pℓ d′=0 Pj ′ :d(j ′ ,i)=2d′ Pj :d(j,i)=2d σj σj ′ × ×{k : d(j, k) = d(i, k) = ℓ} · {k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ}. Now it holds that α (cid:19)d(j,j ′ )! . E(σj σj ′ T ) = O (cid:18) β We will use this formula, and further distinguish nodes j ′ according to their distance 2(d + d′ − τ ) for τ = 0, . . . , 2(d ∧ d′ ). This yields α (cid:17)2(d+d′−τ )(cid:19) × τ =0 Pj ′ :d(j ′ ,i)=2d′ Pj :d(j,i)=2d O((cid:18)(cid:16) β d,d′=0 P2(d∧d′ ) E(X 2 T ) = Pℓ ×{k : d(j, k) = d(i, k) = ℓ} · {k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ}. Note now that with high probability, we have the following evaluations = O(αℓ−d ), {k : d(j, k) = d(i, k) = ℓ} = O(αℓ−d′ {k ′ : d(j ′ , k ′ ) = d(i, k ′ ) = ℓ} ), = O(α2d ), {j : d(j, i) = 2d} {j ′ : d(j ′ , i) = 2d′&d(j, j ′ ) = 2(d + d′ − τ )} = O(α2d′ −τ ). Plugging these in, we have d,d′=0 P2(d∧d′ ) E(X 2 T ) = Pℓ τ =0 d,d′=0 P2(d∧d′ ) = Pℓ τ =0 = O(α2ℓ (β 2 /α)2ℓ ) = O(β 4ℓ ). α (cid:17)2(d+d′ −τ )(cid:19) α2ℓ−d−d′+2(d+d′ )−τ O (cid:18)(cid:16) β α )d+d′−τ (cid:17) O (cid:16)α2ℓ ( β 2 By coupling (techniques of Theorem 4.2 involving Tchebitchev inequality, based on the bounds of Theorem 2.3 and Lemmas 4.6 and 4.1) we thus have that with high probability, B (ℓ)B (ℓ)σ = O(pnβ 4ℓ ) = O(β ℓ B (ℓ)σ ) as announced. 24
1910.10763
1
1910
2019-10-23T18:40:18
Representation Learning in Heterogeneous Professional Social Networks with Ambiguous Social Connections
[ "cs.SI" ]
Network representations have been shown to improve performance within a variety of tasks, including classification, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social networks (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength-aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches.
cs.SI
cs
Representation Learning in Heterogeneous Professional Social Networks with Ambiguous Social Connections Baoxu Shi LinkedIn Jaewon Yang Tim Weninger LinkedIn University of Notre Dame Jing How Pinterest Qi He LinkedIn [email protected] [email protected] [email protected] [email protected] [email protected] 9 1 0 2 t c O 3 2 ] I S . s c [ 1 v 3 6 7 0 1 . 0 1 9 1 : v i X r a Abstract -- Network representations have been shown to im- prove performance within a variety of tasks, including classi- fication, clustering, and link prediction. However, most models either focus on moderate-sized, homogeneous networks or require a significant amount of auxiliary input to be provided by the user. Moreover, few works have studied network representations in real-world heterogeneous social networks with ambiguous social connections and are often incomplete. In the present work, we investigate the problem of learning low-dimensional node representations in heterogeneous professional social net- works (HPSNs), which are incomplete and have ambiguous social connections. We present a general heterogeneous network representation learning model called Star2Vec that learns entity and person embeddings jointly using a social connection strength- aware biased random walk combined with a node-structure expansion function. Experiments on LinkedIn's Economic Graph and publicly available snapshots of Facebook's network show that Star2Vec outperforms existing methods on members' industry and social circle classification, skill and title clustering, and member-entity link predictions. We also conducted large-scale case studies to demonstrate practical applications of the Star2Vec embeddings trained on LinkedIn's Economic Graph such as next career move, alternative career suggestions, and general entity similarity searches. Index Terms -- Network representation, Heterogeneous profes- sional social networks I. INTRODUCTION Many important tasks in network analysis, for example node classification [1], community detection [2], recommen- dation [3], and link prediction [4], rely primarily on the discovery and modelling of patterns hidden among the nodes and edges in a network. To that end, recent advances in network-based Representation Learning (RL) have shown the ability to capture these patterns within a vector-embedding of the network's nodes. These embeddings can then be used for a variety of network analysis tasks. In order to learn good network embeddings on very large heterogeneous professional social networks (HPSNs) such as LinkedIn's Economic Graph and power entity recommendation or entity retrieval based products, an HPSN representation learning model needs to: • utilize the rich type information in HPSNs, • learn both person and entity representations in the same semantic space, sklearn LinkedIn Representation Learning ML Engineer Alice Bob Deep Learning Recruiter Onboarding Carol Eve Dan Sr. ML Engineer Microsoft Google Legend: Member Skill Title Company Fig. 1. Example professional social network represented as a heterogeneous information network. • handle ambiguous and unobserved social connections in HPSNs, • handle networks with hundreds-of-millions of nodes and billions of edges. Unfortunately, few systems have addressed all four require- ments. Most existing methods in this area focus on homoge- neous (i.e., untyped) networks [5] -- [7], which assumes that all nodes share a single node type. Although these shallow models have fewer parameters and can run on very large networks, they ignore heterogeneity found in many networks. Recently there has been some work to extend homogeneous network models through the use of auxiliary features like node attribute or content [8] -- [11]. However, using supplemental features explodes the parameter space and is prone to overfitting. Although these augmented models achieve promising results on homogeneous networks, real-world social networks, such as LinkedIn and Facebook, are often heterogeneous networks with multiple node types like person, school, company, in- terest, and many others. Therefore, one major challenge with learning representations in heterogeneous social networks is to find proper ways to leverage their rich type information. Metapath2vec [12] introduced a metapath-based method that learns node-embeddings from heterogeneous networks; but this approach is limited by human-curated metapaths, which requires domain-specific knowledge and can be difficult to generate on heterogeneous social networks with complex semantics or a large number of node types. On the other hand, researchers have also tried to model heterogeneous social networks as attributed graphs where persons are the nodes in the network and all other non-person entities are treated as attributes. These methods such as SNE [13] and LANE [8] treat attribute entities as input features instead of nodes and cannot learn entity and person embeddings jointly. Besides utilizing rich type information and learning both en- tity and person embeddings, an HPSN representation learning model also needs to handle both unobserved and observed but ambiguous social connections that exist in professional het- erogeneous social networks. The majority of social networks are incomplete and do not contain all the social connections people have in the real world. Moreover, the social connections captured in social networks are often ambiguous. In real-world scenarios, relationships often take many forms; for example, a person-to-person social connection in an HPSNs could represent spouse, coworker, acquaintance, etc [14]. However, most networks do not distinguish among these relationships and often use a single semantically ambiguous relationship connectedTo or a few coarse relationships, e.g., friend and follow, to represent them all [4]. Social networks usually model social connections with a limited number of ambiguous relationship types because it is often unfeasible to automatically or even manually dis- ambiguate these relationships, not only because such a task is costly but also because the relationship's granularity and interpretation are subjective. Throughout the present work we will reference a simplified example network from LinkedIn illustrated in Fig. 1 to aid in our discussion. In Fig. 1, the social connection between Alice and Carol can be either candidate-recruiter relationship or college friends. Alice and Bob, on the other hand, can be either close coworkers or acquaintances who work at the same company. Moreover, the social connection between people are transient and evolves over time, which makes it even harder to disambiguate social connections. Again take Fig. 1 as an example, Carol and Eve might be coworkers at some point and later becomes recruiter- candidate relationship after Eve moves to LinkedIn. Ideally, an HPSN representation learning model ought to be able to infer unobserved social connections and distinguish between different ambiguous social connection types and their social strengths. Unfortunately, most existing network embedding models ignore the network incompleteness and the edge het- erogeneity, and simply assume social networks are complete and all existing social connections are the same [7]. As a result, those models will not handle persons with limited number of social connections well and learn similar representations for nodes with common social connections regardless the actual social relationship types and connection strength. In addition to direct connections, ambiguous social connec- tions also affect higher-order proximity which is also used to measure node similarity in representation learning models [6]. An implicit assumption used in these models is that indirect (i.e., second- or third-order) connections between two nodes are reliable, but this assumption does not apply when there are ambiguous social connections with different social strengths. In fact, because direct social connections do not always represent the same degree of similarity, the error will cascade and cause further problems when using higher-order proximity. Consider again Fig. 1, wherein second-order proximity models that count common neighbors of, say, Alice and Carol will be misled by Eve and Bob to believe that Alice and Carol have similar characteristics. The presence of ambiguous social connections affects most network representation models. Higher-order proximity mod- els [6], [15], [16] overlook this issue and implicitly assume that network connections are always reliable in all scenarios. This problem also has a more severe impact on all random walk-based models [17] because these models optimize node representations based on a false assumption that nodes con- nected within k-steps are similar. In response, more recent network models [8], [18] include text and labels as additional signals. Although they show promising results by adding more parameters, they do not get to the root of the ambiguous social connection problems discussed above. In the present work, we develop a fast and scalable HPSN representation learning model called Star2Vec that requires little human supervision, contains no auxiliary features, and can run on very large real-world networks.To address the problems raised above, Star2Vec has the ability to 1) automati- cally weight social connections and leverage unobserved social connections based on heterogeneous second-order proximity, and 2) learn person and non-person entity embeddings jointly with a node structure expansion mechanism. In summary we make the following contributions: • We describe Star2Vec, a scalable model that learns person and entity representations on very large heterogeneous pro- fessional social networks, • We introduce a social connection strength-aware random walk model to overcome social connection ambiguity and leverage unobserved social connections without increasing the number of model parameters, • We introduce a node-structure expansion model to expand person node into person-entity structures and learn person and non-person entity embeddings in the same space, • We perform extensive experiments on LinkedIn's Economic Graph and show the effectiveness of the learned HPSN representations in a variety of tasks, • We demonstrate that Star2Vec can be applied to other heterogeneous social networks by evaluating Star2Vec on available portions of Facebook. The following of the work is organized as follows. We first give formal definitions of the network representation learning task on HPSNs in Sec. II. Section III gives a detailed description of the proposed Star2Vec model. Then we present our evaluation results on LinkedIn and Facebook datasets in Sec. IV, followed by a discussion of related works in Sec. V. II. PROBLEM DEFINITION In this work, we define a heterogeneous professional social network (HPSN) as a network where both nodes and edges are labeled [19]. The formal definition of HPSN is as follows a less important role compared to other social connections. Definition 1. A Heterogeneous Professional Social Network is a graph G = (V, E, T, R) in which V, E, T, R are nodes, edges, node types, and edge types respectively. person ∈ T and R = Rppl ∪ Rent, where Rppl are person-to-person edge types and Rent are person-to-entity edge types. T ≥ 2, Rppl ≥ 1, and Rent ≥ 1. Each node u is associated with a type mapping function φ(·) defined as φ(u) = Tu, Tu ∈ T. Similarly, each edge e = u → v is associated with a relationship type mapping function ψ(e) = r, r ∈ R. Definition 1 defines an HPSN as a social network having more than one type of node and more than one type of edge. The main difference between an HPSN and other definitions of heterogeneous social networks is that instead of modeling casual social connections, an HPSN focuses on professional entities and emphasizes professional social relationships. For example, LinkedIn's HPSN, call the Economic Graph, contains person-nodes as well as entities such as skills, titles, schools, degrees, companies, jobs, and many other professional entities. As for edge types, besides the main person-to-person social connections, there also exist professional connections such as person-worksAt-company, person-knows-skill, etc. Next, we define the path-based network representation learning task on HPSNs to contain two sub-tasks: path gener- ation and path-based network representation learning. Definition 2. Given an HPSN G, Path Generation constructs a collection of paths P = {u0 ul} as the input to the network representation learner, where u0 ul denotes some length-l path. The path generation process extends a length- i path u0 ui to a length-(i + 1) path u0 ui → ui+1 based on a biased random walk transition scoring function P(ui, ui+1, G), which determines the probability of walking from ui to the social connection strength between ui and ui+1. to ui+1 on graph G with respect Definition 3. Given a collection of paths P and an HPSN G, Path-based Network Representation Learning learns a W ∈ RV×d node embedding matrix in which d ≪ V that minimizes some loss function L(·) using path set P′ = {F (p, G)p ∈ P} s.t. F (·) is some optional post-processing function. Recall the primary challenge in learning embeddings on HP- SNs is generating meaningful paths that carry reliable semantic meaning [12]. However, in most real-world social networks, generating such paths becomes more challenging due to the connection ambiguity of its social connections. As we state before, heterogeneous social networks like LinkedIn and Face- book primarily use a coarse person-to-person relationship type to denote a variety of social connection types including but not limited to coworkers, friends, acquaintance, and many others. When learning person and entity representations on those networks, a model should be able to properly weight such ambiguous person-to-person social connections so that the ones carry less relevance signals, i.e., social strength, will play Therefore, the main focus here is how to design a biased transition function P(·) that properly weights ambiguous so- cial connections in HPSN. So we design the corresponding post-processing function F (·) to generate high quality paths, and the loss function L(·) to train the person and non-person entity representations accordingly. III. STAR2VEC In this section, we present Star2Vec and its details in three parts: (A) its social connection strength-aware, random walk-based path generation method, (B) its node-structure expansion-based path augmentation, and (C) its star-structure- based person and entity representation learning method. A. Social Connection Strength-aware Biased Random Walk Models that operate on heterogeneous networks typically enumerate constrained network paths so that the nodes on the path conform to a sequence of types [20]. The path constraints are typically called metapaths, and they are hand-curated by a human designer. Specific metapaths are meaningful for specific tasks; a typical example found in the related literature [21] sug- gests that the path author→paper←author, which represents co-authorship in a bibliographical heterogeneous network, is important to identify communities of researchers. However, it is not always clear which metapaths are meaningful for heterogeneous professional social networks with many node types, and human curators may miss important information or introduce bias into the model. Moreover, the social connection ambiguity nature of HPSNs and many social networks makes manually composing reliable metapath even harder. In fact our results in Sec. IV show that on networks with ambiguous social connections, such as LinkedIn and Facebook, representations learned from "intuitive" metapaths are even worse than the ones learned from homogeneous models. As we discussed above, social connections in HPSNs are oftentimes ambiguous and have different connection strengths, which makes it almost impossible to design reliable metapaths for representation learning. To better model such ambiguous social connections in HPSNs and general social networks, one natural approach is to label each social connection with its true relationship type. However, this labelling task is problematic for two reasons. First, without sufficient signals beyond the connection itself, the interpretation of a social connection can be subjective. Second, the social connection between people evolves over time. Luckily, if an HPSN model can treat each social connection differently based on its connection strength, then we no longer need to disambiguate each person-to-person edge manually. Moreover, by modeling the connection strength between two persons, the model can even discover and leverage unobserved social connections. Recall that the result of ambiguous social connections is that different person-to-person edges with dif- ferent social strengths are grouped into the same edge type and treated equally. If we can properly model the connection strength based on the network context, then we can weight Traditional path-based skip gram model: Alice Eve Carol Onboarding Carol Bob Alice Rep. Learning Bob Pr(c1u) Pr(c2u) p → F (p, G): Alice Bob Dan node-structure expansion sklearn Alice Pr(c3u) Pr(c4u) Rep. Learning Sr. ML Engineer Bob Dan structure-based skip-gram sklearn Pr(c1u) Alice Bob Pr(c3u) Rep. Learning Sr. ML Engineer Pr(c4u) Pr(c2u) Dan ML Engineer LinkedIn Deep Learning ML Engineer LinkedIn Deep Learning Fig. 2. Path generation and embedding learning example of Star2Vec. Star2Vec first generates a length-2 person path using P, then expands the path into stars of size ks = 2 using F , and finally optimizes the network representation of Bob using a structure-based skip-gram with window size kw = 5. Comparing to traditional path-based skip-gram models show at the top of the figure, Star2Vec uses social connection strength-aware random walk and therefore can walk on social connections with high strength (Alice-Bob) and unobserved but highly similar persons (Bob-Dan). Star2Vec is also likely to optimize nodes with semantically similar person and entity neighbors because of its node-structure expansion function. social connections using their connection strengths and reduce the importance of social connections such as neighbors and friends which represent ambiguous relationships. To estimate the strength of social connections, we need to first identify useful network context that can help model the social connection. According to Def. 1, we separate the nodes in HPSNs into two groups, person-type nodes and non- person-type entity nodes. Although person nodes are the same and person-to-person connections are often ambiguous across different social networks, non-person entity types and person- to-entity connections usually represent the special interests of each social network and therefore are reliable and have consis- tent semantic meanings within the same relationship type. For example, unambiguous person-to-entity relationships on Face- book include person-to-political preference and person-likes- post, whereas on LinkedIn, unambiguous professional person- to-entity relationships such as person-knows-skill, person-has- title, person-worksAt-company, etc. Based on this observation, we assume that edges between person and non-person entity nodes (also called attribute nodes) are often unambiguous, because they represent the characteristics of the person nodes. With this assumption, next we will discuss how to estimate the strength of social connec- tions using other unambiguous person-to-entity relationships. Consider the example illustrated in Fig. 1, where the so- cial connection Alice-to-Bob is an ambiguous person-to- person connection and its reliability is hard to determine by simply examining a single edge. By looking at other alternative, unambiguous person-to-entity connections among worksAt −−−−−→ company knows−−−−→ skill, we know Alice-Bob is a stronger and person social connection than Alice-Carol because Alice and Bob are more structurally similar because they are both indirectly connected via many unambiguous person-to-entity paths. Hence, we can estimate the connection strength of such person-to-person edges by modeling unambiguous alternative person-to-entity paths between two nodes. Here we formally define the social connection strength as follows Alice and Bob, for example person Definition 4. Given an HPSN G and a social connection edge u r−→ v between two person nodes u and v, the social connection strength of u r−→ v is defined by some support function S(u, r, v, G) that measures the structural similarity between u and v with respect relationship r. to some social connection To model the structural similarity between nodes using alternative unambiguous connections between two person with respect to some social relationship r, we borrow the concept of second-order proximity from LINE [6] and define the support function S of some social connection u r−→ v as their heterogeneous second-order proximity. S(u, r, v, G) = Px∈N(u,Dr ) N (u, Dr) I(x,v) deg(x,φ(v)) , (1) where r ∈ Rppl, the relationship dependent neighbor set N (u, Dr) = {xφ(x) ∈ Dr, (u, x) ∈ E} represents the neighbors x of person u with node type φ(x) ∈ Dr, I(x, v) is an indicator function testing (x, v) ∈ E, and deg(x, t) returns the number of type-t nodes that x connects to. One can also view Eq. 1 as a function measuring the heterogeneous second- order proximity based on the probability that u can reach v in two steps using only nodes within a given dependency type set Dr. Note that one can also use Eq. 1 to measure the connection strength of some unobserved social connection u r−→ v. When Dr = T holds for all r ∈ R, then Eq. 1 degenerates to a homogeneous higher-order proximity scoring function [6]. To generate dependency set Dr with respect to social connection relationship r, one could first collect some u r−→ v examples, or use association rule mining [22], or predicate path mining [23] to discover associated length-2 paths, and then extract all intermediate non-person node types to con- struct Dr. For example, in LinkedIn network, the dependency- set of a simple person-to-person connection is Dconnect = {title, skill}, which defines the social connection strength of mutual connections by their common titles and skills. Dr can also be manually defined, e.g., the dependency set of LinkedIn's follower-influencer social relationship Df ollow = {member, industry} if we are interested in modeling the con- nection strength based on influencer popularity among their followers' social circle and common industry experience. In Eq. 1 we limit the order of the proximity to 2 to simplify the computation, but it can be easily extended to higher-orders by modeling paths instead of neighboring nodes. With Eq. 1, we define the epsilon-greedy style social con- nection strength-aware transition function P that determines the transition score from person ui to person ui+1 as + α Xr∈Rppl {z walk on unobserved social connections } } (2) P(ui, ui+1, G) = (1 − α) Xrk ∈R(ui ,ui+1) {z walk on existing social connections S(ui, r, ui+1, G) S(ui, rk, ui+1, G) where the relationship set R(ui,ui+1) contains all relationships rk that connect ui and ui+1 in G, r is some person-to-person relationship type from Rppl, which is defined in the HPSN G, and α is some jump probability that allows the model to walk on unobserved but highly possible social connections between highly similar nodes measured by S. To reduce the computational complexity on enumerating all possible ui+1, we limit ui+1 to person-type nodes that can be reached from person ui within two steps. Equation 2 addresses the problem of ambiguous social connections by calculating the social connection strength of person-to-person edges to avoid walking over ambiguous social connections that do not contribute to the professional similarity, such as Alice→Carol in Fig. 1. Moreover, by considering the transition score between highly similar but not directly connected persons (second term in Eq. 2), the model will also generate social connection paths that are not directly observed. For example, Alice→Bob could be extended to Alice→Bob→Dan using P even though two structurally similar nodes Bob and Dan are not directly connected. Note that the random walker used in previous works [5], [17] is a special case of Eq. 2, where α = 0, u∗ ∈ V, R = 1, and S(u, r, v, G) = 1 N (u) . B. Node-structure Expansion In the previous section we described a social connection strength-aware random walk that generates paths using ob- served and unobserved social connections with high connec- tion strengths defined by Eq. 1. However, due to the lack of non-person entities in the generated paths, this method cannot learn person and entity embeddings jointly. If we explicitly generate additional paths by specifying certain metapaths, e.g., person-skill-person or person-title-person, then the represen- tations of each entity type is likely to be trained disjoint- edly, which would produce incomparable node representations across different node types. Such an approach may yield good results in a node-type clustering visualization, but cannot be used for cross-type inference, such as suggesting skills to members, finding related skills given a title or find important companies at some location, etc. To remedy this issue and learn person and entity embed- dings in the same semantic space so different type of entities can be compared directly, we apply an extra node-structure expansion post-processing function F on the path set P to generate an expanded, diversified person-entity structure (i.e., a star) path set P′ to increase the entity-type coverage in P and appropriately capture higher-order heterogeneous proximity in the model. To describe F , first recall that network representation learning models inspired by Word2Vec view the nodes and paths as words and sentences respectively, and learn node representations by maximizing the similarity between a node in some path and its surrounding nodes. In Star2Vec, we extend this idea by replacing the single person u in the path with a star-structure s(u) containing ks neighbors of u with u as the star's center. To continue the analogy, s(u) essentially becomes a "phrase" in the overall sentence, and we use nodes in nearby phrases to update the representation of nodes in s(u). By doing so, we can increase the context node similarity and diversity within a given window size comparing to other models. In Fig. 2 we illustrate this node expansion using a length-2 path generated by P and expanding each node u in the path to s(u) with a star size ks = 2. Here we define F as F (p, G) → {s(u1) → · · · → s(ul)ui ∈ p}, s(u) = {u} ∪ {vivi ∼ Pr(viu, G), vi ∈ N (u, T)} , s(u) = ks + 1, and Pr(vu, π, G) is some disproportionate stratified sampling probability defined as Pr(vu, π, G) ∝ πφ(v) N (u, {φ(v)}) , (3) where π ∈ RT is the parameter of t ∼ Multi(tπ), πφ(v) denotes the probability of selecting node type φ(v). π can be approximated by the confidence score of φ(ui) φ(ui+1) via Ti for Ti ∈ T using AMIE [22] or some simple distributions such as uniform distribution. N (u, {φ(v)}) is the number of φ(v) typed-nodes that connect to u. C. Structure-based Skip-gram After we construct the star-structured paths P′, next we discuss how to learn person and entity embeddings using P′. In a standard random walk-based network representation learning setting, the objective is often defined as arg max θ Xu∈V Xc∈C(u) log(Pr(cu; θ)), (4) where c is the context node of u defined by C(u), which is usually the neighbor of u in a random walk path p within a window size kw. Here we can not apply this objective directly to the proposed Star2Vec model because it is unclear about how to generate context nodes for u from star-shaped structure paths s(u1) s(ul) instead of simple node paths u1 ul. So, we first define k′ w = ⌈kw/ks⌉ that represents the smallest star window size that covers at least kw nodes. The context nodes of u within a star window of size k′ w on s(u1) s(ul) is then defined as V u,p c = i+ k′ w 2 [ j=i− k′ w 2 s(uj ) \ {u}, u ∈ s(ui), (5) c in which s(ui) is the star-shaped structure centered at ui and V u,p is the superset of the context nodes of u in path p. We then extract kw context nodes for u ∈ s(ui) by randomly sampling from V u,p and rewrite the objective as c EVALUATION DATASETS USED IN THIS WORK. TABLE I Dataset #Nodes #Members #NodeType #Edges 6, 319 Facebook ∼ 60K LinkedIn-60k LinkedIn-44M ∼ 44M 4, 039 ∼ 14K ∼ 40M 29 10 10 127, 777 > 500K > 6B arg max θ Xu∈V Xp∈P′ kw Xi E u,p ci∼Unif(V c ) log(Pr(ciu; θ)), (6) where the conditional probability Pr(cu; θ) is actually the log-normalized score of the embedding inner product de- fined as exp(Wc · WT u ), in which W ∈ RV×d is the embedding matrix. We combine a negative sampling function with Eq. 6 to define the loss function u )/ Pv∈V exp(Wv · WT kw Xi E u,p ci∼Unif(V c )(cid:18) log(σ(Wci · WT u )) + Evj ∼Dist(u) log(σ(−Wvj · WT L = Xu∈V Xp∈P′ Xj kneg (7) u ))(cid:19), in which σ(x) = 1/(1 + exp(−x)), Dist(u) is some negative sampling distribution, kneg and kw are the number of negative samples and context window size respectively. We follow the convention of previous works [24] and use stochastic gradient descent with back propagation to optimize Eq. 7. Training time complexity of Star2Vec is O(V ) which is the same as homogeneous network embedding models [5], [7] and lower than rich feature models' O(V 2) [8]. IV. EXPERIMENTS We compare Star2Vec to other representation learning mod- els on LinkedIn's Economic Graph and a public available sub- set of Facebook using a variety of tasks including industry and social circle classification, skill / title clustering, and member- entity link predictions. We also conduct extensive case studies to demonstrate the possibilities of using the representations learned from Star2Vec to solve real-world tasks LinkedIn is facing such as skill recommendation, career suggestion, and general entity retrieval on the LinkedIn's Economic Graph. A. Datasets We consider LinkedIn as a heterogeneous professional so- cial network and Facebook as a general-purpose heterogeneous social networks with different focus on the social connections and entity types. Table I shows a summary of the three datasets. LinkedIn-60k and LinkedIn-44M are two subsets of LinkedIn's Economic Graph and Facebook is derived from Facebook-egonet [25]. B. Experiment Setup compared because of their high time complexity or the lack of certain features. We use the best performing parameters reported in each work for all tasks on the Facebook and LinkedIn-60k. On the LinkedIn-44M network we limited the embedding size to 64 and only generate 10 length-100 paths per entity node for all node embedding models in order to manage the memory and disk consumption. We generated metapaths for the Metapath2Vec model by enumerating all length-2 person to entity metapaths as suggested in the original work. As in prior work, all networks are treated as undirected graphs to avoid creating random walk sinks. On the LinkedIn datasets, we set the dependency set of person-to-person connection as DconnectT o = { title, skill, company, school }. On the Facebook dataset, DconnectT o con- tains all non-person entity types. We set πφ(⋆) to be a uniform distribution for all datasets. As for other hyper-parameters, we conduct a hyper-parameter test for the proposed Star2Vec model and report the results at the end of this section. We were unable to gather results of LINE and knowledge graph completion models on LinkedIn-44M due to scaling issues. The model was trained on a single machine with 48 cores, and it took 9 hours to converge on the LinkedIn-44M dataset. C. Multi-class and Multi-label Classification First we explore the effectiveness of Star2Vec on multi-class and multi-label classifications. In both cases we use external labels with at least 10 members and train logistic regression models on top of the learned embeddings to perform the prediction. We vary the training size from 5% to 90% using a stratified split w.r.t each class and treat the remaining data as testing set. We repeat each experiment setting 10 times and report the average Macro-F1 and Micro-F1 scores. We perform the multi-class classification by predicting a persons' self-reported industry on LinkedIn because each person has exact one label. Similarly, we perform multi-label classification task on Facebook where social circles are used as labels. Note that users may belong to multiple social circles so a single user can have multiple labels. The classification results of LinkedIn-60k and LinkedIn- 44M are shown in Tab. II and Tab. IV. Due to memory limitation and high time complexity, we are not able to com- pare LINE and Knowledge Graph Completion based models on the LinkedIn-44M dataset. On both networks Star2Vec outperformed other models on Macro-F1 by up to 37.8% and up to 10.2% on Micro-F1. Interestingly, the improvement was more significant on the large-scale LinkedIn-44M network. We believe the difference in improvement is because the smaller LinkedIn-60k network is well-curated so that the network is more complete and the number of ambiguous social connections is limited. The large improvement on the less-curated LinkedIn-44M network indicates that Star2Vec is robust on networks with ambiguous social connections due to its social connection strength-aware random walk. We compared Star2Vec with node embedding methods and knowledge graph completion methods. Other matrix factor- ization methods as well as rich-feature methods could not be The results of the multi-label classification task on the Facebook network are shown in Tab. III. We find that Star2Vec works well especially when the amount of training data is PERSON-TO-INDUSTRY CLASSIFICATION ON LINKEDIN-60K. TABLE II Metric Model 5% 10% 20% 30% Training Set % 40% 50% 60% 70% 80% 90% Macro-F1 Micro-F1 Metapath2Vec LINE (1+2) DeepWalk Node2Vec TransE TransR ProjE Star2Vec Metapath2Vec LINE (1+2) DeepWalk Node2Vec TransE TransR ProjE Star2Vec 0.0733 0.0191 0.1105 0.0504 0.0240 0.0245 0.0677 0.0943 0.4888 0.4422 0.4990 0.4621 0.4567 0.4619 0.4108 0.5038 0.1060 0.0199 0.1381 0.0888 0.0274 0.0281 0.0889 0.1334 0.5076 0.4477 0.5158 0.4919 0.4648 0.4700 0.4339 0.5197 0.1291 0.0218 0.1558 0.1251 0.0358 0.0375 0.1065 0.1617 0.5215 0.4515 0.5258 0.5140 0.4773 0.4834 0.4629 0.5317 0.1658 0.0261 0.1890 0.1759 0.0537 0.0567 0.1373 0.1979 0.5355 0.4603 0.5373 0.5330 0.4902 0.4964 0.4971 0.5436 0.1747 0.0270 0.1916 0.1864 0.0556 0.0599 0.1429 0.2056 0.5390 0.4618 0.5373 0.5357 0.4914 0.4991 0.5028 0.5434 0.1746 0.0282 0.1963 0.1954 0.0582 0.0615 0.1472 0.2113 0.5387 0.4654 0.5391 0.5399 0.4937 0.4999 0.5077 0.5466 0.1794 0.0286 0.1977 0.1981 0.0592 0.0649 0.1503 0.2131 0.5421 0.4664 0.5434 0.5434 0.4961 0.5033 0.5104 0.5505 0.1811 0.0302 0.1945 0.1961 0.0596 0.0640 0.1415 0.2149 0.5411 0.4675 0.5432 0.5402 0.4949 0.5068 0.5118 0.5500 0.1491 0.0234 0.1724 0.1457 0.0436 0.0461 0.1225 0.1802 0.5305 0.4543 0.5302 0.5246 0.4845 0.4903 0.4811 0.5368 0.1587 0.0248 0.1825 0.1648 0.0491 0.0521 0.1300 0.1902 0.5336 0.4578 0.5364 0.5316 0.4862 0.4940 0.4882 0.5410 TABLE III PERSON-TO-SOCIAL CIRCLE CLASSIFICATION ON FACEBOOK. Metric Model 5% 10% 20% 30% Training Set % 40% 50% 60% 70% 80% 90% Macro-F1 Micro-F1 Metapath2Vec LINE (1+2) DeepWalk Node2Vec TransE TransR ProjE Star2Vec Metapath2Vec LINE (1+2) DeepWalk Node2Vec TransE TransR ProjE Star2Vec 0.0504 0.1240 0.2510 0.0517 0.0755 0.0778 0.3102 0.1495 0.2233 0.4683 0.6319 0.2490 0.4176 0.4198 0.5290 0.4435 0.0958 0.1697 0.3249 0.1129 0.1175 0.1197 0.3336 0.2390 0.3346 0.5292 0.6947 0.4593 0.4705 0.4714 0.5389 0.5903 0.1338 0.2338 0.4106 0.1949 0.1589 0.1625 0.3620 0.3943 0.4139 0.6038 0.7422 0.6146 0.5144 0.5163 0.5421 0.7145 0.1690 0.2616 0.4509 0.2395 0.1960 0.1982 0.3669 0.5055 0.4434 0.6240 0.7659 0.6660 0.5456 0.5454 0.5363 0.7769 0.1960 0.2951 0.4875 0.2703 0.2117 0.2178 0.3663 0.5687 0.4746 0.6499 0.7811 0.6962 0.5548 0.5564 0.5333 0.8101 0.2167 0.3143 0.5048 0.2833 0.2305 0.2393 0.3659 0.6210 0.4899 0.6579 0.7899 0.7051 0.5655 0.5668 0.5281 0.8307 0.2414 0.3302 0.5160 0.3053 0.2443 0.2586 0.3598 0.6588 0.5050 0.6693 0.7984 0.7207 0.5680 0.5723 0.5282 0.8511 0.2603 0.3509 0.5250 0.3190 0.2618 0.2772 0.3595 0.6866 0.5251 0.6934 0.7994 0.7268 0.5727 0.5776 0.5215 0.8583 0.2666 0.3507 0.5137 0.3292 0.2746 0.2848 0.3603 0.6977 0.5296 0.6990 0.8000 0.7392 0.5791 0.5818 0.5290 0.8661 0.2426 0.3371 0.5019 0.3351 0.2830 0.2885 0.3507 0.6135 0.5305 0.6958 0.8070 0.7411 0.5834 0.5845 0.5243 0.8760 PERSON-TO-INDUSTRY CLASSIFICATION ON LINKEDIN-44M. TABLE IV Metric Model 5% 10% 20% 30% Macro-F1 Micro-F1 Metapath2Vec DeepWalk Node2Vec Star2Vec Metapath2Vec DeepWalk Node2Vec Star2Vec 0.1688 0.1820 0.1943 0.2421 0.4101 0.4113 0.4259 0.4783 0.1912 0.2069 0.2218 0.2685 0.4280 0.4284 0.4434 0.4919 0.2097 0.2250 0.2437 0.2908 0.4419 0.4394 0.4555 0.5019 0.2195 0.2347 0.2539 0.3012 0.4473 0.4445 0.4607 0.5069 Training Set % 40% 50% 0.2246 0.2410 0.2606 0.3067 0.4502 0.4476 0.4637 0.5089 0.2285 0.2467 0.2658 0.3108 0.4516 0.4501 0.4664 0.5101 60% 70% 80% 90% 0.2315 0.2481 0.2683 0.3122 0.4540 0.4508 0.4671 0.5114 0.2325 0.2489 0.2691 0.3153 0.4548 0.4514 0.4678 0.5122 0.2343 0.2526 0.2707 0.3170 0.4564 0.4519 0.4694 0.5140 0.2354 0.2517 0.2692 0.3172 0.4558 0.4508 0.4674 0.5151 greater than 30%. This improvement indicates that Star2Vec is able to learn person embeddings that better capture a person's characteristics by modeling non-person entities with people jointly using the node-structure expansion function. Because many social networks are incomplete and follow a power-law degree distribution, the ability of handling poorly connected nodes with many unobserved social connections is a crucial factor for an HPSN representation learning model. To better understand Star2Vec's ability to learn embeddings for nodes with limited connectivity, we further group the person-nodes in LinkedIn-44M by their degree and plot the F1 improvement over the second-best performing model stratified by the degree percentile in Fig. 3. These results clearly demon- strates that Star2Vec works better than the best performing % t n e m e v o r p m I e r o c s - 1 F Macro-F1 Micro-F1 30 % 20 % 10 % 0 % 0 20 40 60 80 100 Overall Degree Percentile 30 % 20 % 10 % 0 % Macro-F1 Micro-F1 0 20 40 60 80 100 Member → Member Degree Percentile Fig. 3. Classification improvement stratified by degree percentile (in ascend- ing order) on LinkedIn-44M. Percentage is based on second best model. model especially on nodes with low connectivity (left-hand side of plots). This indicates Star2Vec's social connection- strength based path generation can implicitly increase the TOP-3 SIMILARITY RESULTS OF PROVIDED QUERIES ON LINKEDIN-44M. TABLE V (Query, target node type) Top-3 Results 1 2 3 4 5 6 7 8 (Software Dev, title) (Software Dev + KDB, title) (Sr. Audit Accountant, title) (Sr. Accountant Audit − Member of AICPA, title) (FBI, skill) (Medical Research, region) (Deloitte, Title) (Deep Learning, skill) Junior Software Engineer Quantitative Dev Supervising Sr. Accountant SVP Marketing Business Development Counterintelligence Iowa City, Iowa Area Sr. Advisory Consultant Machine Learning Software Dev Team Lead Financial Software Dev Audit Sr. SVP Strategy Business Development Federal Law Enforcement Washington D.C. Metro Area Sr. Manager Advisory Services Artificial Neural Networks Software Dev Contractor Front Office Dev Audit Staff Accountant SVP Human Resources Administration Cybercrime Investigation Gainesville, Florida Area Sr. Associate Advisory Neural Networks ADJUSTED MUTUAL INFORMATION (AMI) SCORE OF NODE CLUSTERING AUROC SCORE OF LINK PREDICTION ON LINKEDIN-44M. TABLE VI TABLE VII RESULTS ON LINKEDIN-44M. skill-to-domain person-to-industry title-to-specialty Metapath2Vec DeepWalk Node2Vec Star2Vec 0.5965 0.5918 0.5969 0.5992 0.1105 0.1689 0.1633 0.3294 0.3878 0.3663 0.3850 0.4200 person-region person-industry person-skill Metapath2Vec DeepWalk Node2Vec Star2Vec 0.5097 0.5034 0.5013 0.6370 0.5189 0.5034 0.5080 0.5840 0.5356 0.5489 0.5605 0.7175 connectivity of nodes with few connections, and therefore learn better representations compared to other methods. D. Node Clustering Next, we performed three node clustering tasks on the LinkedIn-44M network. We compare models on the Adjusted Mutual Information (AMI) [26]. For these clustering tasks, we used the trained node embeddings as input and assigned nodes to clusters using k-means. The cluster labels used in each task are summarized as follows: 1) in the skill-to-domain task we assigned each skill to a single hand-curated domain, e.g., Java and Python are assigned to Computing; 2) the person-to-industry task uses the same label as described in the classification task; and 3) the title-to-specialty task divides job titles by induced specialties, e.g., Junior Java Dev would belong to Software Developer. In each task, the number of clusters k is set to equal the number of labels observed in the network. We present the results in Tab. VI. We find that Star2Vec performs well on these tasks. How- ever, the performance boost is most pronounced the person- to-industry task. This performance boost is due to differences in the connectivity patterns between person and non-person entity nodes. Recall that in HPSNs ambiguous connections are mostly person-to-person social connections, which means person nodes are more vulnerable to ambiguity because, in prior models, their representations were mainly defined by their peers. On the other hand, entity nodes such as skill and title are less likely to be affected because they usually have a robust second-order connectivity pattern, i.e., a skill and a title are likely to be similar if they connect to the same person. This also explains why Metapath2Vec works well on some clustering tasks, but not others. Under these conditions, metap- aths such as person-entity-person tend to decouple entity node types from each other during training. This decoupling leads to poor person embeddings and poor clustering performance. E. Link Prediction tasks. Here we use 70% of the data for training, 5% for validation, and evaluate the model performance on the remain- ing 25% with the same amount of negative edges, which is generated by replacing a node on an existing edge with an incorrect random node of the same type. This strategy results in a more difficult but more realistic link prediction problem comparing to previous settings [7]. To speed up the evaluation on the LinkedIn-44M dataset, we sampled 50, 000 edges at random from 1 billion testing edges. The area under the ROC (AUROC) score of link prediction tasks are shown in Tab. VII. These consistent performance im- provements indicate the proposed model can learn embeddings that better captures the semantic meaning of nodes. F. Case Studies In addition to the applications that can be formed into standard network analysis tasks, we are also interested in applying the learned representations to other practical cases and to gain insights from the HPSN. In this section, we demonstrate how to employ the learned Star2Vec embeddings to solve interesting entity retrieval tasks. We built a nearest neighbor model that takes, as input, a query vector and a target node type, and returns the top-k nearest nodes (in terms of cosine similarity). The top-3 results of 8 example queries are shown in Tab. V. Note that there are no direct relationships between any of these query objects. Next Career Move. The title of a person typically depends on their skill set and experience. Thus, learning new skills could potentially lead to new opportunities. To capture such a change, we combine the vector of a person's current title with their most recent skill and suggest titles based on the combined representation [27]. In Tab. V, we see that after a software developer learns a new skill KDB, which is a financial database, the job recommendation shifts from general software development to jobs in the financial sector. In addition to the classification and clustering tasks, we also evaluate Star2Vec on multiple person-entity link prediction Alternative Career Suggestion. Oftentimes, individuals may be interested in a particular job title, but do not possess the 0.8 0.6 0.4 0.2 ) 1 F ( k s a T n o i t a c fi i s s a l C ) I M A ( k s a T g n i r e t s u l C 1 0.8 0.6 0.4 0.2 Macro-F1 Micro-F1 0.8 0.6 0.4 0.2 Macro-F1 Micro-F1 0.8 0.6 0.4 0.2 Macro-F1 Micro-F1 0.8 0.6 0.4 0.2 ) 1 F ( k s a T n o i t a c fi i s s a l C Macro-F1 Micro-F1 0.8 0.6 0.4 0.2 Macro-F1 Micro-F1 0.8 0.6 0.4 0.2 Macro-F1 Micro-F1 6 8 10 12 50 window size kw 150 100 200 embedding size d 250 2 6 4 star size ks 8 10 40 60 80 100 120 walk length l 140 160 5 10 15 walk per node w 20 0 40 20 80 jump probability α (%) 60 Skill-Domain Member-Industry Title-Specialty 6 8 10 12 window size kw 1 0.8 0.6 0.4 0.2 Skill-Domain Member-Industry Title-Specialty 1 0.8 0.6 0.4 Skill-Domain Member-Industry Title-Specialty 1 0.8 0.6 0.4 ) I M A ( k s a T g n i r e t s u l C Skill-Domain Member-Industry Title-Specialty 1 0.8 0.6 0.4 Skill-Domain Member-Industry Title-Specialty 50 200 150 100 embedding size d 15 walk per node w Fig. 4. Parameter sensitivity test for classification and clustering tasks on LinkedIn-44M. 40 60 80 100 120 140 160 4 star size ks walk length l 250 10 5 6 8 10 0.2 2 0.2 0.2 1 0.8 0.6 0.4 0.2 0 20 Skill-Domain Member-Industry Title-Specialty 20 80 jump probability α (%) 60 40 necessary skill set. In this case, we may wish to show the alter- native job titles that do not require certain skills. We achieve this goal by subtracting the missing skill from the title's representation. Tab. V shows alternative job recommendations for senior audit accountant without requiring a CPA license. Note that the returned alternative jobs also preserves the seniority of the given job title. General Similarity Search. The learned representations can also perform general similarity searches between arbitrary nodes regardless of node types. These searches can be used to infer relationships that are absent from the graph. These inferred relationships allow members to gain valuable insights to better their place in the network. G. Hyper-parameter Sensitivity Here we study the hyper-parameter sensitivity of Star2Vec and report the relationship between Star2Vec performance as a function of its various hyper-parameters. These include the window size kw, the node embedding size d, the star size ks, the random walk length l, the number of walks per node w, and the jump probability α. The hyper-parameter sensitivity results on two tasks are illustrated in Fig. 4. We find that the performance of Star2Vec is stable and largely insensitive to most of the hyper-parameters. The primary exception is, as excepted, the embedding size d. Another particularly interest- ing finding is that the model's performance remains largely unchanged when ks or kw is changed. This demonstrates that training with long, reliable simple paths can achieve results similar to models trained with shorter, star-structured paths covering the same number of nodes. V. RELATED WORK A variety of Representation Learning (RL) models have been developed to learn network embeddings in recent years. Here we group them by their inputs. Network Embedding. Homogeneous by random walk-based RL Word2Vec [28], a number of models have been proposed [5], [7], [29]. Just as Word2Vec updates each word embedding to match those within the same sentence, these models update each node-embedding to Inspired match its neighboring nodes on truncated random walk paths. LINE [6] and HOPE [30] take a different approach and learn node-embeddings through matrix factorization-like objectives. SNDE [15], on the other hand, uses an auto-encoder to learn node-embeddings from second-order proximity data. MVE [31] separates a network into multiple views and learn node representations using attention. CTDNE [29] uses a temporal random walk method to consider the temporal neighborhood. Despite their differences, these models only use un-typed topological information and therefore miss the rich information encoded in the node types. Network Embedding with Rich Features. To address the limitations that accompany homogeneous network embedding, several models have been proposed to augment the network in order to generate better network representations. LANE [8] uses an auxiliary attribute network and node labels to learn node embeddings jointly. SNE [13], on the other hand, encode attributes into embeddings and utilizes MLP to learn node representations. TriDNR [18] uses two skip-gram models to jointly train node embeddings from a node's content and neighbors. Although these methods have shown promising results by augmenting the graph with additional features, they either have a high O(V 2) time complexity or require additional features which may not be available in all networks. More- over, these models were evaluated on limited sized networks, which is not applicable to real-world online networks, such as Economic Graph's million-node scale. Recently, RGCN [32] studies learning robust network embeddings against small deliberate perturbations in graph structures, but it does not address how to handle existing ambiguous social connections that appear in many real-world social networks. Heterogeneous Network Embedding. Metapath2Vec [12] is a graph embedding model that guides the random walk with human-curated metapaths over HINs. Other models have extended this idea into meta-graph walks [33], [34]. How- ever, the problem of generating informative metapaths is still unclear. ImVerde designed a vertex-diminished random walk method to boost the probability of visiting nodes from the same class [35]. This approach can better separate nodes from different classes but will penalize inter-class related- ness. Knowledge Graph Completion methods [36] -- [40] can be viewed as heterogeneous embedding models, but they are explicitly designed for link prediction and are not well suited for node classification and clustering tasks, especially when the relationship type is absent. VI. CONCLUSIONS AND FUTURE WORK In this work, we presented a heterogeneous professional social network representation learning model that 1) addresses the ambiguous social connection and incomplete network problem by designing a social connection strength-aware random walk method without introducing additional model parameters, and 2) utilizes rich entity types to learn person and entity embeddings jointly with a node-structure expansion function. Star2Vec outperforms existing models on three het- erogeneous social network datasets across different scales and tasks, which highlights the necessity to rectify ambiguous so- cial connections in heterogeneous social networks, leveraging unobserved social connections, and modeling person and entity embeddings jointly. We also conducted extensive case studies to demonstrate how to use these embeddings to discover professional insights and power other recommendation tasks. As for future work, we will incorporate rich contextual features into Star2Vec in a scalable way. Another interesting extension would be to further improve the model's ability to estimate the social connection strength. Acknowledgements. This work is partially supported by the US Army Research Office (ARO W911NF-17-1-0448). REFERENCES [1] S. Bhagat, G. Cormode, and S. Muthukrishnan, "Node classification in social networks," in Social network data analytics. Springer, 2011, pp. 115 -- 148. [2] S. Fortunato, "Community detection in graphs," Physics reports, vol. 486, no. 3, pp. 75 -- 174, 2010. [3] T. Zhou, J. Ren, M. Medo, and Y.-C. Zhang, "Bipartite network projection and personal recommendation," Physical Review E, vol. 76, no. 4, p. 046115, 2007. [4] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for social networks," JASIST, vol. 58, no. 7, pp. 1019 -- 1031, 2007. [5] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social representations," in SIGKDD, 2014, pp. 701 -- 710. [6] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large- scale information network embedding," in WWW, 2015, pp. 1067 -- 1077. [7] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in SIGKDD, 2016, pp. 855 -- 864. [8] X. Huang, J. Li, and X. Hu, "Label informed attributed network embedding," in WSDM, 2017, pp. 731 -- 739. [9] S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang, "Heterogeneous network embedding via deep architectures," in KDD, 2015, pp. 119 -- 128. [10] L. Liao, X. He, H. Zhang, and T.-S. Chua, "Attributed social network embedding," IEEE Trans. on Knowledge and Data Engineering, vol. 30, no. 12, pp. 2257 -- 2270, 2018. [11] H. Gao and H. Huang, "Deep attributed network embedding." in IJCAI, 2018, pp. 3364 -- 3370. [12] Y. Dong, N. V. Chawla, and A. Swami, "metapath2vec: Scalable representation learning for heterogeneous networks," in SIGKDD, 2017, pp. 135 -- 144. [13] L. Liao, X. He, H. Zhang, and T.-S. Chua, "Attributed social network embedding," arXiv preprint arXiv:1705.04969, 2017. [14] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li, "Rolx: structural role extraction & mining in large graphs," in SIGKDD, 2012, pp. 1231 -- 1239. [15] D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in SIGKDD, 2016, pp. 1225 -- 1234. [16] C. Yang, M. Sun, Z. Liu, and C. Tu, "Fast network embedding enhancement via high order proximity approximation," in IJCAI, 2017. [17] W. L. Hamilton, R. Ying, and J. Leskovec, "Representation learning on graphs: Methods and applications," arXiv preprint arXiv:1709.05584, 2017. [18] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang, "Tri-party deep network representation," Network, vol. 11, no. 9, p. 12, 2016. [19] C. Shi, Y. Li, J. Zhang, Y. Sun, and P. S. Yu, "A Survey of Heterogeneous Information Network Analysis." IEEE Trans. on Knowledge and Data Engineering, vol. 29, no. 1, pp. 17 -- 37, 2017. [20] N. Lao and W. W. Cohen, "Relational retrieval using a combination of path-constrained random walks," Machine learning, vol. 81, no. 1, pp. 53 -- 67, 2010. [21] Y. Sun, B. Norick, J. Han, X. Yan, P. S. Yu, and X. Yu, "Pathsel- clus: Integrating meta-path selection with user-guided object clustering in heterogeneous information networks," ACM Trans. on Knowledge Discovery in Databases, vol. 7, no. 3, p. 11, 2013. [22] L. A. Gal´arraga, C. Teflioudi, K. Hose, and F. Suchanek, "Amie: associ- ation rule mining under incomplete evidence in ontological knowledge bases," in WWW. ACM, 2013, pp. 413 -- 422. [23] B. Shi and T. Weninger, "Discriminative predicate path mining for fact checking in knowledge graphs," Knowledge-Based Systems, vol. 104, pp. 123 -- 133, 2016. [24] T. Mikolov, K. Chen, G. Corrado, and J. Dean, "Efficient estimation of word representations in vector space," arXiv preprint arXiv:1301.3781, 2013. [25] J. Leskovec and J. J. Mcauley, "Learning to discover social circles in ego networks," in NeurIPS, 2012, pp. 539 -- 547. [26] N. X. Vinh, J. Epps, and J. Bailey, "Information theoretic measures for clusterings comparison: Variants, properties, normalization and correc- tion for chance," Journal of Machine Learning Research, vol. 11, pp. 2837 -- 2854, 2010. [27] L. Li, H. Jing, H. Tong, J. Yang, Q. He, and B.-C. Chen, "Nemo: Next career move prediction with contextual embedding," in WWW, 2017, pp. 505 -- 513. [28] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their composi- tionality," in NeurIPS, 2013, pp. 3111 -- 3119. [29] G. H. Nguyen, J. B. Lee, R. A. Rossi, N. K. Ahmed, E. Koh, and S. Kim, "Dynamic network embeddings: From random walks to temporal random walks," in BigData. IEEE, 2018, pp. 1085 -- 1092. [30] M. Ou, P. Cui, J. Pei, Z. Zhang, and W. Zhu, "Asymmetric transitivity preserving graph embedding." in SIGKDD, 2016, pp. 1105 -- 1114. [31] M. Qu, J. Tang, J. Shang, X. Ren, M. Zhang, and J. Han, "An Attention- based Collaboration Framework for Multi-View Network Representation Learning." in CIKM. ACM, 2017, pp. 1767 -- 1776. [32] D. Zhu, Z. Zhang, P. Cui, and W. Zhu, "Robust Graph Convolutional Networks Against Adversarial Attacks," in SIGKDD. Anchorage, AK, USA: ACM, 2019, pp. 1399 -- 1407. [Online]. Available: http://dl.acm.org/citation.cfm?doid=3292500.3330851 [33] V. Fionda and G. Pirr`o, "Meta structures in knowledge graphs," in ISWC, 2017, pp. 296 -- 312. [34] H. Jiang, Y. Song, C. Wang, M. Zhang, and Y. Sun, "Semi-supervised learning over heterogeneous information networks by ensemble of meta- graph guided random walks," in IJCAI, 2017. [35] J. Wu, J. He, and Y. Liu, "Imverde: Vertex-diminished random walk for IEEE, 2018, learning imbalanced network representation," in BigData. pp. 871 -- 880. [36] A. Bordes, N. Usunier, A. Garc´ıa-Dur´an, J. Weston, and O. Yakhnenko, "Translating Embeddings for Modeling Multi-relational Data." in NeurIPS, 2013, pp. 2787 -- 2795. [37] Y. Lin, Z. Liu, M. Sun, Y. Liu, and X. Zhu, "Learning entity and relation embeddings for knowledge graph completion." in AAAI, 2015, pp. 2181 -- 2187. [38] B. Shi and T. Weninger, "Proje: Embedding projection for knowledge graph completion." in AAAI, 2017, pp. 1236 -- 1242. [39] T. Dettmers, P. Minervini, P. Stenetorp, and S. Riedel, "Convolutional 2d knowledge graph embeddings," arXiv preprint arXiv:1707.01476, 2017. [40] B. Shi and T. Weninger, "Open-world knowledge graph completion," in Thirty-Second AAAI Conference on Artificial Intelligence, 2018.
1912.03750
1
1912
2019-12-08T20:15:20
Determining Individual Origin Similarity (DInOS): Binary Classification of Authors Using Stylometric Features
[ "cs.SI" ]
Author similarity and detection is an integral first step in detecting state-led disinformation campaigns in an automated fashion. Current detection techniques require an analyst or subject matter expert to hand-curate accounts. Stylometric features have a rich history in identifying authorship of unknown documents, but little exploration has been done to compare authors to one another. We have adapted a select handful of stylometric features for use in author similarity metrics, and show their >0.96 F-1 performance on a curated author classification task, across both traditional machine learning and deep learning models. These features should contribute to the expanding field of author similarity research, and expedite the process of detecting and mitigating large-scale social media disinformation campaigns.
cs.SI
cs
Determining Individual Origin Similarity (DInOS): Binary Classification of Authors Using Stylometric Features Kingsland, A., Fortin, D., Cary, E., Smith, S., Pazdernik, K., and Perko, R. Pacific Northwest National Laboratory October 25, 2019 Abstract Author similarity and detection is an integral first step in detecting state-led disinformation campaigns in an automated fashion. Current detection techniques require an analyst or subject matter expert to hand-curate accounts. Stylometric features have a rich history in identifying authorship of unknown documents, but little exploration has been done to compare authors to one another. We have adapted a select handful of stylometric features for use in author similarity metrics, and show their >0.96 F-1 performance on a curated author classification task, across both traditional machine learning and deep learning models. These features should contribute to the expanding field of author similarity research, and expedite the process of detecting and mitigating large-scale social media disinformation campaigns. I. Introduction In 2016, the Russia-based Internet Research Agency (IRA) conducted a multifaceted information warfare campaign at the direction of the Russian government [1, 2]. By posting a massive volume of falsified and de- ceptive information across a spectrum of social media and other online platforms, IRA operatives worked to undermine Americans faith in the 2016 U.S. electoral process and government institutions, as well as exacer- bate political polarization by exploiting cultural and so- cietal divisions [1, 3, 4]. Ongoing examination of these influence campaigns show evidence that not only has Russia continued to use this tactic to support their pol- icy narratives and objectives, but that other state and non-state actors are emulating these tactics for their own use [1, 3]. Since the events of 2016, Twitter [5] and other social media platforms such as (but not lim- ited to) Instagram, Facebook, and Tumblr [1, 4, 6] have collected and published evidence of the IRAs efforts to manipulate and deceive audiences both inside and outside of the United States. Detection of troll-like user accounts is a first step in uncovering larger state- sponsored adversaries that are attempting to erode pub- lic trust in democratic institutions and processes. Un- covering these users, though, is currently a time- and labor-intensive process that relies on analysts, subject matter experts, or content moderators evaluating ac- counts by hand in an effort to discover adversary nar- ratives and map troll dissemination networks. Many accounts, in order to evade detection, engage in the process of persona-building, or posting otherwise harm- less materials to help establish their footprint as a le- gitimate account before publishing their deceptive or manipulative payload [1]. This can make it difficult to detect accounts of interest using solely content-based metrics. There is a large body of work in authorship attribu- tion through use of stylometrics [7 -- 14], a field which at- tempts to match documents of unknown origins to their author. Stylometrics applies features like frequency of specific punctuation and n-grams, number of characters and words, part of speech usage, vocabulary diversity, and spelling and grammatical errors. Stylometry, how- ever, has only just begun to be applied to the field of author similarity detection [15 -- 17], though it has been proposed as early as 1987 with PCA [18, 19]. We believe that by applying stylometric features to text and incorporating them into machine learning pipelines, we will be able to accurately predict certain behaviors or qualities of relevance to national security. This would increase the speed and precision by which analysts may identify problematic accounts, and allow institutions to counter these information warfare cam- paigns in a more timely and effective manner. Stylo- metrics are also inherently devoid of metadata and, as such, they are platform-agnostic; that is, a fully-realized model should be able to detect similar users across plat- forms. In this work, we focus on binary classification of Twit- 1 ter data as a proof-of-concept for the use of stylomet- rics on author similarity tasks; we explore a custom troll/not-troll dataset, which shows high performance across multiple machine learning models. We also high- light current data limitations for author similarity tasks, and consider which models and stylistic features are most appropriate going forward. II. Troll / not-Troll Dataset We developed a binary classification dataset: troll au- thors and non-troll authors. For the positive (troll) au- thors, we used the dataset released by Twitter [5] which contained tweets the platform attributed to the IRA's information warfare campaign directed against the 2016 presidential elections. The IRA dataset contains tweets from known IRA trolls, including many tweets of "in- nocent" persona-building as well as more nefarious and divisive tweets (narrative payloads). Overall this class had over 53 million English tweets across 2,560 users. The negative (not-troll) authors were taken from a gar- den hose Twitter drip over five days of July 2019. This class had over 21 million English tweets across over 125,000 users. Overall we found this dataset to be adequate to show- case the performance of our novel author similarity fea- tures and to compare multiple analysis methods. How- ever, due to several assumptions made on the part of the authors, some limitations may exist in the dataset. We assumed that troll-like behavior was not present or otherwise negligible in the garden hose data. We also assumed that weighing the models' loss functions for the different classes would account for the extreme im- balance in the number of authors for each label, and that the imbalance in the number of tweets would not affect performance. The final assumption is that the two sources are similar enough to merge, even given the multi-year gap between them. III. Features III.1. Readability • The Dale-Chall readability formula [22] (DCRF): DCRF = words 0.1579(cid:18) difficult words +0.0497(cid:18) words sentences(cid:19) +(3.6365 if difficult words else 0 × 100(cid:19) (1) words > 0.05, , where "easy" words are from a 3,000-word pre- determined list [22], and "difficult" words are all those which are not easy. • The Automated readability index [23] (ARI): ARI = 4.71(cid:18) characters words (cid:19) + 0.5(cid:18) words sentences(cid:19) − 21.43 (2) • The SMOG index [24]: SMOG = 1.043rpolysyllables × + 3.1291, 30 sentences (3) where "polysyllables" refer to words which have 3 or more syllables. • The Gunning fog index [25] (GFI): GFI = 0.4h(cid:18) words sentences(cid:19) + 100(cid:18) complex words (cid:19)i, (4) where "complex" words are those which are both polysyllables, as defined by SMOG, and are diffi- cult words, as defined by DCRF. • The Coleman-Liau index [26] (CLI): words(cid:19) CLI = 0.0588(cid:18) letters − 0.2996(cid:18) sentences words (cid:19) − 15.8 There are many instances where an author's writing ability and command of the English language can be informative. Non-native English speakers may have a more limited vocabulary [20], or make common gram- matical and spelling errors [21]. Intuition would also suggest that a human author would write at about the same level, regardless of the topic, platform, or user account that they were currently using. We propose using the following readability metrics as features, all intended to (roughly) represent reading grade level from 0 -- 12, in our author similarity task: • The Flesch Kincaid grade level [27] (FKGL): FKGL = 0.39(cid:18) words sentences(cid:19) words (cid:19) − 15.59 + 11.8(cid:18) syllables • The Linsear write formula [28] (LW): LW = LWr 2 −(1 0 if LWr > 20, else , 2 (5) (6) (7) where the provisional result, LWr, is given by: LWr = 2 × brachysyllables + 3 × polysyllables sentences , (8) where "brachysyllables" are words with 1 or 2 sylla- bles, and "polysyllables" are words with 3 or more syllables. • The text standard (µ), as defined by the mode of the above tests: µ = mode(cid:0)DCRF, ARI, SMOG, GFI, . CLI, FKGL, LW(cid:1) (9) We use the mode to filter out extreme values and accurately represent the models' consensus. III.2. Lexical A person's lexicon and use thereof should remain con- sistent, regardless of topic. We identified several lexical features to use in our author similarity model: • Statistics on a user's post length; the minimum, mean, median, and maximum number of characters were each used as individual features. • The minimum, mean, median, and maximum num- ber of unique words in a post. • The author's overall minimum, mean, and maxi- mum word length. • 1,000 features from what we are calling the "Bur- rows' Z" metric, described in detail in Section III.4, which effectively captures an author's unique lex- ical fingerprint, as compared to other authors in the corpus. III.3. Syntactic As with lexical features, a person's use of language should remain consistent, even across varied topics. We calculated syntactic features for each post, and aggre- gated them at the author level in an attempt to capture this effect. Author aggregations were the minimum, mean, median, and maximum across all of their post features. We calculated the post features as: • Punctuation density (number of punctuation to- kens divided by total number of tokens) • Word density • Digit density • Special token (e.g. emoji) density • Stop word density • Meaningful word density • Parts of speech densities; that is, for every present part of speech (e.g. "adverb") the number of its occurrences divided by the number of words We have provided exact definitions for each of these categories as outlined in Section III.4. III.4. Technical Details For all models, all text was converted to lowercase, and tokens were separated from the text based on whitespace. Non-alphabetic characters were treated as separate tokens. Token classification was done with the Python 3.6 string [29] library: punctuation to- kens were considered to be any with a first character present in punctuation, word tokens with first char- acter in ascii, and digit tokens with first character in digits. Special tokens were defined as any token present that was neither punctuation, word, nor digit. Stop words were any word token present within the En- glish list provided by nltk's [30] corpus.stopwords. Meaningful words were any word token not within the stop word list. Part of speech tags were calculated us- ing nltk's [30] pos tag, with only word-labeled tokens passed to the parser. Words' syllables were calculated with the pyphen [31] package. Sentences were counted approximately, by summing the number of ".", "?", and "!" special characters in each message. We forced a min- imum count of one sentence. We additionally developed a set of 1,000 lexical fea- tures (given in Appendix I) adapted from Burrows' Delta method [32], which has been routinely used in author identification tasks. We call this feature set Bur- rows' Z, defined as the element-wise Z-score for author a: Za = (Xa − µ) ⊙(cid:20) 1 σ0 , . . . , 1 σn(cid:21) , (10) where µ is the element-wise mean of all Xa, σ is the element-wise standard deviation of the same (a vector from σ0 to σn), ⊙ is the element-wise multiplicative operator, and each Xa is defined by Xa =   Pa(w0) Pa(w1) ... Pa(wn−1) Pa(wn)   , (11) where Pa(wi) is the fraction of author a's words that are wi. Each Xa is calculated with the n most-common words in the corpus; in our case we chose the top 1,000. Calculating the Burrows' Z-score in this manner has several important side-effects. Firstly, the corpus is nor- malized by author vectors, Xa, so that all authors are equally weighted within µ, regardless of the number of posts in the corpus. Secondly, each feature, Pa(wi), is 3 scaled by the standard deviation, σi, to better differ- entiate usage at the tails of the distribution. Finally, scaling by the mean and standard deviation of each fea- ture means that all of the features lie on the same scale, regardless of the frequency of their use within the cor- pus. All features (readability, lexical, and syntactic) were de-skewed using the Yeo-Johnson [33] transform, as im- plemented by sklearn [34], and then scaled to a mean of 0 with a standard deviation of 1. We constructed a fourth model, an ensemble voting classifier, using sklearn [34]. The model used each of the previous three models as sub-models, each imple- mented with its best hyper-parameters and weighed by its tuned performance, as defined by macro average F1- score, given in Table 3. The voting was conducted with soft voting, meaning that each model's probability of a given prediction were taken into account during the voting. IV. Experiments IV.2. Deep Learning Model IV.1. Statistical Models We built and optimized three independent machine learning models: random forest, support vector ma- chine (SVM), and extreme gradient boost (XGBoost) decision trees, as implemented by sklearn [34] and xgboost [35], respectively. All models used balanced class weights, such that each class contributed equally to the loss. We tuned the model hyper-parameters on the troll/not-troll dataset using Ray/Tune 0.7.3 [36] with 1,000 trials for each model. Each trial had parame- ters randomly selected from pre-determined distribu- tions given in Table 1. The final parameters were taken from the best models, as defined by macro average F1- score on validation data, and given in Table 2. Model Parameter Range Random Estimators Forest Max. features Max. depth Min. sample leaf Min. sample split Z ∈ [20, 1000] {log, sqrt} Z ∈ [10, 110] Z ∈ [1, 5] Z ∈ [2, 10] SVM Kernel *Penalty param. {linear, rbf} R ∈ [1e−1, 1e3] XGBoost Estimators Max. depth *Learning rate *Gamma Deep Learning Nodes per layer Batch size Hidden layers *Learning rate Z ∈ [20, 1000] Z ∈ [1, 20] R ∈ [1e−4, 1e−1] R ∈ [1e−4, 1e0] Z ∈ [8, 64] Z ∈ [16, 128] Z ∈ [0, 16] R ∈ [1e−5, 1e2] Table 1: Parameter ranges used during hyper-parameter tuning of all models. All parameters were sampled from a random uniform distribution except where noted with an asterisk (*), which indicates a log-uniform distribution. In- teger parameters are represented by the letter Z, and real- valued numbers by R. Square brackets indicate that all num- bers within the range were considered, including both end- points. Curly braces indicate that the possible values were a set of equally-likely non-numerical choices. 4 We created a deep learning model with densely- connected layers using PyTorch 1.2.0 [37]. We used the ReLU activation between each layer. Our final ac- tivation was a sigmoid function, and our loss function was binary cross-entropy, which we weighed such that each category (e.g. "troll" or "not-troll") contributed equally to the loss, regardless of any data imbalance. We optimized using the Adam [38] optimizer, using be- tas of 0.9 and 0.999, epsilon 1e−8, and weight decay 0. We refined the model hyper-parameters using Ray/Tune 0.7.3 [36] to perform a meta-parameter search on 32 (troll) trials with parameter selection cri- teria given by Table 1. Trials were stopped early if the test loss rose above 1.0 or at 10 epochs, whichever oc- curred sooner. We chose the final parameters, given in Table 2 from the trial epoch with the highest macro average F1-score. Model Parameter Random Estimators Forest Max. features Max. depth Min. sample leaf Min. sample split SVM Kernel Penalty param. XGBoost Estimators Max. depth Learning rate Gamma Deep Learning Nodes per layer Batch size Hidden layers Learning rate Best Value 346 sqrt 10 4 4 rbf 1.0e0 705 4 9.0e−2 3.4e−1 61 118 6 5.6e−4 Table 2: The best meta-parameters for each model, as opti- mized on the troll/not-troll dataset. The best models were defined as those having the highest macro average F1-score. Model Macro Precision Recall F1-score Macro Macro Random Forest SVM XGBoost Voting Deep Learning 0.99 0.91 0.99 0.99 0.96 0.90 0.92 0.93 0.90 0.91 0.94 0.92 0.96 0.94 0.93 Table 3: Performance results for all tuned models on the troll/not-troll dataset. Precision can be thought of as the true positive rate, and recall as the detection rate. Both are reported as the macro average, which is the mean of both troll and not-troll performance (equally weighted). The F1- score is the harmonic mean of precision and recall. XGBoost out-performs all other models on all measures. V. Results and Discussion Performance results across all models are given in Ta- ble 3. Extreme gradient boost (XGBoost) out-performs all other models across all metrics, and all of the statistic-based models out-performed the deep learning model. This is likely due to the deep learning model overfitting the data very quickly -- almost all parameters' F1-score peaked at only one epoch. Overfitting would likely be slowed by much smaller learning rates, but it is unlikely that the final performance would out-perform that of XGBoost. For the troll/not-troll dataset, we recommend using the XGBoost model, as it is the most performant. Our performance is quite high, despite our imple- menting several readability features in Section III.1 in a crude fashion. For instance, the SMOG index was normalized on texts of 30 sentences, a length which we were unable to match given the short-message format of Twitter. We also made two concessions in favor of scal- ability: while matching against the "easy" word list for Dale-Chall and Gunning fog, we eschewed the require- ment that words be compared against their base form. We forwent accurate sentence delineation, instead elect- ing to count sentences based on quantity of punctua- tion. As we are measuring author similarity and not grade-level reading, we are not so much concerned with the accuracy of a given readability score, so much as consistency and reproducibility, which our features pro- vide. Indeed, the high performance of all models on the troll/not-troll dataset indicate that our feature se- lection was appropriately predictive for this data. It is possible that our models over-performed due to the inherent structure of our data set, having been joined from two disparate sources. For instance, the word "epstein" was trending in the garden hose data (8,171 uses) but not in the IRA dataset (202 uses), which could be used to create very accurate labels based on the time period difference, but not necessarily on the users. Most words, however, did not appear to be repre- sentative of a given time frame. On a surface level, these words can appear to be quite mundane, but still highly predictive of troll-like behavior (i.e. "sports," "local," or "news"). Many stopwords, which are by definition not correlated to any particular time event, were also indicative of trolls (i.e. "after," "against," or "over"). Other stopwords were anti-correlated with troll-like be- havior (i.e. "dont," "been," or "ve"), which we hypothe- size is due to language mastery, specifically with regard to contractions. Overall, these seemingly-benign words show some of the underlying structure of the troll-like narratives, and in a manner detectable by our features. Our approach provides a solid foundation for author similarity detection, even with a noisy data source. VI. Conclusions High-volume author similarity and detection techniques are critical, not only in research applications, but with grave national security consequences. Through the course of this study, we showed how the study of sty- lometrics, mostly used for author attribution, could be successfully adopted for author similarity and detection tasks. Our classification models were highly performant on our stlye-based features, independently of model se- lection and implementation. Our results could be some- what inflated due to the incongruence of our data set: for future work, we heartily recommend more balanced data all taken within the same context and time period. Author similarity models should help not only pre- vent future adversary-sponsored attempts at election interference, but also in detecting other coordinated at- tempts to sow discord, undermine civic trust in gov- ernment institutions and processes, and propagate ad- versarial policy objectives and narratives. Stylometric features, specifically, are inherently well-suited to cross- platform research and threat detection; they are not limited to one social media website's metadata format. As more robust datasets for author similarity emerge, we expect to see stylometric features increase in promi- nence. More complex features, such as bigrams, gram- matical errors, and usage anomalies, should be inves- tigated. We also hope to explore multilingual models in order to remove the current requirement of English- only text when threats exist world-wide. Finally, with more refined data, features, and models, we would hope to accomplish true author detection tasks. In particu- lar, pinpointing a specific human with multiple user ac- counts, rather than this first elementary step of binary classification. VII. References [1] Select Committee on Intelligence. Russian Active Mea- sures Campaigns and Interference in the 2016 U.S. Election, Report 116-XX, volume 2: Russia's use of 5 Social Media with Additional Views. United States Senate, 116th Congress, 1st Session. [2] Assessment, I. C. Assessing russian activities and inten- tions in recent US elections 2017-01d. Technical report, Office of the Director of National Intelligence, 2017. [3] Mazarr, M. J., et al. Hostile social manipulation present realities and emerging trends. Technical report, RAND Corporation Santa Monica United States, 2019. [4] DiResta, R., et al. The Tactics & Tropes of the Internet Research Agency. New Knowledge, 2018. [5] Twitter. IRA Twitter data, 2018. URL [18] Burrows, J. F. Word-patterns and story-shapes: The statistical analysis of narrative style. Literary & Lin- guistic Computing, 2(2):61 -- 70, 1987. [19] Burrows, J. F. Not unles you ask nicely: The interpreta- tive nexus between analysis and information. Literary and Linguistic Computing, 7(2):91 -- 109, 1992. [20] Mokhtar, A. A. Achieving native-like English lexical knowledge: The non-native story. Journal of Language Teaching & Research, 1(4), 2010. [21] Futagi, Y., P. Deane, M. Chodorow, and J. Tetreault. A computational approach to detecting collocation er- rors in the writing of non-native speakers of English. Computer Assisted Language Learning, 21(4):353 -- 367, 2008. https://about.twitter.com/en_us/values/elections-integrity.html#data. [6] Tumbler. Public record of usernames linked to state-sponsored disinformation campaigns, 2018. URL https://tumblr.zendesk.com/hc/en-us/articles/360002280214. [22] Chall, J. S. and E. Dale. Readability Revisited: The New Dale-Chall Readability Formula. Brookline Books, 1995. [7] Malyutov, M. B. Authorship attribution of texts: A review. In General Theory of Information Transfer and Combinatorics, pages 362 -- 380. Springer, 2006. [8] Pavelec, D., et al. Compression and stylometry for au- thor identification. In 2009 International Joint Con- ference on Neural Networks, pages 2445 -- 2450. IEEE, 2009. [9] Stamatatos, E. A survey of modern authorship at- tribution methods. Journal of the American Society for information Science and Technology, 60(3):538 -- 556, 2009. [10] Layton, R., P. Watters, and R. Dazeley. Authorship attribution for Twitter in 140 characters or less. In 2010 Second Cybercrime and Trustworthy Computing Workshop, pages 1 -- 8. IEEE, 2010. [11] Narayanan, A., et al. On the feasibility of internet- scale author identification. In 2012 IEEE Symposium on Security and Privacy, pages 300 -- 314. IEEE, 2012. [12] Rocha, A., et al. Authorship attribution for social IEEE Transactions on Information media forensics. Forensics and Security, 12(1):5 -- 33, 2016. [13] Overdorf, R. and R. Greenstadt. Blogs, Twitter feeds, and reddit comments: Cross-Domain authorship attri- bution. Proceedings on Privacy Enhancing Technolo- gies, 2016(3):155 -- 171, 2016. [14] Neal, T., et al. Surveying stylometry techniques and ap- plications. ACM Computing Surveys (CSUR), 50(6):86, 2018. [15] Stolerman, A., R. Overdorf, S. Afroz, and R. Green- stadt. Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution. In IFIP Working Group, volume 11, page 64. 2013. [16] Afroz, S., et al. Doppelganger finder: Taking stylome- try to the underground. In 2014 IEEE Symposium on Security and Privacy, pages 212 -- 226. IEEE, 2014. [17] Almishari, M., D. Kaafar, E. Oguz, and G. Tsudik. Sty- lometric linkability of tweets. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, pages 205 -- 208. ACM, 2014. [23] Smith, E. A. and R. J. Senter. Automated readability index. Aerospace Medical Research Laboratories, 1967. [24] McLaughlin, G. H. SMOG grading -- A new readability formula. Journal of Reading, 12(8):639 -- 646, 1969. [25] Gunning, R. Technique of Clear Writing. McGraw-Hill, 1968. [26] Coleman, M. and T. L. Liau. A computer readabil- ity formula designed for machine scoring. Journal of Applied Psychology, 60(2):283, 1975. [27] Kincaid, J. P., R. P. Fishburne Jr, R. L. Rogers, and B. S. Chissom. Derivation of new readability formu- las (automated readability index, fog count and flesch reading ease formula) for Navy enlisted personnel. In- stitute for Simulation and Training, University of Cen- tral Florida, 1975. [28] Klare, G. R. Assessing readability. Reading Research Quarterly, 10(1):62 -- 102, 1974. [29] Python Software -- Common URL https://docs.python.org/3.6/library/string.html. Foundation. operations, string string 2016. [30] Bird, S., E. Klein, and E. Loper. Natural Language Pro- cessing With Python: Analyzing Text With The Natural Language Toolkit. O'Reilly Media, Inc., 2009. [31] Kozea Community. https://pyphen.org. Pyphen, 2008. URL [32] Burrows, J. Delta: A measure of stylistic difference and a guide to likely authorship. Literary and Linguistic Computing, 17(3):267 -- 287, 2002. [33] Yeo, I.-K. and R. A. Johnson. A new family of power transformations to improve normality or symmetry. Biometrika, 87(4):954 -- 959, 2000. [34] Pedregosa, F., et al. Scikit-learn: Machine learning Journal of Machine Learning Research, in Python. 12:2825 -- 2830, 2011. [35] Chen, T. and C. Guestrin. XGBoost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Dis- covery and Data Mining, pages 785 -- 794. ACM, New York, NY, USA, 2016. 6 [36] Liaw, R., et al. Tune: A research platform for dis- tributed model selection and training. arXiv preprint arXiv:1807.05118, 2018. [37] Paszke, A., et al. Automatic differentiation in PyTorch. In NIPS Autodiff Workshop. 2017. [38] Kingma, D. P. and J. Ba. Adam: A method for stochas- arXiv preprint arXiv:1412.6980, tic optimization. 2014. 7 Appendix I: Top troll/not-troll dataset 1,000 words in token 9 1 0 2 c e D 8 ] I S . s c [ 1 v 0 5 7 3 0 . 2 1 9 1 : v i X r a All word tokens used in the calculation of Burrows' Z. The number of uses (counts) are the number of times that token (regardless of case) appeared in our troll corpus. The troll percentage is the percentage of usages by positively-labeled trolls. Trolls accounted for 72.00% of the word tokens in the corpus. We also show the percentage points from random chance for each word token. Stopword tokens are indicated in bold. word token number of uses troll per- centage foke fukushima2015 fukushimaagain blicqer giselleevns danageezus blacklivesmatter topnews uthornsrawk lsu sanjose pjnet enlist showbiz newyork workout cleveland sports tcot talibkweli ukraine exercise fatal baltimore politics kansas mt shooting syria obamacare local charlottesville suspect nfl midnight news injured chicago cruz crash isis hillary entertainment comey nuclear 28,633 14,575 9,318 8,795 7,463 7,210 15,236 16,425 8,502 7,794 8,284 10,601 6,302 10,927 13,795 44,690 12,268 105,633 14,141 6,697 12,800 15,376 6,506 11,477 85,456 7,637 6,410 26,920 10,845 7,675 62,112 6,434 12,981 12,724 13,504 280,799 10,135 37,828 7,177 16,080 18,457 41,684 11,457 8,482 13,218 100.0 100.0 100.0 100.0 100.0 100.0 99.94 99.92 99.88 99.80 99.80 99.76 99.66 99.62 99.62 99.47 99.33 99.23 99.21 99.17 99.00 98.71 98.63 98.45 98.29 98.28 98.20 98.02 97.93 97.90 97.89 97.77 97.77 97.64 97.45 97.36 97.27 97.22 97.21 97.12 96.98 96.95 96.80 96.80 96.65 points from random (72.00) +27.99 +27.99 +27.99 +27.99 +27.99 +27.99 +27.93 +27.92 +27.88 +27.80 +27.80 +27.76 +27.66 +27.62 +27.62 +27.47 +27.33 +27.22 +27.21 +27.17 +27.00 +26.71 +26.63 +26.45 +26.29 +26.28 +26.20 +26.02 +25.93 +25.90 +25.89 +25.77 +25.77 +25.64 +25.45 +25.35 +25.27 +25.22 +25.21 +25.11 +24.98 +24.94 +24.80 +24.80 +24.65 baseball texas dies cops orleans arizona foxnews bush police christmas stocks weight county san officer obama ohio charged islamic driver clinton north gun debate health cop russia ban march teen rap environment budget sanders loss maga rally breaking turkey officers shot fired trial murder houston viral coach business tech killed islam quote fbi louisiana schools hillaryclinton east mayor liberals student university students nyc 1 count 9,326 31,408 12,687 12,978 11,948 6,392 11,284 7,075 75,410 8,027 6,649 10,565 16,190 17,726 14,784 74,987 7,790 13,819 7,552 7,962 37,896 17,414 14,372 9,847 36,862 9,530 18,950 9,232 6,747 10,333 14,825 6,852 6,661 8,700 8,435 23,924 9,212 58,196 6,787 7,232 24,120 7,542 7,285 12,366 7,067 6,304 6,589 39,739 15,139 29,967 6,460 13,455 13,250 7,953 6,468 7,547 8,590 9,826 10,648 8,357 6,431 8,955 13,946 troll % points 96.63 96.61 96.59 96.36 96.18 96.05 95.79 95.63 95.61 95.58 95.47 95.25 95.19 95.14 94.97 94.85 94.82 94.54 94.43 94.43 94.29 94.18 94.16 93.95 93.95 93.92 93.71 93.59 93.59 93.51 93.44 93.38 93.37 93.10 93.05 92.95 92.94 92.92 92.91 92.78 92.73 92.66 92.57 92.36 92.27 92.24 92.16 92.09 92.08 92.07 92.04 91.84 91.81 91.72 91.65 91.51 91.46 91.42 91.40 91.39 91.36 91.22 91.20 +24.63 +24.61 +24.59 +24.36 +24.18 +24.05 +23.79 +23.63 +23.61 +23.58 +23.47 +23.25 +23.19 +23.14 +22.97 +22.85 +22.82 +22.54 +22.43 +22.43 +22.29 +22.18 +22.16 +21.95 +21.95 +21.92 +21.71 +21.59 +21.59 +21.51 +21.44 +21.38 +21.37 +21.10 +21.05 +20.95 +20.94 +20.92 +20.91 +20.78 +20.73 +20.66 +20.57 +20.36 +20.27 +20.24 +20.16 +20.08 +20.07 +20.06 +20.04 +19.84 +19.81 +19.72 +19.64 +19.51 +19.46 +19.41 +19.40 +19.39 +19.36 +19.22 +19.20 token fire terror california senate governor crime arrested science protesters korea near guilty death violence football wins accused reports plans http hospital state protest russian west florida bill arrest muslims officials claims study usa liberal presidential charges gov refugees dead threat calls poll john supporters college washington school car search drug judge st battle ny gop victim election george freedom fraud latest woman talks count 25,081 6,619 13,457 12,432 6,586 17,708 19,781 7,753 6,330 11,232 12,701 8,387 24,971 9,990 8,543 9,307 12,238 9,046 8,089 16,494 6,548 39,911 7,579 10,814 12,474 8,024 24,629 7,988 7,414 11,239 9,812 7,406 19,999 10,730 7,821 9,103 7,053 8,155 25,009 7,315 15,508 9,948 15,772 8,583 10,025 9,692 26,209 20,274 6,683 8,273 15,304 12,522 6,344 6,337 24,482 6,473 15,674 6,997 9,781 6,269 13,380 40,607 7,454 troll % points token count troll % points 12,683 10,125 10,031 6,615 16,311 13,086 11,311 9,359 14,746 10,895 8,577 21,360 19,274 15,312 12,764 7,577 102,054 11,460 53,886 6,372 6,630 9,224 54,695 7,496 9,396 18,775 12,258 9,892 10,831 15,547 7,841 11,180 7,507 17,051 31,799 29,167 7,413 7,784 21,419 6,348 6,813 11,230 7,573 10,004 10,311 6,828 6,915 19,155 7,953 22,458 15,611 11,075 9,610 221,430 102,962 25,350 21,338 12,791 28,181 13,098 13,566 10,659 20,374 87.14 87.00 86.93 86.89 86.89 86.86 86.85 86.77 86.72 86.67 86.61 86.61 86.56 86.53 86.50 86.40 86.38 86.30 86.24 86.20 86.13 86.09 86.04 85.97 85.94 85.76 85.73 85.72 85.65 85.60 85.46 85.45 85.40 85.38 85.33 85.31 85.30 85.29 85.01 84.98 84.98 84.95 84.82 84.74 84.74 84.73 84.72 84.72 84.72 84.70 84.57 84.55 84.40 84.27 84.24 84.23 84.15 84.14 84.02 84.00 83.89 83.76 83.66 +15.14 +15.00 +14.92 +14.89 +14.89 +14.86 +14.85 +14.77 +14.72 +14.67 +14.61 +14.60 +14.56 +14.53 +14.50 +14.40 +14.37 +14.30 +14.24 +14.20 +14.13 +14.08 +14.04 +13.97 +13.93 +13.76 +13.73 +13.72 +13.65 +13.60 +13.45 +13.45 +13.39 +13.38 +13.33 +13.31 +13.30 +13.28 +13.01 +12.98 +12.98 +12.95 +12.82 +12.74 +12.74 +12.73 +12.72 +12.72 +12.72 +12.70 +12.57 +12.54 +12.40 +12.27 +12.23 +12.23 +12.15 +12.14 +12.01 +12.00 +11.89 +11.76 +11.65 91.17 91.08 91.01 90.98 90.98 90.96 90.77 90.54 90.45 90.44 90.39 90.34 90.28 90.18 90.05 89.94 89.93 89.78 89.76 89.75 89.70 89.66 89.64 89.49 89.45 89.34 89.23 89.23 89.20 89.12 89.11 89.08 89.06 89.04 88.99 88.93 88.91 88.90 88.82 88.81 88.73 88.70 88.60 88.52 88.41 88.41 88.30 88.16 88.14 88.11 88.08 88.03 87.98 87.97 87.75 87.74 87.58 87.52 87.46 87.46 87.44 87.27 87.25 +19.17 +19.08 +19.01 +18.98 +18.97 +18.96 +18.77 +18.54 +18.45 +18.44 +18.39 +18.34 +18.28 +18.17 +18.04 +17.94 +17.93 +17.78 +17.76 +17.75 +17.70 +17.66 +17.64 +17.49 +17.45 +17.34 +17.23 +17.23 +17.20 +17.12 +17.11 +17.08 +17.06 +17.04 +16.98 +16.93 +16.91 +16.90 +16.82 +16.81 +16.73 +16.69 +16.59 +16.52 +16.41 +16.41 +16.30 +16.16 +16.14 +16.11 +16.08 +16.03 +15.98 +15.97 +15.75 +15.74 +15.58 +15.52 +15.46 +15.46 +15.44 +15.27 +15.25 ex killing speech defense lose tax missing attacks south lead investigation report court campaign muslim bernie man park says cancer fat wall black success street cnn lives prison military plan afraid la ahead war true city meeting victims potus problems david security voters gives iran return patriots attack fox donald national fall james trump after found fight takes game kill star hurt run 2 token possible former leaders j https force race peace players case truth climate china may early hit chief among hits train york million control gets top video caught change service world worth five high htt rock money matter jobs beat monday against die year son winning rape trade mother dog died ft new saturday secret deal air life jail tv center policy broken vs count troll % points token count troll % points 12,629 7,431 16,503 15,148 12,735 6,636 8,575 7,544 7,580 48,934 6,276 9,418 13,874 10,724 10,058 7,202 75,434 7,293 10,387 11,998 27,376 8,659 40,117 9,917 11,002 9,499 46,709 14,803 6,904 8,404 22,817 8,409 8,807 20,503 15,480 7,884 8,810 10,834 6,486 13,257 6,943 6,655 11,659 787,576 7,306 9,518 8,007 19,882 15,794 12,571 15,575 9,510 11,040 6,324 7,240 11,234 32,570 8,210 31,332 9,516 37,111 7,747 6,682 80.44 80.36 80.33 80.28 80.22 80.16 80.16 80.06 80.02 79.98 79.95 79.95 79.85 79.84 79.83 79.70 79.65 79.65 79.61 79.61 79.59 79.58 79.48 79.48 79.47 79.43 79.35 79.33 79.28 79.27 79.26 79.15 79.15 79.12 78.98 78.98 78.92 78.91 78.90 78.88 78.87 78.84 78.83 78.76 78.74 78.69 78.65 78.48 78.42 78.38 78.38 78.33 78.32 78.30 78.30 78.20 78.15 78.12 78.11 78.11 78.10 78.10 78.06 +8.44 +8.36 +8.32 +8.27 +8.22 +8.16 +8.16 +8.06 +8.02 +7.98 +7.95 +7.95 +7.85 +7.84 +7.83 +7.69 +7.65 +7.65 +7.61 +7.61 +7.59 +7.58 +7.48 +7.48 +7.47 +7.43 +7.35 +7.33 +7.28 +7.27 +7.26 +7.15 +7.15 +7.12 +6.98 +6.98 +6.92 +6.91 +6.90 +6.88 +6.86 +6.84 +6.83 +6.76 +6.74 +6.69 +6.65 +6.48 +6.42 +6.38 +6.38 +6.33 +6.32 +6.30 +6.29 +6.20 +6.15 +6.12 +6.11 +6.10 +6.10 +6.10 +6.05 8,769 16,979 6,978 10,662 67,955 7,785 11,948 8,816 6,372 18,632 17,734 6,536 11,496 34,566 9,317 18,215 9,437 6,656 7,319 7,416 11,358 19,845 10,746 21,234 31,253 57,773 7,387 22,311 8,834 81,513 10,797 6,912 21,834 8,888 7,544 35,021 15,758 8,465 11,247 7,399 36,139 11,177 48,396 10,613 7,802 6,593 7,020 10,565 11,871 7,172 6,478 127,684 6,740 7,678 19,520 9,943 68,278 8,085 10,859 8,329 6,474 6,701 11,630 83.65 83.63 83.57 83.50 83.45 83.30 83.23 83.21 83.20 83.16 83.06 82.98 82.95 82.91 82.89 82.79 82.76 82.76 82.71 82.68 82.67 82.61 82.58 82.44 82.43 82.42 82.40 82.38 82.26 82.25 82.21 82.20 82.05 81.97 81.90 81.72 81.66 81.66 81.51 81.51 81.43 81.43 81.37 81.28 81.19 81.05 81.01 80.95 80.93 80.89 80.88 80.86 80.78 80.72 80.72 80.71 80.69 80.66 80.63 80.53 80.53 80.52 80.44 +11.65 +11.63 +11.57 +11.50 +11.45 +11.29 +11.23 +11.21 +11.20 +11.16 +11.05 +10.98 +10.95 +10.91 +10.89 +10.79 +10.76 +10.76 +10.71 +10.68 +10.67 +10.61 +10.58 +10.44 +10.43 +10.42 +10.40 +10.37 +10.26 +10.24 +10.21 +10.20 +10.05 +9.97 +9.90 +9.72 +9.66 +9.66 +9.51 +9.50 +9.43 +9.43 +9.37 +9.28 +9.19 +9.05 +9.01 +8.95 +8.93 +8.89 +8.88 +8.86 +8.78 +8.72 +8.72 +8.70 +8.69 +8.66 +8.63 +8.53 +8.53 +8.52 +8.44 others community fake water goes general pro michael awesome white billion strong side past photos wake over dem federal sometimes win worst house inside antifa record america stand bank father makes late action during set walk friday justice released shows rules games food in fear wife major law cause body history al future issues tells special media system home leader old visit cat 3 token via political terrorist lies pay ryan power facebook paul open due break public family behind republicans americans live must without rights running office ht meet road class town step sexual safe de problem mind become face season second won down cut head low wants questions line joe self under government outside lost three turn two anti great art happened make dems storm perfect count troll % points token count troll % points 6,861 11,174 9,810 7,217 11,023 16,927 8,032 45,123 27,402 43,924 6,741 32,807 10,251 7,659 23,945 10,044 13,033 9,650 15,581 9,842 6,612 22,743 6,598 6,718 8,090 9,322 7,694 9,928 7,721 8,579 7,681 6,865 6,728 37,724 9,920 7,500 9,934 60,234 24,974 17,647 9,148 8,178 9,389 6,622 9,964 232,479 35,667 32,493 8,028 6,403 15,201 12,488 659,166 21,252 6,990 21,657 63,784 12,962 8,638 6,294 6,396 13,131 7,129 76.11 76.06 76.06 76.04 76.03 76.00 75.97 75.89 75.89 75.88 75.87 75.84 75.84 75.83 75.82 75.71 75.70 75.68 75.66 75.64 75.60 75.59 75.58 75.57 75.55 75.53 75.39 75.35 75.33 75.33 75.32 75.32 75.26 75.20 75.19 75.17 75.15 75.11 75.11 75.11 75.08 75.07 75.03 74.96 74.93 74.93 74.92 74.84 74.83 74.74 74.73 74.72 74.65 74.53 74.43 74.42 74.42 74.40 74.26 74.24 74.23 74.20 74.20 +4.11 +4.06 +4.06 +4.04 +4.03 +4.00 +3.96 +3.89 +3.89 +3.88 +3.87 +3.84 +3.84 +3.83 +3.82 +3.71 +3.70 +3.68 +3.66 +3.64 +3.60 +3.59 +3.58 +3.57 +3.54 +3.52 +3.39 +3.35 +3.33 +3.33 +3.32 +3.32 +3.26 +3.20 +3.19 +3.17 +3.15 +3.11 +3.11 +3.11 +3.08 +3.07 +3.03 +2.96 +2.93 +2.92 +2.92 +2.83 +2.83 +2.74 +2.73 +2.72 +2.64 +2.53 +2.43 +2.42 +2.42 +2.40 +2.26 +2.24 +2.23 +2.20 +2.20 42,667 10,352 7,819 7,411 14,083 7,571 19,070 8,874 9,201 17,325 6,349 11,063 12,316 23,461 11,542 9,372 16,956 36,996 27,337 23,115 11,062 9,733 11,642 7,885 11,595 8,897 7,148 7,303 6,523 6,513 8,300 7,264 10,742 15,619 11,579 19,493 10,869 12,286 27,779 47,488 8,053 15,218 6,473 17,774 7,067 9,890 6,408 9,469 18,868 16,776 8,773 14,791 12,467 10,691 32,482 17,497 39,449 9,952 9,731 69,954 11,912 6,779 9,805 78.02 78.00 77.86 77.85 77.85 77.84 77.83 77.81 77.74 77.73 77.71 77.63 77.48 77.41 77.41 77.36 77.33 77.30 77.27 77.23 77.22 77.22 77.22 77.19 77.19 77.12 77.07 77.06 76.95 76.95 76.95 76.94 76.91 76.91 76.90 76.88 76.81 76.75 76.73 76.73 76.71 76.70 76.67 76.65 76.58 76.57 76.56 76.55 76.51 76.50 76.45 76.43 76.37 76.37 76.35 76.29 76.29 76.28 76.28 76.26 76.25 76.25 76.17 +6.01 +6.00 +5.86 +5.85 +5.85 +5.84 +5.83 +5.81 +5.74 +5.73 +5.71 +5.63 +5.48 +5.41 +5.41 +5.36 +5.33 +5.30 +5.27 +5.23 +5.22 +5.22 +5.21 +5.19 +5.19 +5.12 +5.06 +5.06 +4.95 +4.95 +4.95 +4.93 +4.91 +4.91 +4.90 +4.88 +4.81 +4.75 +4.73 +4.73 +4.71 +4.70 +4.67 +4.64 +4.57 +4.57 +4.55 +4.55 +4.51 +4.50 +4.44 +4.43 +4.37 +4.37 +4.35 +4.29 +4.29 +4.28 +4.28 +4.26 +4.24 +4.24 +4.17 series comes list paid move job trust into nothing off daughter things sign un believe super join republican stay save brown away mark company shut learn ones red mueller chance daily mexico cover could weekend release stupid than care wrong small light happen issue eat at watch american gay lying child hell s n himself end never words dream thinks deep young israel 4 token co more for times us play between another tomorrow press work mom cannot to close tried take crazy place women king everything alone before by find long lie big least try app moment on start real wanted day president say will left doesn music pick sick forget mike message week huge official through call again night of kids bring easy living protect smile count troll % points token count troll % points 31,185 121,907 23,286 10,025 23,971 8,722 23,427 9,616 12,448 109,820 31,478 8,709 7,036 15,985 9,756 27,438 274,393 9,905 51,218 11,370 8,094 45,012 10,304 34,737 30,461 10,976 9,885 79,009 24,861 175,889 52,202 7,740 6,626 9,683 7,881 11,055 9,141 43,638 8,846 37,826 7,084 6,309 15,836 7,113 149,723 6,455 14,381 13,741 44,767 124,788 9,167 156,218 8,005 16,218 46,970 6,363 20,290 8,119 6,765 8,438 57,495 6,551 19,254 72.37 72.35 72.28 72.26 72.23 72.21 72.21 72.19 72.18 72.15 72.13 72.07 72.07 72.06 72.04 72.04 72.01 72.00 72.00 71.98 71.96 71.95 71.94 71.92 71.90 71.89 71.84 71.76 71.76 71.74 71.69 71.69 71.64 71.64 71.56 71.56 71.55 71.55 71.53 71.51 71.48 71.46 71.44 71.43 71.39 71.38 71.31 71.31 71.31 71.28 71.27 71.21 71.20 71.15 71.10 71.03 71.01 70.99 70.98 70.97 70.96 70.95 70.93 +0.37 +0.35 +0.28 +0.26 +0.23 +0.21 +0.21 +0.19 +0.18 +0.15 +0.13 +0.07 +0.07 +0.06 +0.04 +0.04 +0.01 +0.00 +0.00 -0.01 -0.03 -0.04 -0.05 -0.07 -0.09 -0.10 -0.15 -0.23 -0.23 -0.25 -0.30 -0.30 -0.35 -0.36 -0.43 -0.44 -0.44 -0.45 -0.46 -0.48 -0.51 -0.53 -0.55 -0.56 -0.61 -0.61 -0.68 -0.68 -0.68 -0.71 -0.72 -0.78 -0.79 -0.84 -0.89 -0.96 -0.98 -1.00 -1.01 -1.02 -1.03 -1.05 -1.06 74.11 7,743 74.11 98,676 74.11 534,952 74.05 16,653 73.97 87,455 73.95 17,237 73.95 11,695 73.94 27,838 73.86 11,211 73.82 8,031 73.82 30,182 73.81 11,831 8,506 73.75 1,201,900 73.74 73.74 9,742 73.73 7,355 43,665 73.72 73.67 8,166 73.66 13,920 73.56 34,276 73.53 9,986 22,127 73.48 73.44 8,236 73.43 32,136 73.42 148,300 73.38 23,049 73.37 22,337 8,617 73.34 73.31 30,027 73.29 10,995 73.28 16,730 73.26 7,315 10,655 73.25 73.20 401,509 73.18 19,397 73.17 29,643 73.16 10,987 67,552 73.13 73.08 57,943 73.05 54,576 72.97 143,648 72.96 24,848 72.90 28,058 24,237 72.89 72.85 6,969 72.84 8,397 72.84 13,037 72.83 7,786 6,972 72.83 72.82 22,192 72.81 6,648 72.75 10,532 72.74 18,927 22,671 72.71 72.71 37,164 72.66 22,315 72.64 717,733 72.55 16,278 10,345 72.52 72.47 6,488 72.43 8,315 72.41 7,262 8,217 72.38 +2.11 +2.11 +2.11 +2.05 +1.97 +1.95 +1.95 +1.94 +1.86 +1.82 +1.82 +1.81 +1.75 +1.74 +1.74 +1.73 +1.72 +1.66 +1.66 +1.56 +1.53 +1.48 +1.44 +1.43 +1.42 +1.38 +1.37 +1.34 +1.30 +1.29 +1.28 +1.25 +1.25 +1.20 +1.18 +1.17 +1.16 +1.13 +1.08 +1.05 +0.97 +0.96 +0.90 +0.89 +0.84 +0.84 +0.84 +0.83 +0.83 +0.82 +0.81 +0.75 +0.74 +0.71 +0.70 +0.66 +0.63 +0.55 +0.52 +0.47 +0.43 +0.41 +0.38 better people next photo men sunday bad important tonight love help parents short enough order something with act first racism fighting ll hold years show taking eyes u own what right crisis fast four cool wish heard best gone stop kim loves story blue as taken needs ready look up less from following boy still continue use knows biggest ppl need poor heart 5 token reason days understand dad lol be no person immigration rich means half buy does mad gave t nation way wouldn who d else minutes about nowplaying agree looks not support book rest phone keep funny little hands while out hope nice idea age hard called time give hate children don later should wonder looking until group get word congress final month w respect count troll % points 11,308 18,488 11,466 6,415 24,693 239,919 128,801 24,871 10,053 6,800 8,867 7,949 11,010 27,887 7,984 8,416 368,688 7,750 42,701 6,689 149,564 36,942 12,363 6,884 131,104 8,453 9,609 16,325 210,466 22,878 11,170 7,341 8,530 27,964 10,398 21,766 6,905 25,338 117,249 20,879 12,519 7,561 6,498 19,463 17,194 80,339 29,400 26,690 18,215 125,595 6,431 49,120 6,693 16,646 13,327 13,409 101,518 10,098 15,208 8,827 7,839 24,856 7,061 70.92 70.89 70.87 70.83 70.81 70.80 70.74 70.71 70.65 70.64 70.58 70.54 70.43 70.39 70.37 70.33 70.31 70.27 70.26 70.23 70.23 70.22 70.20 70.20 70.17 70.17 70.12 70.08 70.07 70.07 70.02 70.00 69.97 69.97 69.96 69.93 69.83 69.81 69.77 69.77 69.76 69.76 69.75 69.75 69.72 69.70 69.69 69.69 69.68 69.65 69.63 69.62 69.62 69.58 69.56 69.55 69.55 69.51 69.50 69.46 69.43 69.43 69.39 -1.07 -1.10 -1.12 -1.16 -1.18 -1.19 -1.25 -1.28 -1.34 -1.35 -1.41 -1.45 -1.56 -1.60 -1.62 -1.67 -1.68 -1.73 -1.73 -1.76 -1.76 -1.77 -1.79 -1.79 -1.82 -1.82 -1.87 -1.91 -1.92 -1.92 -1.97 -1.99 -2.02 -2.02 -2.03 -2.06 -2.16 -2.18 -2.22 -2.22 -2.23 -2.23 -2.24 -2.24 -2.27 -2.29 -2.30 -2.30 -2.31 -2.34 -2.36 -2.37 -2.37 -2.41 -2.43 -2.44 -2.44 -2.48 -2.49 -2.53 -2.56 -2.56 -2.60 token can party team online always girl post states myself human there o good flag working trying got too c is thing put around every someone those waiting sex cry god free room gotta only it anything a making using our baby thanks made most your used the going tell yourself why ain morning last l leave clear think isn forever its are ask 6 count troll % points 69.38 163,704 69.33 20,960 69.29 16,127 69.28 8,298 69.24 35,321 69.18 25,745 69.16 17,267 69.12 11,801 69.08 9,747 69.07 10,963 69.06 78,019 69.05 17,221 69.03 67,893 69.01 8,518 69.01 11,090 69.01 20,930 68.96 46,612 68.96 48,058 68.86 16,086 68.86 605,936 68.79 26,671 68.75 19,328 68.65 17,405 68.61 36,235 68.58 34,734 68.56 28,402 68.56 7,058 68.54 17,312 68.53 6,804 68.48 32,541 68.47 29,637 68.46 7,710 68.41 7,628 68.41 61,076 68.40 418,877 68.39 16,498 68.31 809,249 68.29 15,359 68.26 10,448 68.18 93,644 68.15 18,196 68.15 17,954 68.09 27,773 68.04 35,493 68.01 187,607 12,964 68.01 1,360,727 67.93 67.88 42,230 25,568 67.87 67.86 17,953 67.83 68,491 67.80 10,746 67.78 20,276 28,236 67.74 67.74 9,980 67.59 15,711 67.57 6,323 67.57 52,491 17,356 67.56 67.51 6,376 67.50 30,168 67.50 253,816 13,041 67.45 -2.61 -2.66 -2.70 -2.71 -2.75 -2.81 -2.83 -2.88 -2.91 -2.92 -2.93 -2.94 -2.96 -2.98 -2.98 -2.99 -3.03 -3.04 -3.13 -3.13 -3.20 -3.24 -3.34 -3.38 -3.41 -3.43 -3.44 -3.45 -3.46 -3.51 -3.52 -3.53 -3.58 -3.58 -3.59 -3.61 -3.69 -3.70 -3.73 -3.81 -3.84 -3.84 -3.90 -3.95 -3.98 -3.98 -4.06 -4.11 -4.12 -4.13 -4.16 -4.19 -4.21 -4.25 -4.25 -4.40 -4.42 -4.42 -4.43 -4.48 -4.49 -4.49 -4.54 token youtube feel army amp friend miss one democrat wanna has wow do would finally when k you let far how fun being remember tired ya knew summer we feeling aren instead movie p guess soon just talk might read amazing done f months wasn hear sleep welcome want know well but playing giving uk go share took sad coming yet all re his count troll % points token count troll % points 93,117 12,339 41,450 176,922 94,129 28,634 59,686 49,705 14,897 32,277 7,849 49,176 15,026 9,531 23,700 8,895 331,146 8,449 7,502 31,460 29,820 6,469 38,111 16,112 80,103 32,098 29,303 1,843,554 49,141 8,331 8,351 11,477 24,147 19,245 6,541 19,550 20,397 13,725 123,396 14,951 17,906 144,827 13,265 14,145 6,763 37,207 10,646 7,530 6,485 9,981 10,477 17,350 39,189 57,554 13,694 11,770 16,253 11,343 22,480 9,049 70,277 10,984 12,246 65.42 65.40 65.36 65.34 65.32 65.32 65.32 65.29 65.28 65.20 65.16 65.12 65.10 65.09 65.02 64.96 64.95 64.82 64.82 64.81 64.80 64.80 64.77 64.65 64.64 64.64 64.52 64.44 64.42 64.36 64.33 64.31 64.29 64.27 64.22 64.21 64.20 64.17 64.16 64.13 64.09 64.09 64.05 63.96 63.90 63.87 63.81 63.78 63.77 63.77 63.74 63.71 63.70 63.68 63.64 63.57 63.57 63.50 63.31 63.28 63.26 63.25 63.24 -6.57 -6.59 -6.64 -6.65 -6.67 -6.68 -6.68 -6.71 -6.71 -6.79 -6.83 -6.87 -6.89 -6.90 -6.97 -7.03 -7.04 -7.17 -7.17 -7.18 -7.19 -7.19 -7.22 -7.34 -7.35 -7.35 -7.47 -7.55 -7.57 -7.63 -7.66 -7.69 -7.70 -7.73 -7.77 -7.78 -7.80 -7.82 -7.83 -7.86 -7.90 -7.90 -7.94 -8.03 -8.09 -8.12 -8.18 -8.21 -8.22 -8.23 -8.25 -8.28 -8.29 -8.31 -8.35 -8.42 -8.42 -8.49 -8.68 -8.71 -8.73 -8.74 -8.75 10,232 23,630 11,632 130,858 14,777 13,041 114,211 8,898 16,971 98,794 11,273 123,663 56,904 9,607 122,781 7,784 647,202 51,469 11,319 111,908 10,548 49,176 18,856 6,900 7,286 7,316 10,868 215,205 6,996 7,849 8,217 9,326 10,203 7,577 10,295 149,329 15,856 11,033 18,096 11,410 17,940 12,921 7,404 8,057 11,852 10,259 6,474 68,601 77,243 30,060 151,964 15,754 7,814 7,055 67,916 9,246 10,387 10,835 16,108 13,122 172,300 87,384 104,995 67.45 67.43 67.42 67.38 67.37 67.37 67.29 67.28 67.27 67.27 67.14 67.14 67.13 67.12 67.11 67.08 67.01 66.99 66.87 66.85 66.84 66.77 66.75 66.73 66.71 66.70 66.60 66.52 66.46 66.37 66.37 66.34 66.30 66.18 66.17 66.17 66.12 66.11 66.11 66.11 66.11 66.07 66.05 66.02 66.01 65.99 65.97 65.95 65.91 65.90 65.89 65.88 65.86 65.79 65.79 65.67 65.60 65.57 65.54 65.53 65.53 65.50 65.47 -4.54 -4.56 -4.57 -4.61 -4.62 -4.62 -4.70 -4.71 -4.72 -4.73 -4.85 -4.86 -4.86 -4.87 -4.88 -4.91 -4.98 -5.00 -5.12 -5.14 -5.15 -5.22 -5.24 -5.26 -5.28 -5.29 -5.39 -5.47 -5.53 -5.62 -5.62 -5.65 -5.69 -5.81 -5.82 -5.82 -5.87 -5.88 -5.88 -5.88 -5.88 -5.92 -5.94 -5.97 -5.98 -6.01 -6.02 -6.04 -6.08 -6.09 -6.10 -6.11 -6.13 -6.20 -6.20 -6.32 -6.40 -6.42 -6.45 -6.46 -6.46 -6.49 -6.52 now once had have an vote back some h ever almost today name question didn kind that hours though happy come haven much r or where any rt because nobody calling point same democrats democratic getting doing already m b friends if guy mean yesterday then e probably drop damn maybe gonna even see thought seen part together oh hand their pretty such 7 token count troll % points token count troll % points were beautiful and g really thinking wait administration other check united girls was fan since did full hot ve started global watching i like listen country exactly fans illegal favorite proud sure they dear them absolutely each very which single social her having mr few both talking many fact lot he me these yeah born speak am my him actually anyone told here 37,777 16,087 615,184 6,697 46,587 7,999 13,709 6,298 30,643 15,895 10,621 14,579 145,692 6,911 16,200 41,708 13,839 11,219 37,895 8,000 6,481 8,546 730,059 136,660 12,352 28,156 7,680 9,772 12,128 7,505 8,019 14,730 163,815 8,572 61,702 6,800 10,292 25,328 21,143 10,248 10,822 75,538 13,173 6,695 8,881 11,959 10,790 29,765 10,185 13,395 161,802 177,149 40,456 10,421 7,673 8,425 33,420 228,066 49,829 15,118 16,241 12,431 60,018 63.23 63.21 63.19 63.14 63.14 63.13 63.03 63.00 62.95 62.90 62.90 62.87 62.87 62.84 62.83 62.82 62.75 62.68 62.64 62.56 62.28 62.27 62.25 62.16 62.12 62.08 62.00 61.93 61.92 61.89 61.82 61.81 61.57 61.52 61.51 61.44 61.43 61.35 61.23 61.21 61.18 61.05 61.01 61.00 60.82 60.67 60.54 60.50 60.45 60.44 60.39 60.36 60.24 60.17 60.05 59.95 59.83 59.80 59.74 59.59 59.57 59.32 59.26 -8.76 -8.78 -8.80 -8.85 -8.85 -8.86 -8.96 -8.99 -9.05 -9.09 -9.09 -9.13 -9.13 -9.15 -9.16 -9.17 -9.24 -9.31 -9.35 -9.43 -9.71 -9.72 -9.74 -9.83 -9.87 -9.91 -9.99 -10.06 -10.07 -10.10 -10.17 -10.18 -10.43 -10.47 -10.48 -10.56 -10.56 -10.64 -10.76 -10.78 -10.82 -10.94 -10.98 -11.00 -11.17 -11.32 -11.45 -11.50 -11.54 -11.56 -11.60 -11.64 -11.75 -11.82 -11.94 -12.04 -12.16 -12.19 -12.25 -12.40 -12.42 -12.67 -12.73 8,566 8,590 10,018 77,832 6,555 11,803 46,964 29,458 6,949 152,058 7,654 7,958 8,190 10,461 13,655 9,100 26,621 16,104 25,940 36,134 8,457 302,011 6,633 8,769 9,409 10,306 18,162 10,284 48,122 22,061 13,573 7,778 6,846 13,206 11,566 20,748 11,553 6,416 16,298 9,763 11,292 6,749 6,869 27,529 9,749 7,194 6,902 22,383 33,088 12,199 6,495 16,605 11,252 8,767 8,170 9,526 22,185 9,018 7,780 14,221 7,737 18,360 13,589 59.23 59.20 59.16 59.07 58.94 58.69 58.61 58.52 58.42 58.33 58.23 58.14 57.98 57.84 57.60 57.59 57.49 57.48 57.28 57.23 57.11 57.07 57.01 56.99 56.66 56.60 55.99 55.70 55.64 55.24 54.65 54.42 54.36 54.11 53.95 53.91 53.08 52.89 52.81 52.05 51.78 51.05 50.74 50.26 49.56 49.48 49.10 48.70 47.88 47.83 47.57 47.32 47.09 46.99 46.63 46.54 46.23 45.87 44.57 41.83 40.85 39.84 39.52 -12.76 -12.79 -12.83 -12.93 -13.05 -13.30 -13.38 -13.48 -13.57 -13.66 -13.77 -13.85 -14.01 -14.15 -14.39 -14.40 -14.50 -14.51 -14.71 -14.76 -14.88 -14.93 -14.98 -15.00 -15.33 -15.39 -16.00 -16.29 -16.35 -16.75 -17.34 -17.57 -17.63 -17.88 -18.05 -18.08 -18.91 -19.10 -19.18 -19.94 -20.22 -20.94 -21.25 -21.73 -22.43 -22.51 -22.89 -23.29 -24.11 -24.16 -24.42 -24.67 -24.90 -25.00 -25.36 -25.45 -25.76 -26.12 -27.42 -30.16 -31.14 -32.15 -32.47 saw voting ago she rep hey been gt boys so hair send different went saying birthday twitter area everyone said asked this immigrants members th sorry yes ok realdonaldtrump shit whole lt number ass song also border telling tweet omg tweets imagine update thank came x account racist please guys album fuck fucking bitch tour cute follow ur okay retweet dont y ice 8 token literally july im followers epstein bts exo aoc bts twt mgmavote count 8,362 9,686 16,296 11,972 8,373 11,879 7,737 9,821 10,967 10,389 troll % points 39.27 37.35 37.23 30.06 2.41 1.10 0.33 0.01 0.00 0.00 -32.72 -34.64 -34.76 -41.93 -69.58 -70.89 -71.66 -71.99 -71.99 -72.00 9
1905.10668
1
1905
2019-05-25T19:57:57
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding
[ "cs.SI", "cs.IR", "cs.LG" ]
Networks have been widely used as the data structure for abstracting real-world systems as well as organizing the relations among entities. Network embedding models are powerful tools in mapping nodes in a network into continuous vector-space representations in order to facilitate subsequent tasks such as classification and link prediction. Existing network embedding models comprehensively integrate all information of each node, such as links and attributes, towards a single embedding vector to represent the node's general role in the network. However, a real-world entity could be multifaceted, where it connects to different neighborhoods due to different motives or self-characteristics that are not necessarily correlated. For example, in a movie recommender system, a user may love comedies or horror movies simultaneously, but it is not likely that these two types of movies are mutually close in the embedding space, nor the user embedding vector could be sufficiently close to them at the same time. In this paper, we propose a polysemous embedding approach for modeling multiple facets of nodes, as motivated by the phenomenon of word polysemy in language modeling. Each facet of a node is mapped as an embedding vector, while we also maintain association degree between each pair of node and facet. The proposed method is adaptive to various existing embedding models, without significantly complicating the optimization process. We also discuss how to engage embedding vectors of different facets for inference tasks including classification and link prediction. Experiments on real-world datasets help comprehensively evaluate the performance of the proposed method.
cs.SI
cs
Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1 1Department of Computer Science and Engineering, Texas A&M University, TX, USA {nhliu43,qytan,liyuening,xiahu}@tamu.edu,{yang.yhx,jingren.zhou}@alibaba-inc.com 2Alibaba Group, Hangzhou, China 9 1 0 2 y a M 5 2 ] I S . s c [ 1 v 8 6 6 0 1 . 5 0 9 1 : v i X r a ABSTRACT Networks have been widely used as the data structure for abstract- ing real-world systems as well as organizing the relations among entities. Network embedding models are powerful tools in mapping nodes in a network into continuous vector-space representations in order to facilitate subsequent tasks such as classification and link prediction. Existing network embedding models comprehensively integrate all information of each node, such as links and attributes, towards a single embedding vector to represent the node's general role in the network. However, a real-world entity could be multifac- eted, where it connects to different neighborhoods due to different motives or self-characteristics that are not necessarily correlated. For example, in a movie recommender system, a user may love comedies or horror movies simultaneously, but it is not likely that these two types of movies are mutually close in the embedding space, nor the user embedding vector could be sufficiently close to them at the same time. In this paper, we propose a polysemous embedding approach for modeling multiple facets of nodes, as moti- vated by the phenomenon of word polysemy in language modeling. Each facet of a node is mapped as an embedding vector, while we also maintain association degree between each pair of node and facet. The proposed method is adaptive to various existing embed- ding models, without significantly complicating the optimization process. We also discuss how to engage embedding vectors of dif- ferent facets for inference tasks including classification and link prediction. Experiments on real-world datasets help comprehen- sively evaluate the performance of the proposed method. KEYWORDS Network Embedding; Disentangled Representation Learning; Rec- ommender Systems; Graph Mining ACM Reference Format: Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1. 2019. Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding. In The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD '19), August 4 -- 8, 2019, Anchorage, AK, USA. ACM, New York, NY, USA, Article 4, 9 pages. https://doi.org/10.1145/ 3292500.3330967 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA © 2019 Association for Computing Machinery. ACM ISBN 978-1-4503-6201-6/19/08...$15.00 https://doi.org/10.1145/3292500.3330967 Figure 1: An example of multiple facets within a node. The network is built from online purchase history, where cus- tomers and items are nodes, and purchase actions are links. 1 INTRODUCTION Networks are ubiquitous data structures utilized for modeling in- formation systems [1], such as social networks, recommender sys- tems, biological networks and knowledge graphs. In these systems, real-world entities such as users, items, molecules and knowledge concepts are abstracted as nodes in networks, while the relations between entities are modeled as links between them. The recent advances in network embedding propose to represent each node as a low-dimensional vector, by considering the node's neighbor- hood and feature information [5, 14, 26, 30 -- 32]. Similar nodes are mapped close to each other in the embedding space. Node embed- ding has been shown to be an effective representation scheme that facilitates downstream network analysis tasks such as classification, clustering and link prediction [1, 7]. It has been shown that, in many real-world applications, entities may possess disparate characteristics or aspects [25, 28]. In other words, a node in the network can be seen as a capsule containing different aspects. Different links stretching out from an entity to their neighbors could in fact result from the expression of its differ- ent aspects. In some scenarios, it could be problematic to fuse these disparate aspects into a single vector-space representation for a node. For example, in an online shopping website in Figure 1 where customers and items are the nodes, a customer may have bought items of disparate genres. If we represent each customer with only a single vector, then the embedding vectors of the customer and items have to be simultaneously close to each other. It could be hard to achieve this, because other customers have different interests and it may mess up the distribution of embedding vectors. In this paper, we call such phenomenon as node polysemy, where each node could have multiple facets, by making an analogy to a similar property possessed by words in natural language (e.g., Node: Personis interested inNetwork: Purchase History KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1 "bank" can refer to either financial institutions or land near a river, depending on different contexts) [10, 28]. In this setting, each node has multiple facets, while each facet of a node owns an embedding vector. In this work, we want to develop a polysemous network embedding method in order to discover multiple facets of nodes and learn representations for them. The challenges of developing polysemous network embedding models are three-fold. The first is how to determine the facets of nodes, as well as to flexibly update embeddings of different facets in the vector space. For each data sample (e.g., links or random walks), we need to determine which facet of each node is likely to be activated, so as to update the corresponding embedding of that facet in the training process. The second challenge is how to maintain the correlation among embedding vectors of differ- ent facets. Although we split a node into multiple facets, different facets may not be completely uncorrelated to each other. Some in- formation will be lost if we simply model each facet independently. Third, when considering node polysemy, how to make the model- ing process adaptive to the existing well-established base models such as Deepwalk [26], LINE [31], PTE [30] and GCN [14]. Besides, the computational complexity of the new model will inevitably increase when different facets of nodes are considered. Therefore, an efficient optimization algorithm is also needed, especially when considering its compatibility to negative sampling. Specifically, in this paper, we propose a polysemous network embedding method in order to take into account multiple facets of nodes in network data. Each facet of a node is represented us- ing an embedding vector. The correlation between different node facets can be preserved in our method. The developed modeling strategy is flexible to be applied to various base embedding mod- els without making radical changes to their base formulation. We first show how to revise Deepwalk to tackle node polysemy, and then extend our discussion to more base embedding models and more complex application scenarios. The optimization process for training the polysemous embedding models is specially designed to guarantee its efficiency and implementation feasibility, especially when applying negative sampling. Finally, to evaluate whether con- sidering multiple aspects of nodes could actually benefit learning node representations and downstream data mining tasks, we con- duct experiments with different tasks to compare the performance between polysemous embedding models and their corresponding single-vector base models. The contribution of this paper is sum- marized as follows: • We propose a novel polysemous network embedding method to incorporate different facets of nodes into representation learning. Each aspect of a node owns an embedding vec- tor, and the relations among embedding vectors of different aspects are also considered. • We specifically formulate the problem to guarantee that the resultant optimization algorithm is efficient and feasible for implementation. Also the proposed method is flexible to be adapted to various existing transductive embedding models. • We conduct intensive experiments considering different down- stream tasks and application scenarios, providing insights on how and when we benefit from modeling node polysemy in the network embedding. 2 POLYSEMOUS NETWORK EMBEDDING In this section, we introduce the core idea of polysemous network embedding, by using Deepwalk as the base model. Then, we de- sign an optimization algorithm to train the polysemous embedding model. We will also discuss how to estimate the facet of a node in different contexts. Finally, we introduce how to combine embed- ding vectors of different facets towards downstream tasks such as classification and link prediction. 2.1 Polysemous Deepwalk In the setting of polysemous embedding, for the Deepwalk model, each node vi is associated with a target embedding matrix Ui ∈ RKi×D and a context embedding matrix Hi ∈ RKi×D. Here Ki is the number of embedding vectors possessed by node vi considering its different possible facets. The traditional Deepwalk model could be seen as a special case where Ki = 1. The embedding vector for i ∈ RD, and D is facet k of node vi is denoted as Uk the dimension of each embedding vector. Different nodes may be associated with different number of embedding vectors, depending on the diversity of their characteristics in the network. In this work, for illustration purposes, we simply let all nodes have the same number of embedding vectors, so that Ki = K and K is a predefined constant integer. In practice, the value of K could be estimated from data. For examples, K can be approximately set as the number of latent interest categories in recommender systems, or be estimated as the number of major topics in an academic network. We will discuss in later sections about how to assign facets to nodes with different probabilities. i ∈ RD or Hk Deepwalk utilizes the skip-gram model [22] that is trained using the maximum likelihood estimation, where we try to find the model parameters that maximize the likelihood of obtained observations. Specifically, let θ be the parameters to be optimized and O be the set of all observations, the objective function to be maximized is: log p(cid:0)(N(vi), vi)θ(cid:1) LDW (θ) = = o∈O log p(oθ) =  o∈O log p(vjvi), o∈O vj ∈N(vi) (1) where each observation o ∈ O is defined as a tuple, o = (N(vi), vi), consisting of a central node vi and its context N(vi). Each node within the context is denoted as vj so that vj ∈ N(vi). The model parameters, i.e., the embedding vectors of nodes, are used in com- puting p(vjvi) which is the conditional probability of having vj as one of the contexts given vi. However, in our settings where each node owns multiple facets, the activated facet of a node varies under different contexts. Also, the facet of a given context is determined by the combination of all facets of the nodes within the context. Suppose the distribution of node facets are known in advance, and we treat them as prior knowledge denoted as P. Taking the additional information into account, the objective is reformulated as: LPolyDW (θ) = = o∈O log p(oP, θ) log [ o∈O s(o) p(os(o), P, θ) · p(s(o)P, θ)]. (2) Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA Figure 2: The overall training procedure of Polysemous Deepwalk. Each color refers to one facet contained in the input net- work. Each histogram visualizes a probability distribution. Note that the above network is only a toy example for illustration purposes, where numerical values do not reflect real results. Here s(o) is defined as one case of activated facets of all nodes within o, so s(o) = {s(vo) v ∈ vi ∪ N(vi)} where s(vo) is the activated facet of node v in the context of o. In a given observation o, suppose the activated facet of vi is ki and the facet of each vj ∈ N(vi) is kj, the conditional probability p(os(o), P, θ) is thus defined as: 1 ≤ i ≤ N ; for o ∈ O do Algorithm 1: Polysemous Deepwalk Input: Input network G, number of nodes N , facet sampling rate R. Output: Embedding matrix U, context embedding matrix H. 1 Initialize U and H ; 2 Estimate facet distribution p(vi) for each node, so that P = {p(vi)}, 3 Obtain observations O via random walks and context window sliding ; 4 while not converged do 5 6 7 8 9 Obtain a target-context tuple o = (N(vi), vi) ; for 1 ≤ r ≤ R do Sample a facet ki = s(vi o) ∼ p(vi o), defined in Eq. 7 ; Sample a facet kj = s(vj o) ∼ p(vj o), defined in Eq. 7, for each context node vj ∈ N(vi) ; Obtain negative samples ; for vj ∈ N(vi), as well as facet Update Uki i embeddings of negative samples, using stochastic gradient descent ; , Hkj j 10 11 The intuition behind the above transformation is that, instead of maximizing the original objective function, we propose to maximize its lower bound [13], denoted as L∗ PolyDW (θ), by applying Jensen's inequality. The final form of the objective function is similar to that of the skip-gram model, except the external summation over s(o). As a result, we could adopt the same negative sampling strategy as in the traditional skip-gram model to approximate the normaliza- tion term in p(vjvi , s(o)). Therefore, one major advantage of the proposed polysemous embedding model is that the training process can be easily implemented through minimal modification to the existing learning frameworks, by adding an additional sampling step of assigning activated facets to nodes in each observation o. s(o), following the distribu- tion of p(s(o)P), is implemented through facet sampling separately for each node in o. The overall optimization algorithm is specified Specifically, the summation over p(os(o), P, θ) =   vj ∈N(vi) and each product factor is calculated as i >) exp(< Hkj , Uki j i >) , v,k exp(< Hk v , Uki p(vjvi , s(o)) = p(vjvi , s(o)), (3) (4) which is similar to the softmax function in traditional skip-gram models, except that general node embeddings are replaced by node facet embeddings. Here "< · , · >" denotes the inner product of two vectors. The denominator acts as normalization over all possible nodes and facets. For readability, we omit P after the expansion in Equation 3, as it is no longer applied in later steps. It is cumbersome to directly apply gradient descent to optimize the objective function in Equation 2 ∼ Equation 4, due to the sum- mation term inside the logarithm function. Also, it becomes unclear of how to incorporate negative sampling [22] to approximate the normalization term for more efficient computation. Therefore, we further derive the objective function as below: LPolyDW (θ) = ≥  = o∈O o∈O log [  p(s(o)P) · [   s(o) p(os(o), P, θ) · p(s(o)P, θ)] s(o) p(s(o)P, θ) · log p(os(o), P, θ) o∈O s(o) = L∗ PolyDW (θ) vj ∈N(vi) log p(vjvi , s(o))] (5) Random Walk 1 (𝑜")v1v2v3v4v6Random Walk 2 (𝑜#)v6v7v8v9v10………46712358109Node Facet DistributionInput NetworkaverageaverageminFacetAssignmentObjectiveOptimization𝐔%"𝐔%#𝐔%%𝐇""𝐇#"𝐇'#𝐇("𝐔)"𝐔)#𝐔)%𝐇(#𝐇*#𝐇+%𝐇",%facet sampling for context nodes facet sampling for context nodes facet sampling for target node min𝐩(𝑜")𝐩(𝑜#) KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1 in Algorithm 1. After initialization and node-facet distribution esti- mation (will be introduced later), a number of random walks are sampled just as in traditional Deepwalk (Line 3). Then, for each observation o, several rounds of facet sampling are conducted on each node within o (the loop in Line 7). In each round, each node has one facet activated (Line 8 ∼ 10), so that the embedding vector corresponding to that facet will be updated using SGD (Line 11). The major additional computation cost, compared with traditional Deepwalk, comes from the increased size of training data in O by a factor of sampling rate R. The overall process of polysemous Deepwalk is illustrated in Figure 2, where "Objective Optimization" has been introduced as above, while the other steps related with facet distribution and facet assignment will be discussed in detail in the next subsection. 2.2 Node-Facet Assignment We now introduce how the prior knowledge P can be obtained, and how to determine the facet of nodes given a specific observation o. For now, we limit the discussion to undirected homogeneous plain networks, and provide one method to obtain the global distribution of node facets by only leveraging the network adjacency matrix. For networks with attribute information or heterogeneous information networks, we may resort to other strategies and we leave it to future work. Let A be the symmetric adjacency matrix of the network, we perform community discovery on the network [15][36]: + α∥P∥2 F , (6) F P≥0 ∥A − P · PT ∥2 min  Pv,k c =1, . . .,K Pv,c where P can be solved using gradient search algorithms. The proba- bility p(kv), that node v is assigned with the k-th facet, can be cal- culated as p(kv) = . We define the facet distribution of a node as p(v) = [p(1v), ..., p(Kv)]. We treat p(vi), 1 ≤ i ≤ N as the prior knowledge P, as it encodes the global understanding of the network states. Applying attribute information could achieve better estimation, but it is beyond the discussion in this work. After obtaining the prior knowledge P, we are able to estimate the overall facet of each observation o as well as the facet of nodes within o. Given an observation o = (N(vi), vi), a straightforward way to define its facet distribution p(o) is by averaging the facet distributions of nodes inside the observation, i.e., p(o) =(cid:0)p(vi) + vj ∈N(vi) p(vj)(cid:1)/(N(vi)+1). Considering that the activated facet  of a node depends on the specific context where it is observed, given o, the node's facet s(vo) is sampled according to the distribution p(vo), which is defined heuristically as below p(vo) = min(p(v), p(o)), (7) where we include a min(·, ·) operator because it is undesirable to assign a node vi with facet k if p(kvi) ≈ 0, even when the k-th entry in p(o) is large. To make it a valid probability distribution, p(vo) is further normalized to sum to 1. Till now, we have introduced the whole training process of poly- semous Deepwalk as shown in Figure 2. Given the input network, we first estimate node facet distributions as prior knowledge P. Then, random walks are performed to construct node-context ob- servations O. After that, within each walk sample o, each node is assigned with an activated facet. Finally, node embeddings of correspondent facets are updated through optimization. 2.3 Joint Engagement of Multiple Embeddings for Inference We are able to obtain multiple embedding vectors for each node after training the polysemous model. Then the question arises that, during inference, how to collectively consider different embedding vectors for subsequent tasks. Here we discuss two major network analysis tasks including classification and link prediction. tiple vectors {Uk options include: For classification, for each node, our strategy is to combine mul- i }k =1, ...,K into a joint vector Ui. Specifically, some (cid:1), Ui = U1 i ⊕ U2 i ⊕ ... ⊕ UK i , (cid:1) ⊕(cid:0)p(2vi) · U2 Ui =(cid:0)p(1vi) · U1 (cid:1) ⊕ ... ⊕(cid:0)p(Kvi) · UK (8) where we directly concatenate embeddings of different facets, or (9) where we first scale each embedding vector with the probability of belonging to the corresponding facet and then concatenate these scaled vectors. Here ⊕ denotes the concatenation operation. The resultant embedding vectors { Ui}i =1, ..., N can be directly used in node classification. We adopt Equation 9 in experiments. For link prediction or network reconstruction tasks, a higher similarity score between the representations of two nodes indicates greater possibility that a link exist between the nodes. We can define the similarity between two nodes vi and vj as: similarity(vi , vj) = ′vj) < Uk p(kvi) p(k K K i , Uk′ j >, (10) i i i k =1 k′=1 where different facet pairs of embedding vectors contribute to the overall similarity computation, weighted by the probability that the node belongs to the corresponding facet. 2.4 Discussion The proposed work can be regarded as an example of disentangled representation learning [9], since different representation dimen- sions are sensitive to varying factors behind the data. Moreover, it helps improving the interpretability of representation learning [3], because representation dimensions are separated according to node facets that could be associated with concrete meanings or charac- teristics of real-world networked objects. 3 MODELS EXTENDED BY POLYSEMOUS EMBEDDING The methodology of polysemous embedding can also be applied to extend other fundamental single-embedding models. In this sec- tion, we elaborate two scenarios as examples. First, we show how polysemous embedding can be used in heterogeneous networks where links exist between nodes of different types. Second, we show how polysemous embedding can be combined with graph neural networks, where the embedding look-up tables in Deepwalk is replaced by feedforward modules. 3.1 Polysemous PTE for Heterogeneous Networks We show how to consider node polysemy when modeling hetero- geneous networks. We choose PTE [30] as the base model to be Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA example and show how it could be extended as PolyGCN to con- sider node polysemy. Different from PolyDeepwalk and PolyPTE that keep embedding look-up tables to store embedding vectors, PolyGCN uses a feedforward network module to generate embed- ding of each node by gathering information from neighborhoods. The core step of embedding generation in GCN is to aggregate information from a node's local neighborhood. Let ud(i) denote the intermediate representation of node vi on layer of depth d, then the forward propagation is (cid:19) (cid:19) extended, as it is a fundamental model for tackling the problem. To simplify the illustration, we only consider bipartite networks during model development. The discussion can be applied for more complex networks, since the objective function of PTE could be extended as the sum of several terms considering multiple bipartite or homogeneous networks. Given a network containing two types of nodes VA and VB, as well as a set of links denoted as E, each observation o is defined as a link o = (uj , vi) ∈ E where vi ∈ VA, uj ∈ VB. The set of all observations is thus defined as O = E. Similar to the derivation in Section 2.1, the objective function is formulated as: LpolyPT E(θ) = ≥ = o∈E o∈E log [   s(o) o∈E s(o) where p(ujvi , s(o)) =  p(os(o), P, θ)) · p(s(o)P, θ)] s(o) p(s(o)P, θ) · log p(os(o), P, θ) p(s(o)P) · log p(ujvi , s(o)), i >) exp(< Hkj , Uki j i >) . v,k exp(< Hk v , Uki (11) (12) According to the original PTE model, the matrix U contains the embedding vectors of nodes in VA, and H contains the embedding vectors of nodes in VB. The resultant lower bound objective is denoted as L∗ 3.1.1 Node Facet Assignment. The strategy of determining hetero- geneous node facet distribution is similar to that of the previous section. Given the asymmetric adjacency matrix A, we first solve (13) , which is to be optimized. polyPT E P≥0,Q≥0 ∥A − P · QT ∥2 min F + α(∥P∥2 F + ∥Q∥2 F), (i.e., an edge) is computed as p(o) = (cid:0)p(vi) + p(uj)(cid:1)/2. Different where we set α = 0.05 in experiments. The resultant factor matrix P contains the association intensity between VA and facets, while Q contains the facet association information for nodes in VB. Then, we normalize P and Q to obtain the probabilities of belonging to different facets for each node vi ∈ VA and uj ∈ VB [36]. If we denote the facet distribution as p(vi) and p(uj) respectively for the two types of nodes, then the facet distribution of an observation from polysemous Deepwalk, here we simply let p(vo) = p(o) be applied for node-facet sampling, because the window size in PTE equals to 1 which is much smaller than Deepwalk. 3.1.2 Engage Multiple Embeddings for Inference. The way of jointly considering a node's multiple embedding vectors, for downstream tasks, is similar to what is introduced in Section 2.3. The only dif- ference is that the measurement of similarity between two different types of nodes is adjusted as: similarity(vi , uj) = p(kvi) p(k ′uj) < Uk i , Hk′ j > . (14) K K k =1 k′=1 3.2 Polysemous Embedding with GCN The idea of polysemous embedding can be realized with models of other architectures. In this subsection, we consider GCN [14] as an (cid:18) (cid:18) ud(i) ← σ Wd · MEAN(ud−1(i) ∪ {ud−1(j),∀vj ∈ N(vi)}) , (15) where Wd is the weight matrix on layer d, MEAN refers to the aggregator based on the pre-processed adjacency matrix, and N(vi) is the local neighborhood of vi. The final embedding output for vi is defined as Ui = udmax (i), where dmax denotes the depth of the final layer. After forward propagation, GCN can be trained in an unsupervised manner similar to Deepwalk or PTE. We here propose a feasible approach to incorporate node pol- ysemy into GCN-based models, where each facet of embeddings corresponds to one GCN model, while the internal architecture of each GCN is unchanged. Specifically, within a certain facet k, we limit the local neighborhood of the node as other nodes with the same facet k activated, so that dmax = uk d−1(i) ∪ {uk d · MEAN(uk Wk d−1(j),∀vj ∈ Nk(vi)}) d(i) ← σ uk , (16) where Nk(vi) denotes the local neighborhood under facet k. The (i). The main final embedding output for facet k of vi is Uk i question to be answered is how to construct the local neighborhood for a specific facet k of node v. Here we still consider bipartite networks as the scenario, so for each facet there are two GCNs respectively for generating embeddings for each type of nodes. Following the similar strategy as in Section 3.1, the observed links are decomposed into interaction results of different facet pairs. We further relax the problem so that embeddings of different facets are mutually independent. Specifically, the original observation k Ak, where Ak ≥ 0 and Ak(i, j) is proportional to P(i, k) · Q(j, k). vj ∈ Nk(vi) if both vi and vj connect to the same node of the other type under facet k. For training each GCN pair, we adopt the similar unsupervised training strategies as proposed in [6], where nodes are encouraged to have similar embeddings of facet k if they are connected according to the corresponding observation matrix. matrix A = 4 EXPERIMENTS We try to answer several questions through experiments. First, how effective is the proposed polysemous embedding method compared with single-vector embedding counterparts? Second, is considering node polysemy beneficial for network embedding when evaluated on different downstream tasks? Third, how will polysemous em- bedding models react to the changes of hyperparameters? KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1 4.1 Experimental Settings We first introduce the applied datasets as below. The detailed infor- mation is shown in Table 1. • BlogCatalog: A social network dataset built based on connec- tions between online bloggers. The original dataset contains both link and attribute information, while we only keep the links in our experiments. Each node is also associated with a label deter- mined from some predefined interest categories of bloggers. • Flickr: A network dataset constructed from interactions between users on a multimedia hosting website. Each link corresponds to a following relation between users. The groups that users joined are regarded as labels. • MovieLens: A movie rating dataset widely used for evaluating collaborative filtering models. In our experiments, we treat it as a heterogeneous network where links exist between users and items (i.e., movies). We transform rating scores into implicit data, so that each entry is either 0 or 1 indicating whether the user rated the movie [8]. In this way, conducting recommendation on this dataset can also be regarded as performing link prediction. • Pinterest: An implicit feedback data originally constructed for image recommendation. Users and images are regarded as nodes. Each link is a pin on an image initiated by a user. Each user has at least 20 links. Similarly, the link prediction task can be seen as recommending images to users. The networks in BlogCatalog and Flickr are homogeneous, and we use them in classification and link prediction. The networks in MovieLens and Pinterest are heterogeneous, and we will apply them in link prediction tasks which can also be seen as doing rec- ommendation. The baseline methods for comparison are as below. • Deepwalk [26], PTE [30], GCN [38]: Some commonly used net- work embedding models that map each node to a single vector. We include them as baseline methods to analyze whether their polysemous embedding counterparts achieve better performance. Here GCN is only applied in heterogeneous link prediction. • NMF [15, 16]: A traditional model that learns latent factors from data. We include NMF as one of the baseline methods because we applied it in estimating the global facets contained in data. The number of latent factors is the same as the number of facets in the proposed polysemous model. • MSSG [23]: A multi-sense word embedding model original de- veloped for natural language processing. Senses of words de- termined by clustering their average context representations. Each word has only one embedding vector when it is regarded as context. The model is adapted for network analysis tasks. • MNE [37]: A model that factorizes the network proximity matrix into several group of embedding matrices, and adds a diversity constraint to force different matrices focus on different aspects of nodes. We only use MNE for node classification since the way of performing link prediction is not discussed in the paper. 4.2 Node Classification Node classification is a commonly applied task for evaluating net- work embedding outcomes. In this experiment, we compare the performance of the proposed polysemous models compared with baseline models. We use Deepwalk as the base single-embedding BlogCatalog Flickr MovieLens Pinterest VA 5,196 7,575 6,040 55,187 VB − − 3,952 9,916 E 171,743 239,738 1,000,209 1,500,809 Table 1: Statistics of datasets. model. The proposed model is named as PolyDeepwalk. The Blog- Catalog and Flickr datasets are applied in this experiment. Unless specifically stated in each task, the default model hyper- parameters are set as follows. For BlogCatalog dataset, the number of walks generated per node is 110, the length of walk is 11, the con- text size is 8, the number of facets is 6 considered for PolyDeepwalk, the embedding of dimension is 210 for each node in Deepwalk and 210/6 = 35 for each node's facet in PolyDeepwalk, the number of negative samples is 5 for Deepwalk and 10 for PolyDeepwalk. For Flickr dataset, the parameter settings are similar, except that the number of facets is 5 for PolyDeepwalk, the embedding dimension is 180 for each node in Deepwalk and 180/5 = 36 for each node's facet in PolyDeepwalk, and the number of negative samples is 15 for PolyDeepwalk. It is worth noting that the dimension of polyse- mous embedding is divided by the number of facets, so that after concatenation, the resultant embedding has the same length as the single-embedding counterpart. We use Support Vector Machine as the classification model, where 80% of data samples are used as training data. The performance comparison is illustrated in Figure 3 and Figure 4. Note that we do not plot the performance of NMF as its F1 scores are much lower than other models. Some work includes node attributes as additional information source when using NMF related models for node classification [11, 17], but this is beyond our experiment setting. From the figures, some observations are summarized as below: • In general, PolyDeepwalk achieves better performances than other polysemous embedding models. Also, by varying the di- mensionality, we can observe that polysemous embedding models are less likely to be affected, while the classification performance of Deepwalk gradually decreases as dimensionality increases. • Deepwalk and PolyDeepwalk have different responses to the change of context size. The former achieves better performances as context size increases, while the latter shows the opposite trend. A possible reason is that, as the context window enlarges in PolyDeepwalk, random walks from each node are more likely to reach other network regions of different facets. As a result, the facet distributions are over smoothed, so it becomes more difficult to decide which facet a context window belongs to. It could be one of the challenges to be tackled in future work. Besides making comparisons to baseline models, we also analyze the sensitivity of PolyDeepwalk to some of the key parameters when modeling node polysemy. The experiment results are shown in Figure 5. Some observations are made as below: • Increasing the number of facets has positive influence on the classification performance of the proposed model. It is also worth noting that we keep the total embedding dimension (i.e., K × DPolyDeepwalk) to be fixed, where DPolyDeepwalk actually decreases as K increases, so that the downstream classification task will not be affected by the feature size. Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA 0.74 0.72 0.7 0.68 0.66 1 F - o r c i M Deepwalk MSSG PolyDeepwalk MNE 100 50 200 DDeepwalk (or Dpolydeepwalk*K) 150 1 F - o r c i M 0.74 0.72 0.7 0.68 0.66 0.64 Deepwalk PolyDeepwalk 5 context size 10 Figure 3: Node classification evaluation on BlogCatalog dataset. 1 F - o r c i M 0.58 0.56 0.54 0.52 0.5 1 F - o r c i M 0.6 0.58 0.56 0.54 0.52 Deepwalk PolyDeepwalk 5 context size 10 Deepwalk MSSG PolyDeepwalk MNE 100 50 200 DDeepwalk (or DPolyDeepwalk*K) 150 Figure 4: Node classification evaluation on Flickr dataset. 1 F - o r c i M 0.8 0.7 0.6 0.5 0.4 1 F - o r c i M 0.8 0.7 0.6 0.5 0.4 BlogCatalog Flickr 6 4 K BlogCatalog Flickr 15 5 10 R Figure 5: Parameter analysis for node classification. • In this part of experiment, changing the facet sampling rate for each observation (i.e., context window) does not significantly perturb the results. The possible reason is that many random walks have been generated from each node, so the facet sampling is also implicitly performed for each random walk. The training samples are already adequate even when we reduce the facet sampling rate for each context window. 4.3 Link Prediction in Homogeneous Networks Besides node classification, we also include link prediction as one of the tasks for evaluating the embedding results. We randomly select one link for each node as test data, and use the remaining network as training data. The default settings of hyperparameters are similar to those applied in the last experiment. The main difference lies on the embedding dimensionality, where we let the embedding dimension to be DDeepwalk = DPolyDeepwalk. In other words, the embedding space of PolyDeepwalk is the same as that of Deepwalk. The default dimension value, unless otherwise stated, is chosen as 150. The performance of link prediction is summarized in Table 2, from which we could observe that: • There is no significant advantage for PolyDeepwalk on BlogCat- alog dataset compared with Deepwalk. Although PolyDeepwalk achieves better performance in terms of AUC score, Deepwalk is more advantageous when evaluated using HR@k and k is small. However, it implicitly indicates that Deepwalk is gradu- ally surpassed by PolyDeepwalk when k increases, which means PolyDeepwalk could be better at recovering links that do not match the major connection patterns of a node. • PolyDeepwalk performs better than NMF, which indicates that the effectiveness of polysemous embedding is not purely inher- ited from the matrix factorization step which provides prior knowledge of node facet distribution. In addition, we also analyze the sensitivity of PolyDeepwalk by varying the values of certain hyperparameters, including dimen- sionality, the number of facets (K), and the facet sampling rate (R) for each context window. The results are shown in Figure 6. Some phenomenons are observed as below: • Network embedding models are sensitive to embedding dimen- sion in link prediction tasks, as we can observe a clear growth of AUC score when embedding dimension increases. • Increasing the number of facets K appropriately could boost link prediction performance. However, increasing K will also augment the embedding storage and inference computation cost. We should better keep an appropriate K value, in order to balance the performance and efficiency. • Similar to what we have discussed in node classification, in- creasing the facet sampling rate does not bring much benefits. Therefore, when the number of walks per node is large enough, we can keep the face sampling rate to be low in order to reduce computation costs. 4.4 Link Prediction in Heterogeneous Networks In some application scenarios such as recommender systems, each link stretches across two types of nodes. Here we construct two bipartite networks from two recommendation datasets: MovieLens and Pinterest. Models such as PTE and unsupervised GCN can handle such scenario, and we extend them as PolyPTE and PolyGCN to be evaluated. For each user node, we hold out its latest interaction as the test set and use the remaining data for training. The default values of hyperparameters, unless otherwise stated, are as follows. For both datasets, the number of facets K is 5, the embedding dimension is set as 30, and the facet sampling rate R 2. The negative sampling for each observation (i.e., link) equals K rate is set as 30 for PolyPTE. Different from the last experiment where DPolyDeepwalk = DDeepwalk, the embedding dimension in this experiment is set as D/K. Performances of heterogeneous link prediction are shown in Table 3 under different metrics, where we can observe that: • Polysemous embedding models achieves better performances than their single-embedding counterparts. It thus suggests that considering node polysemy is beneficial for modeling the associ- ation relation between different types of node entities. • Polysemous embedding models in general perform better than NMF, which demonstrates that the effectiveness of polysemous models comes beyond the prior knowledge obtained from NMF. • PolyGCN is not as good as PolyPTE in performance boosting. A possible reason is that we do not consider inter-facet relations in KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA Ninghao Liu,1 Qiaoyu Tan,1 Yuening Li,1 Hongxia Yang,2 Jingren Zhou,2 Xia Hu1 BlogCatalog Flickr PolyDeepwalk Deepwalk NMF MSSG HR@10 HR@50 HR@100 HR@200 AUC HR@10 HR@50 HR@100 HR@200 AUC 0.928 0.912 0.852 0.811 0.493 0.512 0.132 0.272 Table 2: Performance of Homogeneous Link Prediction 0.590 0.530 0.335 0.268 0.737 0.764 0.280 0.505 0.487 0.430 0.226 0.207 0.615 0.639 0.196 0.376 0.957 0.950 0.801 0.910 0.234 0.253 0.041 0.102 0.210 0.195 0.048 0.071 0.395 0.348 0.148 0.152 MovieLens Pinterest PolyPTE PTE PolyGCN GCN NMF MSSG HR@10 HR@50 HR@100 HR@200 AUC HR@10 HR@50 HR@100 HR@200 AUC 0.919 0.703 0.801 0.721 0.654 0.838 0.491 0.336 0.389 0.313 0.404 0.427 0.460 0.088 0.236 0.130 0.075 0.304 0.318 0.052 0.159 0.087 0.040 0.199 0.334 0.227 0.250 0.204 0.265 0.288 0.067 0.040 0.050 0.039 0.051 0.060 0.892 0.832 0.863 0.813 0.865 0.868 0.062 0.007 0.036 0.028 0.005 0.039 0.210 0.143 0.158 0.130 0.165 0.181 0.204 0.030 0.102 0.059 0.021 0.128 Table 3: Performance of Heterogeneous Link Prediction 1 0.95 0.9 C U A 0.85 50 100 C U A 0.96 0.94 0.92 0.9 2 250 BlogCatalog Flickr 8 4 6 K C U A 0.98 0.96 0.94 0.92 0.9 BlogCatalog Flickr 15 5 10 R BlogCatalog Flickr 200 150 DPolyDeepwalk Figure 6: Parameter analysis for link prediction on homogeneous networks. 0.9 C U A 0.8 0.7 MovieLens Pinterest 6 2 4 K C U A 0.95 0.9 0.85 0.8 MovieLens Pinterest 30 10 20 R Figure 7: Parameter analysis for PolyPTE. PolyGCN. However, GCN-based models still have much room for improvement, especially when attribute information is available. Similar to previous experiment tasks, here we also analyze the sensitivity of PolyPTE to model hyperparameters, as shown in Figure 7 for MovieLens and Pinterest. Besides some similar ob- servations as in the last experiment, PolyPTE is sensitive to the facet sampling rate, especially when its value is low. A possible reason for such contrasting observations between PolyDeepwalk and PolyPTE could be the different forms of observation samples o ∈ O. PolyDeepwalk samples plenty of random walks from each node (i.e., o = {N(v), v}), while PolyPTE uses edge based sampling strategy (i.e., o = (vi , vj)). Therefore, if the facet sampling rate is low, PolyPTE could not fully consider all the possible correlation patterns between different facets of users and items. It will thus negatively affect the embedding performance. 5 RELATED WORK Network embedding models have received a lot of attention recently due to its effectiveness in learning representations for nodes in net- work data. Existing work on network embedding can be categorized based on various criteria. Many basic models such as Deepwalk [26], LINE [31], node2vec [5] and SDNE [32] focus on analyzing plain networks, while more recent work starts tackling more complex networks such as considering attributes [11, 18], community struc- tures [33] and node heterogeneity [2, 30]. Many methods solve the embedding problem by resorting to matrix factorization [27], either explicitly [24] or implicitly [26, 31], while recently feed-forward modules such as graph convolutional networks [6, 14] are attract- ing more and more attention. In addition, some challenges that have been tackled in network embedding include model scalability improvement [38], modeling dynamic networks [40], considering human-in-the-loop scenarios [12]. Finally, network embedding has been applied in applications such as recommender systems [4], fraud detection [35] and behavioral modeling [34]. Some recently proposed models, not limited to network analysis, start to utilize the structural knowledge for representation learning. Ma et al. make use of hierarchical taxonomy to regularize node representation learning [21], which does not solve the same problem as in this paper since each node is still assigned only one embedding vector. Yang et al. extends matrix factorization models to explore multiple facets of homogeneous networks towards embedding [37], Is a Single Vector Enough? Exploring Node Polysemy for Network Embedding KDD '19, August 4 -- 8, 2019, Anchorage, AK, USA where the method may not be extended to other base models or scenarios. Some other work such as [39] and [20] try to extract hierarchical taxonomy from embedding results, which also do not solve the same problem as in this paper. The property of multiple facets owned by network nodes can be analogized to a similar phenomenon of word polysemy in nat- ural languages [28]. However, the modeling methods cannot be directly applied to our problem of network analytics due to various incompatibility issues [10, 19], such as the differences in language models and network models, the difference of sample formats, and the absence of the concept of documents in network data. Also, [23] does not consider polysemy in the context vectors or the correlation between different word senses. Some relevant problems have been discussed in Heterogeneous Information Networks [29], but it is hard to adapt the methodology to other scenarios. 6 CONCLUSION AND FUTURE WORK In this paper, we propose a polysemous embedding method for con- sidering multiple facets of nodes in network embedding. After esti- mating the degrees of association between each node and its facets, each facet of a node owns a embedding vector. The proposed method is flexible as it can be used to extend various existing embedding models. During the training process, embedding vectors of different facets are updated, based on the observation where the nodes locate. We also introduce how to combine multiple embedding vectors of each node during classification and link prediction. Experiments on real-world datasets comprehensively evaluate when we benefit from considering node polysemy compared with single-vector em- bedding baseline methods. Some possible future work are as follow: (1) Exploring the possibility of doing node facets association and polysemous embedding simultaneously, (2) Applying polysemous network embedding models to more complicated network systems such as knowledge graphs, (3) Developing optimization algorithms to further accelerate the training procedure. ACKNOWLEDGMENTS The work is, in part, supported by NSF (#IIS-1657196, #IIS-1718840, #IIS-1750074). The views and conclusions contained in this paper are those of the authors and should not be interpreted as represent- ing any funding agencies. REFERENCES [1] Peng Cui, Xiao Wang, Jian Pei, and Wenwu Zhu. A survey on network embedding. arXiv preprint arXiv:1711.08752, 2017. [2] Yuxiao Dong, Nitesh V Chawla, and Ananthram Swami. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD. ACM. [3] Mengnan Du, Ninghao Liu, and Xia Hu. Techniques for interpretable machine learning. arXiv preprint arXiv:1808.00033, 2018. [4] Mihajlo Grbovic and Haibin Cheng. Real-time personalization using embeddings for search ranking at airbnb. In KDD, 2018. [5] Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In KDD. ACM, 2016. [6] Will Hamilton, Zhitao Ying, and Jure Leskovec. Inductive representation learning on large graphs. In NIPS, 2017. [7] William L Hamilton, Rex Ying, and Jure Leskovec. Representation learning on graphs: Methods and applications. arXiv preprint arXiv:1709.05584, 2017. [8] Xiangnan He, Hanwang Zhang, Min-Yen Kan, and Tat-Seng Chua. Fast matrix factorization for online recommendation with implicit feedback. In SIGIR, 2016. [9] Irina Higgins, Loic Matthey, Arka Pal, Christopher Burgess, Xavier Glorot, Matthew Botvinick, Shakir Mohamed, and Alexander Lerchner. beta-vae: Learning basic visual concepts with a constrained variational framework. In ICLR, 2017. [10] Eric H Huang, Richard Socher, Christopher D Manning, and Andrew Y Ng. Improving word representations via global context and multiple word prototypes. In ACL, 2012. [11] Xiao Huang, Jundong Li, and Xia Hu. Label informed attributed network embed- ding. In WSDM. ACM, 2017. [12] Xiao Huang, Qingquan Song, Jundong Li, and Xia Hu. Exploring expert cognition for attributed network embedding. In WSDM, 2018. [13] Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114, 2013. [14] Thomas N Kipf and Max Welling. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907, 2016. [15] Da Kuang, Chris Ding, and Haesun Park. Symmetric nonnegative matrix factor- ization for graph clustering. In SDM, 2012. [16] Daniel D Lee and H Sebastian Seung. Algorithms for non-negative matrix factorization. In NIPS, 2001. [17] Jundong Li, Harsh Dani, Xia Hu, Jiliang Tang, Yi Chang, and Huan Liu. Attributed network embedding for learning in a dynamic environment. In CIKM, 2017. [18] Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua. Attributed social network embedding. IEEE Transactions on Knowledge and Data Engineering, 2018. [19] Yang Liu, Zhiyuan Liu, Tat-Seng Chua, and Maosong Sun. Topical word embed- dings. In AAAI, 2015. [20] Ninghao Liu, Xiao Huang, Jundong Li, and Xia Hu. On interpretation of network embedding via taxonomy induction. KDD, 2018. [21] Jianxin Ma, Peng Cui, Xiao Wang, and Wenwu Zhu. Hierarchical taxonomy aware network embedding. In KDD, 2018. [22] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Dis- tributed representations of words and phrases and their compositionality. In NIPS, 2013. [23] Arvind Neelakantan, Jeevan Shankar, Alexandre Passos, and Andrew McCallum. Efficient non-parametric estimation of multiple embeddings per word in vector space. In EMNLP, 2014. [24] Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. Asymmetric transitivity preserving graph embedding. In KDD, 2016. [25] Adam Perer, Ido Guy, Erel Uziel, Inbal Ronen, and Michal Jacovi. Visual social network analytics for relationship discovery in the enterprise. In Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on, 2011. [26] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of social representations. In KDD. ACM, 2014. [27] Jiezhong Qiu, Yuxiao Dong, Hao Ma, Jian Li, Kuansan Wang, and Jie Tang. Net- work embedding as matrix factorization: Unifying deepwalk, line, pte, and node2vec. In WSDM. ACM, 2018. [28] Joseph Reisinger and Raymond J Mooney. Multi-prototype vector-space models of word meaning. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, 2010. [29] Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, and Jiawei Han. Easing embedding learning by comprehensive transcription of heterogeneous information networks. In KDD, 2018. [30] Jian Tang, Meng Qu, and Qiaozhu Mei. Pte: Predictive text embedding through large-scale heterogeneous text networks. In KDD. ACM, 2015. [31] Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. Line: Large-scale information network embedding. In WWW, 2015. [32] Daixin Wang, Peng Cui, and Wenwu Zhu. Structural deep network embedding. In KDD. ACM, 2016. [33] Xiao Wang, Peng Cui, Jing Wang, Jian Pei, Wenwu Zhu, and Shiqiang Yang. Community preserving network embedding. In AAAI, 2017. [34] Daheng Wang, Meng Jiang, Qingkai Zeng, Zachary Eberhart, and Nitesh V Chawla. Multi-type itemset embedding for learning behavior success. In KDD, 2018. [35] Haibo Wang, Chuan Zhou, Jia Wu, Weizhen Dang, Xingquan Zhu, and Jilong Wang. Deep structure learning for fraud detection. In KDD, 2018. [36] Wei Xu, Xin Liu, and Yihong Gong. Document clustering based on non-negative matrix factorization. In SIGIR, 2003. [37] Liang Yang, Yuanfang Guo, and Xiaochun Cao. Multi-facet network embedding: Beyond the general solution of detection and representation. In AAAI, 2018. [38] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L Hamilton, and Jure Leskovec. Graph convolutional neural networks for web-scale recommender systems. In KDD, 2018. [39] Chao Zhang, Fangbo Tao, Xiusi Chen, Jiaming Shen, Meng Jiang, Brian Sadler, Michelle Vanni, and Jiawei Han. Taxogen: Unsupervised topic taxonomy construction by adaptive term embedding and clustering. In KDD, 2018. [40] Lekui Zhou, Yang Yang, Xiang Ren, Fei Wu, and Yueting Zhuang. Dynamic network embedding by modeling triadic closure process. 2018.
1708.00379
1
1708
2017-08-01T15:06:56
Exponentially Twisted Sampling: a Unified Approach for Centrality Analysis in Attributed Networks
[ "cs.SI", "physics.soc-ph" ]
In our recent works, we developed a probabilistic framework for structural analysis in undirected networks and directed networks. The key idea of that framework is to sample a network by a symmetric and asymmetric bivariate distribution and then use that bivariate distribution to formerly defining various notions, including centrality, relative centrality, community, and modularity. The main objective of this paper is to extend the probabilistic definition to attributed networks, where sampling bivariate distributions by exponentially twisted sampling. Our main finding is that we find a way to deal with the sampling of the attributed network including signed network. By using the sampling method, we define the various centralities in attributed networks. The influence centralities and trust centralities correctly show that how to identify centralities in signed network. The advertisement-specific influence centralities also perfectly define centralities when the attributed networks that have node attribute. Experimental results on real-world dataset demonstrate the different centralities with changing the temperature. Further experiments are conducted to gain a deeper understanding of the importance of the temperature.
cs.SI
cs
1 Exponentially Twisted Sampling: a Unified Approach for Centrality Analysis in Attributed Networks Cheng-Hsun Chang and Cheng-Shang Chang Abstract In our recent works, we developed a probabilistic framework for structural analysis in undirected networks and directed networks. The key idea of that framework is to sample a network by a symmetric and asymmetric bivariate distribution and then use that bivariate distribution to formerly defining various notions, including centrality, relative centrality, community, and modularity. The main objective of this paper is to extend the probabilistic definition to attributed networks, where sampling bivariate distributions by exponentially twisted sampling. Our main finding is that we find a way to deal with the sampling of the attributed network including signed network. By using the sampling method, we define the various centralities in attributed networks. The influence centralities and trust centralities correctly show that how to identify centralities in signed network. The advertisement-specific influence centralities also perfectly define centralities when the attributed networks that have node attribute. Experimental re- sults on real-world dataset demonstrate the different centralities with changing the temperature. Further experiments are conducted to gain a deeper understanding of the importance of the temperature. centralities, signed networks, sampled graph, exponentially twisted sampling. Index Terms I. INTRODUCTION I N social network analysis, centrality [1], [2], [3] have been widely used for ranking the important nodes. To obtain a viewpoint of a network, one typical method is to "sample" the network, e.g., edge sampling, random walks, diffusion [4], or random gossiping [5]. Mathematically, each sampling method renders a (probability) measure for a network that enables us to carry out further analysis. As in the probabilistic framework in [6], we model a network as a graph G and sample the graph to generate a bivariate distribution p(·,·) for a pair of two nodes. In this paper, we only consider the case that the bivariate distribution is symmetric. Under this assumption, the two marginal distributions of the bivariate distribution are the same. As such, the marginal distribution can be used for defining the centrality. Then, we can use centrality to rank nodes. Ranking nodes in the unsigned network have existed a long time such as PageRank [7]. There are many papers in the development of new centralities has made great progress in a static network [8], [9], [10]. Moreover, they extend network properties to the dynamic network [11], [12]. Also, many researchers have proposed heuristics on the standard methods to make them computable in signed networks [13] and attributed network [14], but there is no unified approach for centrality. In this paper, we propose "exponentially twisted sampling," the exponential change of measure to get the bivariate distribution p(·,·), to sample the graph G. We show that our centrality measure digs out various centrality, including the influence centralities, the trust centralities, the advertisement-specific influence centralities, and homophily centrality. The main objective of this paper is to extend the centrality in [6], [15], [16] to attributed networks which contain edge attribute and node attribute. Our main finding is that we can find the path measure f to sample the path r. For this, we show that one can construct another sampled graph with a exponentially twisted sampling, and then the path measure f can be represented as a function of attributes of the nodes C.-H. Chang and C.-S. Chang are with the Institute of Communications Engineering, National Tsing Hua University, Hsinchu 30013, Taiwan, R.O.C. Email: [email protected]; [email protected]. and edges along the path. In this paper, we also address a method for sampling an attributed network with a bivariate distribution and a path measure. A. Review of the probabilistic framework of sampled graphs II. SAMPLED GRAPH 2 In [15], [16], a probabilistic framework for structural analysis in undirected/directed networks was proposed. The main idea in that framework is to sample a network by randomly selecting a path in the network. A network with a path sampling distribution is then called a sampled graph in [15], [16] that can in turn be used for structural analysis of the network, including centrality and community. Specifically, suppose a network is modeled by a graph G(V, E), where V denotes the set of vertices (nodes) in the graph and E denotes the set of edges (links) in the graph. Let n = V be the number of vertices in the graph and index the n vertices from 1, 2, . . . , n. Also, let A = (ai,j) be the n× n adjacency matrix of the graph, i.e., if there is an edge from vertex i to vertex j, ai,j = 0, otherwise. Let Ru,w be the set of (directed) paths from u to w and R = ∪u,w∈V Ru,w be the set of paths in the graph G(V, E). According to a probability mass function p(·), called the path sampling distribution, a path r ∈ R is selected at random with probability p(r). In [15], [16], there are many methods for sampling a graph with a randomly selected path. Here we introduce the following three commonly used approaches: (i) sampling by uniformly selecting a directed edge, (ii) sampling by a Markov chain, and (iii) sampling by a random walk on an undirected network with path length 1 or 2. Example 1. (Sampling by uniformly selecting a directed edge) Given a directed graph G = (V, E) with the adjacency matrix A = (ai,j), one only sample directed paths with length 1 and this is done uniformly among all the directed edges. Specifically, sampling by uniformly selecting a directed edge has the following probability mass function: (cid:26) 1, (cid:26) 1/m, 0, p(r) = if r is an edge from vertex i to vertex j, otherwise. , where m = E is the total number of directed edges in the graph. Example 2. (Sampling by a Markov chain) Given a directed graph G = (V, E) with the adjacency matrix A = (ai,j), consider an ergodic Markov chain on this graph. Let pu,w be the transition probability from node u to node w and πu be the steady state probability of node u. In particular, for PageRank [17] with the web surfing probability λ, the transition probability of the corresponding Markov chain is is the out-degree of node u. Its steady state probabilities (with(cid:80)n pu,w = (1 − λ) au,w kout u + λ 1 n , where kout from solving the following system of equations: u u=1 πu = 1) can be obtained πu = (1 − λ) 1 n + λ awu kout w πw, for all u = 1, 2, . . . , n. (2) For a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in a directed network, we have from the Makrov property that p(r) = πu1 · pu1,u2 · . . . · puk−1,uk. (1) (3) n(cid:88) w=1 Consider the reverse path of r, denoted by Rev(r), that traverses a sequence of nodes {uk, uk−1, . . . , u2, u1}. If the Markov chain is reversible, then it follows from the detailed balance equation that (4) It is known that the corresponding Markov chain for PageRank is in general not reversible. However, the corresponding Markov chain for a random walk on an undirected graph is reversible. We will discuss this further in the next example. p(r) = p(Rev(r)). 3 Example 3. (Sampling by a random walk on an undirected network with path length 1 or 2) For an undirected graph G(V, E), let m = E be the total number of edges and kv be the degree of node v, v = 1, 2, . . . , n. A path r with length 1 can be represented by the two nodes {u1, u2} it traverses. Similarly, a path with length 2 can be represented by the three nodes {u1, u2, u3} it traverses. A random walk with path length not greater than 2 can be generated by the following two steps: (i) with the probability kv/2m, an initial node v is chosen, (ii) with probability βi, i = 1, 2, a walk with length i is chosen. As such, we have  β1 β2 2m 2m au1,u2, au1,u2 au2,u3 , ku2 p(r) = if r = {u1, u2}, if r = {u1, u2, u3}. where β1 + β2 = 1 and βi ≥ 0, i = 1, 2. For an undirected network, we have ai,j = aj,i for all i, j = 1, 2, . . . , n. Thus, in view of (5), we also have in this example. p(r) = p(Rev(r)) (6) Let U (resp. W ) be the starting (resp. ending) node of a randomly select path by using the path sampling distribution p(·). Then the bivariate distribution pU,W (u, w) = P(U = u, W = w) = p(r) (7) (cid:88) r∈Ru,w is the probability that the ordered pair of two nodes (U, W ) is selected. As such, pU,W (u, w) can be viewed as a similarity measure from node u to node w and this leads to the definition of a sampled graph in [15], [16]. In general, the bivariate distribution in (7) is not symmetric by using the path sampling distributions in Example 1 and Example 2. However, if p(r) = p(Rev(r)) for any path r, then the bivariate distribution in (7) is clearly symmetric. Definition 4. (Sampled graph [15], [16]) A graph G(V, E) that is sampled by randomly selecting an ordered pair of two nodes (U, W ) according to a specific bivariate distribution pU,W (·,·) in (7) is called a sampled graph and it is denoted by the two-tuple (G(V, E), pU,W (·,·)). Let pU (u) (resp. pW (w)) be the marginal distribution of the random variable U (resp. W ), i.e., (5) (8) (9) pU (u) = P(U = u) = and pU,W (u, w), pW (w) = P(W = w) = pU,W (u, w). n(cid:88) n(cid:88) w=1 Then pU (u) is the probability that node u is selected as a starting node of a path and it can be viewed as an out-centrality of u. On the other hand, pW (w) is the probability that node w is selected as a ending u=1 4 node of a path and it can be viewed as an in-centrality of w. The in-centrality and the out-centrality are in general not the same. Clearly, if the bivariate distribution pU,W (·,·) is symmetric, then the in-centrality and the out-centrality are the same. A recent advance in [16] shows that one does not need a symmetric bivariate distribution to ensure the equality between the in-centrality and the out-centrality. In particular, for the Markov chain sampling methods in Example 2, one still has pU (u) = pW (u) and the in-centrality and the out-centrality are the same. In that case, we will simply refer PU (u) as the centrality of node u. The framework of sampled graphs in [15], [16] can further be used to define the notions of community and modularity. There are two different types of communities for directed networks that are commonly addressed in the literature (see e.g., [18], [19]): structural communities (based on the densities of edges) and flow communities (based on the flow of probabilities). For (probabilistic) flow communities, they can be detected by using Markov chains in Example 2. On the other hand, structural communities can be detected by using uniform edge sampling in Example 1 to produce communities that are densely connected inside and sparsely connected outside. These two notions of community and modularity will not be pursued further in this paper. B. Exponentially twisted sampling Now we generalize the probabilistic framework in [15], [16] to attributed networks. An attributed network is a generalization of a graph G(V, E) by assigning each node u ∈ V an attribute hV (u) and each edge e ∈ E an attribute hE(e). As such, an attributed network can be represented as G(V, E, hV (·), hE(·)), where hV (·) and hE(·) are called the node attribute function and the edge attribute function, respectively. For a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in a attributed network, we can define a path measure f (r) as a function of the attributes of the nodes and edges along the path r, i.e., {hV (u1), . . . , hV (uk), hE(u1, u2), . . . , hE(uk−1, uk)}. In this paper, we assume that a path measure f (·) is a mapping from the set of paths R to a p-dimensional real-valued vector in Rp, i.e., f (r) = (f1(r), f2(r), . . . , fp(r)), where fi(·), i = 1, 2, . . . , p, are real-valued functions. Now suppose that we have already had a sampled graph (G(V, E), p0(·)) that uses the probability mass function p0(r) to sample a path r in G(V, E). The question is how the sampling distribution should be changed so that the average path measure is equal to a specified vector ¯f. In other words, what is the most likely sampling distribution p(·) that leads to the average path measure ¯f given that the original sampling distribution is p0(·)? For this, we introduce the Kullback-Leibler distance between two probability mass functions p(·) and p0(·): (cid:88) r∈R (cid:88) (cid:88) r∈R r∈R D(p(cid:107)p0) = p(r) log( ). (10) p(r) p0(r) The Kullback-Leibler distance is known to be nonnegative and it is zero if and only if p(·) = p0(·) (see e.g., [20]). Also, according to the Sanov theorem (see e.g., the books [20], [21]), the larger the Kullback- Leibler distance is, the more unlikely for p0(·) to behave like p(·). Thus, to address the question, we consider the following constrained minimization problem: D(p(cid:107)p0) min s.t. p(r) = 1, f (r)p(r) = f . (11) The first constraint states that the total probability must be equal to 1. The second constraint states that the average path measure must be equal to ¯f with the new sampling distribution p(·). The above minimization problem can be solved by using Lagrange's multipliers α ∈ R and θ ∈ Rp as follows: I = D(p(cid:107)p0) + α(1 −(cid:88) p(r)) + θ · (f −(cid:88) f (r)p(r)). r∈R r∈R Taking the partial derivative with respect to p(r) yields Thus, Since(cid:80) where ∂I ∂p(r) = log p(r) + 1 − log p0(r) − α − θ · f (r) = 0. p(r) = exp(α − 1) ∗ exp(θ · f (r)) ∗ p0(r). r∈R p(r) = 1, it then follows that p(r) = C ∗ exp(θ · f (r)) ∗ p0(r), (cid:80) r∈R exp(θ · f (r)) ∗ p0(r) 1 C = 5 (12) (13) (14) (15) (16) is the normalization constant. The new sampling distribution in (15) is known as the exponentially twisted distribution in the literature (see e.g., [22]). To solve θ, we let F = log(1/C). The quantity F is called the free energy as it is analogous to the free energy in statistical mechanic [2]. It is easy to see that for i = 1, 2, . . . , p that ∂F ∂θi fi(r)p(r) = f i. (cid:88) (17) = r∈R These p equations can then be used to solve θi, i = 1, 2, . . . , p. Once we have the sampling distribution in (15), we can define a bivariate distribution pU,W (u, w) as in (7). Specifically, let U (resp. W ) be the starting (resp. ending) node of a randomly select path according to the sampling distribution in (15). Then the bivariate distribution (cid:88) r∈Ru,w pU,W (u, w) = P(U = u, W = w) = p(r) (18) is the probability that the ordered pair of two nodes (U, W ) is selected and it can be viewed as a similarity measure from node u to node w. Analogous to the discussion of a sampled graph in the previous section, the marginal distribution of the random variable U (resp. W ), i.e., pU (u) (resp. pW (w)), can be viewed as an out-centrality of u (resp. in-centrality of w). III. CENTRALITIES A. Centralities in signed networks In this section, we consider a special class of attributed networks, called signed networks. A signed network G = (V, E, hE(·)) is an attributed network with an edge attribute function hE(·) that maps every undirected edge in E to the two signs {+,−}. In this paper, we represent the positive (resp. negative) sign by 1 (resp. -1). An edge (u, w) mapped with the + sign is called a positive edge, and it is generally used for indicating the friendship between the two nodes u and w. On the other hand, an edge mapped with the − sign is called a negative edge. A negative edge (u, w) indicates that u and w are enemies. 6 1) Influence centralities: Such a problem was previously studied in [13] for ranking nodes in signed networks. In SRWR [13], a signed random surfer was used. They use the balance theory to imply the signed random walks. In our paper, it is our special case because it is as same as our how to sampling the path. In [13], it divides the equation into positive surfer r+ u . However, we can consider positive and negative situations in a comprehensive way. u and negative surfer r− One interesting question for signed networks is how the nodes in signed networks are ranked. Our idea for this is to use opinion dynamics. If u and w are connected by a positive (resp. negative) edge, then it is very likely that u will have a positive (resp. negative) influence on w and vice versa. As such, if we start from a node u with a positive opinion on a certain topic, then a neighbor of node u connected by a positive (resp. negative) edge will tend to have the same (resp. the opposite) opinion as node u has. Now we can let the opinion propagate through the entire network (via a certain opinion dynamic) and count the (expected) number of nodes that have the same opinion as node u has. If such a number is large, then it seems reasonable to say that node u has a large positive influence on the other nodes in the network. In other words, a node u has a large positive influence if there is a high probability that the other end of a randomly selected path has the same opinion as node u. This then leads us to define the notion of influence centralities for ranking nodes in signed networks. The above argument is based on the general belief that "a friend of my friend is likely to be my friend" and "an enemy of my enemy can be my friend" in [2]. As such, for a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in a signed network, we define the following path measure as the product of the edge signs along the path, i.e., f (r) = hE(ui, ui+1). (19) (cid:89) (ui,ui+1)∈r Note that f (r) is either 1 or -1 as the edge attribute function hE(·) that maps every undirected edge in E to {1,−1}. In addition to the path measure, we also need to specify the probability that the path r is selected, i.e., p0(r) in (15). For this, we consider a random walk with path length 1 or 2 in Example 3. It then follows from (15), (19) and (5) that  p(r) = (cid:104) C · eθhE (u1,u2) · β1 if r = {u1, u2}, 2m au1,u2, C · eθ·hE (u1,u2)·hE (u2,u3) · β2 if r = {u1, u2, u3}. 2m au1,u2 au2,u3 ku2 , (20) The constant C in (20) is the normalization constant. Summing all the paths from u to w yields the bivariate distribution pU,W (u, w) = C eθhE (u,w) · β1 2m au,w + eθ·hE (u,u2)·hE (u2,w) · β2 2m au,u2au2,w ku2 . (21) (cid:105) (cid:88) u2∈V The marginal distribution of the bivariate distribution, denoted by PU (u), is the influence centrality of node u (with respect to the temperature θ). If we only select paths with length 1, i.e., β2 = 0 in (21), then there is a closed-form expression for the influence centrality. For this, we first compute the normalization constant C by summing over u and w in (21) and this yields m C = m+eθ + m−e−θ , (22) (cid:88) ∂F ∂θ (cid:115) 7 (24) (25) where m+ (resp. m−) is the total number of positive (resp. negative) edges in the graph. Thus, for β2 = 0, pU (u) = = w∈V pU,W (u, w) u eθ + k− u e−θ) (k+ 2(m+eθ + m−e−θ) , (23) u (resp. k− where k+ Now suppose we require the average path measure ¯f to be equal to some fixed constant −1 < γ < 1, u ) is the number of positive (resp. negative) edges of node u. then we have from (17) that where F = log(1/C) with C in (22) is the free energy. This then leads to γ = ¯f = m+ exp(θ) − m− exp(−θ) m+ exp(θ) + m− exp(−θ) , = θ = ln( 2 m−(1 + γ) m+(1 − γ) ). 2) Trust centralities: As discussed in the previous section, the influence centralities are based on the general belief that "an an enemy of my enemy can be my friend." Such a statement might be valid for modelling opinion dynamics. However, it is not suitable for modelling trust. In addition to the interpretation of a signed edge as the friend/enemy relationship, another commonly used interpretation is the trusted/untrusted link. A path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} can be trusted if every edge is a trusted link so that there exists a chain of trust. In view of this, we consider another path measure as the minimum of the edge signs along the path, i.e., f (r) = min (ui,ui+1)∈r hE(ui, ui+1). (26) If we use the random walk with path length 1 or 2 to sample a path r in G(V, E) as in (5), then the sampling distribution for the signed network with the path measure in (26) can be written as follows: C · eθhE (u1,u2) · β1 if r = {u1, u2}, 2m au1,u2, C · eθ·min[hE (u1,u2),hE (u2,u))] · β2 if r = {u1, u2, u3}. au1,u2 au2,u3 ku2 , 2m  p(r) = (cid:104) Moreover, we have the following bivariate distribution pU,W (u, w) = C eθhE (u,w) · β1 2m au,w + eθ·min[hE (u,u2),hE (u2,w)] · β2 2m au,u2au2,w ku2 (cid:88) u2∈V (cid:105) , (27) (28) where C is the normalization constant. The marginal distribution of the bivariate distribution, denoted by PU (u), is the trust centrality of node u (with respect to the temperature θ). We note that if we only select paths with length 1, i.e., β2 = 0, then the trust centrality is the same as the influence centrality in (23). B. Advertisement-specific influence centralities in networks with node attributes G(V, E) with the node attribute function hV (u) that maps every node u to a vector in Rp In this section, we consider another class of attributed networks that have node attributes. For a graph (hV,1(u), hV,2(u), . . . , hV,p(u)). (29) 8 One intuitive way to interpret such an attributed network is to view the graph G(V, E) as a social network with n users and the attribute vector in (29) as the scores of user u on various topics. Now suppose an advertisement z can be represented by a vector of scores (z1, z2, . . . , zp) with zi being the score of the ith topic. Then we would like to find out who are the most influential users in the network to pass on the advertisement z. Such a problem was previously studied in [14] for ranking nodes in Twitter. In TwitterRank [14], a two-step approach was used. First, a topic-specific ranking is obtained for each topic by using a random surfer model similar to that in PageRank [17]. The second step is then to take the weighted average over these topic-specific rankings. Specifically, suppose that RTi(u) is the ranking for topic i and user u. TwitterRank for advertisement z and user u is then defined as the following weighted average: ziRTi(u). (30) p(cid:88) i=1 One flaw for such a two-step approach is that it neglects the fact that the propagation of a specific advertisement through a user depends on how much a user "likes" the advertisement. To model how much a user "likes" an advertisement, we use the similarity measure from the inner product of the score vector of the user and that of the advertisement. It is possible that in a cascade of two users {u1, u2}, both users like the advertisement because their inner products are large, but user u1 likes one topic in that advertisement and user u2 likes another different topic in that advertisement. Such a cascade cannot be caught by using the two-step approach in TwitterRank [14]. In view of this, it might be better to use a single-step approach for computing advertisement-specific influence centralities. As the influence centralities in the previous section, we propose using opinion dynamics through a path. For a path r that traverses a sequence of nodes {u1, u2, . . . , uk−1, uk} in the attributed network, we define the following path measure (31) where z · hV (ui) = zi · hV,i(ui) f (r) = min ui∈r [z · hV (ui)], p(cid:88) i=1 is the inner product of z and hV (u), If we use the random walk with path length 1 or 2 to sample a path r in G(V, E) as in (5), then the sampling distribution for the attributed network with the path measure in (31) can be written as follows:  p(r) = C · eθ min[z·hV (u1),z·hV (u2)] · β1 if r = {u1, u2}, 2m au1,u2, C · eθ·min[z·hV (u1),z·hV (u2),z·hV (u3)] · β2 2m if r = {u1, u2, u3}. au1,u2 au2,u3 ku2 , (32) TABLE I: The Jaccard index results of influence centralities for various γ settings by β2=0 9 ranking by positive edge ranking by negative edge ranking by total edge γ=-0.99 θ=-3.8310 γ=-0.9 θ=-2.6566 γ=-0.5 θ=-1.7337 γ=0 θ=-1.1844 γ=0.5 θ=-0.6351 γ=0.9 θ=0.2878 γ=0.99 θ=1.4323 0.0417 0.0753 0.2658 0.7241 0.8868 1 1 0.7544 0.6667 0.3514 0.0989 0.0638 0.0417 0.0417 0.0417 0.0753 0.2658 0.7241 0.8868 0.9608 0.9608 Moreover, we have the following bivariate distribution (cid:104) pU,W (u, w) = C (cid:88) u2∈V + eθ min[z·hV (u),z·hV (w)] · β1 2m au,u2au2,w au,w eθ·min[z·hV (u),z·hV (u2),z·hV (w)] · β2 2m ku2 (cid:105) , (33) where C is the normalization constant. The marginal distribution of the bivariate distribution, denoted by PU (u), is the advertisement-specific influence centrality of node u for advertisement z (with respect to the temperature θ). A. Experiment for influence centrality IV. EXPERIMENT In this section, we evaluate our model on the real-world network proposed in [23] which is a directed network of hyperlinks between weblogs of US politics recorded by Adamic and Glance. The data on political leaning come from blog directories as indicated. Some blogs were labeled manually, based on incoming and outgoing links and posts around the time of the United States presidential election of 2004. Basically, there are 1,490 nodes and 19,090 edges in this dataset. For our purposes, we would like to examine our algorithm in a undirected signed network. Therefore, we choose the nodes from different community and adding 4,000 negative edges to this network. As a reason that every node should be treated fairly, we randomly pick up the node in the different community instead of choosing those with a higher degree. Then let the the adjacency matrix A = A + AT because we want to get the undirected network. Before we rank these nodes, we have to delete the nodes with degree smaller than 7, that is, their ranks are not important. Furthermore, we also remove the edges which are self-loop and the edges between two nodes if they are connected by more than one edges. As a result, we obtain the directed signed network containing 863 nodes and 16,650 edges, including 15,225 positive edges and 1,425 negative edges. 1) Experiment by β2=0: In Figure 1, we show the distribution of ranking by β2=0. Initially, the top 100 nodes are uniformly distributed on the right side on (a). However, when the value of gamma increases, the top 100 nodes gradually gather in the middle of two community where nodes have more edges than those on the edge of the graph. Also, these top 100 nodes are divided into two clusters and for the nodes in each cluster, they are closely compact with each other. From so, the key persons for these two clusters can be found at ease. On the other hand, we can get the information of which nodes are affecting others in a negative way while gamma is lower. That is to say; these nodes usually have a much higher negative 10 (a) γ = -0.9, θ=-2.6566 (b) γ =-0.5, θ=-1.7337 (c) γ =0, θ=-1.1844 (d) γ =0.5, θ=-0.6351 (e) γ =0.9, θ=0.2878 (f) γ =0.99, θ=1.4623 Fig. 1: The ranking result of influence centralities by β2=0 with different theta degree compared to others. We can view the nodes with a higher negative degree as people who are sent to attack the opponent team, which we call a hitman in this paper. Since these graphs only provide the fact that the top 100 nodes would gather in the middle of the graph if gamma is close to 1, we use Jaccard index for more detail explanation. The Jaccard index is a statistic used for comparing the similarity and diversity of sample sets. It can be denoted as J(S1, S2) = S1 ∩ S2 S1 ∪ S2 , (34) where S1 and S2 are the sample sets. In Table I, we use three kinds of Jaccard index as metrics for comparing the similarity between two sample sets. The negative Jaccard index, the similarity between the set ranked by negative edges and the set ranked by β2 = 0. Similarly, the positive (total) Jaccard index is the similarity between the set ranked by positive (total) edges and the set ranked by β2 = 0. It is easy for us to conclude that the increment of gamma has a positive impact on raising theta. Also, the change of theta causes the change of all three Jaccard indexes. More specifically, the negative Jaccard index decreases and the positive Jaccard index increases along with the increment of theta. Interestingly, the total Jaccard index has a larger value when theta is closer to zero. In order to look into the relationship between these three parameters, Figure 2 is plotted. In Figure 2, we can make a conclusion that the positive Jaccard index and the negative Jaccard index have positive and negative relation with gamma respectively. For the total Jaccard index, it has its maximum 11 Fig. 2: The Jaccard index compare of influence centralities by β2 = 0 TABLE II: The Jaccard index results of influence centralities for various θ settings by β1=0.7 and β2=0.3. ranking by positive edge ranking by negative edge ranking by total edge θ=-2 θ=-1.5 θ=-1 θ=-0.5 θ=0 θ=0.5 θ=1 θ=1.5 θ=2 0.3423 0.4925 0.6949 0.8868 0.9608 0.9802 1 1 1 0.3423 0.1976 0.1299 0.0753 0.0638 0.0638 0.0582 0.0582 0.0582 0.3605 0.5152 0.7241 0.9231 1 0.9802 0.9608 0.9608 0.9608 when gamma is close to 0.8. This implies the fact that the closer to 0.8 the gamma is, the closer to zero the theta is. As a result, we can use this fact as a pioneering method to define the centrality for a signed network. That is to say, the centrality can be defined by the adjustment of temperature (theta). By using opinion dynamic, there are three different centralities able to be defined. First, the positive influence centrality, representing those people who give you positive influences (e.g., your friends), can be found by increasing the temperature (theta). On the contrary, the negative influence centrality stands for those people giving you negative influences like your enemy. We figure it out by lowering down the temperature (theta). Last, the total influence centrality is the representation for the famous people among all. For these famous people, the thing we only care about is how many people know him instead of how many people love him or hate him. Thus, we make the temperature (theta) close to zero to find the total influence centrality. 2) Experiment by β1 = 0.7 and β2 = 0.3: In Figure 3, we show the distribution of ranking by β1 = 0.7 and β2 = 0.3. Same as Figure 1, theta has the same effect for gathering node in the middle of graphs. In addition, we can observe that the hitmen by setting β1 = 0.7 and β2 = 0.3 are slightly different from ranking by β2 = 0. The reason is that when we have the information from our neighbors' neighbor, some messages that our neighbors are unwilling to tell may be revealed. Therefore, these hidden hitmen will emerge due to the exposure of these secret messages. More details are provided in Table II. In Table II, the values for the three Jaccard indexes we proposed are listed. As the theta increases, the positive Jaccard index does increase as a very similar way as listed in Table I. However, the positive gamma-1-0.500.51Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexNegative Jaccard indexTotal Jaccard index 12 (a) θ =-3 (b) θ =-2 (c) θ =-1 (d) θ =0 (e) θ =1 (f) θ =2 Fig. 3: The ranking result of influence centralities by β1 = 0.7 and β2 = 0.3 Jaccard index in Table I is one when θ is 0.2878 and the positive Jaccard index is one when θ is one. We can find if we consider the path which length is two, the positive Jaccard index converges slowly. It is because we have to consider more information than only consider the path which length is one. The obvious difference is that the negative Jaccard index values are much lower compared to the result that only consider the path which length is one. Due to the fact that when considering not just the neighbors of a node but both its neighbors and its neighbors' neighbors, we would get more information and thus find a more global ranking. The negative Jaccard index and the total Jaccard index have very similar changes of behavior as the positive Jaccard index when considering the path which length is two. To study more about the difference between these two path sampling, Figure 4 provides more graphical details. For the negative Jaccard index, it is relatively lower compared to the result of considering the path which length is one in Figure 4. Since considering the path which length is two would consider two edges rather than one, it means that there will be four circumstances to consist a two-step edge pair including negative/negative, negative/positive, positive/negative and positive/positive. We have to consider the positive/negative and negative/positive edge pairs to figure out the negative Jaccard index. Therefore, the lower negative Jaccard index has been generated. In the same way, we have to add the positive/positive and negative/negative edge pairs into our consideration for the calculation of the positive Jaccard index. We also look forward to a relatively lower positive Jaccard index when θ is not too large same as the negative Jaccard index does. However, there are only 8.5% of negative edges in this network such that the influence of negative edges can be ignored. As a result, the positive Jaccard index acts in the same 13 Fig. 4: The Jaccard index compare of influence centralities by β1=0.7 and β2=0.3. (a) θ =0 (b) θ =1 (c) θ =2 Fig. 5: The ranking result of trust centralities by β1=0.7 and β2=0.3 with different theta way as it does in considering the path which length is only one when theta grows larger. In opinion dynamic, we say that the spread of the information is a way to define centrality. Considering the path which length is only one provides a way to find the influence centrality for a node to its neighbors. Moreover, if we want to find the influence centrality for a node to those nodes which can not be reached in random walk only one step, we have to apply random walk more step to figure this out. B. Experiment for trust centrality We use the same data as used in the experiment for influence centrality. In trust centrality, we have to consider the path which length is two because if only considering the path which length is one the result is as same as the influence centrality considering only the path which length is one. In Figure 5, no matter how we adjust theta, figure (a), (b) and (c) look similar. It is because the higher ranking node has more positive edges in trust centrality, and we have to consider positive/positive edges in two-step approach. Then in this dataset, the positive edges accounted for 91.5%. When theta is closer to zero, the rank is more similar to rank by total edges. When theta is larger, the rank is more similar to rank by positive edges. It is different from Figure 4. theta-3-2-10123Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexNegative Jaccard indexTotal Jaccard index 14 Fig. 6: The Jaccard index compare of trust centralities. (a) θ =0 (b) θ =0.05 (c) θ =0.1 Fig. 7: The ranking result of advertisement-specific influence centralities with different theta In Figure 4, the line of positive Jaccard index slowly close to one when theta is larger. It is because it has to consider the negative/negative and positive/positive edges. In Figure 6, we only have to consider positive/positive edges, so the line is equal to one when theta is larger. It is as same as the line in Figure 2. With the increase of theta, we can find who is worthy of our trust. It is our definition of trust centrality. C. Experiment for advertisement-specific influence centrality We evaluate our model on MemeTracker dataset [24], which tracks the quotes and phrases that frequently appear over time across mass media and personal blogs. Each cascade is composed of a "meme' (the phrase being mentioned), and the timestamps records of sites which have mentioned that phrase. To get advertisement information from these memes, we leverage Carrot2 [25], an open source clustering engine, with STC clustering algorithm to classify memes into fifteen topics including People, Going, Know, Years, Way, United States, States, Life, Believe, Lot, Love, America, Country, Barack Obama and Obama. For the data-independency purpose, we delete United States and Barack Obama since they are subsets of topic theta-3-2-10123Jaccard index00.20.40.60.81Jaccard index compare for first 100Positive Jaccard indexTotal Jaccard index 15 States and Obama. Therefore, we obtain a dataset with thirteen regularly-used phrases in it. Before we rank these nodes, we have to delete the nodes with degree smaller than 7 and self-loop edges, that is, their ranks are not important. As a result, we obtain the attributed network containing 2082 nodes and 16,503 edges. We choose the phrase "Going" as an advertisement and input it into the existing attributed network that has node attribute. Since the ranking results by the sampling with path length 1 and the sampling with path length 2 are almost the same, we simply use the rank of sampling with path length 1 to do performance evaluation. Then, treating the advertisement as a sampling bias to find the pass measure and plot it as Figure 7 varying with θ. As so, it is obvious to see that the red nodes with higher rank gradually gather in the middle of the graph while θ slowly decrease down to zero. Then, we use Jaccard index for more detail explanation. Fig. 8: The Jaccard index compare of advertisement-specific influence centralities. In this paper, we simply call the Jaccard index between the rank of degree and the rank generated by setting β2 = 0 as Degree Jaccard index. Also, we call the Jaccard index between the rank of the regularly- used phrases and rank generated by setting the β2 = 0 as Advertisement Jaccard index. In Figure 8, we show the relationship between θ and the two Jaccard index respectively. Degree Jaccard index has an escalating trend while θ is close to zero. On the other hand, Advertisement Jaccard index raises up as θ grows large, we claim it as advertisement-specific influence centrality. Then, the smaller the θ is, the more similar the ranking is to the rank of degree. On the contrary, if the θ increases, the rank would be more relevant to the rank of advertisement. For experimental settings, we set θ as 0.2 because the top 250 nodes do not change by increasing the θ over than 0.2. Then we choose the top six most frequently-used phrases as test data, including Going, Know, People, Years, America, and Obama. We apply each phrase to our algorithm one by one and find that the top rank nodes are not in complete accord. Figure 9 leads to the fact that the top rank nodes may not be the same between any two topics. Besides, we combine advertisements from different aspects and do the performance evaluation to find the top rank node of these advertisements. In Figure 10, figure (a) is combined by two advertisements that is "Going" and "Obama," and figure (b) is combined by the advertisement "Know" and the advertisement "America". The result is not necessarily the same compared to the result of each advertisement we used to combine in. theta00.050.10.150.2Jaccard index00.20.40.60.81Jaccard index compare for first 250Advertisement Jaccard indexDegree Jaccard index 16 (a) Going (b) Know (c) People (a) Years Fig. 9: The ranking result of advertisement-specific influence centralities with different advertisement (b) America (c) Obama As a result, if there is an advertisement containing all sort of contents and we would like to know who is the most influential person to it in the existing network, we can get the answer through this experiment. Briefly speaking, we pick up those important phrases in the contents manually and apply them to our algorithms. Thus, those nodes which are truly beneficial to the promotion for the advertisement can be found out. This may be very different to the fact that people usually think the higher degree a node has the more value the node can create for an advertisement. V. CONCLUSION In this paper, we extend our previous work in [16] to attributed networks. Our approach is to extend the bivariate distributions in an unsigned network to a signed network by using the exponential change of measure. Hence, the centrality is also being separated into three different terms of centrality which are the positive influence centrality, negative influence centrality, and the total influence centrality. Besides, the experimental results also help us learn the relationship between temperature (theta) and the three centralities. We also would like to extend this definition to community detection and not just using it as centrality. [1] L. C. Freeman, "A set of measures of centrality based on betweenness," Sociometry, pp. 35 -- 41, 1977. [2] M. Newman, Networks: an introduction. Oxford university press, 2010. [3] L. C. Freeman, "Centrality in social networks conceptual clarification," Social networks, vol. 1, no. 3, pp. 215 -- 239, 1978. REFERENCES 17 (a) Going and Obama (b) Know and America Fig. 10: The ranking result of advertisement-specific influence centralities with combining two advertise- ment [4] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter, and J.-P. Onnela, "Community structure in time-dependent, multiscale, and multiplex networks," science, vol. 328, no. 5980, pp. 876 -- 878, 2010. [5] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Gossip algorithms: Design, analysis and applications," in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 3. IEEE, 2005, pp. 1653 -- 1664. [6] C.-S. Chang, C.-Y. Hsu, J. Cheng, and D.-S. Lee, "A general probabilistic framework for detecting community structure in networks," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 730 -- 738. [7] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web." Stanford InfoLab, Tech. [8] V. Latora and M. Marchiori, "A measure of centrality based on network efficiency," New Journal of Physics, vol. 9, no. 6, p. 188, [9] E. Estrada and J. A. Rodriguez-Velazquez, "Subgraph centrality in complex networks," Physical Review E, vol. 71, no. 5, p. 056103, Rep., 1999. 2007. 2005. [10] A. Mohammadinejad, R. Farahbakhsh, and N. Crespi, "Employing personality feature to rank the influential users in signed networks," in Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom)(BDCloud-SocialCom-SustainCom), 2016 IEEE International Conferences on. IEEE, 2016, pp. 346 -- 353. [11] H. Kim and R. Anderson, "Temporal node centrality in complex networks," Physical Review E, vol. 85, no. 2, p. 026107, 2012. [12] D. Taylor, S. A. Myers, A. Clauset, M. A. Porter, and P. J. Mucha, "Eigenvector-based centrality measures for temporal networks," Multiscale Modeling & Simulation, vol. 15, no. 1, pp. 537 -- 574, 2017. [13] J. Jung, W. Jin, L. Sael, and U. Kang, "Personalized ranking in signed networks using signed random walk with restart," in Data Mining (ICDM), 2016 IEEE 16th International Conference on. IEEE, 2016, pp. 973 -- 978. [14] J. Weng, E.-P. Lim, J. Jiang, and Q. He, "Twitterrank: finding topic-sensitive influential twitterers," in Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010, pp. 261 -- 270. [15] C.-S. Chang, C.-J. Chang, W.-T. Hsieh, D.-S. Lee, L.-H. Liou, and W. Liao, "Relative centrality and local community detection," Network Science, vol. 3, no. 4, pp. 445 -- 479, 2015. [16] C.-S. Chang, D.-S. Lee, L.-H. Liou, S.-M. Lu, and M.-H. Wu, "A probabilistic framework for structural analysis in directed networks," in Communications (ICC), 2016 IEEE International Conference on. IEEE, 2016, pp. 1 -- 6. [17] S. Brin and L. Page, "Reprint of: The anatomy of a large-scale hypertextual web search engine," Computer networks, vol. 56, no. 18, [18] M. Rosvall and C. Bergstrom, "Maps of information flow reveal community structure in complex networks," arXiv preprint physics.soc- pp. 3825 -- 3833, 2012. ph/0707.0609, 2007. [19] R. Lambiotte, J.-C. Delvenne, and M. Barahona, "Random walks, markov processes and the multiscale modular organization of complex networks," IEEE Transactions on Network Science and Engineering, vol. 1, no. 2, pp. 76 -- 90, 2014. [20] T. M. Cover and J. A. Thomas, Elements of information theory. [21] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012. John Wiley & Sons, 2012. [22] S. Juneja and P. Shahabuddin, "Rare-event simulation techniques: an introduction and recent advances," Handbooks in operations research and management science, vol. 13, pp. 291 -- 350, 2006. 18 [23] L. A. Adamic and N. Glance, "The political blogosphere and the 2004 us election: divided they blog," in Proceedings of the 3rd international workshop on Link discovery. ACM, 2005, pp. 36 -- 43. [24] J. Leskovec, L. Backstrom, and J. Kleinberg, "Memetracker data," 2008. [25] S. Osi´nski and D. Weiss, "Carrot2: Design of a flexible and efficient web information retrieval framework," in International atlantic web intelligence conference. Springer, 2005, pp. 439 -- 444.
1210.3587
1
1210
2012-10-12T18:04:45
Inferring the Underlying Structure of Information Cascades
[ "cs.SI", "cs.AI", "physics.soc-ph" ]
In social networks, information and influence diffuse among users as cascades. While the importance of studying cascades has been recognized in various applications, it is difficult to observe the complete structure of cascades in practice. Moreover, much less is known on how to infer cascades based on partial observations. In this paper we study the cascade inference problem following the independent cascade model, and provide a full treatment from complexity to algorithms: (a) We propose the idea of consistent trees as the inferred structures for cascades; these trees connect source nodes and observed nodes with paths satisfying the constraints from the observed temporal information. (b) We introduce metrics to measure the likelihood of consistent trees as inferred cascades, as well as several optimization problems for finding them. (c) We show that the decision problems for consistent trees are in general NP-complete, and that the optimization problems are hard to approximate. (d) We provide approximation algorithms with performance guarantees on the quality of the inferred cascades, as well as heuristics. We experimentally verify the efficiency and effectiveness of our inference algorithms, using real and synthetic data.
cs.SI
cs
Inferring the Underlying Structure of Information Cascades Bo Zong, Yinghui Wu, Ambuj K. Singh, and Xifeng Yan Department of Computer Science University of California at Santa Barbara Santa Barbara, CA 93106-5110, USA {bzong, yinghui, ambuj, xyan}@cs.ucsb.edu 2 1 0 2 t c O 2 1 ] I S . s c [ 1 v 7 8 5 3 . 0 1 2 1 : v i X r a Abstract -- In social networks, information and influence diffuse among users as cascades. While the importance of studying cascades has been recognized in various applications, it is difficult to observe the complete structure of cascades in practice. Moreover, much less is known on how to infer cascades based on partial observations. In this paper we study the cascade inference problem following the independent cascade model, and provide a full treatment from complexity to algorithms: (a) We propose the idea of consistent trees as the inferred structures for cascades; these trees connect source nodes and observed nodes with paths satisfying the constraints from the observed temporal information. (b) We introduce metrics to measure the likelihood of consistent trees as inferred cascades, as well as several optimization problems for finding them. (c) We show that the decision problems for consistent trees are in general NP-complete, and that the optimization problems are hard to approximate. (d) We provide approximation algorithms with performance guarantees on the quality of the inferred cascades, as well as heuristics. We experimentally verify the efficiency and effectiveness of our inference algorithms, using real and synthetic data. Keywords-information diffusion; cascade inference I. INTRODUCTION In various real-life networks, users frequently exchange information and influence each other. The information (e.g., messages, articles, recommendation links) is typically cre- ated from a user and spreads via links among users, leaving a trace of its propagation. Such traces are typically represented as trees, namely, information cascades, where (a) each node in a cascade is associated with the time step at which it receives the information, and (b) an edge from a node to another indicates that a user propagates the information to and influences its neighbor [4], [12]. A comprehensive understanding and analysis of cascades benefit various emerging applications in social networks [6], [16], viral marketing [1], [9], [27], and recommendation networks [24]. In order to model the propagation of infor- mation, various cascade models have been developed [8], [31], [33]. Among the most widely used models is the independent cascade model [16], where each node has only one chance to influence its inactive neighbors, and each node is influenced by at most one of its neighbors independently. Nevertheless, it is typically difficult to observe the entire cascade in practice, due to the noisy graphs with missing data, or data privacy policies [21], [29]. It is important to "Iphone 4s" Bill,1 0.7 Ann,0 Ann,0 0.7 0.8 Ann,0 Bill,1 Mike ... 0 . 5 0.8 0 . 3 0 . 8 Jack 0.8 0.3 Tom 0.6 G 0.7 0.9 0.4 0 . 8 Mary,3 0.7 Mike 0.9 Mary,3 T1 Jack 0.7 0.8 Bill,1 Jack 0.8 Mary,3 T2 Figure 1: A cascade of an Ad (partially observed) in a social network G from user Ann, and its two possible tree representations T1 and T2. develop techniques that can infer the cascades using partial information. Consider the following example. Example 1: The graph G in Fig. 1 depicts a fraction of a social network (e.g., Twitter), where each node is a user, and each edge represents an information exchange. For example, edge (Ann, Bill) with a weight 0.7 represents that a user Ann sends an advertisement (Ad) about a released product (e.g., "Iphone 4s") with probability 0.7. To identify the impact of an Ad strategy, a company would like to know the complete cascade starting from their agent Ann. Due to data privacy policies, the observed information may be limited: (a) at time step 0, Ann posts an Ad about "Iphone 4s"; (b) at time step 1, Bill is influenced by Ann and retweets the Ad; (c) by time step 3, the Ad reaches Mary, and Mary retweets it. As seen, the information diffuses from one user to his or her neighbors with different probabilities, represented by the weighted edges in G. Note that the cascade unfolds as a tree, rooted at the node Ann. To capture the entire topological information of the cas- cades, we need to make inferences in the graph-time domain. Given the above partially observed information, two such inferred cascades are shown as trees T1 and T2 in Fig. 1. T1 illustrates a cascade where each path from the source Ann to each observed node has a length that exactly equals to the time step, at which the observed node is influenced, while T2 illustrates a cascade where any path in T2 from Ann to an observed node has a length no greater than the observed time step when the node is influenced, due to possible delay in observation, e.g., Mary is known to be influenced by (instead of exactly at) time step 3. The inferred cascades provide useful information about the missing links and users that are important in the propagation of the information. The above example highlights the need to make reason- able inference about the cascades, according to only the partial observations of influenced nodes and the time at or by which they are influenced. Although cascade models and a set of related problems, e.g., influence maximization, have been widely studied, much less is known on how to infer the cascade structures, including complexity bounds and approximation algorithms. Contributions. We investigate the cascade inference prob- lem, where cascades follow the widely used independent cascade model. To the best of our knowledge, this is the first work towards inferring cascades as general trees following independent cascade model, based on the partial observations. (a) We introduce the notions of (perfect and bounded) con- sistent trees in Section II. These notions capture the inferred cascades by incorporating connectivity and time constraints in the partial observations. To provide a quantitative measure of the quality of inferred cascades, we also introduce two metrics in Section II, based on (i) the size of the consistent trees, and (ii) the likelihood when a diffusion function of the network graph is taken into account, respectively. These metrics give rise to two optimization problems, referred to as the minimum consistent tree problem and minimum weighted consistent tree problem. (b) We investigate the problems of identifying perfect and bounded consistent trees, for given partial observations, in Section III and Section IV, respectively. These problems are variants of the inference problem. (i) We show that these problems are all NP-complete. Worse still, the optimization problems are hard to approximate: unless P = NP, it is not possible to approximate the problems within any constant ratio. (ii) Nevertheless, we provide approximation and heuristic algorithms for these problems. For bounded trees, the prob- lems are O(X ∗ log fmin )-approximable, where X is the log fmax size of the partial observation, and fmin (resp. fmax) are the minimum (resp. maximum) probability on the graph edges. We provide such polynomial approximation algorithms. For perfect trees, we show that it is already NP-hard to even find a feasible solution. However, we provide an efficient heuristics using a greedy strategy. Finally, we address a practical special case for perfect tree problems, which are O(d∗ log fmin )-approximable, where d is the diameter of the log fmax graph, which is typically small in practice. (c) We experimentally verify the effectiveness and the effi- ciency of our algorithms in Section V, using real-life data and synthetic data. We show that our inference algorithms can efficiently infer cascades with satisfactory accuracy. Related work. We categorize related work as follows. Cascade Models. To capture the behavior of cascades, a variety of cascade models have been proposed [2], [13], [15], [17], [18], such as Suscepctible/Infected (SI) model [2], de- creasing cascade model [17], triggering model [16], Shortest Path Model [19], and the Susceptible/Infected/Recover (SIR) model [18]. In this paper, we assume that the cascades follow the independent cascade model [13], which is one of the most widely studied models (the shortest path model [19] is one of its special cases). Cascade Prediction. There has been recent work on cas- cade prediction and inference, with the emphasis on global properties (e.g., cascade nodes, width, size) [5], [11], [20], [23], [29], [31], [33] with the assumption of missing data and partial observations. The problem of identifying and ranking influenced nodes is addressed in [20], [23], but the topological inference of the cascades is not considered. Wang et al. [33] proposed a diffusive logistic model to capture the evolution of the density of active users at a given distance over time, and demonstrated the prediction ability of this model. Nevertheless, the structural informa- tion about the cascade is not addressed. Song et al. [31] studied the probability of a user being influenced by a given source. In contrast, we consider a more general inference problem where there are multiple observed users, who are influenced at different time steps from the source. Fei et al. [11] studied social behavior prediction and the effect of information content. In particular, their goal is to predict actions on an article based on the training dataset. Budak et al. [5] investigated the optimization problem of minimizing the number of the possible influencing nodes following a specified cascade model, instead of predicting cascades based on partial observations. All the above works focus on predicting the nodes and their behavior in the cascades. In contrast, we propose approaches to infer both the nodes and the topology of the cascades in the graph-time domain. Network Inference. Another host of work study network inference problem, which focuses on inferring network structures from observed cascades over the unknown net- work, instead of inferring cascade structures as trees [10], [14]. Manuel et al. [14] proposes techniques to infer the structure of a network where the cascades flow, based on the observation over the time each node is affected by a cascade. Similar network inference problem is addressed in [10], where the cascades are modeled as (Markov random walk) networks. The main difference between our work and theirs is (a) we use consistent trees to describe possible cascades allowing partial observations; (b) we focus on inferring the structure of cascades as trees instead of the backbone networks. Closer to our work is the work by Sadikov et al. [29] that consider the prediction of the cascades modeled as k-trees, a Ann,0 Ann,0 Ann,0 Ann,0 Bill,1 Bill,1 Jack Bill,1 Mike Bill,1 Jack Tom Jack Tom Mary,3 T3 Mary,3 T4 Mary,3 T5 Mary,3 T6 Figure 2: Tree representations of a partial observation X = {(Ann, 0), (Bill, 1), (Mary, 3)}: T3, T4 and T5 are consistent Trees, while T6 is not. balanced tree model. The global properties of cascades such as size and depth are predicted based on the incomplete cascade. In contrast to their work, (a) we model cascades as general trees instead of k-balanced trees, (b) while Sadikov et al. [29] assume the partial cascade is also a k-tree and predict only the properties of the original cascade, we infer the nodes as well as topology of the cascades only from a set of nodes and their activation time, using much less available information. (c) The temporal information (e.g., time steps) in the partial observations is not considered in [29]. II. CONSISTENT TREES We start by introducing several notions. Diffusion graph. We denote a social network as a directed graph G = (V, E, f ), where (a) V is a finite set of nodes, and each node u ∈ V denotes a user; (b) E ⊆ V × V is a finite set of edges, where each edge (u, v) ∈ E denotes a social connection via which the information may diffuse from u to v; and (c) a diffusion function f : E → R+ which assigns for each edge (u, v) ∈ E a value f (u, v) ∈ [0, 1], as the probability that node u influences v. Cascades. We first review the independent cascade model [16]. We say an information propagates over a graph G following the independent cascade model if (a) at any time step, each node in G is exactly one of the three states {active, newly active, inactive}; (b) a cascade starts from a source node s being newly active at time step 0; (c) a newly active node u at time step t has only one chance to influence its inactive neighbors, such that at time t + 1, (i) if v is an inactive neighbor of u, v becomes newly active with probability f (u, v); and (ii) the state of u changes from newly active to active, and cannot influence any neighbors afterwards; and (d) each inactive node v can be influenced by at most one of its newly active neighbors independently, and the neighbors' attempts are sequenced in an arbitrary order. Once a node is active, it cannot change its state. Based on the independent cascade model, we define a cascade C over graph G = (V, E, f ) as a directed tree (Vc, Ec, s, T ) where (a) Vc ⊆ V , Ec ⊆ E; (b) s ∈ Vc is the source node from which the information starts to propagate; and (c) T is a function which assigns for each node vi ∈ Vc a time step ti, which represents that vi is newly active at time step ti. Intuitively, a cascade is a tree representation of the "trace" of the information propagation from a specified source node s to a set of influenced nodes. Indeed, one may verify that any cascade from s following the independent cascade model is a tree rooted at s. Example 2: The graph G in Fig. 1 depicts a social graph. The tree T1 and T2 are two possible cascades following the independent cascade model. For instance, after issuing an ad of "Iphone 4s", Ann at time 0 becomes "newly active". Bill and Jack retweet the ad at time 1. Ann becomes "active", while Bill and Jack are turned to "newly active". The process repeats until the ad reaches Mary at time step 3. The trace of the information propagation forms the cascade T1. As remarked earlier, it is often difficult to observe the entire structure of a cascade in practice. We model the observed information for a cascade as a partial observation. Partial observation. Given a cascade C = (Vc, Ec, s, T ), a pair (vi, ti) is an observation point, if vi ∈ V is known (observed) to be newly active at or by time step ti. A partial observation X is a set of observation points. Specifically, X is a complete observation if for any v ∈ Vc, there is an observation point (v, t) ∈ X. To simplify the discussion, we also assume that pair (s, 0) ∈ X where s is the source node. The techniques developed in this paper can be easily adapted to the case where the source node is unknown. We are now ready to introduce the idea of consistent trees. A. Consistent trees Given a partial observation X of a graph G = (V, E, f ), a bounded consistent tree Ts = (VTs , ETs, s) w.r.t. X is a directed subtree of G with root s ∈ V , such that for every (vi, ti) ∈ X, vi ∈ VTs, and s reaches vi by ti hops, i.e., there exists a path of length at most ti from s to vi. Specifically, we say a consistent tree is a perfect consistent tree if for every (vi, ti) ∈ X and vi ∈ VTs, there is a path of length equals to ti from s to vi. Intuitively, consistent trees represent possible cascades which conform to the independent cascade model, as well as the partial observation. Note the following: (a) the path from the root s to a node vi in a bounded consistent tree Ts is not necessarily a shortest path from s to vi in G, as observed in [22]; (b) the perfect consistent trees model cascades when the partial observation is accurate, i.e., each time ti in an observation point (vi, ti) is exactly the time when vi is newly active; in contrast, in bounded consistent trees, an observation point (v, t) indicates that node v is newly active at the time step t′ ≤ t, due to possible delays in the information propagation, as observed in [6]. Example 3: Recall the graph G in Fig. 1. The partial observation of a cascade in G is X = {(Ann, 0), (Bill, 1), (Mary, 3)}. The tree T1 is a perfect consistent tree w.r.t. X, where T2 is a bounded consistent tree w.r.t. X. Now consider the trees in Fig. 2. One may verify that (a) T3, T4 and T5 are bounded consistent trees w.r.t. X; (b) T3 and T4 are perfect consistent trees w.r.t. X, where T5 is not a perfect consistent tree. (c) T6 is not a consistent tree, as there is no path from the source Ann to Mary with length no greater than 3 as constrained by the observation point (Mary, 3). B. Cascade inference problem We introduce the general cascade inference problem. Given a social graph G and a partial observation X, the cascade inference problem is to determine whether there exists a consistent tree T w.r.t. X in G. There may be multiple consistent trees for a partial ob- servation, so one often wants to identify the best consistent tree. We next provide two quantitative metrics to measure the quality of the inferred cascades. Let G = (V, E, f ) be a social graph, and X be a partial observation. Minimum weighted consistent trees. In practice, one often wants to identify the consistent trees that are most likely to be the real cascades. Recall that each edge (u, v) ∈ E in a given network G carries a value assigned by a diffusion function f (u, v), which indicates the probability that u influences v. Based on f (u, v), we introduce a likelihood function as a quantitative metric for consistent trees. Likelihood function. Given a graph G = (V, E, f ), a partial observation X and a consistent tree Ts = (VTs , ETs , s), the likelihood of Ts, denoted as LX (Ts), is defined as: LX (Ts) = P(X Ts) = Y f (u, v). (1) (u,v)∈ETs Following common practice, we opt to use the log- likelihood metric, where LX(Ts) = X log f (u, v) (u,v)∈ETs Given G and X, a natural problem is to find the consistent tree of the maximum likelihood in G w.r.t. X. Using log- likelihood, the minimum weighted consistent tree problem is to identify the consistent tree Ts with the minimum −LX(Ts), which in turn has the maximum likelihood. Minimum consistent trees. Instead of weighted consistent trees, one may simply want to find the minimum structure that represents a cascade [25]. The minimum consistent tree, as a special case of the minimum weighted consistent tree, depicts the smallest cascades with the fewest communication steps to pass the information to all the observed nodes. In other words, the metric favors those consistent trees consist with the given partial observation with the fewest edges. Given G and X, the minimum consistent tree problem is to find the minimum consistent trees in G w.r.t. X. In the following sections, we investigate the cascade inference problem, and the related optimization problems using the two metrics. We investigate the problems for perfect consistent trees in Section III, and for bounded consistent trees in Section IV, respectively. III. CASCADES AS PERFECT TREES As remarked earlier, when the partial observation X is accurate, one may want to infer the cascade structure via perfect consistent trees. The minimum (resp. weighted) perfect consistent tree problem, denoted as PCTmin (resp. PCTw) is to find the perfect consistent trees with minimum size (resp. weight) as the quality metric. Though it is desirable to have efficient polynomial time algorithms to identify perfect consistent trees, the problems of searching PCTmin and PCTw are nontrivial. Proposition 1: Given a graph G and a partial observation X, (a) it is NP-complete to determine whether there is a perfect consistent tree w.r.t. X in G; and (b) the PCTmin and PCTw problems are NP-complete and APX-hard. One may verify Proposition 1(a) by a reduction from the Hamiltonian path problem [32], which is to determine whether there is a simple path of length V −1 in a graph G =(V, E). Following this, one can verify that the PCTmin and PCTw problems are NP-complete as an immediate result. Proposition 1(b) shows that the PCTmin and PCTw prob- lems are hard to approximate. The APX class [32] consists of NP optimization problems that can be approximated by a polynomial time (PTIME) algorithm within some positive constant. The APX-hard problems are APX problems to which every APX problem can be reduced. Hence, the prob- lem for computing a minimum (weighted) perfect consistent tree is among the hardest ones that allow PTIME algorithms with a constant approximation ratio. It is known that if there is an approximation preserving reduction (AFP-reduction) [32] from a problem Π1 to a problem Π2, and if problem Π1 is APX-hard, then Π2 is APX-hard [32]. To see Proposition 1(b), we may construct an AFP-reduction from the minimum directed steiner tree (MST) problem. An instance of a directed steiner tree problem I = {G, Vr, Vs, r, w} consists of a graph G, a set of required nodes Vr, a set of steiner nodes Vs, a source node r and a function w which assigns to each node a positive weight. The problem is to find a minimum weighted tree rooted at r, such that it contains all the nodes in Vr and a part of Vs. We show such a reduction exists. Since MST is APX-hard, PCTmin is APX-hard. A. Bottom-up searching algorithm Given the above intractability and approximation hardness result, we introduce a heuristic WPCT for the PCTw problem. The idea is to (a) generate a "backbone network" Gb of G which contains all the nodes and edges that are possible to form a perfect consistent tree, using a set of pruning rules, and also rank the observed nodes in Gb with 2. 3. 4. 5. 6. Input: graph G and partial observation X. Output: a perfect consistent tree T in G. 1. tree T = (VT , ET ), where VT := {v(v, t) ∈ X}, set level l(v):= t for each (v, t) ∈ X, E := ∅; set Vb := {vbdist(s, vb) ≤ tmax}; if there is a node v in X and v /∈ Vb then return ∅; set Eb := {(v′, v)(v′, v) ∈ E, v′ ∈ Vb, v ∈ Vb)}; for each v ∈ Vb do if there is no (vi, ti) ∈ X that dist(s, v)+dist(v, vi) ≤ ti then Vb = Vb \ {v}; Eb = Eb \ {(v1, v2)} where v1 = v or v2 = v; 7. 8. 9. graph Gb := (Vb, Eb); 10. list L := {(v1, t1), . . . , (vk, tk)} where ti ≤ ti+1, (vi, ti) ∈ X, i ∈ [1, k − 1]; 11. for each i ∈ [1, tmax] following descending order do 12. Vt:= V1 ∪ V2 ∪ V3, V1 := {vi(v, ti) ∈ X}; V2 := {vv ∈ VT , l(v) = ti}; V3 := {v′(v′, v) ∈ Eb, v ∈ V1 ∪ V2, v′ /∈ VT }; construct Gt = (Vt, Et); T := T ∪ PCTl(Gt, V1 ∪ V2, V3, i); 13. Et := {(v′, v)v′ ∈ V3, v ∈ V1 ∪ V2, (v′, v) ∈ Eb}; 14. 15. 16. if T is a tree then return T ; 17. return ∅; Procedure PCTl Input: A bipartite graph Gt, node set V , node set Vs, a number ti; Output: a forest Tt. 1. Tt = ∅; 2. construct Tt as a minimum weighted steiner forest which cover V as the required nodes; 3. for each tree Ti ∈ Tt do 4. 5. return Tt; l(r) := ti − 1 where r ∈ Vs is the root of Ti; Figure 3: Algorithm WPCT: initialization, pruning and local searching the descending order of their time step in X, and (b) perform a bottom-up evaluation for each time step in Gb using a local-optimal strategy, following the descending order of the time step. Backbone network. We consider pruning strategies to re- duce the nodes and the edges that are not possible to be in any perfect consistent trees, given a graph G = (V, E, f ) and a partial observation X = {(v1, t1), . . . , (vk, tk)}. We define a backbone network Gb = (Vb, Eb), where • Vb = S{vjdist(s, vj) + dist(vj, vi) ≤ ti} for each (vi, ti) ∈ X; and • Eb = {(v′, v)v′ ∈ Vb, v ∈ Vb, (v′, v) ∈ E} Intuitively, Gb includes all the possible nodes and edges that may appear in a perfect consistent tree for a given partial observation. In order to construct Gb, a set of pruning rules can be developed as follows: if for a node v′ and each observed node v in a cascade with time step t, dist(s, v′) + dist(v′, v) > t, then v′ and all the edges connected to v′ can be removed from Gb. Algorithm. Algorithm WPCT, as shown in Fig. 3, consists of the following steps: Initialization (line 1). The algorithm WPCT starts by initial- izing a tree T , by inserting all the observation points into T . Each node v in T is assigned with a level l(v) equal to its time step as in X. The edge set is set to empty. Pruning (lines 2-10). The algorithm WPCT then constructs a backbone network Gb with the pruning rules (lines 2-9). It initializes a node set Vb within tmax hop of the source node s, where tmax is the maximum time step in X (line 2). If there exists some node v ∈ X that is not in Vb, the algorithm returns ∅, since there is no path from s reaching v with t steps for (v, t) ∈ X (line 3). It further removes the redundant nodes and edges that are not in any perfect trees, using the pruning rules (lines 5-8). The network Gb is then constructed with Vb and Eb at line 9. The partial observation X is also sorted w.r.t. the time step (line 10). Bottom-up local searching (lines 11-17). Following a bottom-up greedy strategy, the algorithm WPCT processes each observation point as follows. For each i in [1, tmax], it generates a (bipartite) graph Gt. (a) It initializes a node set Vt as the union of three sets of nodes V1, V2 and V3 (line 12), where (i) V1 is the nodes in the observation points with time step ti, (ii) V2 is the nodes v in the current perfect consistent tree T with level l(v) = ti, and (iii) V3 is the union of the parents for the nodes in V1 and V2. (b) It constructs an edge set Et which consists of the edges from the nodes in V3 to the nodes in V1 and V2. (c) It then generates Gt with Vt and the edge set Et, which is a bipartite graph. After Gt is constructed, the algorithm WPCT invokes procedure PCTl to compute a "part" of the perfect tree T , which is an optimal solution for Gt, a part of the graph Gb which contains all the observed nodes with time step ti. It expands T with the returned partial tree (line 15). The above process (lines 11- 15) repeats for each i ∈ [1, tmax] until all the nodes in X are processed. Algorithm WPCT then checks if the constructed T is a tree. If so, it returns T (line 16). Otherwise, it returns ∅ (line 17). The above procedure is as illustrated in Fig. 4. Procedure PCTl. Given a (bipartite) graph Gt, and two sets of nodes V and Vs in Gt, the procedure PCTl computes for Gt a set of trees Tt = {T1, . . . , Ti} with the minimum total weight (line 2), such that (a) each Ti is a 2-level tree with a root in Vs and leaves in V , (b) the leaves of any two trees in Tt are disjoint, and (c) the trees contain all the nodes in V as leaves. For each Ti, PCTl assigns its root r in Vs a level l(r) = ti − 1 (line 4). Tt is then returned as a part of the entire perfect consistent tree (line 5). In practice, we may either employ linear programming, or an algorithm for MST problem (e.g., [28]) to compute Tt. Example 4: The cascade T1 in Fig. 1, as a minimum weighted perfect consistent tree, can be inferred by algo- rithm WPCT as illustrated in Fig. 4. WPCT first initializes a tree T with the node Mary. It then constructs Gt as ... ... ... ... t 1 t i t i+1 t max s Ann,0 ... ... V3 Bill,1 Jack Tom Jack Mike V1 V2 Mary,3 Gb Figure 4: The bottom-up searching in the backbone network to T . Following Mike, the graph induced by edges (Tom, Mary), (Jack, Mary), and (Mike, Mary). Intuitively, the three nodes as the parents of Mary are the possible nodes which accepts the message at time step 2. It then selects the tree with the maximum probability, which is a single edge (Mike, Mary), and adds it it keeps choosing the optimal tree structure for each level, and identifies nodes Jack. The process repeats until WPCT reaches the source Ann. It then returns the perfect consistent tree T as the inferred cascade from the partial observation X. Correctness. The algorithm WPCT either returns ∅, or correctly computes a perfect consistent tree w.r.t. the partial observation X. Indeed, one may verify that (a) the pruning rules only remove the nodes and edges that are not in any perfect consistent tree w.r.t. X, and (b) WPCT has the loop invariant that at each iteration i (lines 11-15), it always constructs a part of a perfect tree as a forest. Complexity. The algorithm WPCT is in time O(V E + X2 + tmax ∗ A), where tmax is the maximum time step in X, and A is the time complexity of procedure PCTl. Indeed, (a) the initialization and preprocessing phase (lines 1-9) takes O(V E) time, (b) the sorting phase is in O(X2) time, (c) the bottom-up construction is in O(tmax ∗ A), which is further bounded by O(tmax ∗ V 3) if an approx- imable algorithm is used [28]. In our experimental study, we utilize efficient linear programming to compute the optimal steiner forest. The algorithm WPCT can easily be adapted to the prob- lem of finding the minimum perfect consistent trees, where each edge has a unit weight. Perfect consistent SP trees. The independent cascade model may be an overkill for real-life applications, as observed in [7], [19]. Instead, one may identify the consistent trees which follow the shortest path model [19], where cascades propagate following the shortest paths. We define a perfect shortest path (sp) tree rooted at a given source node s as a perfect consistent tree, such that for each observation point (v, t) ∈ X of the tree, t = dist(s, v); in other words, the path from s to v in the tree is the shortest path in G. The PCTw (resp. PCTmin) problem for sp trees is to identify the sp trees with the maximum likelihood (resp. minimum size). Proposition 2: Given a graph G and a partial observation X, (a) it is in PTIME to find a sp tree w.r.t. X; (b) the PCTmin and PCTw problems for perfect sp trees are NP-hard and APX-hard; (c) the PCTw problem is approximable within O(d ∗ log fmin ), where d is the diameter of G, and fmax log fmax (resp. fmin) is the maximum (resp. minimum) probability by the diffusion function f . We next provide an approximation algorithm to the PCTw problem for sp trees. Given a graph G and a partial observation X, the algorithm, denoted as WPCTsp (not shown), first constructs the backbone graph Gb as in the al- gorithm WPCT. It then constructs node sets Vr = {v(v, t) ∈ X}, and Vs = V \ Vr. Treating Vr as required nodes, Vs as steiner nodes, and the log-likelihood function as the weight function, WPCTsp approximately computes an undirected minimum steiner tree T . If the directed counterpart T ′ of T in Gb is not a tree, WPCTsp transforms T ′ to a tree: for each node v in T ′ with more than one parent, it (a) connects s and v via the shortest path, and (b) removes the redundant edges attached to v. It then returns T ′ as an sp tree. One may verify that (a) T ′ is a perfect sp tree w.r.t. X, (b) the weight −LX(T ′) is bounded by O(d ∗ log fmin ) times of log fmax the optimal weight, and (c) the algorithm runs in O(V 3) time, leveraging the approximation algorithm for the steiner tree problem [32]. Moreover, the algorithm WPCTsp can be used for the problem PCTmin for sp trees, where each edge in G has the same weight. This achieves an approximation ratio of d. IV. CASCADES AS BOUNDED TREES In this section, we investigate the cascade inference problems for bounded consistent trees. In contrast to the intractable counterpart in Proposition 1(a), the problem of finding a bounded consistent tree for a given graph and a partial observation is in PTIME. Proposition 3: For a given graph G and a partial obser- vation X, there is a bounded consistent tree in G w.r.t. X if and only if for each (v, t) ∈ X, dist(s, v) ≤ t, where dist(s, v) is the distance from s to v in G. Indeed, one may verify the following: (a) if there is a node (vi, ti) ∈ X where dist(s, vi) > ti, there is no path satisfies the time constraint and T is empty; (b) if dist(s, vi) ≤ ti for each node (vi, ti) ∈ X, a BFS tree rooted at s with each node vi in X as its internal node or leaf is a bounded consistent tree. Thus, to determine whether there is a bounded consistent tree is in O(E) time, via a BFS traversal of G from s. Given a graph G and a partial observation X, the mini- mum weighted bounded consistent tree problem, denoted as BCTw, is to identify the bounded consistent tree T ∗ s w.r.t. X with the minimum − log LX (T ∗ s ) (see Section II). Input: graph G and partial observation X. Output: a bounded consistent tree T in G. 1. 2. 3. 4. 5. 6. tree T = (Vt, Et), where Vt := {s(s, 0) ∈ X}, Et := ∅; compute tk bounded BFS DAG Gd of s in G; for each ti ∈ [t1, tk] do for each node v where (v, ti) ∈ X and l(v) = i do if i > ti then return ∅; find a path ρ from s to v with the minimum weight w(ρ) = −Σ log f (e) for each e ∈ ρ; T = T ∪ ρ; 7. 8. return T as a bounded consistent tree; Figure 5: Algorithm WBCT: searching bounded consistent trees via top-down strategy Theorem 1: Given a graph G and a partial observation X, the BCTw problem is (a) NP-complete and APX-hard; and (b) approximable within O(X ∗ log fmin log fmax ), where fmax (resp. fmin) is the maximum (resp. minimum) prob- ability by the diffusion function f over G. We can prove Theorem 1(a) as follows. First, the BCTw problem, as a decision problem, is to determine whether there exists a bounded consistent tree T with −LX(T ) no greater than a given bound B. The problem is obviously in NP. To show the lower bound, one may show there exists a polynomial time reduction from the exact 3-cover problem (X3C). Second, to see the approximation hardness, one may verify that there exists an AFP-reduction from the minimum directed steiner tree (MST) problem. We next provide a polynomial time algorithm, denoted as WBCT, for the BCTw problem. The algorithm runs in linear time w.r.t. the size of G, and with performance guarantee as in Theorem 1(b). Algorithm. The algorithm WBCT is illustrated in Fig. 5. Given a graph G and a partial observation X, the algorithm first initializes a tree T = (Vt, Et) with the single source node s (line 1). It then computes the tk bounded BFS directed acyclic graph (DAG ) [3] Gd of the source node s, where tk is the maximum time step of the observation points in X, and Gd is a DAG induced by the nodes and edges visited by a BFS traversal of G from s (line 2). Following a top-down strategy, for each node v of (v, t) ∈ X, WBCT then (a) selects a path ρ with the minimum Σ log f (e) from s to v, and (b) extends the current tree T with the path ρ (lines 3-7). If for some observation point (v, t) ∈ T , dist(s, v) > t, then WBCT returns ∅ as the tree T (line 5). Otherwise, the observation points in X are processed. Correctness and complexity. One may verify that algo- rithm WBCT either correctly computes a bounded consistent tree T , or returns ∅. For each node in the observation point X, there is a path of weight selected using a greedy strategy, and the top-down strategy guarantees that the paths form a consistent tree. The algorithm runs in time O(E), since it the tree T is returned (line 8) after all visits each edges at most once following a BFS traversal. We next show the approximation ratio in Theorem 1(b). Observe that for a single node v in X, (a) the total weight of the path w from s to v is no greater than −w log fmin, where w is the length of w; and (b) the weight of the counterpart of w in T ∗, denoted as w′, is no less than −w∗ log fmax. Also observe that w ≤ w∗. Thus, w/w∗ ≤ log fmin . As there are in total X such nodes, log fmax . Theorem 1(b) LX (T )/LX(T ∗) ≤ X w thus follows. w∗ ≤ X log fmin log fmax Minimum bounded consistent tree. We have considered the likelihood function as a quantitative metric for the quality of the bounded consistent trees. As remarked earlier, one may simply want to identify the bounded consistent trees of the minimum size. Given a social graph G and a partial observation X, the minimum bounded consistent tree problem, denoted as BCTmin, is to identify the bounded consistent tree with the minimum size, i.e., the total number of nodes and edges. The BCTmin problem is a special case of BCTw, and its main result is summarized as follows. Proposition 4: The BCTmin problem is (a) NP-complete, (b) APX-hard, and (c) approximable within O(X), where X is the size of the partial observation X. Proposition 4(a) and 4(b) can both be shown by construct- ing reductions from the MST problem, which is NP-complete and APX-complete [32]. Despite of the hardness, the problem can be approximated within O(X) in polynomial time, by applying the algo- rithm WBCT over an instance where each edge has a unit weight. This completes the proof of Proposition 4(c). V. EXPERIMENTS We next present an experimental study of our proposed methods. Using both real-life and synthetic data, we conduct three sets of experiments to evaluate (a) the effectiveness of the proposed algorithms, (b) the efficiency and the scalability of WPCT and WBCT. Experimental setting. We used real-life data to evaluate the effectiveness of our methods, and synthetic data to conduct an in-depth analysis on scalability by varying the parameters of cascades and partial observations. (a) Real-life graphs and cascades. We used the following real-life datasets. (i) Enron email cascades. The dataset of Enron Emails 1 consists of a social graph of 86, 808 nodes and 660, 642 edges, where a node is a user, and two nodes are connected if there is an email message between them. We tracked the forwarded messages of the same subjects and obtained 260 cascades of depth no less than 3 with more than 8 nodes. (ii) Retweet cascades (RT). The dataset of Twitter Tweets 2 [35] contains more than 470 million posts 1http://www.cs.cmu.edu/ enron/ 2http://snap.stanford.edu/data/twitter7.html i i n o s c e r P i i n o s c e r P 1 0.8 0.6 0.4 0.2 0 WPCT PCTr PCTg 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.6 0.7 0.5 (a) PCT@Enron: prec 1 0.8 0.6 0.4 0.2 0 WPCT PCTr PCTg 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.6 0.7 0.5 l l a c e R l l a c e R 0.6 0.5 0.4 0.3 0.2 0.1 0 WPCT PCTr PCTg 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 i i n o s c e r P 1 0.8 0.6 0.4 0.2 0 WBCT BCTr BCTlp 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 l l a c e R 1 0.8 0.6 0.4 0.2 0 WBCT BCTr BCTlp 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 (b) PCT@Enron: rec (c) BCT@Enron: prec (d) BCT@Enron: rec 0.6 0.5 0.4 0.3 0.2 0.1 0 WPCT PCTr PCTg 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 i i n o s c e r P 1 0.8 0.6 0.4 0.2 0 WBCT BCTr 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 l l a c e R 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 WBCT BCTr 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 (e) PCT@RT: prec (f) PCT@RT: rec (g) BCT@RT: prec (h) BCT@RT: rec Figure 6: The prec and rec of the inference algorithms over Enron email cascades and Retweet cascades from more than 17 million users, covering a period of 7 months from June 2009. We extracted the retweet cascades of the identified hashtags [35]. To guarantee that a cascade represents the propagation of a single hashtag, we removed those retweet cascades containing multiple hashtags. In the end, we obtain 321 cascades of depth more than 4, with node size ranging from 10 to 81. Moreover, we used the EM algorithm from [30] to estimate the diffusion function. (b) Synthetic cascades. We generated a set of synthetic cas- cades unfolding in an anonymous Facebook social graph 3, which exhibits properties such as power-law degree distri- bution, high clustering coefficient and positive assortativ- ity [34]. The diffusion function is constructed by randomly assigning real numbers between 0 and 1 to edges in the network. The generating process is controlled by size T . We randomly choose a node as the source of the cascade. By simulating the diffusion process following the independent cascade model, we then generated cascades w.r.t. T and assigned time steps. (c) Partial observation. For both real life and synthetic cascades, we define uncertainty of a cascade T as σ = 1− X VT , where VT is the size of the nodes in T , and X is the size of the partial observation X. We remove the nodes from the given cascades until the uncertainty is satisfied, and collect the remaining nodes and their time steps as X. (d) Implementation. We have implemented the following in C++: (i) algorithms WPCT, and WBCT; (ii) two linear programming algorithms PCTlp and BCTlp, which iden- tify the optimal weighted bounded consistent trees and the optimal perfect consistent trees using linear program- ming, respectively; (iii) two randomized algorithms PCTr and BCTr, which are developed to randomly choose trees Algorithms Precision WPCT WBCT precv prece precv prece Enron Twitter d=4 d = 4 d=3 d = 5 100% 100% 97.2% 93.2% 78.2% 82.4% 86.1% 82.6% 100% 70.1% 73.6% 66.1% 69% 55.7% 60.6% 41.7% Table I. precv and prece over real cascades from given graphs. PCTr is developed using a similar strategy for WPCT, especially for each level the steiner forest is randomly selected (see Section III); as WBCT does, BCTr runs on bounded BFS directed acyclic graphs, but randomly selects edges. (iv) to verify various imple- mentations of WPCT, an algorithm PCTg is developed by using a greedy strategy to choose the steiner forest for each level (see Section III). We used LP solve 5.5 4 as the linear programming solver. We used a machine powered by an Intel(R) Core 2.8GHz CPU and 8GB of RAM, using Ubuntu 10.10. Each experi- ment was run by 10 times and the average is reported here. Experimental results. We next present our findings. Effectiveness of consistent trees. In the first set of experi- ments, using real life cascades, we investigated the accuracy and the efficiency of our cascade inference algorithms. ′ , ETi ′ = (VTi life cascade T = {T1, . . . , Tk}, (a) Given a set of real for each cascade Ti = (VTi , ETi ) ∈ T, we computed an ′ ) according to a partial inferred cascade Ti observation with uncertainty σ. Denote the nodes in the partial observation as VX . We evaluated the precision as prec = Σ((VTi ′ ∩VTi )\VX ) . Intuitively, prec is the fraction of inferred nodes that are missing from Ti, while rec is the fraction of missing nodes that are inferred by Ti , and rec = Σ((VTi ′ ∩VTi )\VX ) Σ(VTi \VX ) Σ(VTi ′ \VX ) ′. 3http://current.cs.ucsb.edu/socialnets 4http://lpsolve.sourceforge.net/5.5/ ) c e s ( e m i t n o i t u c e x e e g a r e v A 100000 10000 1000 100 10 1 0.1 0.01 WBCT BCTr BCTlp 50 100 150 200 Cascade Size (a) Varying T ) c e s ( e m i t n o i t u c e x e e g a r e v A 1000 100 10 1 0.1 0.01 WBCT BCTr BCTlp 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 ) c e s ( e m i t n o i t u c e x e e g a r e v A 4 3.5 3 2.5 2 1.5 1 0.5 0 WPCT PCTr PCTg 50 100 150 200 Cascade Size 250 300 ) c e s ( e m i t n o i t u c e x e e g a r e v A 0.6 0.5 0.4 0.3 0.2 0.1 0 WPCT PCTr PCTg 0.4 0.3 0.8 The uncertainty of the observation (σ) 0.5 0.6 0.7 (b) Varying σ (c) Varying T (d) Varying σ Figure 7: Efficiency and scalability over synthetic cascades For Enron email cascades, Fig. 6(a) and Fig. 6(b) show the accuracy of WPCT, PCTg and PCTr for inferring cascades, while σ is varied from 0.25 to 0.85. PCTlp does not scale over the Enron dataset and thus is not shown. (i) WPCT outperforms PCTg and PCTr on both prec and rec. (ii) When the uncertainty increases, both the prec and rec of the three algorithms decrease. In particular, WPCT successfully infers cascade nodes with prec no less than 70% and rec no less than 25% even when 85% of the nodes in the cascades are removed. Using the same setting, the perfor- mance of WBCT, BCTlp and BCTr are shown in Fig. 6(c) and Fig. 6(d), respectively. (i) Both BCTlp and WBCT outperform BCTr, and their prec and rec decrease while the uncertainty increases. (ii) BCTlp has better performance than WBCT. In particular, both BCTlp and WBCT success- fully infer the cascade nodes with the prec no less than 50% and with the rec no less than 25%, even when 85% of the nodes in the cascades are removed. For retweet the the and cascades, prec rec of WPCT, PCTg and PCTr are shown in Fig. 6(e) and in Fig. 6(f), respectively. While the uncertainty increases from 0.25 to 0.85, (i) WPCT outperform PCTr and PCTg, and (ii) the performance of all the algorithms decreases. In particular, WPCT successfully infers the nodes with the prec more than 80% and the rec more than 35%, while the uncertainty is 25%. Similarly, the prec and the rec of WBCT and BCTr are presented in Fig. 6(g) and Fig. 6(h), respectively. As BCTlp does not scale on retweet cascades, its performance is not shown. While the uncertainty σ increases, the prec and the rec of the algorithms decrease. For all σ, WBCT outperforms BCTr; in particular, WBCT correctly infers the nodes with prec no less than 60% and rec no less than 25%, when σ is 25%. (b) To further evaluate the structural similarity of Ti and ′ as described in (a), we also evaluate (i) precv = V ′′ Ti V ′ ′ ∩ VTi ) \ VX, where V ′′ ∈ V ′ are for nodes V ′ = (VTi the nodes with the same topological order in both T ′ i and Ti, and (ii) prece = E ′ ′, following ETi the metric for measuring graph similarity [26]. The average results are as shown in Table I, for σ =50%, and the cascades of fixed depth. As shown in the table, for WPCT, the average precv is above 90%, and the average prece is ′ for E′ = ETi ∩ ETi above 75% over both datasets. Better still, the results hold even when we set σ = 85%. For WBCT, precv and prece are above 65% and above 40%, respectively. For WPCT, precv and prece have almost consistent performance on both datasets; however, for WBCT, the precv and prece of the inferred Enron cascades are higher than those of the inferred retweet cascades. The gap might result from the different diffusion patterns between these two datasets: we observed that there are more than 70% of cascades in the Enron dataset whose structures are contained in the BFS directed acyclic graphs of WBCT, while in the Twitter Tweets there are less than 45% of retweet cascades following the assumed graph structures of WBCT. Efficiency over real datasets. In all the tests over real datasets, PCTr, BCTr, PCTg and WBCT take less than 1 second. BCTlp does not scale for retweet cascades, while PCTlp does not scale for both datasets. On the other hand, while WPCT takes less than 0.4 seconds in inferring all the Enron cascades, it takes less than 20 seconds to infer Twitter cascades where d=4, and 100 seconds when d = 5. Indeed, for Twitter network the average degree of the nodes is 20, while the average degree for Enron dataset is 7. As such, it takes more time for WPCT to infer Twitter cascades in the denser Twitter network. In our tests, the efficiency of all the algorithms are not sensitive w.r.t. the changes to σ. Efficiency and scalability over synthetic datasets. In the second set of experiments, we evaluated the efficiency and the scalability of our algorithms using synthetic cascades. (a) We first evaluate the efficiency and scalability of WPCT and compare WPCT with PCTr and PCTg. Fixing uncertainty σ = 50%, we varied T from 30 to 240. Fig. 7(c) shows that WPCT scales well with the size of the cascade. Indeed, it only takes 2 seconds to infer the cascades with 300 nodes. Fixing size T = 100, we varied the uncertainty σ from 0.25 to 0.85. Fig. 7(d) illustrates that while all the three algorithms are more efficient with larger σ, WPCT is more sensitive. All the three algorithms scale well with σ. As PCTlp does not scale well, its performance is not shown in Fig. 7(c) and Fig. 7(d). (b) Using the same setting, we evaluated the performance of WBCT, compared with BCTlp and BCTr. Complexity Approximation Problem BCTmin BCTw PCTmin (sp tree) PCTw (sp tree) PCTmin PCTw NP-c, APX-hard NP-c,APX-hard NP-c, APX-hard NP-c, APX-hard NP-c, APX-hard NP-c, APX-hard X X ∗ log fmax log fmin d d ∗ log fmax log fmin time O(E) O(E)) OV 3 OV 3 -- -- O(tmax ∗ V 3) O(tmax ∗ V 3) Table II. Summary: complexity and approximability the result Fixing σ and varying T , is reported in Fig. 7(a). First, WBCT outperforms BCTlp, and is almost as efficient as the randomized algorithm BCTr. For the cascade of 240 nodes, WBCT takes less than 0.5 second to infer the structure, while BCTlp takes nearly 1000 seconds. Second, while WBCT is not sensitive to the change of T , BCTlp is much more sensitive. Fixing T and varying σ, Fig. 7(b) shows the performance of the three algorithms. The figure tells us that WBCT and BCTr are less sensitive to the change of σ than BCTlp. This is because WBCT and BCTr identify bounded con- sistent tree by constructing shortest paths from the source to the observed nodes. When the maximum depth of the observation point is fixed, the total number of nodes and edges visited by WBCT and BCTr are not sensitive to σ. Summary. We can summarize the results as follows. (a) Our inference algorithms can infer cascades effectively. For example, the original cascades and the ones inferred by WPCT have structural similarity (measured by prece) of higher than 75% in both real-life datasets. (b) Our algorithms scale well with the sizes of the cascades, and uncertainty. They seldom demonstrated their worst-case complexity. For example, even for cascades with 240 nodes, all of our algorithms take less than two seconds. VI. CONCLUSION In this paper, we investigated cascade inference problem based on partial observation. We proposed the notions of consistent trees for capturing the inferred cascades, namely, bounded consistent trees and perfect consistent trees, as well as quantitative metrics by minimizing either the size of the inferred structure or maximizing the overall likelihood. We have established the intractability and the hardness results for the optimization problems as summarized in Table II. Despite the hardness, we developed approximation and heuristic algorithms for these problems, with performance guarantees on inference quality, We verified the effectiveness and efficiency of our techniques using real life and synthetic cascades. Our experimental results have shown that our methods are able to efficiently and effectively infer the structure of information cascades. REFERENCES [1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu. Pricing Internet strategies for viral marketing on social networks. and Network Economics, pages 101 -- 112, 2009. [2] N. Bailey. The mathematical theory of infectious disease and its applications. 1975. [3] J. Bang-Jensen and G. Z. Gutin. Digraphs: Theory, Algo- rithms and Applications. Springer, 2008. [4] S. Bikhchandani, D. Hirshleifer, and I. Welch. A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of political Economy, pages 992 -- 1026, 1992. [5] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In WWW, 2011. [6] M. Cha, F. Benevenuto, Y.-Y. Ahn, and P. K. Gummadi. De- layed information cascades in flickr: Measurement, analysis, and modeling. Computer Networks, 56(3):1066 -- 1076, 2012. [7] W. Chen, C. Wang, and Y. Wang. Scalable influence max- imization for prevalent viral marketing in large-scale social networks. In KDD, 2010. [8] K. Dave, R. Bhatt, and V. Varma. Modelling action cascades in social networks. In AAAI, 2011. [9] P. Domingos and M. Richardson. Mining the network value of customers. In KDD, 2001. [10] M. Eslami, H. R. Rabiee, and M. Salehi. Dne: A method for extracting cascaded diffusion networks from social networks. In The Third IEEE International Conference on Social Com- puting, 2011. [11] H. Fei, R. Jiang, Y. Yang, B. Luo, and J. Huan. Content based social behavior prediction: a multi-task learning approach. In CIKM, 2011. [12] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word- of-mouth. Marketing Letters, pages 211 -- 223, August 2001. [13] J. Goldenberg, B. Libai, and E. Muller. Talk of the Network: A Complex Systems Look at the Underlying Process of Word- of-Mouth. Marketing Letters, pages 211 -- 223, 2001. [14] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. TKDD, 5(4):21, 2012. [15] M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, 83(6), 1978. [16] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003. [17] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In ICALP, 2005. [18] W. O. Kermack and A. G. Mckendrick. A contribution to the mathematical theory of epidemics. Proc R Soc Lond A, 115:700 -- 721, 1927. [19] M. Kimura and K. Saito. Tractable models for information diffusion in social networks. PKDD, pages 259 -- 271, 2006. [20] M. Kimura, K. Saito, R. Nakano, and H. Motoda. Finding influential nodes in a social network from information diffu- sion data. Social Computing and Behavioral Modeling, pages 1 -- 8, 2009. [21] G. Kossinets. Effects of missing data in social networks. Social networks, 28(3), 2006. [22] G. Kossinets, J. Kleinberg, and D. Watts. The structure of information pathways in a social communication network. In SIGKDD, 2008. [23] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila. Finding effectors in social networks. In KDD, pages 1059 -- 1068, 2010. [24] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of influence Advances in Knowledge in a recommendation network. Discovery and Data Mining, pages 380 -- 389, 2006. [25] M. Mathioudakis, F. Bonchi, C. Castillo, A. Gionis, and In Sparsification of influence networks. A. Ukkonen. SIGKDD, pages 529 -- 537, 2011. [26] J. W. Raymond, E. J. Gardiner, and P. Willett. Rascal: Calculation of graph similarity using maximum common edge subgraphs. The Computer Journal, 45:2002, 2002. [27] M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In SIGKDD, 2002. [28] G. Robins and A. Zelikovsky. Tighter bounds for graph steiner tree approximation. SIAM J. Discrete Math., 19(1), 2005. [29] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. In Correcting for missing data in information cascades. WSDM, 2011. [30] K. Saito, R. Nakano, and M. Kimura. Prediction of informa- [31] X. Song, Y. Chi, K. Hino, and B. L. Tseng. Information flow modeling based on diffusion rate for prediction and ranking. In WWW, 2007. [32] V. V. Vazirani. Approximation Algorithms. 2001. [33] F. Wang, H. Wang, and K. Xu. Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. ArXiv e-prints, 2011. tion diffusion probabilities for independent cascade model. In KES, 2008. [34] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In EuroSys, 2009. [35] J. Yang and J. Leskovec. Patterns of temporal variation in online media. In Proceedings of the fourth ACM international conference on Web search and data mining, WSDM, 2011.
1903.11451
1
1903
2019-03-27T14:27:22
Sensing Social Media Signals for Cryptocurrency News
[ "cs.SI", "cs.LG", "stat.ML" ]
The ability to track and monitor relevant and important news in real-time is of crucial interest in multiple industrial sectors. In this work, we focus on the set of cryptocurrency news, which recently became of emerging interest to the general and financial audience. In order to track relevant news in real-time, we (i) match news from the web with tweets from social media, (ii) track their intraday tweet activity and (iii) explore different machine learning models for predicting the number of the article mentions on Twitter within the first 24 hours after its publication. We compare several machine learning models, such as linear extrapolation, linear and random forest autoregressive models, and a sequence-to-sequence neural network. We find that the random forest autoregressive model behaves comparably to more complex models in the majority of tasks.
cs.SI
cs
Sensing Social Media Signals for Cryptocurrency News Johannes Beck ∗1, Roberta Huang *1, David Lindner *1, Tian Guo2, Ce Zhang3, Dirk Helbing2, and Nino Antulov-Fantulin†2 1Department of Computer Science, ETH Zurich 2Computational Social Science, ETH Zurich Abstract The ability to track and monitor relevant and impor- tant news in real-time is of crucial interest in multi- ple industrial sectors. In this work, we focus on the set of cryptocurrency news, which recently became of emerging interest to the general and financial audi- ence. In order to track relevant news in real-time, we (i) match news from the web with tweets from social media, (ii) track their intraday tweet activity and (iii) explore different machine learning models for predict- ing the number of article mentions on Twitter within the first 24 hours after its publication. We compare several machine learning models, such as linear ex- trapolation, linear and random forest autoregressive models, and a sequence-to-sequence neural network. We find that the random forest autoregressive model behaves comparably to more complex models in the majority of tasks. 1 Introduction Social media and news play an important role in driv- ing the fluctuation of economic indicators and finan- cial markets [1], [2], [3], [4] in a nontrivial fashion. Recently, novel financial markets have emerged, that are exchanging from fiat money (USD, EUR, CNY) to cryptocurrencies and vice versa [5, 6]. As of De- cember 2018, cryptocurrencies have a total market capitalization of $120 billion, with more than 250000 ∗Contributed equally to the first authorship †[email protected] transactions per day. In 2017 Bitcoin was ranked second on the Google Trends list of popular topics in global news. Despite a decrease of interest towards cryptocurrencies in 2018 according to Google Trends, the number of daily articles related to cryptocurren- cies is still notably high. Therefore, it is not surpris- ing that the rapid development of cryptocurrency has attracted increasing attention from news and social media. A large volume of news articles about cryptocur- rencies, published daily can make it hard for individ- uals to filter out relevant information and make in- formed decisions in this domain. Fortunately, people share and discuss news every day in large quantities on social media platforms, e.g. on Twitter, which is the focus of this paper. Therefore, social media can be a good proxy to monitor and track "important" news about cryptocurrencies. Our work is motivated by the hypothesis that high engagement with a news article on Twitter is related to the "importance" of an article. In this paper, we introduce an online data mining system which connects news and tweets discussing it. We also perform preliminary data exploratory and predictive analytic using machine learning and deep learning. Overall, the contribution of this paper is as follows: (i) We build an online data mining pipeline to extract news articles from a discussion on Twit- ter and collect tweets associated with the articles. This paired news and tweet data is continuously up- dated in a cloud database. This data is a rich source for studying public interest and attention on cryp- 1 tocurrency and the potential effect of social media on the market. (ii) Based on the news and asso- ciated tweets collected by the pipeline, we perform exploratory data analysis to characterize news dis- cussion on Twitter. (iii) We apply machine learning and deep learning models to predict the popularity of news articles on Twitter. We aim to predict the number of tweets mentioning an articles related to cryptocurrencies, which we consider as a measure of its "importance". 2 Related work Many studies have focused on the relationship be- tween social media, news, and other information from the www onto financial markets [7, 8, 3]. However, the main focus of our work is modeling and prediction of news popularity via social media. In [9], the au- thors link a given news article to social media utter- ances that implicitly reference it through a dedicated query model. Tracking and automatically connect- ing news articles to Twitter conversations by Twitter hashtags was studied in [10]. In [11], the authors con- structed a multi-dimensional feature space derived from an article and use a conventional SVM to pre- dict its popularity. The authors in [12] show how the class of temporal point processes (Hawkes) can be used for predicting Retweet dynamics. The authors in [13] propose how to leverage knowledge base infor- mation for improving popularity prediction. Starting from the idea that only a small amount of news arti- cles become popular, [14] focused on the subset of the most popular news to rank articles. In [15] it formu- lates article importance prediction as a classification task using SVM. In this paper, we exploit ensemble machine learn- ing and sequence to sequence (seq2seq) deep learning to study the predictability of crypto news popularity on Twitter in real-time mode. In contrast to others, our analysis is focused on the intraday importance prediction. Figure 1: The tracking of crypto news intraday ac- tivity on 24th Jan 2018 at 15:28:37 CET, visualized by our server. 3 Data pipeline The data pipeline consists of a real-time online sys- tem, with the following components: Twitter collec- tion, article collection, and tweet-article matching. Figure 2: Architecture of the data pipeline. The Twitter data collection was implemented by using the publicly accessible Twitter streaming API with real-time filtering by a list of cryptocur- rency related keywords. The Twitter API does only provide a random sample of all tweets. 2 # hours since publication03691215182124# mentions020406080100120140160180Samsung Galaxy S10 Bitcoin Wallet Leaked by Insider: Is it Official?Samsung Galaxy S10 Bitcoin Wallet Leaked by Insider: Is it Official?$20 Million Funding Round in Blockchain Firm Symbiont Includes Citigroup and Nasdaq$20 Million Funding Round in Blockchain Firm Symbiont Includes Citigroup and NasdaqUS: New Hampshire Bill Aims to Legalize Bitcoin for State Payments in 2020US: New Hampshire Bill Aims to Legalize Bitcoin for State Payments in 2020CBOE Withdraws Rule Change Request to List Bitcoin Exchange-Traded FundCBOE Withdraws Rule Change Request to List Bitcoin Exchange-Traded FundBlockchain Startup to Boost Patient Safety and Prevent OverprescribingBlockchain Startup to Boost Patient Safety and Prevent OverprescribingUK Standards Institution Partners With Blockchain Startup for Supply Chain ComplianceUK Standards Institution Partners With Blockchain Startup for Supply Chain ComplianceThe Simple Reasons Why the Bitcoin Price Will Never Go to ZeroThe Simple Reasons Why the Bitcoin Price Will Never Go to ZeroEnterprise Blockchain Platform Records 10K Transactions per Second in Testnet LaunchEnterprise Blockchain Platform Records 10K Transactions per Second in Testnet LaunchWhy the Bitcoin Price Barely Moved Following CBOE's Withdrawal of ETF ProposalWhy the Bitcoin Price Barely Moved Following CBOE's Withdrawal of ETF ProposalMost US Investing Pros are Waiting on a Bitcoin ETF Before Buying CryptoMost US Investing Pros are Waiting on a Bitcoin ETF Before Buying CryptoStreaming TweetsNews ArticlesPairs of News and TweetsDBPredictingEngineVisualizationPre-processing The article data colletion is obtained by scrap- ing news from the dynamic set of gazetteer source URLs. The set of gazetteer source URLs is auto- matically updated by extracting the URLs from the content of downloaded tweets. The tweet-article matching data is the document-oriented database online instance, that contains matchings between news articles and tweets. The matching exists if the tweet explicitly contains the URL of an article. Before extracting features from the data, we first process the data for further usage. In a first step, we merge some of the matchings together. This is done for two reasons. First, the online database only con- tains incremental matchings which have to be merged together in order to provide a complete matching of the article to tweets. Secondly, the raw URLs of the articles can contain query strings, which often con- tain information not related to which article the URL refers to. Hence, by changing those parameters one can obtain arbitrarily many different URLs linking to the same article. Because of this, there are often mul- tiple different article entries in the database or data file for the same article. On the other hand, there are also some websites that use the query string to dis- tinguish between articles. Therefore, we merge the matchings of two articles if they fulfill the following 3 conditions: 1. The URLs of both articles share the same host as well as the same path. 2. Both articles have the same title. 3. Both articles were published at the same time. These conditions allow for merging of articles of which the URLs have different query strings while the last two conditions prevent the system from merging articles which are distinguished by the query string in the URL. While merging the articles we also re- move duplicate entries for the same tweet which are sometimes present in the database. According to the publication time in the data, some of the articles were published 2000 years ago or even in the future. These publication dates are clearly wrong. We, therefore, remove all articles that were published outside of an acceptable time- interval. Figure 3: Top publishers and top keywords on 24th Jan 2018 at 15:28:37 CET, visualized by our server. Let us describe the data, that we are gathering and then go on to describe how we process this data. We work with three entities in our dataset: news articles, tweets, and matchings, i.e. the relations between arti- cles and tweets. While these concepts are easy to un- derstand intuitively, we specify their attributes here to avoid confusion. In Tab. 1 and 2, we provide a list of the properties of a news article and a tweet respectively. A matching (see Tab. 3) relates to a set of tweets that reference the article. In Fig. 5 we observe that the number of men- 3 Top publishersTop keywords21.3%14.5%6.0%44.6%CointelegraphCointelegraphCitlhCilhCcnCcnCCCoindeskCoindeskCidkCidkBitcoin0BitcoinoBitiBiiBitcoinistBitcoinistBitiitBiiiCoinspectatorCoinspectatorCittCiTwitterTwitterTittTiTribeticaTribeticaRedditRedditNewsbtcNewsbtcEthereumworldnews0EthereumworldnewsCoinpathCoinpathOthersOthers66.8%21.1%BitcoinBitcoinBitiBiicryptocurrencycryptocurrencytEthereumEthereumEthEhDash0DashDDhDhEOSEOSEOSEOSRippleRippleRilRilEthosEthosEthEhNanoNanoNNEthereum ClassicEthereum ClassicWaves00WavesNEONEOSteemSteemOthersOthers Table 2: Properties of a tweet entity. user text publication time The timestamp of the tweet. links The Twitter username. The content of the tweet. The urls in the text. Table 3: Properties of a matching entity. article An article as described in Tab.1. tweets A list of matched tweets. time t0 and t0 + δ. Here t1 is the prediction starting time, which represents how much historical data can be used to predict. Figure 4: Top article ranked by our system on 24th Jan 2018 at 15:28:37 CET. 4.1 Feature Extraction Table 1: Properties of an article entity. The url of the article. URL The headline of the article. title publication time The publication timestamp. The text body of the article. text tions on Twitter saturates generally within the first 24 hours after publication. We, therefore, define our prediction target as the number of mentions during 24 hours after publication. We also found that there is a strong seasonality effect at weekends. 4 Predictive analytics We aim to explore the different machine learning models on the task of predicting the total number of article mentions within a defined time horizon af- ter the article's publication time. Let t0, t1 be two timestamps with t0 < t1 < t0 + δ, where we set δ to 24 hours in this paper. The task of our machine learning models is as follows: Given an article pub- lished at time t0 and all tweets published between t0 and t1 that mention the article, predict the cumula- tive number of tweets mentioning the article between For our predictive models we use three sets of fea- tures, which we name time series, content and con- text features. Time series features Let t0 be the publication time of an article and t1 the current time. Let d a timestep size (set to 1 hour in our experiments). The time series feature fk is then given by the number of mentions of the article between t0 and t0 + kd where k ∈ {j ∈ {1, 2, ...}t0 + jd ≤ t1}. As an example suppose that t1 is 3 hours after t0 and the article is mentioned twice, once and three times in hours 1, 2 and 3 since publication respectively. Then there are 3 time series features: f1 = 2, f2 = 3, f3 = 6. Note that the number of these features is not constant, but depends on t1 as defined in 4. Content features We extract a vector of content features from each article, by using a keyword list to allow the models to learn individual dynamics for articles related to different cryptocurrencies. Each cryptocurrency related concept is represented by a binary feature, that is set to 1 if one of the keywords related to the concept is present in the title of the article. 4 4.2.2 Autoregressive models A common type of time series model is an autoregres- sive model [16]. An autoregressive model of order k predicts the value at the next timestep K + 1 based on the values observed at the previous k timesteps K − k + 1, ..., K. In our experiments, we provide K as an additional input to the model. The idea is, that the dynamics can be very different a few hours after the publication and shortly before the end of the prediction window. In some experiments, we will fur- ther provide content and/or context features to the model. In our case, we have to predict multiple steps in the future. This is achieved by first predicting a single timestep. We then assume that the predicted value is the correct value and use it as an input for the prediction of the next timestep. By recursively applying this strategy, we can predict an arbitrary amount of timesteps ahead. For autoregressive models of order k, we gener- ate multiple training samples from each time series f1, ..., fN . The first sample uses f1, ..., fk to pre- dict fk+1. The second sample predicts fk+2 from f2, ..., fk+1 and so on. We use two different kinds of autoregressive mod- els. The first one uses a linear model to predict the next timestep and the second one uses the random forest regressor. 4.2.3 Random forest regressor A random forest is an ensemble of decision trees. The total response of the random forest model is the av- erage prediction of all decision trees. In order to increase the variety of the individual decision trees, each tree is trained on a bootstrapped sample from the original dataset and uses only random subsets of the features for each decision. For more details about random forests see [17] or the documentation of the scikit-learn implementation that we use for our ex- periments.1 1https://scikit-learn.org/stable/modules/generated/ sklearn.ensemble.RandomForestRegressor.html#sklearn. ensemble.RandomForestRegressor Figure 5: Histogram of article lifespan during one week starting at 13.10.2018, defined as the time after which an article reaches 90% of its total mentions (on the right). We observe that most articles, with at least 100 mentions, reach the end of their lifespan around 24 hours after publication. Context features The amount of Twitter men- tions might further be related to the publisher of an article. There seem to be very few publishers with significantly more mentions on Twitter than the other publishers. We count the total number of mentions of each publisher in our training set. We then extract the 10 publishers with the highest numbers of men- tions. For each of these publishers, we introduce a binary feature set to 1 if the article was published by the respective publisher. 4.2 Predictive Models 4.2.1 Baseline model As a baseline model, we use a linear extrapolation of the last k time series features by fitting a linear function of the time step to the dataset given by {(K − k + 1, fK−k+1), ..., (K, fK)}. Here K is the number of time series features available for the arti- cle. To predict the total number of mentions at the target time, we evaluate the model for the time step N , such that N d = δ. The model ignores content and context features. In our experiments, we will choose k = 3. 5 020406080100article lifespan in hours05101520number of articles 4.2.4 Sequence-to-sequence model implementation.2 As described in [18], sequence-to-sequence model con- sists of two recurrent neural networks (RNN). The first RNN is called the encoder. This recurrent net- work receives as inputs all available time series fea- tures. The outputs of this model are discarded. The second RNN is called the decoder. The initial hid- den state is given by the final hidden state of the encoder. The first input to the decoder is the last time series feature. In our architecture, the output of the decoder at each timestep serves as input for a fully connected network with one hidden layer that outputs the predicted value for the next timestep. If context or content features are used, those features serve as additional inputs to the fully connected net- work. The predicted value is then used as the input at the next timestep. As a loss function, we use the sum of squared errors between the predicted values and the real values. Be f1, ..., fl the input time series and fl+1, ..., fK the real continuation. Be fK+1, ... fN the predicted values. The loss for this time series is then given by K(cid:88) L = (fi − fi)2 i=l+1 Gated recurrent units Our sequence-to-sequence model implementation is based on the gated recur- rent unit (GRU), a variant of recurrent neural net- works (RNN). The following definition of a GRU is taken from [19]. Let σ(·) denote the sigmoid function, tanh(·) the hyperbolic tangent and (cid:12) the element- wise matrix multiplication operator. Be x1, x2, ..., xn a sequence of inputs (e.g. a time series) and h0 the so- called initial hidden state usually set to 0. The RNN using GRUs then outputs a sequence h1, h2, ..., hn de- fined by zt = σ(Wzxt + Uzht−1) rt = σ(Wrxt + Urht−1) ht = tanh(W xt + U (rt (cid:12) ht−1)) ht = (1 − zt) (cid:12) ht−1 + zt (cid:12) ht 4.3 Evaluation set-up 4.3.1 Dataset In this paper, we have done the evaluation of our real-time model on 23535 articles published between 2018-12-02 00:00:00 and 2018-12-09 00:00:00 and all tweets mentioning those articles. The correspond- ing training set contains all articles published before 2018-12-02 00:00:00 with the related tweets. In to- tal, the training set consists of 125248 articles from roughly 35 days. Bootstrapping We want to estimate confidence intervals of the performance of the different models instead of just obtaining point estimates. Therefore, we use bootstrapping to generate 100 new datasets consisting of 2000 samples from the validation set. Balancing Because popular articles are rare, we balance the training set. Let M = .05 ∗ Ntrain where Ntrain is the total number of articles in the train- ing set. We first sort the training set in descending order by the number of mentions and then keep the top M articles with most mentions. We also draw M random samples from each of the sets of articles lying between the 75th and 95th percentile and be- low the 75th percentile. We hence obtain a training set with an equal number of high importance (above 95th percentile), medium importance (between 75th and 95th) and low importance (below 75th) articles. 4.3.2 Models For the baseline model, we choose a linear interpo- lation of the most recent 3 time series features. The linear autoregressive model is evaluated for orders 1, 3 and 5. The random forest autoregressive models are all of order 3 with 50 and 500 estimators. The sequence-to-sequence model has a hidden state size of 200 for the encoder and the decoder. The hidden dense layer consists of 200 units. During training, we where Wr, Wz, W, Ur, Uz, U are model parameters learned during training. We use the TensorFlow GRU 2https://www.tensorflow.org/api_docs/python/tf/nn/ rnn_cell/GRUCell 6 drop out 30 percent of the inputs to the dense layer as well as 10 percent of the hidden state passed to the next step of the RNN. The network is then trained in an end-to-end fashion, using back-propagation with training batches of size 64. The model is trained for 30 epochs with a learning rate .001, then for another 30 epochs with learning rate .0001 and finally for yet another 30 epochs using learning rate .000001 using Adam optimizer. The baseline model is only provided the time se- ries features. The autoregressive models and the sequence-to-sequence model are trained using the time series, content and context features. 4.3.3 Evaluation metrics The goal of our prediction is to extract the most rel- evant cryptocurrency related articles. Most articles accumulate very few mentions on Twitter. Those ar- ticles would heavily influence the performance scores because they represent the vast majority of articles in the validation set. However, the performance of those articles does not represent the performance with re- spect to our goal. For this reason, our evaluation focuses on the top k articles with most mentions on Twitter. There are two different properties of the predic- tions that can be used to assess performance: the accuracy of the predicted number of mentions, and the quality of the induced ranking of articles. We use mean absolute percentage error to measure the for- mer property and normalized discounted cumulative gain to measure the latter. mentions. The MAPE is defined as follows (cid:12)(cid:12)(cid:12)(cid:12) f (i) n(cid:88) i=1 δ − f (i) f (i) δ δ (cid:12)(cid:12)(cid:12)(cid:12) MAPE = 1 n where δ = 24 denotes 24 hour window from the pub- lication date. discounted cumulative gain Normalized (NDCG) The second interesting property of the predictions is the ordering of the articles induced by the predicted values. We could obtain the most important articles from a model that achieves poor performance with respect to the MAPE but yields a good approximation of the ordering of the news. The discounted cumulative gain (DCG) is high if the top k predicted articles achieve a high number of mentions. To compute the DCG, the articles are first ordered by their predicted importance such that f (1) the observed δ importance values of the first k articles from this ordered set. DCGk is then defined as . Be f (1) , f (2) , ..., f (N ) δ δ , f (2) , ..., f (k) δ δ δ k(cid:88) DCGk = f (i) δ log2(i + 1) i=1 IDCGk is now defined as the maximal achievable DCGk which is computed as the DCGk based on an ordering according to the observed instead of the pre- dicted values. The NDCG can be computed as NDCGk = DCGk IDCGk Hence the maximal achievable NDCGk is 1. 4.4 Results Mean absolute percentage error (MAPE) The MAPE is used to evaluate the quality of the predicted value. It computes by how many percents the predicted value deviates from the actual value on average. The reason for using percentage errors in- stead of absolute errors lies in the great difference between numbers of mentions of articles. A metric based on absolute errors would most likely be domi- nated by the very few articles with significantly more We will discuss the overall results of our models and compare their performance in the prediction of the number of mentions and the order of the articles. We vary the prediction start time to be 5, 10, 15 or 20 hours after publication time while keeping the target prediction time fixed at δ = 24 hours after the publication. For instance, for a start time of 5 hours, the model gets five data points as input, describing the mentions in the first 5 hours. It then predicts the 7 number of mentions after another 19 hours. Similarly, for a start-time of 15 hours, the model gets 15 points as input and has to predict 9 hours into the future. curate prediction about the popularity of an article as soon as possible after its publication. At predic- tion start time 5 hours after publication advanced models achieve a significantly lower MAPE than the baseline. RF and S2S model achieve a MAPE around 30− 40%, while the linear model is at about 45% and the baseline at 70%. For predictions starting 10 hours after publication, the baseline and the linear model improve significantly over their performance 5 hours after publication. However, RF and S2S model still achieve a significantly lower MAPE. Overall, we can say that RF and S2S model is able to achieve significantly lower error rates close to the publication time of an article. All models are com- parable about 20 hours after publication. The RF model achieves the lowest MAPE overall. Figure 6: MAPE and NDCG of the different models evaluated on the test data set. The quantiles are determined using 100 bootstrap samples. Predictions are evaluated at 4 different prediction times, 5, 10, 15, and 20 hours after publication of an article. 4.4.1 Overall performance In Fig. 6 we show the experimental results of the baseline model, autoregressive model, random for- est autoregressive model and sequence-to-sequence model on the test dataset. As expected, we see that all models make better predictions, the closer the prediction start time is to the target time. After 15 and 20 hours from the publi- cation time, the baseline model already achieves very good performance with MAPE of 20% and less. As we have seen, the number of mentions in most news articles starts to saturate after 10−20 hours. Because of this, the linear extrapolation that is performed by the baseline model can be quite accurate at later pre- diction points. At prediction start times of 15 and 20 hours, the random forest (RF) and sequence-to- sequence (S2S) model achieve a slightly lower MAPE than the baseline. However, we are more interested in the early pre- diction start points. Ideally, we want to make an ac- Figure 7: MAPE and NDCG of a linear model of or- ders 1, 3 and 5 evaluated on the test dataset. The quantiles are determined using 100 bootstrap sam- ples. Predictions are evaluated at 4 different predic- tion times, 5, 10, 15, and 20 hours after publication of an article. It is instructive to look at the NDCG as well. Here we do not see any model being significantly better than the baseline model, which is mainly due to the fact that the baseline model is already very good at predicting the final order of the news articles shortly after publication. It achieves an NDCG of around 0.9 only 5 hours after publication. The S2S model seems to perform worse than the other two models in pre- 8 5101520predictionstarttime0.00.20.40.60.8MAPEExtrap.BaselineLinearModelSeq.toSeq.RandomForest5101520predictionstarttime0.750.800.850.900.951.00NDCGExtrap.BaselineLinearModelSeq.toSeq.RandomForest5101520predictionstarttime0.20.40.60.8MAPEorder=1order=3order=55101520predictionstarttime0.800.850.900.951.00NDCGorder=1order=3order=5 Figure 9: Predictions of the RFAR model for two articles from the test set. The shaded area shows 95% prediction intervals that are determined from the distribution of the predictions by the ensemble estimators. The results are shown in Fig. 7. We find that for each prediction start time the MAPE of the order = 3 model is significantly lower than the MAPE of the order = 1 model. However, increasing the order of the model to 5 does not seem to give a significant error reduction. The NDCG is not significantly different between the different choices of the order. In view of these results, we choose an order of 3 for all autoregressive models from here on. While we might be able to gain slightly better predictions by choosing an order of more than 5, choosing 3 seems to be a good compromise between model performance and computational cost. Random forest models provide a number of hyper- parameters such as the number of estimators, the depth of the tree or the size of the leaf nodes. To this end, we compare a random forest autoregressor with 50 to one with 500 estimators. The results, depicted in Fig. 8, show no significant different in MAPE or NDCG for both models. Choosing 500 instead of 50 estimators somewhat decreases the variance of the NDCG. For the random forest models in our other experiments, we will, therefore, use 500 estimators, which are still manageable in computation. Experi- menting with other hyperparameters was out of the scope of this work and is left for future work. 4.4.3 Uncertainty prediction In addition to achieving the best model performance in our experiments, the random forest model also gives us a natural way to quantify the prediction un- Figure 8: MAPE and NDCG of a random forest model with 50 and 500 estimators evaluated on the test dataset. The quantiles are determined using 100 bootstrap samples. Predictions are evaluated at 4 dif- ferent prediction times, 5, 10, 15, and 20 hours after publication of an article. dicting the order of the articles. This is likely due to the fact, that it has a large degree of freedom in the model parameter space and probably the rank regu- larization could help. However, additional tuning of the objective function of the S2S model was left for future work. Predicting a rough order of popular news articles seems to be possible by just linearly extrapolating the number of mentions in the first few hours. Improving over that is hard due to the high uncertainty of the predictions of the number of mentions after 24 hours. Looking at the performance of the linear model and the RF, it seems to be feasible to improve over the baseline, but the uncertainty of the predictions re- mains high. 4.4.2 Effect of order For all autoregressive models, we have to choose an order. A higher order increases computational cost but potentially also the prediction quality. To mea- sure the effect on the prediction quality, we evaluate the linear autoregressive model on different orders 1, 3 and 5. 9 SensingSocialMediaSignalsforCryptocurrencyNewsWWW'19-MSM'19,,5101520predictionstarttime0.10.20.30.4MAPE50estimators500estimators5101520predictionstarttime0.800.850.900.951.00NDCG50estimators500estimatorsFigure8:MAPEandNDCGofarandomforestmodelwith50and500estimatorsevaluatedonthetestdataset.Thequan-tilesaredeterminedusing100bootstrapsamples.Predic-tionsareevaluatedat4differentpredictiontimes,5,10,15,and20hoursafterpublicationofanarticle.TheresultsareshowninFig.7.WefindthatforeachpredictionstarttimetheMAPEoftheorder=3modelissignificantlylowerthantheMAPEoftheorder=1model.However,increasingtheorderofthemodelto5doesnotseemtogiveasignificanterrorreduction.TheNDCGisnotsignificantlydifferentbetweenthedifferentchoicesoftheorder.Inviewoftheseresults,wechooseanorderof3forallautoregres-sivemodelsfromhereon.Whilewemightbeabletogainslightlybetterpredictionsbychoosinganorderofmorethan5,choosing3seemstobeagoodcompromisebetweenmodelperformanceandcomputationalcost.Randomforestmodelsprovideanumberofhyper-parameterssuchasthenumberofestimators,thedepthofthetreeorthesizeoftheleafnodes.Tothisend,wecomparearandomforestautore-gressorwith50toonewith500estimators.Theresults,depictedinFig.8,shownosignificantdifferentinMAPEorNDCGforbothmodels.Choosing500insteadof50estimatorssomewhatdecreasesthevarianceoftheNDCG.Fortherandomforestmodelsinourotherexperiments,wewill,therefore,use500estimators,whicharestillmanageableincomputation.Experimentingwithotherhyperparameterswasoutofthescopeofthisworkandisleftforfuturework.4.4.3Uncertaintyprediction.Inadditiontoachievingthebestmodelperformanceinourexperiments,therandomforestmodelalsogivesusanaturalwaytoquantifythepredictionuncertainty.Insteadofjustcalculatingthemeanoftheensemblepredictions,wecancalculatepercentilesofthepredictionstogetpredictionintervalswith95%coverage.ThisisshownintwoexampletimeseriesinFig.9.0510152025hours1015202530354045numberofmentionspredictiontrue0510152025hours50100150200250300numberofmentionspredictiontrueFigure9:PredictionsoftheRFARmodelfortwoarticlesfromthetestset.Theshadedareashows95%predictionin-tervalsthataredeterminedfromthedistributionofthepre-dictionsbytheensembleestimators.4.5ModelDeploymentWeusethetrainedautoregressivemodeltodoonlinepredictionsonreal-timedata.Thedataextractionserver3constantlyretrievesnewtweetsandarticlesandfindsthetweet-articlematchings,whicharesavedasanewbatchintoanonlinedatabase4.Wegeneratethedatasetforpredictionbyqueryingthedatabaseforarticlespub-lishedinthelast24hours.Thequerieddataisthenpre-processedinordertoextracttimeseries,content,andcontextfeatures,asdescribedearlier.Then,wepredicttheimportancevaluesofnewarticlesat24hoursafterthearticle'spublicationtime,usingthepreviouslytrainedmodel.Thepredictionisperformedevery10minutes.Thecurrentpredictedimportancevaluesarevisualizedinanin-teractivewebpage5.ThewebapplicationisdevelopedusingPython-basedFlaskwebdevelopmentframework6:thefront-endmakesconstantlyAjaxGETrequeststotheback-end,whichreadstheupdatedimportancevaluesfromJSONfiles.Fordatavisualization,wegenerateinteractivechartswiththeJavaScriptC3.jslibrary7.Thewebfront-endprovidesthreestabs(i-iii),showingthefollow-ingdynamiccontent.(i)Atablewiththemostimportantarticlescanbesortedbythecurrentnumberoftweetsmentionsorbythepredictedimportancevalueatthetargetof24hoursafterpubli-cation.Italsoembedsthelinktoeacharticleanddisplayssomerelevantinformationaboutthearticle,suchasthepublisherandpublicationtime.(ii)Acombinedlinechartshowsthecumulativetimeseriesofthemostimportantarticles-acontinuouslinefortheobservedhourlymentionsandadashedlineforthepredictedvaluesupto24hourssincethearticle'spublication(seeFig.1).(iii)Twopiechartspresentthestatisticsrelatedtoarticlepublisher(context)andcryptocurrency(content)basedkeywords(seeFig.3).5CONCLUSIONInthispaper,weintroduceanonlinedataminingsystemrelat-ingcryptocurrencynewstothetweetsdiscussingthem.Thisdatapipelinepavesthewayformonitoringcryptocurrencynewsofpub-lic'sinterest,identifyingandpredictingpoplarnews,andtrackingpublicopinionstowardscryptocurrencies.3deployedontheGoogleCloud(GC)4MongoDBdeployedonAmazonWebServices(AWS)5Linktowebpage:http://35.246.215.2066http://flask.pocoo.org/7https://c3js.org0510152025hours1015202530354045numberofmentionspredictiontrue0510152025hours50100150200250300numberofmentionspredictiontrue certainty. Instead of just calculating the mean of the ensemble predictions, we can calculate percentiles of the predictions to get prediction intervals with 95% coverage. This is shown in two example time series in Fig. 9. hourly mentions and a dashed line for the predicted values up to 24 hours since the article's publica- tion (see Fig.1). (iii) Two pie charts present the statistics related to article publisher (context) and cryptocurrency (content) based keywords (see Fig.3). 4.5 Model Deployment We use the trained autoregressive model to do on- line predictions on real-time data. The data extrac- tion server3 constantly retrieves new tweets and arti- cles and finds the tweet-article matchings, which are saved as a new batch into an online database4. We generate the dataset for prediction by querying the database for articles published in the last 24 hours. The queried data is then pre-processed in order to extract time series, content, and context features, as described earlier. Then, we predict the importance values of new ar- ticles at 24 hours after the article's publication time, using the previously trained model. The prediction is performed every 10 minutes. The current predicted importance values are visualized in an interactive webpage5. The web application is developed using Python-based Flask web development framework6: the front-end makes constantly Ajax GET requests to the back-end, which reads the updated importance values from JSON files. For data visualization, we generate interactive charts with the JavaScript C3.js li- brary7. The web front-end provides threes tabs (i-iii), showing the following dynamic content. (i) A table with the most important articles can be sorted by the current number of tweets mentions or by the predicted importance value at the target of 24 hours after publication. It also embeds the link to each article and displays some relevant information about the article, such as the publisher and publication time. (ii) A combined line chart shows the cumulative time series of the most im- portant articles - a continuous line for the observed 3deployed on the Google Cloud (GC) 4MongoDB deployed on Amazon Web Services (AWS) 5Link to webpage: http://cryptodatathon.com/ranknews 6http://flask.pocoo.org/ 7https://c3js.org 5 Conclusion In this paper, we introduce an online data mining system relating cryptocurrency news to the tweets discussing them. This data pipeline paves the way for monitoring cryptocurrency news of public's interest, identifying and predicting poplar news, and tracking public opinions towards cryptocurrencies. Data exploration on the collected paired news ar- ticles and tweets characterized top publishers, top cryptocurrencies discussed on Twitter as well as the lifespan of these news discussions. We also perform preliminary predictive analytics using machine learn- ing and deep learning models. This work is a first step towards providing a prediction system, that detects articles that are going to become popular shortly af- ter they are published. Our current system still needs to observe a few hours of data before making a prediction. For future work, the goal would be to make more accurate pre- dictions within the first hour after publication. This is possible, by exploring different representations of the article content by more advanced NLP models. 6 Acknowledgments N.A.-F. and T.G. are grateful for financial support from the EU Horizon 2020 projects: SoBigData under grant agreement No. 654024. J.B., R.H. and D.L are grateful for the support of professor A. Krause on the Data Science Lab 2018 course at ETH Zurich. References [1] S. Chakraborty, A. Venkataraman, S. Jaga- bathula, and L. Subramanian, "Predicting socio- economic indicators using news events," in Pro- 10 ceedings of the 22nd ACM SIGKDD Interna- tional Conference on Knowledge Discovery and Data Mining, pp. 1455 -- 1464, ACM, 2016. [2] Z. Hu, W. Liu, J. Bian, X. Liu, and T.-Y. Liu, "Listening to chaotic whispers: A deep learning framework for news-oriented stock trend predic- tion," in Proceedings of the Eleventh ACM In- ternational Conference on Web Search and Data Mining, pp. 261 -- 269, ACM, 2018. [3] M. Piskorec, N. Antulov-Fantulin, P. K. Novak, I. Mozetic, M. Grcar, I. Vodenska, and T. Smuc, "Cohesiveness in financial news and its relation to market volatility," Scientific Reports, vol. 4, no. 1, 2014. [4] W. Zhang and S. Skiena, "Trading strategies to exploit blog and news sentiment," in In Fourth Int. Conf. on Weblogs and Social Media (ICWSM), 2010. [5] T. Guo, A. Bifet, and N. Antulov-Fantulin, "Bitcoin volatility forecasting with a glimpse into buy and sell orders," in 2018 IEEE Inter- national Conference on Data Mining (ICDM), IEEE, 2018. [6] N. Antulov-Fantulin, D. Tolic, M. Piskorec, Z. Ce, and I. Vodenska, "Inferring short- term volatility indicators from the bitcoin blockchain," in Complex Networks and Their Applications VII (L. M. Aiello, C. Cherifi, H. Cherifi, R. Lambiotte, P. Li´o, and L. M. Rocha, eds.), (Cham), pp. 508 -- 520, Springer In- ternational Publishing, 2019. [7] H. Chen, P. De, Y. J. Hu, and B.-H. Hwang, "Customers as advisors: The role of social media in financial markets," SSRN Electronic Journal, 2012. [8] T. G. Andersen, T. Bollerslev, F. X. Diebold, and C. Vega, "Real-time price discovery in global stock, bond and foreign exchange markets," Journal of International Economics, vol. 73, no. 2, pp. 251 -- 277, 2007. [9] M. Tsagkias, M. De Rijke, and W. Weerkamp, "Linking online news and social media," in Pro- ceedings of the fourth ACM international confer- ence on Web search and data mining, pp. 565 -- 574, ACM, 2011. [10] B. Shi, G. Ifrim, and N. Hurley, "Insight4news: Connecting news to relevant social conversa- tions," in Joint European Conference on Ma- chine Learning and Knowledge Discovery in Databases, pp. 473 -- 476, Springer, 2014. [11] R. Bandari, S. Asur, and B. A. Huberman, "The pulse of news in social media: Forecasting pop- ularity.," ICWSM, vol. 12, pp. 26 -- 33, 2012. [12] R. Kobayashi and R. Lambiotte, "Tideh: Time- dependent hawkes process for predicting retweet dynamics," in Tenth International AAAI Con- ference on Web and Social Media, 2016. [13] H. Dou, W. X. Zhao, Y. Zhao, D. Dong, J.-R. Wen, and E. Y. Chang, "Predicting the popular- ity of online content with knowledge-enhanced neural networks," in ACM KDD, 2018. [14] N. Moniz, L. Torgo, and F. Rodrigues, "Resam- pling approaches to improve news importance prediction," in International Symposium on In- telligent Data Analysis, 2014. [15] I. Arapakis, B. B. Cambazoglu, and M. Lalmas, "On the feasibility of predicting news popularity at cold start," in International Conference on Social Informatics, 2014. [16] R. H. Shumway and D. S. Stoffer, Time Series Analysis and Its Applications. Springer Interna- tional Publishing, 2017. [17] L. Breiman, "Random forests," Machine learn- ing, vol. 45, no. 1, pp. 5 -- 32, 2001. [18] I. Sutskever, O. Vinyals, and Q. V. Le, "Se- quence to sequence learning with neural net- works," in Advances in neural information pro- cessing systems, 2014. 11 [19] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, "Empirical evaluation of gated recurrent neural networks on sequence modeling," arXiv e-prints, vol. abs/1412.3555, 2014. 12
1503.05502
3
1503
2015-05-30T11:37:20
Urban Magnetism Through The Lens of Geo-tagged Photography
[ "cs.SI", "physics.soc-ph" ]
There is an increasing trend of people leaving digital traces through social media. This reality opens new horizons for urban studies. With this kind of data, researchers and urban planners can detect many aspects of how people live in cities and can also suggest how to transform cities into more efficient and smarter places to live in. In particular, their digital trails can be used to investigate tastes of individuals, and what attracts them to live in a particular city or to spend their vacation there. In this paper we propose an unconventional way to study how people experience the city, using information from geotagged photographs that people take at different locations. We compare the spatial behavior of residents and tourists in 10 most photographed cities all around the world. The study was conducted on both a global and local level. On the global scale we analyze the 10 most photographed cities and measure how attractive each city is for people visiting it from other cities within the same country or from abroad. For the purpose of our analysis we construct the users mobility network and measure the strength of the links between each pair of cities as a level of attraction of people living in one city (i.e., origin) to the other city (i.e., destination). On the local level we study the spatial distribution of user activity and identify the photographed hotspots inside each city. The proposed methodology and the results of our study are a low cost mean to characterize a touristic activity within a certain location and can help in urban organization to strengthen their touristic potential.
cs.SI
cs
Urban Magnetism Through The Lens of Geo-tagged Photography Silvia Paldino1, Iva Bojic2, Stanislav Sobolevsky2*, Carlo Ratti2, Marta C. González3 1Department of Physics, University of Calabria, Via Pietro Bucci, 87036 Arcavacata, Rende CS, Italy 2SENSEable City Laboratory, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, 02139, USA 3Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, MA 02139, USA Abstract There is an increasing trend of people leaving digital traces through social media. This reality opens new horizons for urban studies. With this kind of data, researchers and urban planners can detect many aspects of how people live in cities and can also suggest how to transform cities into more efficient and smarter places to live in. In particular, their digital trails can be used to investigate tastes of individuals, and what attracts them to live in a particular city or to spend their vacation there. In this paper we propose an unconventional way to study how people experience the city, using information from geotagged photographs that people take at different locations. We compare the spatial behavior of residents and tourists in 10 most photographed cities all around the world. The study was conducted on both a global and local level. On the global scale we analyze the 10 most photographed cities and measure how attractive each city is for people visiting it from other cities within the same country or from abroad. For the purpose of our analysis we construct the users’ mobility network and measure the strength of the links between each pair of cities as a level of attraction of people living in one city (i.e., origin) to the other city (i.e., destination). On the local level we study the spatial distribution of user activity and identify the photographed hotspots inside each city. The proposed methodology and the results of our study are a low cost mean to characterize touristic activity within a certain location and can help cities strengthening their touristic potential. Key words: city attractiveness, big data, human mobility, urban planning, tourism study, smart city, complex systems, collective sensing, geo-tagged Flickr 1 Introduction The traces of communication and information technologies are currently considered to be an efficient and consolidated way of collecting useful and large data sources for urban studies. There are in fact various ways to electronically track human behavior and the most diffuse one is collecting data from mobile phones [1-2]. It was already demonstrated that this technique can be used as an accurate method for understanding crowds [1] and individual mobility patterns [3-5], to classify how the land is used [6-9] or to delineate the regional boundaries [10-12]. Moreover, it was shown how to identify some of user characteristics from mobile call patterns, for example how to determinate if a user is a tourist or a resident [13]. However, when it comes to studying human mobility patterns, exploring detailed call records is not the only possibility – other sources of big data collected from digital maps [14], electronic toll systems [15], credit cards payments [16-17], twitter [18], circulation of bank notes [19], vehicle GPS traces [20] and also using geotagged photographs [21-22] can be successfully applied.                                                                                                                 * Correspondence: [email protected]   2   The focus of this paper is on geotagged photographs that provide novel insights into how people visit and experience a city, revealing aspects of mobility and tourism, and discovering the attractions in the urban landscape. In the past, photography was already considered as a good mean of inquiry in architecture and urban planning, being used for understanding landscapes [23]. Moreover, Girardin et al. showed that it was possible to define a measure of city attractiveness by exploring big data from photograph sharing websites [24]. They analyzed two types of digital footprints generated by mobile phones that were in physical proximity to the New York City Waterfalls: cellular network activity from AT&T and photo activity from Flickr. They distinguished between attractiveness and popularity. Regarding attractiveness they defined the Comparative Relative Strength indicator to compare the activity in one area of interest with respect to the overall activity of the city. They measured the attractiveness of a particular event in New York City. In this study we consider the attractiveness in the overall area of the city during three years, comparing the attractiveness and spatial distribution of activities in different cities. Discovering how to increase the global city attractiveness or the local attractiveness of hotspots requires knowing the differences in the visits made by residents and tourists. While both residents and tourists take photographs at locations that they consider important, the reasons why they are taking photographs are different. This knowledge helps us to understand the different usages of the urban infrastructure in people spare time. The overall goal is to find the ways how passively collected data can be used for low cost applications that inform urban innovation. These information trends can be of interest for planning, forecasting of economic activity, tourism, or transportation [25]. Finally, a comparative study of cities from different parts of the world is a relevant objective to discern how the patterns of human behavior largely depend on a particular city [26]. In this paper we define city global attractiveness as the absolute number of photographs taken in a city by tourists, while local attractiveness of hotspots within a city is defined by the spatial distribution of photographs taken by all users (either local residents or tourists). In our analysis we are using a dataset that consist of more than 100 million publicly shared geotagged photographs took during a period of 10 years. The dataset is divided into 8,910 files denoting 3,015 different locations (e.g., cities or certain areas of interest such as Niagara Falls) where for almost every location three different labels are given: resident, tourist and unknown, to denote people who are living in the area, visiting the area or are uncategorized. 2 Data For each photograph in the dataset, which is publicly available on the website sfgeo.org, the following data is given: user id, timestamp, geo coordinates and link from which the photograph can be downloaded. From the given dataset we omitted duplicates (9.33% of the dataset in total) together with the photographs with incorrect timestamps (0.01% of the dataset in total). In the end we were left with more than 90 million photographs. Figure 1 shows how the number of taken photographs and users changed over the period of 10 years. We can see that almost 75% of the photographs were taken from 2007 until 2010. In the further analysis we are thus considering only photographs taken during those three years (about 70 million of photographs in total).     3   Figure 1 -  Number of geotagged photographs (blue line) and users (green line) from 2000 until 2010.   3 Definition of user home cities and countries In order to determinate if there is any difference between how residents vs. tourists are attracted to a certain location, for each user in the dataset we have to determinate his/her home city and country. Even though the dataset has tags for: resident, tourist and unknown, the given categorization is not comprehensive and in some cases is not consistent. For instance, for more than 85% of users in the dataset their home city is not defined (i.e., their photographs are always in unknown files). In addition, for almost 25% of users for who their home city is defined at least two or more cities are listed as their home cities making the proposed categorization inconsistent. Due to the aforementioned reasons, we used our own criteria to determinate if a person is living in the area where he/she took a photograph or not. We are considering that a person is a resident if at that location he/she took the highest number of the photographs (at least 10 of them) over the longest period of time (at least longer than 180 days) calculated as the time between the first and last photograph taken at the location. Once when we determinate a user home city, he/she is automatically becoming a tourist in all other cities in the dataset. A category “tourist” in this sense denotes many different kinds of visitors including business visitors. However, most of people taking photographs at locations other than their home cities in fact act like tourists during this particular instance of time. From almost 1 million users that took photographs between 2007 and 2010, for only 11% of them we were able to determinate their home city and country using our criteria. However, these users took more than 40% of all photographs (i.e., almost 30 millions). Our classification was not consistent with the initial categorization (i.e., users whose photographs were listed in only one resident file) for only less than 2% of users. Moreover, for every city in the dataset we identified its country code allowing us to classify tourists as domestic or foreign ones, where domestic tourists are coming from the same country as the considered city, while foreign tourists are all the others – visitors from different countries. Finally, for every city all the observed activity is assigned to residents, domestic tourists or foreign tourists and for each of these categories, we keep the following data: user id, geo coordinates and for tourists their home city id together with their country code and continent id.     4   4 Attractiveness 4.1 Global Attractiveness Considering our original question what attracts people to a certain location, we start our analysis looking at different locations and their absolute global attractiveness that is quantified by the number of photographs taken in them by either domestic or foreign tourists, leaving out the contribution that was made by their residents. Once we determined user home cities and countries, in order to calculate global attractiveness for different locations, we ranked locations by the total number of photographs taken in them by tourists. We find that the first 10 ranked cities by photographs are: New York City, London, Paris, San Francisco, Washington, Barcelona, Chicago, Los Angeles, Rome and Berlin. Further, we focus this study on the global attractiveness of these 5 US cities and 5 European Union cities (EU), and add together the remaining information as the rest of Europe, the rest of the US and the rest of world. From the aforementioned ranking we were able to extract the origin-destination (O/D) network between the 10 most photographed cities, the rest of the US, and Europe as well as the rest of the world. Figure 2 shows O/D flows among the top 10 city-to-city estimated flows of visitors. Colors of the ribbons correspond to destination cities and origin cities are marked with a thin stripe at the end of a ribbon (visualization method based on Krzywinski [27]). With this visualization it is evident that the most attractive cities are London and New York City, followed by San Francisco, Washington and Paris. It is interesting to point out that the most important flows happen exactly between these cities and New York City (New York City – Washington, New York City – San Francisco, New York City – London, New York City - Paris), while London and Paris have the strongest flow between each other. The less active cities are Berlin and Rome. Figure 2 – Origin-destination (O/D) network among the top 10 city-to-city estimated flows of visitors. Ribbons represent “outgoing” fluxes on each side. For example, following the ribbon between London - New York City, on London side it represents people living in London who visit and take photographs in New York City.     5   linear, having R² ≅ 0.87 for the linear approximation. Therefore, the analysis based on the number of taken The dependence between the number of users and the number of photographs they took is quite close to photographs is to some extent also a good proxy for the number of active users; further we will use the number of photographs as the main measure of attractiveness. However, using this measure one should also be aware of the heterogeneity of Flickr activity belonging to users coming from different parts of the world. As shown in Table 1 this heterogeneity is quite noticeable – number of photographs taken by the residents varies from 1.16 for the rest of the world to more than 1000 for San Francisco. In many places across the world people are almost never using geotagging location services (e.g., Flickr) and are not sharing their photographs publicly because of different reasons: e.g., technical, cultural or even political ones. Among the 10 top ranked cities this activity varies in a magnitude of 20 times between people living in San Francisco (the most active population) and Rome (the least active). Table 1 - Ratio between total number of photographs taken by tourists and their official population. City New York City London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin Rest of EU Rest of the US Rest of the world Population (mln) Photographs taken Photographs per 1000 residents 8.36 7.81 2.23 0.81 0.59 1.62 2.85 3.83 2.71 3.43 4,82.61 2,87.61 5,905.14 1,026,199 1,151,799 534,092 851,425 525,313 255,038 412,246 289,810 126,011 182,325 8,637,148 7,347,003 6,877,894 122.75 147.48 239.50 1,051.14 890.36 157.43 144.65 75.67 46.50 53.16 17.90 25.55 1.16 In order to use the O/D flows of geotagged photography as a proxy for actual human mobility between cities across the globe, the appropriate normalization for the above heterogeneity is required. One way of doing it is by normalizing the O/D flows shown in Figure 2 by the number of photographs taken per 1000 of residents of the origin location reported in Table 1. However, this would require further assumptions about the homogeneity of the dataset representativeness for different modes of people travel behavior that would be a questionable assumption given the dataset sparsity and heterogeneity. Therefore, in the further analysis we will refrain from extrapolating the original values of O/D flows defined by the actual number of photographs taken to represent actual human mobility. In this way we will focus our analysis on the actual photographic activity of the users, keeping in mind that flows of the activity from different origins might actually have different representativeness across the entire human population and might not represent the entire variety of types of human activity from the considered origins in the considered destinations. However, we believe that photographic activity by itself is an important component of visitor behavior and might serve as a relevant proxy for measuring city visual attractiveness for the visitors. The cumulative incoming flow for each destination in the O/D network from all the origins other than the considered destination represents the destination’s total global attractiveness in terms of geotagged photographic activity of tourists. Normalized by the population of destination, this measure becomes a relative global attractiveness of the destination stating how much visitors per capita of residential population the location has.     a) b) 6   c)   Figure 3 – Relative attractiveness. (a) A relative global attractiveness of top 10 cities measured as the estimated amount of touristic activity per capita of urban population, it is plotted in the decreasing order of total attractiveness, (b) the structure of photographic activity within a city and (c) the structure of photographic activity of city residents. Figure 3 (a) shows the number of domestic and foreign photographs divided by the city population (i.e., attractiveness per capita for domestic and foreign tourists). Figure 3 (b) shows the percentage of photographs within each city depending on the type of user, while Figure 3 (c) shows the share of activity type of users that reside in the particular city. For example, as depicted in Figure 3 (b), Rome receives the largest amount of foreign tourist activity and Washington D.C. the smallest. And as depicted in Figure 3 (c) people living in Washington D.C have the largest share of domestic tourists while Parisians have the smallest. Figure 3a shows the relative global attractiveness in relation to the population of the city (with additional distinction by domestic and foreign tourists). This gives a completely different city ranking from the initial one (e.g., New York City, London, Paris, San Francisco, Washington, Barcelona, Chicago, Los Angeles, Rome and Berlin) – now the top relative attractiveness is observed in San Francisco and in Washington for domestic tourists, while the top destination by relative attractiveness for the foreign tourists is observed in Paris. Zooming into the relative structure of photographic activity within each city (Figure 3b), a clearly distinctive pattern between European and American cities can be observed. Namely, in American cities the city residents take most of the photographs; followed by the domestic tourists mostly taking the rest, while in EU cities the activity within the cities is much more diverse showing a higher fraction of touristic and specifically foreign touristic activity. The borderline cases from both groups are London and New York City, the former having the highest fraction of residential activity among European cities making it more similar to the American cities, while the latter has the highest fraction of foreign activity among American cities, making it more similar to European ones. One of the possible explanations could be that the observed pattern is attributed to the cultural similarities going back in the history of British-American ties.     7   Additionally, for every city we can define a measure that shows how mobile its residents are (i.e., if their activity is home-oriented or not) by looking at the ratio of loop edges to the total outgoing weights from the O/D matrix (i.e., user activities in their home cities compared to their total activities). We depict these results in Figure 3c. Although this ratio is nearly flat varying between 50-60%, an interesting pattern appears when looking at the destinations of activities. Again, American and European patterns are surprisingly distinctive – while the American tourists seem to be mostly engaged in domestic tourism, EU citizens’ travel more abroad. This difference can be explained because the US is much bigger and at the same time much more geographically diverse when compared to the EU countries of our studied cities. American users thus have more options when engaged in domestic tourism and are consequently less likely to travel to foreign destinations. When considering the strength of each particular O/D flow 𝑎(𝑖,𝑗) between the origin 𝑖 and destination 𝑗 (i.e., a number of photographs taken by the residents of 𝑖 when visiting city 𝑗), one should loop edge (𝑖≠𝑗) the null model is: 𝑚𝑜𝑑𝑒𝑙(𝑖,𝑗)=𝑤!"#∗(𝑖)  𝑤!"∗(𝑗) (𝑤!"∗(𝑘)) where 𝑤!"#/!"∗(𝑖)=𝑤!"#/!"(𝑖)−𝑎(𝑖,𝑖), 𝑎 is the actual normalized O/D edge, 𝑤!"𝑐 is the total number of photographs taken in city 𝑐 and 𝑤!"#𝑐 is the total number of photographs taken worldwide by city 𝑐 residents. Using the aforementioned model, we compute the fraction 𝑎(𝑖,𝑗)/𝑚𝑜𝑑𝑒𝑙(𝑖,𝑗) (see Table 2) in expect that the number of people travelling between larger or more significant cities is higher. Therefore, in order to estimate the qualitative strength of each particular O/D flow beyond just the effect of scale, we compare all the non-loop edges of the normalized network versus the homogenous null-model where all the outgoing mobility is distributed in the relative proportion to the destination attractiveness, i.e., for each non- !!! order to see how qualitatively strong the links between each pair of cities are, i.e., how people from each origin are attracted to each destination beyond just the effect of scale. Table 2 – Relative strength of the links between each pair of cities, normalized by the null-model estimation. O / D --> New York City London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin New York City - 0.92 0.76 1.58 1.70 0.67 1.25 1.31 0.76 0.64 London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin 0.99 - 2.44 0.83 0.38 2.40 0.77 0.56 1.63 1.79 0.88 1.57 - 0.44 0.77 1.29 0.78 0.24 1.70 1.15 1.11 0.73 0.60 - 1.40 0.20 1.37 3.31 0.21 0.61 2.08 0.35 0.21 0.86 - 0.05 1.62 0.39 0.29 0.37 0.32 1.59 1.60 0.45 0.75 - 0.58 0.50 2.25 2.15 1.60 0.31 0.13 1.46 1.07 0.12 - 1.07 0.36 0.16 0.79 0.44 0.24 2.43 0.89 0.19 1.37 - 0.07 0.09 0.61 1.50 1.41 0.41 0.67 1.24 0.41 0.31 - 2.22 0.53 1.37 1.60 0.32 0.51 3.32 0.34 0.31 1.69 - One clear pattern, which can be immediately recognized, is a high level of attractiveness between pairs of American cities, as well as a lower level of connectivity between American cities and EU ones (see Figure 4a). This pattern was rather expected, as trans-Atlantic links are likely to be weaker than more local ones. To a certain extent it could be attributed to a general decay of links with distances (similar to Krings [28]) – indeed the overall trend is well approximated by an exponential function (Figure 4b) going sharply down once when crossing the ocean. However, an interesting finding shown in both Figures 4-a and 4b is that the links going from the US to EU are stronger than same distance links going in the reciprocal direction from EU to the US (see Figure 4a). According to this, Americans are more attracted by EU destinations than Europeans are by the US cities.     a) b) 8   Figure 4 – (a) Relative strength of different types of links, (b) Relative strength of different types vs. distance. 4.2 Local Attractiveness Until this point, cities have been considered only as aggregated spatial units. However, cities all around the world are not spatially homogenous and there are always relatively more attractive areas within them to which one can refer as “hotspots”. Moreover, attractiveness of different locations across the city could vary for different categories of users. In order to investigate this local attractiveness, we identified spatial distribution of photographs taken by users belonging to resident, domestic or foreign tourist groups. Visualizing them on the map, where each dot represents a photograph taken, Figure 5 shows different spatial patterns of how different categories of users take photographs in New York City, which was taken as an example. As expected, tourists in general take more photographs in central areas within the city while residents take photographs at locations that are much more spatially distributed – scattered all over the city. By putting those dots onto the map, we can create “maps of attractiveness” for every city and for its residents and tourists. a) b)     c) d) 9   the three contributions together. Figure 5 – Spatial distribution in New York City. Dots represent photographs taken by New York City (a) residents, (b) domestic tourists, (c) foreign tourists creating a map of attractiveness for three different categories, while (d) is the map of attractiveness for In order to analyze the spatial activity we use 500x500m rectangular grids covering each city.  First we start with a standard analysis of the distribution functions of the activity density values across the grid cells for different categories of users – residents, domestic and foreign visitors, as well as for the total activity. All of activities can be fitted to truncated lognormal distributions (distribution truncation is an important consideration from a technical standpoint as by its definition the cells covered by user activity cannot have less than one photograph taken inside of them) as shown in Figure 6 for New York City. We took New York City just as an example as patterns for the other cities are similar with the only difference in the relative position of the curves corresponding to the foreign and domestic visitors. Figure 6 – Cumulative distribution functions of activity density. The plot shows the cumulative distribution functions of activity density over 500x500m grid for city residents, domestic and foreign visitors as well as the total activity in New York City fitted to truncated log-normal distributions.       10   Log-normal distribution is characterized by its mean and variance. While means vary for different types of users due to the differences of their total activity level, variance characterizes how broad or narrow the distribution is, i.e., how strongly the activity density varies over the area of the city covered by the considered user activity. The values of variance for all 10 cities and different categories of users reported in Table 3 show a consistent pattern – with the only exception of Los Angeles variance of domestic visitor where their spatial activity is always the lowest one, while variance of the foreign activity is higher for all the EU cities compared to the residential activity and lower for all the American cities. Variance of the total activity is usually the highest one with the exception of three EU cities – London, Barcelona and Rome. Table 3 – Variance of the fitted lognormal distributions. Variance of the fitted lognormal distributions to the activity density is shown in 500x500m grid for city residents, domestic and foreign visitors, as well as for the total activity in the different cities. City New York City London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin Residents Domestic tourists Foreign tourists Total activity 2.37 1.86 2.24 2.19 2.21 2.20 2.17 1.86 2.04 1.86 2.17 1.89 1.62 2.07 2.10 1.77 2.03 1.84 1.88 1.78 2.26 2.22 2.33 2.09 2.17 2.42 2.08 1.71 2.95 2.04 2.44 1.92 2.39 2.22 2.22 2.38 2.23 1.91 2.39 2.07 Another perspective of user activity spatial distribution across different cities can be expressed by considering the dimensions of the areas covered by different quintiles of the top density cells. Figure 7 visualizes the shape of the curve characterizing those distributions (normalization is performed by the number of cells covering 50% of the total activity in order to bring different distributions on the same scale) in all 10 cities for all types of users (i.e., residents, domestic and foreign tourists). The curve shows how large is the most photographed area covering a given quintile of the total activity within the city in relation to the total area covered. Interestingly, curves for all 10 cities and three different types of users nearly follow one single shape which seems to represent a universal pattern of spatial distribution of the photographic activity across the city. Figure 7 – Normalized spatial distribution. Normalized spatial distribution of city attractiveness is shown for city residents, domestic tourists and foreign tourists – normalized total area of most photographed locations is covering a given quintile of the entire photographic activity (area covered by 50% of activity counted as a unit after normalization).       11   However, quantitatively the areas covered by the activity of city residents, domestic and foreign visitors within each city are quite different. Considering an average ratio between the size of areas covered by different activity quintiles (given the similarity of the spatial distribution shapes) for domestic/foreign tourists vs. the corresponding areas covered by the activity of residents for each city, we can see that these values vary largely from one city to another (see Table 4). The pattern is always the same – foreign tourist activity (in any given quintile) covers smaller areas compared to that one of domestic (the only exception is Berlin where those are almost the same) and, with the only exception of Los Angeles, the areas covered by both types of visitors are always smaller compared to the areas covered by the activity of residents. Once more, a very clear difference between the US and EU cities can be noticed – tourists visiting the US cities (with the exception of Chicago) explore more extensively the area compared to the ones visiting EU cities. Table 4 – Top photographed area. Relative size of the top photographed area is covered by the activity of domestic and foreign visitors versus the corresponding area covered by residents in the different cities. New York  City City London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin Domestic tourists Foreign tourists 0.47 0.40 0.33 0.64 0.45 0.45 0.37 1.32 0.47 0.25 0.35 0.25 0.27 0.48 0.32 0.26 0.21 0.74 0.33 0.26 The existing spatial activity coverage in each city is not homogenous as people are often initially attracted by its main destinations that become “must visit” locations consequentially getting the highest photographic activity. For city residents those locations, which are often called “hotspots”, include parks, squares or sport facilities, while tourists are usually more attracted to the key places for the city identity (e.g., Times Square in New York City, Big Ben in London). The overall tourist activity in the New York City is visualized in Figure 8 by grouping coordinates of taken photographs into cells and creating a 3D map of the city perception. Our findings of New York City “hotspots” are similar to those previously identified in [22]. Figure 8 – A tourist density attractiveness map of New York City. The most photographed place in the city is Times Square. In Bronx, which does not attract many people, tourists are mostly taking photographs of Yankees stadium.   Further we give a definition of the hotspots as spatially connected areas on the rectangular grid which consist of the high-density cells and possess the highest cumulative activity. The given algorithm allows us to define a given number of spatial hotspots in all types of user activity, ordering them according to   12   their cumulative activity level. Specifically we identify the top 𝑛 (in further analysis  𝑛=12) activity 1. Consider top 𝑛 density cells in the grid and let 𝑎 be the lowest activity level among them. 2. Select all the cells with activity higher or equal to 𝑎 and divide them into spatially connected 3. If resulting number of connected components is equal or higher than 𝑛 (could be higher if a number of cells has the same activity level  𝑎) stop the algorithm defining selected connected components as 4. Otherwise, if the number of components is 𝑡<n, select n−t top activity cells from the remaining ones (not covered by selected components) and let 𝑎 be the lowest activity level among them. Repeat area is their downtown and moreover,  one hotspot represents their stadiums – Yankee Stadium in New York from Step 2. In Figure 9 we show examples of the resulting maps for the total user activity (including residents and tourists) in one US city (i.e., New York City) and one EU city (i.e., Rome). In both cities the most active components (considering cells having at least one common vertex to be connected). hotspots within each city using a following algorithm: the hotspots. City and Olimpico in Rome. Another similarity is that in both cities among their top 12 hotspots are their squares and parks, meaning that outside of their downtowns and besides their most famous attractions, people take photographs and spend their time at locations where they can meet and talk with other people. The only two cultural hotspots outside the downtown of Rome are the Church San Paolo Fuori le Mura and the Capitolium. Similarly, in New York City hotspots that are outside downtown are two museums located close to Central Park – the Metropolitan Museum of Art and the American Museum of Natural History. Table 5 gives the complete list of top 12 hotspots in Rome and New York City. a) b) Figure 9 – City maps of (a) New York City and (b) Rome.     Hotspot rank 1 2 3 4 5 6 7 8 9 10 11 12 Table 5 – Hotspots in New York City and Rome. New York  City Downtown New York City Hall Metropolitan Museum of Art Union Square Citi Field Yankee Stadium American Museum of Natural History Penn Station Grand Central Terminal Javitz Center Brooklyn Bridge Central Park 13   Rome Downtown San Giovanni in Laterano square Olimpico Stadium Auditorium Parco della Musica Caio Cestio Pyramide IED – Istituto Europeo di Design Papillo Hotel Capitolium Villa Torlonia Church San Paolo Fuori Le Mura Parco dei Caduti Passeggiata del Gianicolo Once that we identified the first dozen of the most photographed spatial hotspots for each city for all types of users, we define the cumulative activity within each of them separately for residents, domestic and foreign visitors and rank them in the decreasing order by the number of photographs taken. We then plot that number vs. the hotspot rank (similar to the approach used in González et al., 2008). Approximating these rank plots with power law dependences ℎ𝑜𝑡𝑠𝑝𝑜𝑡𝐴𝑐𝑡𝑖𝑣𝑖𝑡𝑦(𝑟𝑎𝑛𝑘)=𝑐  𝑟𝑎𝑛𝑘!! (by doing so we get R2 above 90% on distributions on an example of New York City where the distribution is more flat (i.e., lower 𝑞) for the residents and sharper for domestic and especially foreign tourists (i.e., higher 𝑞). average) gives us another important quantitative relative characteristic of how concentrated or distributed between the key destinations across the city is the activity of different types of people. Figure 10 shows those     Figure 10 – Log-log rank plot of 12 hotspots relative attractiveness in New York City fitted to power-laws. The top hotspot attractiveness is considered as a unit for each type of users.   14   Detailed comparison of 𝑞 exponents for different cities is presented in Table 6. From the values of q  we can see how concentrated or distributed resident and tourist activity is within them. If the value of 𝑞 quantifying 𝑞 separately for residents, domestic and foreign tourists, we can conclude that their values exponent is higher, then it means that people are more focused on just visiting the major attractions, while a lower exponent means that people attention is more equally distributed among different attractions. By largely vary from one city to another, corresponding to the unique city spatial layout. However, we can still discover additional strongly consistent pattern in human behavior across different cities: the distribution always becomes sharper for the visitors and especially for the foreign visitors with the only exception of Berlin where foreign activity has almost the same exponent as the activity of the city residents. Table 6 – Values of 𝒒 exponents for residents and tourists in the different cities. 𝒒 exponent is a measure of how concentrated or distributed people activity is across different “hotspots”. Namely, a higher value means that people are more focused on just visiting major attractions. Residents Domestic tourists Foreign tourists Total activity City New York City London Paris San Francisco Washington Barcelona Chicago Los Angeles Rome Berlin 1.06 1.29 1.25 1.10 1.21 1.65 1.48 1.25 2.37 1.60 1.39 1.35 1.38 1.12 2.51 2.18 1.91 1.46 2.77 2.19 1.63 1.61 1.43 1.21 2.81 2.26 2.71 1.84 3.17 1.60 1.21 1.25 1.23 1.02 1.42 1.69 1.54 0.92 2.61 1.56 5 Summary and Conclusion The importance of cities in our society is well founded and it is evident that cities play a crucial role as more than half of world population lives in them. “Rethinking” cities is thus the key component of the world sustainable development paradigm. The first and the most direct way of doing that is by rethinking the way we plan them. In order to become a better planner, one needs to start considering people needs. Not only do people need efficiency, better transportation and green energy, but also do they need a better experience of living in cities enjoying the things that they have interest in and that they find attractive. In this study we thus conducted an analysis of cities through the city attractiveness and derived patterns. The novelty of the study is in the kind of data that was used in it: geotagged photographs from publicly available photograph sharing web sites (e.g., Flickr). Over the last decade big data analyses have being increasingly utilized in urban planning (e.g., analysis of cell phone records for the transportation planning). However, information from geotagged photographs was not very often analyzed although they can provide us with an additional layer of information useful for the urbanism in general. Namely, taken photographs indicate places in cities important enough for people to visit them and to decide to leave their digital trails there. By analyzing the global dataset of geotagged photographs we identified 10 most photographed cities, which happened to be distributed evenly between the US and EU. Focusing on top 10 selected destinations, we studied spatial patterns of visitor attraction versus behavior of the residential users together with analyzing people mobility between those 10 cities and other places all around the world.     15   Although intercity origin/destination fluxes in a rather predictable way depend on the distance between two cities, links between American and European cities are surprisingly asymmetric. Namely, links going from American origins to EU destinations are on average stronger than the ones going in the opposite direction. Another clearly distinctive pattern between EU and American cities is related to the structure of the photographic activity within them. The results showed that in the US cities their residents take most of the photographs while the domestic tourists mostly cover the rest leaving not much for foreigners. The activity that happens in the EU cities is much more diverse showing a higher fraction of touristic and specifically foreign activity. Finally, when investigating the qualitative structure of destinations, again American and EU patterns are surprisingly distinctive – while Americans seem mostly engaged in domestic tourism, the Europeans travel more abroad than within their own home countries. Moreover, we extracted the photographic activity at the local scale comparing attraction patterns for residents, domestic and foreign tourists within a city. Spatial distribution of photographic activity of all those user categories follows the same universal pattern – activity density distributions of all types of users follow log-normal law pretty well while the shapes of the curves for area size vs. activity quintile appear to be strongly consistent. However, the areas covered by tourist activities are always smaller compared to the areas covered by residents with the only exception of Los Angeles where domestic tourist activities cover larger areas compared to city residents. The ratio between areas covered by tourists and city residents is different for domestic and foreign tourists and is always higher for domestic tourists with only exception of Berlin where those factors are almost the same. Once again, we find the activities within American and European cities are different from the quantitative standpoint. First, tourists visiting American cities (with the exception of Chicago) explore them more extensively covering bigger parts of areas of residential activity. More strikingly the variance of the foreign activity density distribution is always higher for all the European cities compared to the residential activity and lower for all the American cities. Finally, we identified the hotspots in each city focusing on the most photographed places of each city. We noted that hotspot attractiveness follows a power-law distribution where the exponent of this distribution serves as an indicator of how focused people’s attention is on the major attractiveness compared to how distributed it is among a number of objectives. For all cities with the exception of Berlin, activity of the tourists and especially foreign tourists appeared to be more concentrated on the major attractions. To conclude, by showing differences between people visiting the US and EU cities our study revealed interesting patterns in human activity. The results of our study are useful for understanding of what has to be enhanced in cities and where it can be appropriate to increase services targeting different categories of users. In past those questions were traditionally answered by analyzing different available datasets such as hotel information or survey data. However, collecting or getting the access to such datasets usually requires significant efforts and/or expenses, while geotagged photography is publicly available while providing a unique global perspective on addressing many research questions at both global and local scale. In future work we will also consider the longitudinal perspective of data analysis by showing how the observed human patterns evolve over time. Acknowledgements The authors wish to thank Ericsson, the MIT SMART Program, the Center for Complex Engineering Systems (CCES) at KACST and MIT CCES program, the National Science Foundation, the MIT Portugal Program, the AT&T Foundation, Audi Volkswagen, BBVA, The Coca Cola Company, Expo 2015, Ferrovial, Liberty Mutual, The Regional Municipality of Wood Buffalo, UBER and all the members of the MIT SENSEable City Lab Consortium for supporting the research. We further thank MIT research support committee via the NEC and Bushbaum research funds, as well as Fulbright. Finally, we would like to thank Eric Fisher for providing the dataset for this research, Alexander Belyi for some help with the visualizations and also Jameson L. Toole, Yingxiang Yang, Lauren Alexander for useful recommendations at the early stage of this work.     References 16   1. Ratti C, Pulselli RM, Williams S, Frenchman D (2006) Mobile landscapes: Using location data from cell-phones for urban analysis. Environment and Planning B: Planning and Design, 33(5):727 – 748. 2. Reades J, Calabrese F, Sevtsuk A, Ratti C (2007) Cellular census: Explorations in urban data collection. Pervasive Computing, IEEE, 6(3), 30-38. 3. González MC, Hidalgo CA, Barabási AL (2008) Understanding individual human mobility patterns. Nature, (453):779–782. 4. Kung KS, Greco K, Sobolevsky S, Ratti C (2014) Exploring Universal Patterns in Human Home- e96180. from Mobile Phone Data. PLoS ONE 9(6): Work doi:10.1371/journal.pone.0096180 Commuting 5. Hoteit S, Secci S, Sobolevsky S, Ratti C, Pujolle G (2014) Estimating human trajectories and hotspots through mobile phone data. Computer Networks, 64: 296-307 6. Reades J, Calabrese F, Sevtsuk A, Ratti C (2007) Cellular census: Explorations in urban data collection. Pervasive Computing, IEEE, 6(3), 30-38. 7. Toole J L, Ulm M, González MC, Bauer D (2012) Inferring land use from mobile phone activity. In Proceedings of the ACM SIGKDD international workshop on urban computing (pp. 1-8). ACM. 8. Grauwin S, Sobolevsky S, Moritz S, Godor I, Ratti C (2014) Towards a comparative science of cities: using mobile traffic records in New York, London and Hong Kong. arXiv:1406.4400. 9. Pei T, Sobolevsky S, Ratti C, Shaw SL, Li T, Zhou C (2014) A new insight into land use classification based on aggregated mobile phone data. International Journal of Geographical Information Science, 28(9) p.1-20. 10. Ratti C, Sobolevsky S, Calabrese F, Andris C, Reades J, Martino M, Claxton R, Strogatz SH (2010) Redrawing the Map of Great Britain from a Network of Human Interaction. PLoS ONE -December 08, 2010 - DOI: 10.1371/journal.pone.0014248. 11. Sobolevsky S, Szell M, Campari R, Couronné T, Smoreda Z, Ratti C (2013) Delineating Geographical Regions with Networks of Human Interactions in an Extensive Set of Countries. PLoS ONE 8(12), e81707 DOI: 10.1371/journal.pone.0081707. 12. Amini A, Kung K, Kang C, Sobolevsky S, Ratti C (2014) The impact of social segregation on Data industrialized regions. EPJ and human developing Science 2014, 3(1):6 doi:10.1140/epjds31. mobility in 13. Furletti B, Gabrielli L, Renso C, Rinzivillo S (2012) Identifying users profiles from mobile calls habits. ACM SIGKDD International Workshop on Urban Computing. 14. Fisher D (2007) Hotmap: Looking at geographic attention. IEEE Trans. Vis. Comput. Graph., 13(6):1184–1191. 15. Houée M, Barbier C (2008) Estimating foreign visitors flows from motorways toll management system. In 9th International Forum on Tourism Statistics. 16. Sobolevsky S et al. (2014) Mining Urban Performance: Scale-Independent Classification of Cities Based on Individual Economic Transactions. ASE BigDataScience 2014 (Stanford, CA), arXiv preprint arXiv:1405.4301   17   17. Sobolevsky S, Sitko I, Tachet des Combes R, Hawelka B, Murillo Arias J, Ratti C (2014) Money on the Move: Big Data of Bank Card Transactions as the New Proxy for Human Mobility Patterns and Regional Delineation. The Case of Residents and Foreign Visitors in Spain. 2014 IEEE International Congress on Big Data (Anchorage, AK) 18. Hawelka B, Sitko I, Beinat E, Sobolevsky S, Kazakopoulos P, Ratti C (2014) "Geo-located Twitter as proxy for global mobility patterns." Cartography and Geographic Information Science 41(3): 260-271. 19. Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. In Nature, (439), 462- 465. 20. Kang C, Sobolevsky S, Liu Y, Ratti C (2013) Exploring human movements in Singapore: A comparative analysis based on mobile phone and taxicab usages. In Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing (p. 1). ACM. 21. Girardin F, Calabrese F, Dal Fiore F, Ratti C, Blat J (2008) Digital footprinting: Uncovering tourists with user-generated content. IEEE Pervasive Computing, 7(4):36–43. 22. Crandall DJ, Backstrom L, Huttenlocher D, Kleinberg J (2009) Mapping the world’s photos. In WWW ’09: Proceedings of the 18th international conference on World wide web, pages 761–770, New York City, NY, USA. ACM. 23. Spirn A (1998) The Language of Landscape. pp. 3-81. 24. Girardin F, Vaccari A, Gerber A, Ratti C (2009) Quantifying urban attractiveness from the distribution and density of digital footprints. Journal of Spatial Data Infrastructures. 25. Sinkiene J, Kromolcas S (2010) Concept, Direction and Practice of City Attractiveness Improvement. Public Policy and Administration. No. 31, pp. 147 – 154. 26. Van den Berg L, Van der Meer J, Otgaar AHJ (2007) The attractive city: catalyst of sustainable urban development. In: P. Ache and P. Lehtovuori (2007), European Urban and Metropolitan Planning. Proceedings of the first Openings. Seminar 12th October 2007 YTK-Espoo, Centre for Urban and Regional Studies Publication C 67, p. 48-63 27. Krzywinski M, Schein J, Birol I, Connors J, Gascoyne R, Horsman D, Jones SJ, Marra MA (2009) “Circos: An Information Aesthetic for Comparative Genomics.” Genome Research 19 (9): 1639– 1645. doi:10.1101/gr.092759.109. 28. Krings G, Calabrese F, Ratti C, Blondel VD (2009) Urban gravity: a model for inter-city telecommunication flows. Journal of Statistical Mechanics: Theory and Experiment, 2009(07), L07003.      
1908.01297
5
1908
2019-12-17T20:48:26
A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models
[ "cs.SI", "cs.CR", "cs.LG", "stat.ML" ]
With the great success of graph embedding model on both academic and industry area, the robustness of graph embedding against adversarial attack inevitably becomes a central problem in graph learning domain. Regardless of the fruitful progress, most of the current works perform the attack in a white-box fashion: they need to access the model predictions and labels to construct their adversarial loss. However, the inaccessibility of model predictions in real systems makes the white-box attack impractical to real graph learning system. This paper promotes current frameworks in a more general and flexible sense -- we demand to attack various kinds of graph embedding model with black-box driven. To this end, we begin by investigating the theoretical connections between graph signal processing and graph embedding models in a principled way and formulate the graph embedding model as a general graph signal process with corresponding graph filter. As such, a generalized adversarial attacker: GF-Attack is constructed by the graph filter and feature matrix. Instead of accessing any knowledge of the target classifiers used in graph embedding, GF-Attack performs the attack only on the graph filter in a black-box attack fashion. To validate the generalization of GF-Attack, we construct the attacker on four popular graph embedding models. Extensive experimental results validate the effectiveness of our attacker on several benchmark datasets. Particularly by using our attack, even small graph perturbations like one-edge flip is able to consistently make a strong attack in performance to different graph embedding models.
cs.SI
cs
A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models Heng Chang∗,1 Yu Rong,2 Tingyang Xu,2 Wenbing Huang,2 Honglei Zhang,2 Peng Cui,3 Wenwu Zhu†,1,3 Junzhou Huang2 1Tsinghua-Berkeley Shenzhen Institute, Tsinghua University, China 3Department of Computer Science and Technology, Tsinghua University, China [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] 2Tencent AI Lab, China 9 1 0 2 c e D 7 1 ] I S . s c [ 5 v 7 9 2 1 0 . 8 0 9 1 : v i X r a Abstract With the great success of graph embedding model on both academic and industry area, the robustness of graph embed- ding against adversarial attack inevitably becomes a central problem in graph learning domain. Regardless of the fruitful progress, most of the current works perform the attack in a white-box fashion: they need to access the model predictions and labels to construct their adversarial loss. However, the inaccessibility of model predictions in real systems makes the white-box attack impractical to real graph learning system. This paper promotes current frameworks in a more general and flexible sense -- we demand to attack various kinds of graph embedding model with black-box driven. To this end, we begin by investigating the theoretical connections between graph signal processing and graph embedding models in a principled way and formulate the graph embedding model as a general graph signal process with corresponding graph filter. As such, a generalized adversarial attacker: GF-Attack is constructed by the graph filter and feature matrix. Instead of accessing any knowledge of the target classifiers used in graph embedding, GF-Attack performs the attack only on the graph filter in a black-box attack fashion. To validate the generaliza- tion of GF-Attack, we construct the attacker on four popular graph embedding models. Extensive experimental results val- idate the effectiveness of our attacker on several benchmark datasets. Particularly by using our attack, even small graph perturbations like one-edge flip is able to consistently make a strong attack in performance to different graph embedding models. Introduction Graph embedding models (Scarselli et al. 2009; Cui et al. 2018), which elaborate the expressive power of deep learning on graph-structure data, have achieved promis- ing success in various domains, such as predicting proper- ties over molecules (Duvenaud et al. 2015), biology analy- sis (Hamilton, Ying, and Leskovec 2017), financial surveil- lance (Paranjape, Benson, and Leskovec 2017) and struc- tural role classification (Tu et al. 2018). Given the increas- ing popularity and success of these methods, a bunch of ∗Work done while interning at Tencent AI Lab. †Wenwu Zhu is the corresponding author. Copyright c(cid:13) 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. recent works have posed the risk of graph embedding mod- els against adversarial attacks, just like what the researchers are anxious for convolutional neural networks (Akhtar and Mian 2018). A strand of research works (Dai et al. 2018; Zugner, Akbarnejad, and Gunnemann 2018; Bojchevski and Gunnemann 2019) have already shown that various kinds of graph embedding methods, including Graph Convolutional Networks, DeepWalk, etc., are vulnerable to adversarial at- tacks. Undoubtedly, the potential attacking risk is rising for modern graph learning systems. For instance, by sophisti- cated constructed social bots and following connections, it's possible to fool the recommendation system equipped with graph embedding models to give wrong recommendations. Regarding the amount of information from both target model and data required for the generation of adversarial examples, all graph adversarial attackers fall into three cate- gories (arranged in an ascending order of difficulties): • White-box Attack (WBA): the attacker can access any information, namely, the training input (e.g., adjacency matrix and feature matrix), the label, the model parameters, the predictions, etc. • Practical White-box Attack (PWA): the attacker can any • Restrict Black-box Attack (RBA): the attacker can only access the training input and limited knowledge of the model. The access of parameters, labels and predictions is prohibited. Despite the fruitful results (Sun et al. 2018; Zugner, Ak- barnejad, and Gunnemann 2018; Zugner and Gunnemann 2019) which absorb ingredients from exiting adversarial methods on convolutional neural networks, obtained in at- tacking graph embeddings under both WBA and PWA setting, however, the target model parameter as well as the labels and predictions are seldom accessible in real-life applications. In the other words, the WBA and PWA attackers are almost impossible to perform a threatening attack to real systems. Meanwhile, current RBA attackers are either reinforcement learning based (Dai et al. 2018), which has low computa- tional efficiency and is limited to edge deletion, or derived merely only from the structure information without consid- ering the feature information (Bojchevski and Gunnemann 2019). Therefore, how to perform the effective adversarial information except the model parameters. Figure 1: The overview of whole attack procedure of GF-Attack. Given target vertices 5 and 7, GF-Attack aims to misclassify them by attacking the graph filter and producing adversarial edges (edge e45 deleted and edge e78 added ) on graph structure. The common graph embedding block refers to the general target GNN model and can be any kind of potential GNN models, illustrating the flexibility and extensibility of GF-Attack. In this vein, GF-Attack would not change the target embedding model. attack toward graph embedding model relying on the train- ing input, a.k.a., RBA setting, is still more challenging yet meaningful in practice. The core task of the adversarial attack on graph embed- ding model is to damage the quality of output embeddings to harm the performance of downstream tasks within the manipulated features or graph structures, i.e., vertex or edge insertion/deletion. Namely, finding the embedding quality measure to evaluate the damage of embedding quality is vital. For the WBA and PWA attackers, they have enough information to construct this quality measure, such as the loss function of the target model. In this vein, the attack can be performed by simply maximize the loss function re- versely, either by gradient ascent (Dai et al. 2018) or a sur- rogate model (Zugner, Akbarnejad, and Gunnemann 2018; Zugner and Gunnemann 2019) given the known labels. How- ever, the RBA attacker can not employ the limited informa- tion to recover the loss function of the target model, even constructing a surrogate model is impossible. In a nutshell, the biggest challenge of the RBA attacker is: how to figure out the goal of the target model barely by the training input. In this paper, we try to understand the graph embedding model from a new perspective and propose an attack frame- work: GF-Attack, which can perform adversarial attack on various kinds of graph embedding models. Specifically, we formulate the graph embedding model as a general graph signal processing with corresponding graph filter which can be computed by the input adjacency matrix. Therefore, we employ the graph filter as well as feature matrix to construct the embedding quality measure as a T -rank approximation problem. In this vein, instead of attacking the loss function, we aim to attack the graph filter of given models. It enables GF-Attack to perform attack in a restrict black-box fashion. Furthermore, by evaluating this T -rank approximation prob- lem, GF-Attack is capable to perform the adversarial attack on any graph embedding models which can be formulate to a general graph signal processing. Meanwhile, we give the quality measure construction for four popular graph embed- ding models (GCN, SGC, DeepWalk, LINE). Figure 1 pro- vides the overview of whole attack procedure of GF-Attack. Empirical results show that our general attacking method is able to effectively propose adversarial attacks to popular unsupervised/semi-supervised graph embedding models on real-world datasets without access to the classifier. Related work For explanation of graph embedding models, (Xu et al. 2018) and (Qiu et al. 2018) show some insights on the under- standing of Graph Convolutional Networks and sampling- based graph embedding, respectively. However, they focus on proposing new graph embedding frameworks in each type of methods rather than building up a theoretical connection. Only recently adversarial attacks on deep learning for graphs have drawn unprecedented attention from researchers. (Dai et al. 2018) exploits a reinforcement learning based framework under RBA setting. However, they restrict their attacks on edge deletions only for node classification, and do not evaluate the transferability. (Zugner, Akbarnejad, and Gunnemann 2018) proposes attacks based on a surrogate model and they can do both edge insertion/deletion in con- trast to (Dai et al. 2018). But their method utilizes additional information from labels, which is under PWA setting. Fur- ther, (Zugner and Gunnemann 2019) utilizes meta-gradients to conduct attacks under black-box setting by assuming the attacker uses a surrogate model same as (Zugner, Akbarnejad, and Gunnemann 2018). Their performance highly depends on the assumption of the surrogate model, and also requires label information. Moreover, they focus on the global attack set- ting. (Xu et al. 2019) also proposes a gradient-based method under WBA setting and overcomes the difficulty brought by discrete graph structure data. (Bojchevski and Gunnemann 2019) considers a different adversarial attack task on vertex embeddings under RBA setting. Inspired by (Qiu et al. 2018), they maximize the loss obtained by DeepWalk with matrix perturbation theory while only consider the information from adjacent matrix. In contrast, we focus on semi-supervised learning on node classification combined with features. Re- markably, despite all above-introduced works except (Dai OriginalPathAttackedPathAttackedPredictionOriginalPredictionOriginalEmbeddingAttackedEmbeddingGraphEmbedding12345678OriginalGraphFilter1=𝜆0>⋯>𝜆𝑛OriginalGraph1243567812345678AttackedGraphFilter1=𝜆′0>⋯>𝜆′𝑛1243567812435678ClassifierGF-Attack et al. 2018) show the existence of transferability in graph embedding methods by experiments, they all lack theoreti- cal analysis on the implicit connection. In this work, for the first time, we theoretically connect different kinds of graph embedding models and propose a general optimization prob- lem from parametric graph signal processing. An effective algorithm is developed afterwards under RBA setting. Preliminary i 2 AD− 1 with dimension l. Dii = (cid:80) (cid:80) j Aij =(cid:80) vol(G) =(cid:80) Let G(V,E) be an attributed graph, where V is a ver- tex set with size n = V and E is an edge set. Denote A ∈ {0, 1}n×n as an adjacent matrix containing informa- tion of edge connections and X ∈ Rn×l as a feature matrix j Aij refers the degree matrix. i Dii denotes the volume of G. For consistency, we denote the perturbed adjacent matrix as A(cid:48) and the normalized adjacent matrix as A = D− 1 2 AD− 1 2 . Symmetric normalized Laplacian and random walk normal- ized Laplacian are referred as Lsym = In − D− 1 2 and Lrw = In − D−1A, respectively. Given a graph embedding model MΘ parameterized by Θ and a graph G(V,E), the adversarial attack on graph aims to perturb the learned vertex representation Z = MΘ(A, X) to damage the performance of the downstream learning tasks. There are three components in graphs that can be attacked as targets: • Attack on V: Add/delete vertices in graphs. This operation • Attack on A: Add/delete edges in graphs. This operation would lead to the changes of entries in the adjacency matrix A. This kind of attack is also known as structural attack. • Attack on X: Modify the attributes attached on vertices. Here, we mainly focus on adversarial attacks on graph struc- ture A, since attacking A is more practical than others in real applications (Tong et al. 2012). may change the dimension of the adjacency matrix A. Adversarial Attack Definition Formally, given a fixed budget β indicating that the attacker is only allowed to modify 2β entries in A (undirected), the adversarial attack on a graph embedding model MΘ can be formulated as (Bojchevski and Gunnemann 2019): Methodologies Graph Signal Processing (GSP) focuses on analyzing and processing data points whose relations are modeled as graph (Shuman et al. 2013; Ortega et al. 2018). Similar to Discrete Signal Processing, these data points can be treated as signals. Thus the definition of graph signal is a mapping from vertex set V to real numbers x : V → R. In this sense, the feature matrix X can be treated as graph signals with l channels. From the perspective of GSP, we can formulate graph embed- ding model M : (A, X) → Rn×d as the generalization of signal processing. Namely, A graph embedding model can be treated as producing the new graph signals according to graph filter H together with feature transformation: X = H (X), X(cid:48) = σ( XΘ), h(x) = (cid:80)L (2) where H denotes a graph signal filter, σ(·) denotes the ac- tivation function of neural networks, and Θ ∈ Rl×l(cid:48) de- notes a convolution filter from l input channels to l(cid:48) output channels. H can be constructed by a polynomial function i=0 aixi ∈ Rn×n with graph-shift filter S, i.e., X = h(S)X. Here, the graph-shift filter S reflects the lo- cality property of graphs, i.e., it represents a linear transfor- mation of the signals of one vertex and its neighbors. It's the basic building blocks to construct H . Some common choices of H include the adjacency matrix A and the Lapla- cian L = D − A. We call this general model Graph Filter At- tack (GF-Attack). GF-Attack introduces the trainable weight matrix Θ to enable stronger expressiveness which can fuse the structural and non-structural information. Embedding Quality Measure L (A(cid:48), Z) of GF-Attack According to (2), in order to avoid accessing the target model parameter Θ, we can construct the restricted black-box attack loss L (A(cid:48), Z) by attacking the graph filter H . Recent works (Yang et al. 2015; Nar et al. 2019) demonstrate that the output embeddings of graph embedding models can have very low- rank property. Since our goal is to damage the quality of output embedding Z, we establish the general optimization problem accordingly as a T -rank approximation problem inspired from (Qiu et al. 2018): L (A(cid:48), Z) arg max A(cid:48) s.t. Z = MΘ(A(cid:48), X), Θ∗ = arg min Θ L(Θ; A(cid:48), X),(cid:107)A(cid:48) − A(cid:107) = 2β, (1) where Z is the embedding output of the model MΘ and L(·,·) is the loss function minimized by Θ. L (A(cid:48), Z) is defined as the loss measuring the attack damage on output embeddings, lower loss corresponds to higher quality. For the WBA, L (A(cid:48), Z) can be defined by the minimization of L(A(cid:48), Z). This is a bi- the target loss, i.e., L (A(cid:48), Z) = inf level optimization problem if we need to re-train the model during attack. Here we consider a more practical scenario: Θ∗ = arg minΘ L(Θ; A, X) are learned on the clean graph and remains unchanged during attack. Θ n(cid:88) λ i X(cid:107)F ≤ n(cid:88) n(cid:88) L (A(cid:48), Z) = (cid:107)h(S(cid:48))X − h(S(cid:48))T X(cid:107)2 F , (3) where h(S(cid:48)) is the polynomial graph filter, S(cid:48) is the graph shift filter constructed from the perturbed adjacency matrix A(cid:48). h(S(cid:48))T is the T -rank approximation of h(S(cid:48)). According to low-rank approximation, L (A(cid:48), Z) can be rewritten as: i=T +1 i=T +1 i=T +1 2 · (cid:48) i λ (cid:107)uT (cid:48) L (A (cid:48) iuiuT , Z) = (cid:107) i X(cid:107)2 2, (4) where n is the number of vertices. h(S(cid:48)) = U ΛU T is the eigen-decomposition of the graph filter h(S(cid:48)). h(S(cid:48)) is a symmetric matrix. Λ = diag(λ1,··· , λn), U = 1 ,··· , uT n ] are the eigenvalue and eigenvector of graph [uT filter H , respectively, in order of λ1 ≥ λ2 ≥ ··· ≥ λn. λ(cid:48) i is the corresponding eigenvalue after perturbation. While n(cid:88) n(cid:88) i=T +1 λiuiuT i X(cid:107) is hard to optimized, from (4), we can compute the upper bound instead of minimizing the loss directly. Accordingly, the goal of adversarial attack is to max- imize the upper bound of the loss reversely. Thus the restrict black-box adversarial attack is equivalent to optimize: λ(cid:48) 2 · arg max A(cid:48) s.t. (cid:107)A(cid:48) − A(cid:107) = 2β. i=T +1 i=T +1 i (cid:107)uT i X(cid:107)2 2, (5) Now our adversarial attack model is a general attacker. Theoretically, we can attack any graph embedding model which can be described by the corresponding graph filter H . Meanwhile, our general attacker provides theoretical explanation on the transferability of adversarial samples created by (Zugner, Akbarnejad, and Gunnemann 2018; Zugner and Gunnemann 2019; Bojchevski and Gunnemann 2019), since modifying edges in adjacent matrix A implicitly perturbs the eigenvalues of graph filters. In the following, we will analyze two kinds of popular graph embedding methods and aim to perform adversarial attack according to (5). GF-Attack on Graph Convolutional Networks Graph Convolution Networks extend the definition of con- volution to the irregular graph structure and learn a repre- sentation vector of a vertex with feature matrix X. Namely, we generalize the Fourier transform to graphs to define the convolution operation: gθ ∗ x = U gθU T x. To accelerate cal- culation, ChebyNet (Defferrard, Bresson, and Vandergheynst k=0 θkΛk and approximated gθ(Λ) by a truncated expansion concern- ing Chebyshev polynomials Tk(x): 2016) proposed a polynomial filter gθ(Λ) = (cid:80)K gθ(cid:48) ∗ x ≈ K(cid:88) kTk((cid:101)L)x, θ(cid:48) k=0 (6) (cid:107)(cid:80)n where(cid:101)L = 2 λmax L − In and λmax is the largest eigenvalue of Laplacian matrix L. θ(cid:48) ∈ RK is now the parameter of Cheby- shev polynomials Tk(x). K denotes the Kth order polyno- mial in Laplacian. Due to the natural connection between Fourier transform and single processing, it's easy to formu- late ChebyNet to GF-Attack: Lemma 1. The K-localized single-layer ChebyNet with ac- tivation function σ(·) and weight matrix Θ is equivalent to filter graph signal X with a polynomial filter H = − In. Tk(S) represents Chebyshev polynomial of order k. Equation (2) can be rewritten as: k=0 Tk(S) with graph-shift filter S = 2 Lsym (cid:80)K λmax X = Tk(2 Lsym λmax − In)X, X(cid:48) = σ( XΘ). tion function σ(·) is σ((cid:80)K and linear and shift-invariant filter H =(cid:80)K Proof. The K-localized single-layer ChebyNet with activa- − In)X). Thus, − In we can directly write graph-shift filter as S = 2 Lsym λmax k=0 Tk(S). kTk(2 Lsym λmax k=0 θ(cid:48) K(cid:88) k=0 j GCN (Kipf and Welling 2017) constructed the layer-wise model by simplifying the ChebyNet with K = 1 and the re-normalization trick to avoid gradient exploding/vanishing: (cid:16) D− 1 where A = A + In and Dii =(cid:80) (7) n } 1 , ..., θ(l) is the parameters in the lth layer and σ(·) is an activation function. , Aij. Θ = {θ(l) 2 X (l)Θ(l)(cid:17) X (l+1) = σ 2 A D− 1 SGC (Wu et al. 2019) further utilized a single linear trans- formation to achieve computationally efficient graph convo- lution, i.e., σ(·) in SGC is a linear activation function. We can formulate the multi-layer SGC as GF-Attack through its theoretical connection to ChebyNet: Corollary 2. The K-layer SGC is equivalent to the K- localized single-layer ChebyNet with Kth order polynomials of the graph-shift filter Ssym = 2In − Lsym. Equation (2) can be rewritten as: X = (2In − Lsym)KX, X(cid:48) = σ( XΘ). Proof. We can write the K-layer SGC as (2In−Lsym)KXΘ. Since Θ is the learned parameters by the neural net- (cid:80)K work, we can employ the reparameterization trick to use k=0 Tk(2In − Lsym) with new (cid:101)Θ. Then we rewrite the (2In − Lsym)K to approximate the same order polynomials K-layer SGC by polynomial expansion as(cid:80)K Lsym)X(cid:101)Θ. Therefore, we can directly write the graph-shift k=0 Tk(2In − filter Ssym = 2In − Lsym with the same linear and shift- invariant filter H as K-localized single-layer ChebyNet. Note that SGC and GCN are identical when K = 1. Even though non-linearity disturbs the explicit expression of graph- shift filter of multi-layer GCN, the spectral analysis from (Wu et al. 2019) demonstrated that both GCN and SGC share similar graph filtering behavior. Thus practically, we extend the general attack loss from multi-layer SGC to multi-layer GCN under non-linear activation functions scenario. Our experiments also validate that the attack model for multi- layer SGC also shows excellent performance on multi-layer GCN. 2 AD− 1 GF-Attack loss for SGC/GCN. As stated in Corollary 2, the graph-shift filter S of SGC/GCN is defined as Ssym = 2In − Lsym = D− 1 2 + In = A + In, where A denotes the normalized adjacent matrix. Thus, for K- layer SGC/GCN, we can decompose the graph filter H as H sym = (Ssym)K = U A(Λ A + In)KU T , where Λ A A and U A are eigen-pairs of A. The corresponding adversarial attack loss for Kth order SGC/GCN can be rewritten as: (λ(cid:48) + 1)2K · (cid:107)uT A(cid:48),i X(cid:107)2 2, (8) A(cid:48),i arg max A(cid:48) where λ(cid:48) turbed normalized adjacent matrix A(cid:48). A(cid:48),i i=T +1 refers to the ith largest eigenvalue of the per- i=T +1 While each time directly calculating λ(cid:48) from at- tacked normalized adjacent matrix A(cid:48) will need an eigen- decomposition operation, which is extremely time consum- ing, eigenvalue perturbation theory is introduced to estimate λ(cid:48) A(cid:48),i in a linear time: A(cid:48),i n(cid:88) n(cid:88) Theorem 3. Let A(cid:48) = A + ∆A be a perturbed version of A by adding/removing edges and ∆D be the respective change in the degree matrix. λ A,i and u A,i are the ith eigen- pair of eigenvalue and eigenvector of A and also solve the generalized eigen-problem Au A,i = λ A,iDu A,i. Then the perturbed generalized eigenvalue λ is approximately as: (cid:48) A,i Theorem 5. LINE is equivalent to filter a graph signal X = b In with a polynomial filter H and fixed parameters Θ = 1 vol(G)D−1. H = S is constructed by graph-shift filter Srw = In − Lrw. Equation (2) can be rewritten as: X = 1 b (In − Lrw)D−1In, X(cid:48) = log(vol(G) X). (cid:16) V(cid:88) V(cid:88) i=1 j=1 λ(cid:48) A(cid:48),i ≈ λ A,i + uT A,i ∆Au A,i − λ A,iuT Du A,i uT A,i A,i ∆Du A,i . (9) Proof. Please kindly refer to (Zhu et al. 2018). lation of λ(cid:48) With Theorem 3, we can directly derive the explicit formu- A(cid:48) perturbed by ∆A on adjacent matrix A. GF-Attack on Sampling-based Graph Embedding Sampling-based graph embedding learns vertex representa- tions according to sampled vertices, vertex sequences, or network motifs. For instance, LINE (Tang et al. 2015) with second order proximity intends to learn two graph represen- tation matrices X(cid:48), Y (cid:48) by maximizing the NEG loss of the skip-gram model: L = Ai,j log σ(x(cid:48)T i y(cid:48) j)+bEj(cid:48)∼PN [log σ(−x(cid:48)T i y(cid:48) j)] i, y(cid:48) (10) where x(cid:48) i are rows of X(cid:48), Y (cid:48) respectively; σ is the sig- moid function; b is the negative sampling parameter; PN denotes the noise distribution generating negative samples. Meanwhile, DeepWalk (Perozzi, Al-Rfou, and Skiena 2014) adopts the similar loss function except that Ai,j is replaced with an indicator function indicating whether vertices vi and vj are sampled in the same sequence within given context window size K. From the perspective of sampling-based graph embed- ding models, the embedded matrix is obtained by gener- ating training corpus for the skip-gram model from adja- cent matrix or a set of random walks. (Yang and Liu 2015; Qiu et al. 2018) show that Point-wise Mutual Information (PMI) matrices are implicitly factorized in sampling-based embedding approaches. It indicates that LINE/DeepWalk can be rewritten into a matrix factorization form: Lemma 4. (Qiu et al. 2018) Given context window size K and number of negative sampling b in skip-gram, the result of DeepWalk in matrix form is equivalent to factorize matrix: (D−1A)k)D−1(cid:17) , (11) (cid:16) vol(G) K(cid:88) j Aij =(cid:80) (cid:80) ( k=1 bK i M = log where vol(G) =(cid:80) i Dii denotes the volume of graph G. And LINE can be viewed as the special case of DeepWalk with K = 1. For proof of Lemma 4, please kindly refer to (Qiu et al. 2018). Inspired by this insight, we prove that LINE can be viewed from a GSP manner as well: (cid:17) , Note that LINE is formulated from an optimized unsuper- vised NEG loss of skip-gram model. Thus, the parameter Θ and value of the NCG loss have been fixed at the optimal point of the model with given graph signals. We can extend Theorem 5 to DeepWalk since LINE is a 1-window special case of DeepWalk: Corollary 6. The output of K-window DeepWalk with b negative samples is equivalent to filtering a set of graph b In with given parameters Θ = vol(G)D−1. K(cid:88) signals X = 1 Equation (2) can be rewritten as: X = ((cid:80)K (In − Lrw)kD−1In, X(cid:48) = log(vol(G) X). Proof of Theorem 5 and Corollary 6. With 4, we can explicitly write DeepWalk as exp (M ) = K (In − Lrw)kD−1In). Therefore, we vol(G) can directly have the explicit expression of Equation (2) on LINE/DeepWalk. Lemma 1 bK k=1 k=1 1 b K 2 AD 1 k=1 Λk A GF-Attack loss for LINE/DeepWalk. As stated in Corol- lary 6, the graph-shift filter S of DeepWalk is defined as Srw = In − Lrw = D−1A = D− 1 2 . Therefore, graph filter H of the K-window DeepWalk can be de- composed as H rw = 1 k=1(Srw)k, which satisfies K H rwD−1 = D− 1 2 U A( 1 Since multiplying D− 1 2 in GF-Attack loss brings extra complexity, (Qiu et al. 2018) provides us a way to well ap- proximate the perturbed λ(cid:48) (cid:80)K (cid:80)K H rwD−1 without this term. Inspired by (Qiu et al. 2018), we can find that both the magnitude of eigenvalues and smallest eigenvalue of H rwD−1 are always well bounded. Thus we can approxi- mate λ(cid:48) . Therefore, the corresponding adversarial attack loss of Kth order DeepWalk can be rewritten as: λ(cid:48) U A( 1 D− 1 2 . (cid:80)K k=1 Λk A )U T A )U T A dmin K H rwD−1 ≈ 1 n(cid:88) 1 λ(cid:48)k A(cid:48),i )2 · (cid:107)uT A(cid:48),i X(cid:107)2 2. arg max A(cid:48) i=T +1 ( dmin 1 K n(cid:88) i=T +1 K(cid:88) k=1 (12) When K = 1, Equation (12) becomes the adversarial attack loss of LINE. Similarly, Theorem 3 is utilized to estimate λ(cid:48) A(cid:48) in the loss of LINE/DeepWalk. The Attack Algorithm Now the general attack loss is established, the goal of our adversarial attack is to misclassify a target vertex t from an attributed graph G(V,E) given a downstream node classifi- cation task. We start by defining the candidate flips then the general attack loss is responsible for scoring the candidates. We first adopt the hierarchical strategy in (Dai et al. 2018) to decompose the single edge selection into two ends of this Algorithm 1 Graph Filter Attack (GF-Attack) adversarial attack algorithm under RBA setting Input: Adjacent Matrix A; feature matrix X; target vertex t; number of top-T smallest singular values/vectors selected T ; order of graph filter K; fixed budget β. Perturbed adjacent Matrix A(cid:48). Output: 1: Initial the candidate flips set as C = {(v, t)v (cid:54)= t}, eigenvalue 2: for (v, t) ∈ C do Approximate Λ(cid:48) A resulting by removing/inserting edge (v, t) 3: via Equation (9); Update Score(v,t) from loss Equation (8) or Equation (12); decomposition of A = U AΛ AU T A ; 4: 5: end for 6: Csel ← edge flips with top-β Score; 7: A(cid:48) ← A ± Csel; 8: return A(cid:48) edge in practice. Then we let the candidate set C for edge selection contains all vertices (edges and non-edges) directly accessary to the target vertex, i.e. C = {(v, t)v (cid:54)= t}, as (Dai et al. 2018; Bojchevski and Gunnemann 2019). Intuitively, further away the vertices from target t, less influence they im- pose on t. Meanwhile, experiments in (Zugner, Akbarnejad, and Gunnemann 2018; Bojchevski and Gunnemann 2019) also showed that they can do significantly more damage com- pared to candidate flips chosen from other parts of graph. Thus, our experiments are restricted on such choices. Overall, for a given target vertex t, we establish the tar- get attack by sequentially calculating the corresponding GF- Attack loss w.r.t graph-shift filter S for each flip in candidate set as scores. Then with a fixed budget β, the adversarial attack is accomplished by selecting flips with top-β scores as perturbations on the adjacent matrix A of clean graph. Details of the GF-Attack adversarial attack algorithm under RBA setting is in Algorithm 1. Experiments Datasets. We evaluate our approach on three real-world datasets: Cora (McCallum et al. 2000), Citeseer and Pubmed (Sen et al. 2008). In all three citation network datasets, ver- tices are documents with corresponding bag-of-words fea- tures and edges are citation links. The data preprocessing settings are closely followed the benchmark setup in (Kipf and Welling 2017). Only the largest connected component (LCC) is considered to be consistent with (Zugner, Ak- barnejad, and Gunnemann 2018). For statistical overview of datasets, please kindly refer to (Zugner, Akbarnejad, and Gunnemann 2018). Code and datasets are available at https://github.com/SwiftieH/GFAttack. Baselines. In current literatures, few of studies strictly follow the restricted black-box attack setting. They utilize the additional information to help construct the attackers, such as labels (Zugner, Akbarnejad, and Gunnemann 2018), gradients (Dai et al. 2018), etc. Hence, we compare four baselines with the proposed at- tacker under RBA setting as follows: • Random (Dai et al. 2018): for each perturbation, randomly choosing insertion or removing of an edge in graph G. We report averages over 10 different seeds to alleviate the influence of randomness. • Degree (Tong et al. 2012): for each perturbation, inserting or removing an edge based on degree centrality, which is equivalent to the sum of degrees in original graph G. • RL-S2V (Dai et al. 2018): a reinforcement learning based attack method, which learns the generalizable attack policy for GCN under RBA scenario. • Aclass (Bojchevski and Gunnemann 2019): a matrix per- turbation theory based black-box attack method designed for DeepWalk. Then Aclass evaluates the targeted attacks on node classification by learning a logistic regression. Target Models. To validate the generalization ability of our proposed attacker, we choose four popular graph embed- ding models: GCN (Kipf and Welling 2017), SGC (Wu et al. 2019), DeepWalk (Perozzi, Al-Rfou, and Skiena 2014) and LINE (Tang et al. 2015) for evaluation. First two of them are Graph Convolutional Networks and the others are sampling-based graph embedding methods. For DeepWalk, the hyperparameters are set to commonly used values: win- dow size as 5, number of negative sampling in skip-gram as 5 and top-128 largest singular values/vectors. A logistic regression classifier is connected to the output embeddings of sampling-based methods for classification. Unless otherwise stated, all Graph Convolutional Networks contain two layers. Attack Configuration. A small budget β is applied to regulate all the attackers. To make this attacking task more challenging, β is set to 1. Specifically, the attacker is limited to only add/delete a single edge given a target vertex t. For our method, we set the parameter T in our general attack model as n−T = 128, which means that we choose the top-T smallest eigenvalues for T -rank approximation in embedding quality measure. Unless otherwise indicated, the order of graph filter in GF-Attack model is set to K = 2. Following the setting in (Zugner, Akbarnejad, and Gunnemann 2018), we split the graph into labeled (20%) and unlabeled vertices (80%). Further, the labeled vertices are splitted into equal parts for training and validation. The labels and classifier is invisible to the attacker due to the RBA setting. The attack performance is evaluated by the decrease of node classification accuracy following (Dai et al. 2018). Attack Performance Evaluation In the section, we evaluate the overall attack performance of different attackers. Attack on Graph Convolutional Networks. Table 1 sum- maries the attack results of different attackers on Graph Con- volutional Networks. Our GF-Attack attacker outperforms other attackers on all datasets and all models. Moreover, GF- Attack performs quite well on 2 layers GCN with nonlinear activation. This implies the generalization ability of our at- tacker on Graph Convolutional Networks. Attack on Sampling-based Graph Embedding. Table 1 also summaries the attack results of different attackers on sampling-based graph embedding models. As expected, our attacker achieves the best performance nearly on all target Cora Citeseer Pubmed Table 1: Summary of the change in classification accuracy (in percent) compared to the clean/original graph. Single edge perturbation under RBA setting. Lower is better. Dataset Models (unattacked) Random Degree RL-S2V Aclass GF-Attack LINE GCN SGC DeepWalk 76.75 -1.84 -12.40 -10.38 -7.55 -13.27 LINE GCN SGC DeepWalk 65.15 -1.78 -12.55 -20.10 -10.28 -22.11 LINE 72.12 -1.01 -13.05 -13.21 -6.75 -14.16 GCN SGC DeepWalk 80.20 -1.90 -2.21 -5.20 -3.62 -7.60 78.82 -1.22 -4.42 -5.62 -2.96 -9.73 77.23 -1.76 -3.08 -5.24 -6.29 -5.31 69.68 -6.62 -9.67 -12.13 -12.56 -12.50 72.50 -2.86 -4.68 -6.50 -3.48 -7.78 78.69 -1.25 -2.43 -6.10 -3.05 -7.43 80.40 -1.75 -3.86 -6.40 -4.21 -7.96 80.21 -1.77 -4.44 -6.11 -2.25 -7.20 69.68 -1.47 -5.21 -4.08 -2.83 -6.19 Figure 2: Comparison between order K of GF-Attack and number of layers in GCN/SGC on Citeseer. Table 2: Running time (s) comparison over all baseline meth- ods on Citeseer. We report the 10 times average running time of processing single node for each model. Models Citeseer Random Degree RL-S2V Aclass GF-Attack 0.19 146.58 222.80 42.21 12.78 models. It validates the effectiveness of our method on at- tacking sampling-based models. Another interesting observation is that the attack perfor- mance on LINE is much better than that on DeepWalk. This result may due to the deterministic structure of LINE, while the random sampling procedure in DeepWalk may help raise the resistance to adversarial attack. Moreover, GF-Attack on all graph filters successfully drop the classification accuracy on both Graph Convolutional Networks and sampling-based models, which again indicates the transferability of our gen- eral model in practice. Evaluation of Multi-layer GCNs To further inspect the transferability of our attacker, we con- duct attack towards multi-layer Graph Convolutional Net- works w.r.t the order of graph filter in GF-Attack model. Figure 2 presents the attacking results on 2, 3, 4 and 5 layers GCN and SGC with different orders, and the number fol- lowed by GF-Attack indicates the graph-shift filter order K in general attack loss. From Figure 2, we can observe that: first, the transferability of our general model is demonstrated, since all graph-shift filters in loss with different order K can perform the effective attack on all models. Interestingly, GF-Attack-5 achieves the best attacking performance in most cases. It implies that the higher order filter contains higher order information and has positive effects on attack to sim- pler models. Second, the attacking performance on SGC is always better than GCN under all settings. We conjecture that the non-linearity between layers in GCN successively adding robustness to GCN. Evaluation under Multi-edge Perturbation Settings In this section, we evaluate the performance of attackers with multi-edge perturbation, i.e. β ≥ 1. The results of multi- edge perturbations on Cora under RBA setting are reported in Figure 3 for demonstration. Clearly, with increasing of the number of perturbed edges, the attacking performance gets better for each attacker. Our attacker outperforms other baselines on all cases. It validates that our general attacker can still perform well when fixed budget β becomes larger. (a) GCN (b) SGC Figure 3: Multiple-edge attack results on Cora under RBA setting. Lower is better. Computational Efficiency Analysis In this section, we empirically evaluate the computational ef- ficiency of our GF-Attack. The running time (s) comparison GCNSGC406080Classification Accuracy (%)2 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)3 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)4 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-5GCNSGC406080Classification Accuracy (%)5 LayersunattackGF-Attack-2GF-Attack-3GF-Attack-4GF-Attack-50123Number of Perturbed Edges607080Accuracy (%)Rand-GCNDegree-GCNRL-S2V-GCNclass-GCNGF-Attack-GCN0123Number of Perturbed Edges607080Accuracy (%)Rand-SGCDegree-SGCRL-S2V-SGCclass-SGCGF-Attack-SGC of 10 times average on Citeseer is demonstrated in Table 2. While being less efficient than two native baselines (Random and Degree), our GF-Attack is much faster than the devel- oped methods RL-S2V and Aclass. Joining the performance in Table 1, it reads that GF-Attack is not only effective in performance but also efficient computationally. Conclusion In this paper, we consider the adversarial attack on different kinds of graph embedding models under restrict black-box attack scenario. From graph signal processing of view, we try to formulate the graph embeddding method as a general graph signal process with corresponding graph filter and con- struct a restricted adversarial attacker which aims to attack the graph filter only by the adjacency matrix and feature ma- trix. Thereby, a general optimization problem is constructed by measuring embedding quality and an effective algorithm is derived accordingly to solve it. Experiments show the vul- nerability of different kinds of graph embedding models to our attack framework. Acknowledgements This work is supported by National Natural Science Foun- dation of China Major Project No. U1611461 and National Program on Key Basic Research Project No. 2015CB352300. We would like to thank the anonymous reviewers for the helpful comments. We also thank Daniel Zugner from Tech- nical University of Munich for the valuable suggestions and discussions. References Akhtar, N., and Mian, A. S. 2018. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6:14410 -- 14430. Bojchevski, A., and Gunnemann, S. 2019. Adversarial at- tacks on node embeddings via graph poisoning. In Interna- tional Conference on Machine Learning, 695 -- 704. Cui, P.; Wang, X.; Pei, J.; and Zhu, W. 2018. A survey on network embedding. IEEE Transactions on Knowledge and Data Engineering 31(5):833 -- 852. Dai, H.; Li, H.; Tian, T.; Huang, X.; Wang, L.; Zhu, J.; and Song, L. 2018. Adversarial attack on graph structured data. international conference on machine learning 1115 -- 1124. Defferrard, M.; Bresson, X.; and Vandergheynst, P. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. neural information processing systems 3844 -- 3852. Duvenaud, D. K.; Maclaurin, D.; Aguilera-Iparraguirre, J.; G´omez-Bombarelli, R.; Hirzel, T.; Aspuru-Guzik, A.; and Adams, R. P. 2015. Convolutional networks on graphs for learning molecular fingerprints. neural information process- ing systems 2224 -- 2232. Hamilton, W. L.; Ying, Z.; and Leskovec, J. 2017. Inductive representation learning on large graphs. neural information processing systems 1024 -- 1034. Kipf, T. N., and Welling, M. 2017. Semi-supervised clas- sification with graph convolutional networks. international conference on learning representations. McCallum, A. K.; Nigam, K.; Rennie, J.; and Seymore, K. 2000. Automating the construction of internet portals with machine learning. Information Retrieval 3(2):127 -- 163. Nar, K.; Ocal, O.; Sastry, S. S.; and Ramchandran, K. 2019. Cross-entropy loss and low-rank features have responsibility for adversarial examples. arXiv preprint arXiv:1901.08360. Ortega, A.; Frossard, P.; Kovacevi´c, J.; Moura, J. M.; and Vandergheynst, P. 2018. Graph signal processing: Overview, challenges, and applications. Proceedings of the IEEE 106(5):808 -- 828. Paranjape, A.; Benson, A. R.; and Leskovec, J. 2017. Motifs In Proceedings of the Tenth ACM in temporal networks. International Conference on Web Search and Data Mining, 601 -- 610. Perozzi, B.; Al-Rfou, R.; and Skiena, S. 2014. Deepwalk: On- line learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, 701 -- 710. ACM. Qiu, J.; Dong, Y.; Ma, H.; Li, J.; Wang, K.; and Tang, J. 2018. Network embedding as matrix factorization: Unifying deepwalk, line, pte, and node2vec. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 459 -- 467. Scarselli, F.; Gori, M.; Tsoi, A. C.; Hagenbuchner, M.; and Monfardini, G. 2009. The graph neural network model. IEEE Transactions on Neural Networks 20(1):61 -- 80. Sen, P.; Namata, G. M.; Bilgic, M.; Getoor, L.; Gallagher, B.; and Eliassi-Rad, T. 2008. Collective classification in network data. Ai Magazine 29(3):93 -- 106. Shuman, D. I.; Narang, S. K.; Frossard, P.; Ortega, A.; and Vandergheynst, P. 2013. The emerging field of signal pro- cessing on graphs: Extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Pro- cessing Magazine 30(3):83 -- 98. Sun, L.; Wang, J.; Yu, P. S.; and Li, B. 2018. Adversarial attack and defense on graph data: A survey. arXiv preprint arXiv:1812.10528. Tang, J.; Qu, M.; Wang, M.; Zhang, M.; Yan, J.; and Mei, Q. 2015. Line: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web, 1067 -- 1077. Tong, H.; Prakash, B. A.; Eliassi-Rad, T.; Faloutsos, M.; and Faloutsos, C. 2012. Gelling, and melting, large graphs by edge manipulation. In Proceedings of the 21st ACM inter- national conference on Information and knowledge manage- ment, 245 -- 254. Tu, K.; Cui, P.; Wang, X.; Yu, P. S.; and Zhu, W. 2018. Deep recursive network embedding with regular equivalence. In Proceedings of the 24th ACM SIGKDD International Confer- ence on Knowledge Discovery & Data Mining, 2357 -- 2366. ACM. Wu, F.; Zhang, T.; Souza Jr., A. H.; Fifty, C.; Yu, T.; and Weinberger, K. Q. 2019. Simplifying graph convolutional networks. In Proceedings of the 36th International Confer- ence on Machine Learning (ICML). Xu, K.; Hu, W.; Leskovec, J.; and Jegelka, S. 2018. How powerful are graph neural networks. arXiv preprint arXiv:1810.00826. Xu, K.; Chen, H.; Liu, S.; Chen, P.-Y.; Weng, T.-W.; Hong, M.; and Lin, X. 2019. Topology attack and defense for graph neural networks: An optimization perspective. arXiv preprint arXiv:1906.04214. Yang, C., and Liu, Z. 2015. Comprehend deepwalk as matrix factorization. arXiv preprint arXiv:1501.00358. Yang, C.; Liu, Z.; Zhao, D.; Sun, M.; and Chang, E. 2015. Network representation learning with rich text information. In Twenty-Fourth International Joint Conference on Artificial Intelligence. Zhu, D.; Cui, P.; Zhang, Z.; Pei, J.; and Zhu, W. 2018. High- order proximity preserved embedding for dynamic networks. IEEE Transactions on Knowledge and Data Engineering 30:2134 -- 2144. Zugner, D.; Akbarnejad, A.; and Gunnemann, S. 2018. Ad- versarial attacks on neural networks for graph data. In Pro- ceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2847 -- 2856. Zugner, D., and Gunnemann, S. 2019. Adversarial attacks on graph neural networks via meta learning. international conference on learning representations.
1909.00440
2
1909
2019-09-19T12:28:39
Can A User Anticipate What Her Followers Want?
[ "cs.SI", "cs.LG", "stat.ML" ]
Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate her followers' preferences and decides which stories to share next to receive more (positive) feedback. Under which conditions can she succeed? In this work, we first look into this problem from a theoretical perspective and then provide a set of practical algorithms to identify and characterize such behavior in social media. More specifically, we address the above problem from the viewpoint of sequential decision making and utility maximization. For a wide variety of utility functions, we first show that, to succeed, a user needs to actively trade off exploitation-- sharing stories which lead to more (positive) feedback--and exploration-- sharing stories to learn about her followers' preferences. However, exploration is not necessary if a user utilizes the feedback her followers provide to other users in addition to the feedback she receives. Then, we develop a utility estimation framework for observation data, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next. Experiments on synthetic data illustrate our theoretical findings and show that our estimation framework is able to accurately recover users' underlying utility functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next.
cs.SI
cs
Can A User Anticipate What Her Followers Want? Abir De, Adish Singla, Utkarsh Upadhyay, and Manuel Gomez-Rodriguez Max Planck Institute for Software Systems, {ade,adishs,utkarshu,manuelgr}@mpi-sws.org Abstract Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate her followers' preferences and decide which stories to share next to receive more (positive) feedback. Under which conditions can she succeed? In this work, we first look into this problem from a theoretical perspective and then provide a set of practical algorithms to identify and characterize such behavior in social media. More specifically, we address the above problem from the perspective of sequential decision making and utility maximization. For a wide variety of utility functions, we first show that, to succeed, a user requires to actively trade off exploitation -- sharing stories which lead to more (positive) feedback -- and exploration -- sharing stories to learn about her followers' preferences. However, exploration is not necessary if a user utilizes the feedback her followers provide to other users in addition to the feedback she receives. Then, we develop a utility estimation framework for observation data, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next. Experiments on synthetic data illustrate our theoretical findings and show that our estimation framework is able to accurately recover users' underlying utility functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next. 1 Introduction Political parties, corporations, celebrities as well as ordinary people use social media to build, reach, and share stories with their own audience. For example, political leaders share details about their activities in hopes of tapping new voters [1], corporations offer insights about their latest products and services with potential customers [16], celebrities give a glimpse of their lavish lifestyle to strengthen their fan base [2], and ordinary people share personal stories with their friends [3]. In all these cases, social media users -- politicians, corporations, celebrities, or ordinary people -- receive feedback from their followers -- their voters, customers, fans, or friends -- by means of likes, comments, or shares. Moreover, this feedback provides hints about the preferences of their followers: it lets the users know what does or does not work, and it influences what they share next, as shown by an increasing number of empirical studies [21, 22, 17, 24, 15, 13, 11, 12, 19, 20]. In this context, it is perhaps surprising that feedback models of posting behavior are largely nonexistent to date. However, such models are of outstanding interest since they would allow us to answer two fundamental questions: (i) Can a user succeed at maximizing the (positive) feedback she receives if, a priori, does not know her followers' preferences? (ii) Can we determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next using observational data? By answering the above questions, we will not only advance our understanding of how feedback may influence a user's posting behavior but will also facilitate the design of more effective algorithms for viral marketing and user personalization. 1 1.1 Overview of our Approach In this paper, we introduce a utility maximization feedback model of posting behavior, which is specially well-fitted to investigate the above questions. More specifically, we assume that each user has an underlying (linear) utility function, which assigns different weights to the feedback the user receives from each of her followers. Moreover, every time the user shares a story with her followers, they provide their feedback according to a set of preferences. If the user knows perfectly her followers' preferences, we can then show that the optimal posting strategy, which maximizes the user's utility function, is deterministic. If the user does not know their preferences, we have the following theoretical results: I. If the user estimates her followers' preferences from the feedback she receives over time, she needs to re- sort to posting strategies that effectively trade-off exploitation -- sharing stories to maximize her utility -- and exploration -- sharing stories to learn about her followers' preferences. More formally, we can show that poste- rior sampling based posting strategies achieve logarithmic regret (i.e., O(log T )) while strategies based on point estimates suffer from linear regret (i.e., Θ(T )) where T denotes the total time steps. II. If the user can, in addition to the feedback she receives, also use the feedback her followers give to other users to estimate her followers' preferences, she is better off using it. More specifically, we can show that posterior sampling based posting strategies achieve constant regret (i.e., O(1)) and, perhaps surprisingly, strategies based on point estimates achieve sublinear regret (i.e., o(T )). In addition to the above theoretical analysis, we also develop a utility estimation framework, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next. Finally, we perform a variety of experiments using both synthetic and real Twitter and Reddit data. Experiments on synthetic data illustrate our theoretical findings and show that our utility estimation framework is able to accurately recover the users' underlying utility functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next. 1.2 Related Work In addition to the empirical studies on how feedback influences user behavior, discussed previously, our work also relates to revealed preference theory, smart broadcasting, and multi-armed bandits. Revealed preference theory. Since the pioneering work by Samuelson [29], reveal preference theory has become a well-established economic theory that analyzes choices made by individuals, particularly to understand consumer behavior. It typically assumes that each consumer decides to buy a bundle of goods, among several alternatives, on the basis of a (concave) nondecreasing utility function [26, 27, 4]. The works most closely related to ours [10, 32, 18, 9, 7] aim to develop efficient algorithms to estimate utility functions from revealed preference data as well as analyze their sample complexity. However, their problem setting is very different from ours: (i) the utility a consumer obtains from buying a bundle of goods is deterministic, however, the feedback a social media user receives from her followers varies randomly and, thus, the utility a user obtains from sharing a story is stochastic; (ii) a consumer can evaluate the utility of a bundle of goods exactly, however, a social media user needs to guess the utility she will obtain from sharing a story on the basis of an estimation of her followers' preferences from the feedback she received in the past; and, (iii) each consumer's decision is independent, however, each social media user's decision is part of a sequential decision making process. Smart broadcasting. In recent years, there has been some work on smart broadcasting [30, 34, 25, 33], which aims to find the times when a user should post to receive more views, likes, comments, or shares from her followers. In smart broadcasting, there is also a user who aims to maximize the impact of the stories she shares, however, the focus is on when to share while our focus is on what to share. In addition, algorithms for smart broadcasting are based on temporal point processes and stochastic optimal control, while we resort to online learning techniques and convex optimization. Multi-armed bandits. The proof techniques used for deriving regret bounds in bandit problems [5, 8, 23, 6] are related to the ones we use to derive the regret bounds in our work. However, there are several key differences: (i) we allow a user to utilize the feedback her followers provide to other users to estimate her followers' preferences, whereas, in a traditional bandit setting, a user could only utilize the feedback she receives on the stories she shares; (ii) 2 our proof techniques allow for users with several followers, in contrast, in a traditional bandit setting, it would only allow for users with one follower. 2 Feedback model of posting behavior In this section, we introduce our feedback model of posting behavior, starting from the problem setting it is designed for. 2.1 Problem Setting Let u be a social media user and N (u) be her set of followers. Then, at each time t ∈ {1, . . . , T}, the user shares a story from a topic ct ∈ C, with C = K, and each of her followers decides whether to give (or not to give) feedback.1 Moreover, for each follower v ∈ N (u), we denote the feedback she gave (or did not give) to user u and, possibly, to any other user in the social media platform2, up to time t − 1 by Hv(t) = {(c, l(c)) the story was posted before t}, where c denotes the topic of the story, l(c) = 1 means that she gave feedback to the story and l(c) = 0 otherwise. We denote the collection of feedback from followers N (u) as H(t) = (Hv(t))v∈N (u). At time t ∈ {1, . . . , T}, we assume that the user u samples the topic c of the story she shares from a categorical distribution ct ∼ p(cH(t)), which may depend on the history of her followers' feedback. Also, given a topic c, each follower v gives feedback with conditional probability pv(l(c) = 1c) = qcv, where we can think of qcv as follower v's preference for topic c. Here, we assume that, in general, followers may differ in their preferences, i.e., qcv (cid:54)= qcv(cid:48) for v (cid:54)= v(cid:48). Moreover, we denote qc = (qcv)v∈N (u) and Q = (qcv)c∈C,v∈N (u). 2.2 Utility Maximization Feedback Model We assume that user u aims to find (and utilize) the categorical distribution p∗(cH(t)) that maximizes a (linear) utility function UTIL(T ), defined as UTIL(T ) = E(cid:88)t∈[T ]  (cid:88)v∈N (u) avlv(ct) + auxct where the expectation is over the topics ct ∼ p∗(cH(t)) of the stories the user shares and the feedback lv(ct) ∼ Bernoulli(qctv). The weights av ≥ 0 model the importance that user u gives to the feedback she receives from follower v, the parameters 0 ≤ xct ≤ 1 encode user u's preference for topic ct, the weight au ≥ 0 models the importance she gives to her own preferences, and we assume that(cid:80)v∈N (u) av + au = 1. In the above utility function, the greater the importance av user u gives to the feedback she receives from a specific follower v, the greater the utility gain she will obtain from posting a story from a topic that follower v prefers. Similarly, the greater the importance au she gives to her own preferences x = (xc)c∈C, the greater the utility gain she will obtain from just posting a story from a topic she prefers. Next, using the linearity of expectation and the law of iterated expectation, we can rewrite Eq. 1 as follows: (1) (2) UTIL(T ) = (cid:88)t∈[T ] (cid:88)v∈N (u) = (cid:88)t∈[T ] (cid:88)v∈N (u) = (cid:88)t∈[T ](cid:88)c∈C Ect∼p∗(cid:2)Elv(ct)ct [avlv(ct) + auxct](cid:3) Ect∼p∗ [avqctv + auxct] p∗(cH(t))(cid:0)a†qc + auxc(cid:1) 1For simplicity, we assume that receiving feedback is always positive, e.g., we assume that receiving a like is always positive. Our formulation can be easily adapted to scenarios with positive and negative feedback, e.g., upvotes and downvotes. 2We will study two scenarios: (i) the user has access only to the feedback she has received; and (ii) the user has access to the feedback she has received as well as the feedback her followers have given to other users. 3 Finally, we can formally state the utility maximization problem user u aims to solve as: where a = (av)v∈N (u) and † denotes the transpose operator. p(cH(t)) (cid:88)t∈[T ](cid:88)c∈C subject to 0 ≤ p(cH(t)) ≤ 1 ∀c ∈ C, p(cH(t))(cid:0)a†qc + auxc(cid:1) maximize (cid:88)c∈C p(cH(t)) = 1, (3) where the followers' preferences Q = (qc)c∈C are generally unknown. 3 Solving the utility maximization problem In this section, we develop an efficient algorithm to solve the utility maximization problem defined by Eq. 3 and study its theoretical guarantees in a variety of settings. 3.1 Known Preferences As a warm up, we first assume that the user u knows her followers' preferences Q. In this setting, it readily follows that the optimal distribution p∗(cH(t)) that maximizes Eq. 3 does not depend on the feedback history and is given by (4) p∗(cH(t)) = p∗(c) = I(cid:20)c = argmax c(cid:48) (cid:0)a†qc(cid:48) + auxc(cid:48))(cid:1)(cid:21) , where I(·) denotes the indicator function. In this case, note that the optimal mechanism for maximizing utility is deterministic (assuming ties over different topics are broken in a predetermined way). 3.2 Unknown Preferences: Exploration Exploitation Trade-off In this section, we consider a more realistic setting where the user u does not know the preferences Q. For this setting, we assume that the user can access historical feedback data to estimate these unknown preferences. When user u does not know her followers' preferences, she needs to trade off exploitation, i.e., maximizing utility, and exploration, i.e., learning about her followers' preferences Q from historical feedback data. To this aim, for every topic c ∈ C and follower v ∈ N (u), we assume a Beta prior over the preference parameter qcv ∼ Beta(α, β). Under this assumption, at each time t, we can use Hv(t) to update the distribution of parameter qcv(t) as: (5) p(qcv(t)Hv(t)) = Beta(α + ncv(t), β + ¯ncv(t)), where ncv(t) = {(c(cid:48), l(c(cid:48))) ∈ Hv(t) l(c(cid:48)) = 1, c(cid:48) = c}, ¯ncv(t) = {(c(cid:48), l(c(cid:48))) ∈ Hv(t) l(c(cid:48)) = 0, c(cid:48) = c}. Then, at the beginning of time t, we can estimate the value of each preference parameter qcv(t) in the following two ways: I. using point estimates, i.e., qcv(t) = argmax p(qcv(t)Hv(t)) = α + ncv(t) − 1 α + β + ncv(t) + ¯ncv(t) − 2 , II. via sampling from posterior, i.e., qcv(t) ∼ p(qcv(t)Hv(t)). 4 (6) (7) Algorithm 1: Utility maximization for unknown preferences 1: Input: Prior parameters α, β. 2: Output: Category {ct}t∈[T ]. 3: for v ∈ N (u) do 4: Hv(t) ← ∅; 5: for t ∈ {1, . . . , T} do 6: 7: 8: 9: 10: 11: 12: ct = argmaxc(cid:48)(cid:0)(cid:80)v∈N (u) av qc(cid:48)v(t) + auxc(cid:48)(cid:1); SHARE(ct); /* Gather feedback from u's followers */ for v ∈ N (u) do Hv(t + 1) ← Hv(t) ∪ GATHERFEEDBACK(v); for c ∈ C do qcv(t + 1) = ESTIMATE(α, β, c,Hv(t + 1)); Given these estimates, we select what to share next using an empirical approximation to Eq. 4, i.e., p(cH(t)) = I(cid:20)c = argmax c(cid:48) (cid:0)a† qc(cid:48)(t) + auxc(cid:48))(cid:1)(cid:21) . (8) where qc(cid:48)(t) = (qc(cid:48)v(t))v∈N (u). Algorithm 1 summarizes the complete procedure. Within the algorithm, SHARE shares a story from a given topic ct, GATHERFEEDBACK gathers the feedback from a follower v, and ESTIMATE returns an estimate of the preferences parameters using either point estimates or posterior samples. 3.3 Unknown Preferences: Analysis In this section, we analyze the theoretical guarantees of Algorithm 1 in terms of regret R(T ), which we define as follows: (9) where UTIL(T ) is the utility achieved by Algorithm 1 and UTIL∗(T ) is the utility achieved by the optimal categorical distribution p∗, given by Eq. 4, under the true preference parameters qcv. Note that an algorithm is called a no-regret algorithm if the regret grows sublinearly (i.e., o(T )) which implies that the algorithm's average performance converges to that of the optimal algorithm. R(T ) = UTIL(T ) − UTIL∗(T ), Note that the utility UTIL(T ) depends on the quality of the estimates qcv(t), which in turn depend on (i) the estimation method (i.e., point estimates vs posterior samples) and (ii) whether each follower's feedback history Hv(t) only contains the feedback the follower gives to user u or it also contains the feedback she gives to others. Next, we study several cases separately. 3.3.1 Point estimates If the user only has access to the feedback she receives from her followers, we have the following negative result (proven in Appendix 8.1): Theorem 1. Assume user u uses point estimates qcv(t) and she can only access the feedback she receives from her followers. Then, Algorithm 1 suffers linear regret Θ(T ). Perhaps surprisingly, Algorithm 1 with point estimates can actually achieve sublinear regret O(√T ) if the user has access to both the feedback her followers give to her as well as to others, as formalized by the following theorem (proven in Appendix 8.2): Theorem 2. Assume user u uses point estimates for the followers' preferences qcv(t) and she can access both the feedback her followers give to her as well as to others. Furthermore, the amount of feedback each of her followers v 5 give to others per topic c follows a Poisson distribution with rate µcv > 0, and let d = α + β. Then, for 2 ≤ d < 3, Algorithm 1 achieves regret and, for d ≥ 3, it achieves: O (cid:88)c∈C,v∈N (u) O (cid:88)c∈C,v∈N (u) 2(cid:112)(d − 2)µcv √T − 1√1 − e−µcv(T−1)  , 2(cid:112)(T − 1)µcvt + d − 3 + √d − 3 T − 1 Here, note that, whenever her followers do not give feedback to others in at least one topic, i.e.,(cid:80)v∈N (u) µcv = 0 for some c ∈ C, Algorithm 1 will suffer linear regret, which is in agreement with Theorem 1. 3.3.2 Posterior samples If the user uses posterior samples, she is better off. In this case, Algorithm 1 achieves sublinear regret independently on whether Hv(t) contains only the feedback she receives or also the feedback her followers give to others. More formally, we have the following Theorem and Corollary (proven in Appendix 8.2): Theorem 3. Assume user u uses posterior samples to estimate the followers' preferences qcv(t), she can access both the feedback her followers give to her as well as to others, and the amount of feedback each of her followers v give to others per topic c follows a Poisson distribution with rate µcv > 0. Then, Algorithm 1 has regret Olog1 + (cid:88)v∈N (u) 1 − exp(−µcvθmT ) µcvθm  , where θm depends on the parameters Q in non-trivial way. Corollary 4. Assume user u uses posterior samples to estimate the followers' preferences qcv(t) and she can only access the feedback she receives from her followers. Then, Algorithm 1 has regret O(log T ). In summary, if user u uses posterior samples instead of point estimates, she can effectively trade off exploitation -- sharing stories for maximizing her utility -- and exploration -- sharing stories to estimate her followers' preferences. Moreover, if she has access to the feedback that her neighbors provide to others, she is better off using it. Such additional information helps her to maximize her utility more effectively in both cases -- posterior samples and point estimates. 4 Utility estimation framework In this section, assume we observe both the stories user u shared at each time t ∈ {1, . . . , T} and the feedback she received from her followers. Then, our goal is to determine whether the user utilizes the feedback she receives from each of her followers to decide what to post next. To this aim, we first find the model parameters that best fit the observed data and then determine its statistical significance using statistical hypothesis testing. 4.1 Parameter estimation To find the weights (av)v∈N (u) and au and parameters (xc)c∈C in Eq. 3 that best fit the observed data, one could resort to maximum likelihood estimation, i.e., maximize log p∗(ctH(t)) a,au,x (cid:88)t∈[T ] subject to au ≥ 0, av ≥ 0 ∀v ∈ N (u) (cid:88)v∈N (u) av + au = 1 0 ≤ xc ≤ 1,∀c ∈ C. 6 (10) where p∗(cH(t)) implicitly depends on (av)v∈N (u) and au since it is the distribution that maximizes the utility function. However, the above maximum likelihood estimation problem faces two serious challenges. First, it is stated in terms of either the optimal distribution p∗(cH(t)) or, in practice, p(cH(t)). However, both distributions concentrate their entire probability mass in one topic. As a consequence, if there exists a time t ∈ {1, . . . , T} in which user u shares a story from a topic that is not the optimal one to choose, the log-likelihood p∗(cH(t)) (or log p(cH(t))) becomes unbounded. Fortunately, we can overcome this undesirable behavior by approximating the distribution p∗(cH(t)) (or p(cH(t))) using a softmax distribution pλ(cH(t)) = (cid:80)c(cid:48)∈C exp(λ(a†qc(t) + auxc)) exp(λ(a†qc(cid:48)(t) + auxc(cid:48))) where λ is a given parameter and qc(t) = qc or qc(t) = qc(t). Second, if the number of feedback events is large, the above maximum likelihood estimation problem is not scalable. To ameliorate this second challenge, in the following, we present a highly efficient heuristic based on linear loss minimization. Our starting point is the following intuition: at each time t ∈ {1, . . . , T}, if user u is sampling the topic of the story she shares from a distribution that is close to p(cH(t)), then the difference between the optimal topic and the observed topic, i.e., (12) max c(cid:48)∈C(cid:0)a†qc(cid:48)(t) + auxju(cid:1) − (a†qct(t) + auxct) should be small. Therefore, our heuristic finds the weights a and au and the parameters x that minimizes this differ- ence over time. In practice, the solution to the above problem depends on whether we assume that the user utilized point estimates or posterior samples for the followers' preferences. Therefore, we proceed in turn. 4.1.1 Point estimates If we assume that the user utilized point estimates qcv(t) for her followers' preferences, then we minimize: (cid:88)t∈[T ] max c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + auxju(cid:1) − (a† qct(t) + auxct) However, the optimization problem is not convex due to the terms auxc and, in its current form, it is difficult to solve efficiently. Fortunately, an invertible nonlinear transformation of the variables transforms it into a convex problem. Let zc = auxc and z = (zc)c∈C. Then, we can rewrite the optimization problem as: (11) (13) c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + zc(cid:48)(cid:1) −(cid:0)a† qct(t) + zct(cid:1)(cid:21) , minimize a,au,z (cid:88)t∈[T ](cid:20)max (cid:88)v∈N (u) subject to au ≥ 0, av ≥ 0 ∀v ∈ N (u) av + au = 1 0 ≤ zc ≤ au,∀c ∈ C. which is a convex problem jointly in a, au, and z using composition rules and the fact that the log-exp function is convex. Once we solve this convex problem, we can recover xc as xc = zc/au. 4.1.2 Posterior samples If we assume that the user utilized posterior samples qcv(t) for her followers' preferences, then, we need to take the average of the objective function with respect to the posterior distributions of the followers' preferences for all topics, since we do not know which sample the user actually took, i.e., the objective function becomes (cid:88)t∈[T ] E q(t),t∈[T ](cid:20)max c(cid:48)∈C(cid:0)a† qc(cid:48)(t) + auxju(cid:1) − (a† qct(t) + auxct )(cid:21) , 7 where qcv(t) ∼ p(qcv(t)Hv(t)) for all c ∈ C and v ∈ N (u). In practice, we just replace the above objective function by the empirical average with respect to the followers' preferences, i.e., (cid:88)t∈[T ] S(cid:88)s=1(cid:20)max c(cid:48)∈C(cid:16)a† q(s) c(cid:48) (t) + zc(cid:48)(cid:17) −(cid:16)a† q(s) ct (t) + zct(cid:17)(cid:21) , where q(s) cv (t) ∼ p(qcv(t)Hv(t)) for all c ∈ C and v ∈ N (u) and S is the number of samples. 4.2 Statistical Hypothesis Testing Given an estimation of the model parameters, we determine their statistical significance using statistical hypothesis testing. More specifically, we proceed as follows. Under the null hypothesis H0, the user does not utilize the feedback she receives from her followers to decide what to post next, i.e., av = 0 for all v ∈ N (u), and, under the alternative hypothesis, the user does utilize it, i.e., av ≥ 0 for all v ∈ N (u). Then, for each user u, we use the log-likelihood ratio (LLR) as a test statistic to measure the statistical power of the feedback data, i.e., LLR(u) = (cid:88)t∈[Tu] log pλ,a≥0(ctH(t)) − (cid:88)t∈[Tu] log pλ,a=0(ctH(t)), where Tu is the total number of posts shared by user u. Finally, we assess the statistical significance of the LLR values using the theoretical distribution of the LLR under the null hypothesis, i.e., χ2 1(N (v) − 1), given by Wilks' theorem [31], where a high value of LLR allows us to reject the null hypothesis with high probability (low p-value). 5 Experiments on synthetic data In this section, we experiment with synthetic data to: (i) illustrate the theoretical properties of Algorithm 1, discussed in Section 3; and (ii) show that our utility estimation framework, discussed in Section 4, can be used to accurately estimate a user's utility from historical data. Experimental setup. We assume that the user u under study has N (u) = 10 followers. Then, we sample her weights av ∼ Dir(γ) and au ∼ Dir(γ) with γ = 0.8, the preferences of her followers qcv ∼ Beta(0.4, 0.6), and her own preferences xc ∼ Beta(0.4, 0.6). The number of topics C = K and rates µcv vary for different experiments and thus are specified therein. Regret analysis. First, we consider the case when u estimates her followers' preferences only on the basis of the feedback her stories receive from her followers. To that aim, we fix µcv = 0 for all c ∈ C and v ∈ N (u), and simulate data from our feedback model of posting behavior for different number of topics C = K. Then, we investigate the variation of the regret over time. Figure 1 summarizes the results which show that: (i) point estimates suffer linear regret whereas, posterior samples achieve logarithmic regret, thereby supporting our theoretical findings in Theorem 1 and Corollary 4; and, (ii) as the number of topics increases, the number of unknown preferences increases, and as a result, the regret increases. Next, we consider the case when u additionally utilizes the feedback her followers give to others. To that aim, we set K = 10, sample µcv ∼ Unif[0, 2¯µ] and simulate our model on user u for different value of ¯µ. Figure 2 summarizes the results which show that: (i) the additional information (i.e., the feedback to others) significantly reduces the regret -- even point estimates achieve a regret of O(√T ), and moreover, posterior samples achieve a constant regret (i.e., O(1)), thereby supporting Theorem 2 and Theorem 3; and, (ii) as ¯µ increases, u estimates their followers' preferences on the basis of a larger amount of feedback and, as a result, the regret decreases. Model estimation. To investigate the performance of our utility estimation framework, we first generate H(T ) by simulating data from our model with K = 10 and sample µcv ∼ Unif[0, 2¯µ]. Then, we train our model using the generated H(T ), for different T and ¯µ values using our two estimation methods from Section 4. Finally, we evaluate the accuracy of model estimation procedures in terms of root mean square error (RMSE) between the estimated and 8 (a) qcv(t) are point estimates (b) qcv(t) are posterior samples Figure 1: Regret analysis when user u only leverages the feedback she receives, i.e., µcv = 0. Panel (a) shows that, if she uses point estimates for her followers' preferences, Algorithm 1 suffers linear regret. Panel (b) shows that, if she uses posterior sampling, it achieves logarithmic regret. In both panels, as the number of topics K increases, the regret increases. (a) qcv(t) are point estimates (b) qcv(t) are posterior samples Figure 2: Regret analysis when user u levegares the feedback she receives as well as the feedback her followers give to others, i.e., µcv > 0. Panel (a) shows that, if she point estimates for her followers' preferences, Algorithm 1 achieves sublinear regret O(√T ). Panel (b) shows that, if she uses posterior sampling, it achieves constant regret O(1). In both panels, as the average rate of feedback to others µcv increases, the regret decreases. true parameters, i.e., RM SE =(cid:112)E(a − a2) + E(au − au2) + E(xu −(cid:98)xu2). Figure 3 summarizes the results the method based on linear loss minimization, which show that, (i) as T increases and we feed more training samples into the estimation procedure, the accuracy increases; (ii) similarly, as ¯µ increases and we feed more feedback into the estimation procedure, the accuracy increases; and, (iii) the estimation accuracy for posterior samples is significantly better than for point estimates; 6 Experiments on real data In this section, we apply our utility estimation algorithms to several real datasets gathered from Twitter and Reddit and then, using the utility estimation framework described in Section 4, show that 53% − 82% of the users in the Twitter datasets and 28%− 43% of the users in the Reddit datasets use the feedback they receive from their followers to decide what to post next. Data description and experimental setup. We collect Twitter and Reddit data for evaluating our utility estimation methods. -- Twitter: We used data gathered from Twitter as reported in previous work [14], which comprises the profiles of 52 million users, 1.9 billion directed follow links among them, and 1.7 billion public tweets posted by these users, where the underlying link information is based on a snapshot taken at the time of data collection, in September 2009. Here, we focused on the tweets published during a two month period, from July 1, 2009 to September 26, 2009, which allows us to consider the set of followers of a user to be approximately static. In our experiments, a follower v provides feedback to a tweet published by a user u ∈ V if she retweets it3 and each topic c ∈ C corresponds to the most common4 hashtag a tweet contains. Moreover, using manual inspection, we 3Since back in 2009, Twitter did not have a retweet button, we consider a Jaccard similarity > 80% between tokens contained in two tweets to decide if the latter is a retweet of former. 4In case a tweet contains more than one hashtag, we consider the hashtag that is more common across our dataset. 9 EHT(R(T))T→T−→K=10K=15K=20K=250.10.20.30.40.510203040503.5EHT(R(T))logT→T−→K=10K=15K=20K=250.51.52.5232040608010001EHT(R(T))√T→T−→¯µ=1¯µ=2¯µ=3¯µ=40.10.20.30.40.50.6102030405003.5EHT(R(T))→T−→¯µ=1¯µ=2¯µ=3¯µ=40.51.52.523102030405001 (a) qcv are point estimates (b) qcv are posterior samples Figure 3: Performance of our utility estimation method based on linear loss minimization in terms of RM SE = (cid:112)E(a − a2) + E(au − au2) + E(xu −(cid:98)xu2) as T increase. The performance is significantly better when- ever the user leverages posterior samples for her followers' preferences. (a) Brazil (b) TOT (c) Iran (d) Leisure Figure 4: Log-likelihood ratio (LLR) values for all users in the three Twitter (first row) and Reddit (second) datasets. The horizontal red line shows the minimum LLR value to achieve statistical significance at p = 10−8. The results indicate that we can reject the hypothesis that users do not utilize the feedback they receive from their followers for 53%, 64% and 82% (28%, 42% and 43%) of the users, respectively for Twitter and Reddit datasets. (e) Sports (f) Learning tracked down the hashtags used in three different themes to create three datasets: -- Brazil: Brazil elections which took place in latter 2010, where C = 4, V = 88 and E[T ] = 166. -- TOT: Top US conservatives and liberals on Twitter, where C = 11, V = 45 and E[T ] = 189. -- Iran: Iran presidential elections in 2009, where C = 5, V = 45 and E[T ] = 395. In each of the above datasets, we filtered out hashtags c that were used less than 500 times and users u who posted less than four tweets with at least two of these hashtags or whose tweets were not retweeted more than four times by at least 2 followers. Moreover, for each of user u ∈ V, we tracked down the five followers who retweeted her tweets more frequently and, for each these followers, we reconstructed the feedback they provided to her and others by collecting all their retweets as well as the tweets posted by all the users they follow. -- Reddit: We used publicly available data gathered from Reddit5, which comprises the profiles of 5 million users and 226 million comments posted by these users in the month of May, 2015. In our experiments, a user v provides feedback to a message published by a user u if she replied to it and each topic c ∈ C corresponds to the subreddit in which a comment was written. Here, we tracked down the subreddits in three different themes to create three datasets: -- Leisure: r/funny, r/pics and r/WTF, where C = 3, V = 3, 540 and E[T ] = 126. -- Sports: r/CFB, r/nba and r/nfl, where C = 3, V = 989 and E[T ] = 309. 5https://archive.org/details/2015 reddit comments corpus 10 0.040.050.060.07RMSE(bababa,bxbxbxu)→T−→¯µ=1¯µ=2¯µ=31204060801000.040.050.060.07T−→¯µ=1¯µ=2¯µ=3120406080100LLR=24.53,p=10−8←−−−−−53%users−−−−−−−→User-ID→LLR→0102030405050607080100150200250300350LLR=35.36,p=10−8←−−−−−−−−64%users−−−−−−−−−→User-ID→LLR→051015202530354045100200300400500600700LLR=21.92,p=10−8←−−−82%users−−−−−−−−−−−−−−−−−−−−→User-ID→LLR→051015202530354045100200300400500600700LLR=21.52,p=10−8←−28%users−→User-ID→LLR→01002003004005005006007001000150020002500300035003538LLR=21.57,p=10−8←−−−42%users−−−→User-ID→LLR→010020030040050060070080090010001200LLR=21.54,p=10−8←−−−43%users−−−−→User-ID→LLR→0500500100010001500150020002000250025003000300035003538 -- Learning: r/AdviceAnimals, r/TodayILearned, r/AskReddit and r/worldnews, where C = 4, V = 3, 505 and E[T ] = 218. In each of the above datasets, we only considered users V who have made at least 20 top-level comments in at least 2 distinct categories c ∈ C. Moreover, for these users u ∈ V, we tracked down the five users who have replied to their comments more frequently and consider them to be the neighbors of u. Finally, for each of these followers, we reconstructed the feedback they provided to u and others by collecting all their replies as well as the comments posted by all their neighbors. Results. We determined whether each user in each of the six datasets utilizes the feedback she receives from each of her followers to decide what to post next using the utility estimation framework described in Section 4. Figure 4 summarizes the results, which show that, at p-value p = 10−8, we can reject the hypothesis that users do not utilize the feedback they receive from their followers for 53%, 64%, 82% of the users in the Twitter datasets and for 28%, 42%, 43% of the users in the Reddit datasets. 7 Conclusions In this paper, we introduced a feedback model of posting behavior in social media. The model allowed us: (i) to investigate under which conditions can a user succeed at maximizing the (positive) feedback she receives; and, (ii) to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next using observational data. Moreover, we performed experiments on synthetic and real data gathered from Twitter and Reddit to illustrate our theoretical findings, show that our estimation methods are able to accurately recover users' underlying utility functions, and provide empirical evidence that 53% − 82% of the users in the Twitter datasets and 28% − 43% of the users in the Reddit datasets use the feedback they receive from their followers to decide what to post next. There are many interesting venues for future work. For example, we have assumed that the followers' preferences are not influenced by the users' posting behavior. It would be interesting to analyze a scenario in which both users and the followers influence each other. We have considered a simple linear utility function, a natural next step would be considering more complex utility functions with higher predictive power. Finally, it would be very interesting to apply our utility estimation methods to real data from other social media platforms, e.g., Facebook. References [1] Efforts to attract the youth vote continue as election day approaches. https://dailyiowan.com/2018/10/09/efforts-to-attract- the-youth-vote-continue-as-election-day-approaches/. Accessed: 2018-10-30. [2] What celebrities can teach companies about social media. https://www.wsj.com/articles/what-celebrities-can-teach- companies-about-social-media-1444788220. Accessed: 2018-10-30. [3] Why do some of your friends get more likes than others? https://www.huffingtonpost.com/simone-collins/why-do-some- of-your-friends-get-likes b 6800102.html. [4] S. N. Afriat. The construction of utility functions from expenditure data. International economic review, 8(1):67 -- 77, 1967. [5] S. Agrawal and N. Goyal. Further optimal regret bounds for thompson sampling. In Artificial Intelligence and Statistics, pages 99 -- 107, 2013. [6] S. Agrawal and N. Goyal. Thompson sampling for contextual bandits with linear payoffs. In International Conference on Machine Learning, pages 127 -- 135, 2013. [7] A. Aprem and V. Krishnamurthy. Utility change point detection in online social media: A revealed preference framework. IEEE Transactions on Signal Processing., 65(7):1869 -- 1880, 2017. [8] P. Auer and R. Ortner. Logarithmic online regret bounds for undiscounted reinforcement learning. In Advances in Neural Information Processing Systems, pages 49 -- 56, 2007. [9] M.-F. Balcan, A. Daniely, R. Mehta, R. Urner, and V. V. Vazirani. Learning economic parameters from revealed preferences. In International Conference on Web and Internet Economics, pages 338 -- 353. Springer, 2014. [10] E. Beigman and R. Vohra. Learning from revealed preference. In Proceedings of the 7th ACM Conference on Electronic Commerce, pages 36 -- 42. ACM, 2006. 11 [11] M. Burke and R. Kraut. Using facebook after losing a job: Differential benefits of strong and weak ties. In Proceedings of the 2013 conference on Computer supported cooperative work, pages 1419 -- 1430. ACM, 2013. [12] M. Burke and R. E. Kraut. Growing closer on facebook: changes in tie strength through social network site use. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 4187 -- 4196. ACM, 2014. [13] M. Burke, C. Marlow, and T. Lento. Social network activity and social well-being. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1909 -- 1912. ACM, 2010. [14] M. Cha, H. Haddadi, F. Benevenuto, P. K. Gummadi, et al. Measuring user influence in twitter: The million follower fallacy. Icwsm, 10(10-17):30, 2010. [15] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. How community feedback shapes user behavior. arXiv preprint arXiv:1405.1429, 2014. [16] L. De Vries, S. Gensler, and P. S. Leeflang. Popularity of brand posts on brand fan pages: An investigation of the effects of social media marketing. Journal of interactive marketing, 26(2):83 -- 91, 2012. [17] U. M. Dholakia, R. P. Bagozzi, and L. K. Pearo. A social influence model of consumer participation in network-and small- group-based virtual communities. International journal of research in marketing, 21(3):241 -- 263, 2004. [18] F. Echenique, D. Golovin, and A. Wierman. A revealed preference approach to computational complexity in economics. In Proceedings of the 12th ACM conference on Electronic commerce, pages 101 -- 110. ACM, 2011. [19] N. B. Ellison, J. Vitak, R. Gray, and C. Lampe. Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes. Journal of Computer-Mediated Communication, 19(4):855 -- 870, 2014. [20] R. Gray, N. B. Ellison, J. Vitak, and C. Lampe. Who wants to know?: question-asking and answering practices among facebook users. In Proceedings of the 2013 conference on Computer supported cooperative work, pages 1213 -- 1224. ACM, 2013. [21] N. Grinberg, P. A. Dow, L. A. Adamic, and M. Naaman. Changes in engagement before and after posting to facebook. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 564 -- 574. ACM, 2016. [22] N. Grinberg, S. Kalyanaraman, L. A. Adamic, and M. Naaman. Understanding feedback expectations on facebook. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pages 726 -- 739. ACM, 2017. [23] T. Jaksch, R. Ortner, and P. Auer. Near-optimal regret bounds for reinforcement learning. Journal of Machine Learning Research, 11(Apr):1563 -- 1600, 2010. [24] A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of facebook. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 1027 -- 1036. ACM, 2008. [25] M. Karimi, E. Tavakoli, M. Farajtabar, L. Song, and M. Gomez-Rodriguez. Smart Broadcasting: Do you want to be seen? In KDD '16: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, 2016. [26] A. Y. Koo. An empirical test of revealed preference theory. Econometrica: Journal of the Econometric Society, pages 646 -- 664, 1963. [27] A. Mas-Colell. The recoverability of consumers' preferences from market demand behavior. Econometrica: Journal of the Econometric Society, pages 1409 -- 1430, 1977. [28] A. Ostrowski. Integral inequalities. In Functional Equations and Inequalities, pages 387 -- 419. Springer, 2010. [29] P. A. Samuelson. Consumption theory in terms of revealed preference. Economica, 15(60):243 -- 253, 1948. [30] N. Spasojevic, Z. Li, A. Rao, and P. Bhattacharyya. When-to-post on social networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015. [31] S. S. Wilks. The large-sample distribution of the likelihood ratio for testing composite hypotheses. The Annals of Mathemat- ical Statistics, 9(1):60 -- 62, 1938. [32] M. Zadimoghaddam and A. Roth. Efficiently learning from revealed preference. In International Workshop on Internet and Network Economics, pages 114 -- 127. Springer, 2012. [33] A. Zarezade, A. De, U. Upadhyay, H. R. Rabiee, and M. Gomez-Rodriguez. Steering social activity: A stochastic optimal control point of view. Journal of Machine Learning Research, 18:205 -- 1, 2017. [34] A. Zarezade, U. Upadhyay, H. Rabiee, and M. Gomez-Rodriguez. Redqueen: An online algorithm for smart broadcasting in social networks. In WSDM '17: Proceedings of the 10th ACM International Conference on Web Search and Data Mining, 2017. 12 8 Appendix 8.1 Proof of Theorem 1 Consider a special case, where the number of topics is K = 2; u has only one follower v with q1v > q2v = 1 2; the weights av = au = 1/2; the user preferences x1u = x2u = q ≥ 0; and the prior parameters α = β = 3. Then, the regret R(T ) is 1 2 (cid:88)t∈[T ](cid:0) max{q1v + q, q2v + q} − (qctv + q)(cid:1) Since, q1v > q2v, we have R(T ) = T2(q1v − q2v)/2, where T2 is the number of stories about topic 2. Now, α = β makes the initial estimates q1v(1) = q2v(1) = 1 2, and therefore, a topic is chosen randomly. Let us assume that topic 2 (the wrong category with minimum utility) is selected and a story from that topic is shared. If v likes this story, which can happen with probability q2v = 1/2, then q2v(2) = (1 + 3 − 1)/(1 + 6 − 2) = 3/5 > q1v(2) = 1/2 and topic 2 is again selected at next time t = 2. At t = 3, q2v(t) again increases (decreases) with probability 1/2 (1/2). Note that, u keeps choosing topic 2 as long as q2v(t) > 1/2 i.e. n2v(t) > ¯n2v(t), and the possibility of selecting topic 1 only arises when n2v(t) = ¯n2v(t). Such a situation can be mapped to an instance of a simple one dimensional random walk, where the walker starts from origin at t = 1, if a story from topic 2 is shared. The walker moves to right (left) if user v does (not) like the story. Now, the expected time of the first return to origin in a simple random walk is infinite. Therefore, once u starts posting the messages with category 2, the expected time that n1v(t) = n2v(t) for the first time t = tfirst → ∞ [?]. Therefore, E(T2) = Θ(T ). More formally, we have: E(T2) > E(T2c1 = 2, lv(1) = 1)P(c1 = 2, lv(1) = 1) = E(T2c1 = 2, lv(1) = 1)P(lv(1) = 1c1 = 2)P(c1 = 2) = E(T2c1 = 2, lv(1) = 1) 1 4 (14) Now, in the random walk setting, E(T2c1 = 2, lv(1) = 1) is the amount of time the walker stays on the positive or right side of the line, and therefore, greater than the time of first return to origin, which is infinite. Therefore, the walker stays on the right side for the entire T , given the first step is taken towards the right side is T . Hence, we have E(T2c1 = 2, lv(1) = 1) = T . hence E(T2) > T /4. 8.2 Proofs of Theorems 2 and 3 Preliminaries. To prove these theorems, we first present few notations which will be used throughout both the proofs. For the sake of brevity, we define (i) qcu := xc; (ii) qcu(t) = xc for all t; (iii) N ∗(u) = N (u) ∪ {u}; (iv) kc(t) as the number of posts made by broadcaster u up to and including time t, that have category c; (iv) Mcv(t) := Ncv(t)− kc(t− 1); (v) Mcv(t) as the number of messages with category c, which u may observe as they are appearing α,β (.) as the c.d.f of Beta distribution with parameters α and β; (vii) the wall of v until and excluding time t; (vi) F Beta n,p(.) as the c.d.f in Binomial distribution with parameters n, p; (viii) fn,p(.) as the probability mass function in F B Binomial distribution function; (ix) ηcv(t) := ncv(t)/Ncv(t); (x) ηi(t) := (cid:80)v∈N (u) av ηcv(t) + auxc; (xi) ηc := (cid:80)v∈N (u) avqcv + auxc; (xii) θc := (cid:80)v∈N (u) av qcv(t) + auxc; (xiii) pc,t := P(θ1(t) > ρc + auxcHt); and (xiv) dKL(a, b) = a log(a/b) + (1 − a) log((1 − a)/(1 − b)), where a, b ∈ [0, 1]. Furthermore, we define ∆Ht(t) :=(cid:88)c∈C(cid:16)(cid:88)v∈N (u) a=(cid:88)c∈C (cid:88)v∈N ∗(u) avqcv + auxc(cid:17)(cid:0)p∗(ctHt) − p(ctHt)(cid:1) avqcv(cid:0)p∗(ctHt) − p(ctHt)(cid:1) (15) 13 Equality a is due to definitions (ii) qcu = xc and (iii) N ∗(u) = N (u) ∪ {u}. So, EHT (∆Ht(t)) = EHtEHT \Ht(∆Ht(t)) = EHt(∆Ht(t)) Hence, EHT (R(T )) = (cid:88)t∈[T ] EHt(∆Ht(t)) Proof of Theorem 2. We have, ∆Ht(t) = max = max + max avqctv av qc(cid:48)v(t) avqcv − max avqcv − (cid:88)v∈N ∗(u) c(cid:48)∈C (cid:88)v∈N ∗(u) av qc(cid:48)v(t) − (cid:88)v∈N ∗(u) c∈C (cid:88)v∈N ∗(u) c∈C (cid:88)v∈N ∗(u) c(cid:48)∈C (cid:88)v∈N ∗(u) c∈C (cid:12)(cid:12)(cid:12) (cid:88)v∈N (u)(cid:0)avqcv − av qcv(t)(cid:1)(cid:12)(cid:12)(cid:12) +(cid:88)v∈N (u)(cid:0)av qctv(t) − avqctv(cid:1) ≤ 2(cid:88)c∈C (cid:88)v∈N (u) qcv − qcv(t) a ≤ max avqctv The inequality a is obtained using (i) the triangle inequality of max norm; (ii) the fact that ct = argmaxc(cid:48)∈C(cid:80)v av qc(cid:48)v(t); and (iii) qcu(t) = qcu, where (iii) reduces the summation over N ∗(u) to N (u). Since, E(X) ≤(cid:112)E(X2), we have EHt (∆Ht(t)) ≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:112)EHt(qcv − qcv(t))2 (16) (17) (18) (19) = 2 (cid:88)c∈C,v∈N (u)(cid:113)ENcv(t)E((qcv − qcv(t))2Ncv(t)) +(cid:16) α + ncv(t) − 1 α + β + Ncv(t) − 2(cid:17)2 α + ncv(t) − 1 α + β + Ncv(t) − 2 (qcv − qcv(t))2 can be written as, q2 cv − 2qcv On expanding, we have E((qcv − qcv(t))2Ncv(t)) to be same as ((α − 1) − qcv(α + β − 2))2 + Ncv(t)qcv(1 − qcv) (α + β + Ncv(t) − 2)2 κ1 κ2 = (α + β + Ncv(t) − 2)2 + α + β + Ncv(t) − 2 where κ1 = ((α − 1) − qcv(α + β − 2))2 − qcv(1 − qcv)(α + β − 2) and κ2 = qcv(1 − qcv). Finally we observe that, (α + β + Ncv(t) − 2)2 ≥ (α + β − 2)(α + β + Ncv(t) − 2). Hence, From Eq. 18, we now have, E((qcv − qcv(t))2Ncv(t)) ≤ κ1/(α + β − 2) + κ2 α + β + Ncv(t) − 2 EHt(∆Ht(t)) ≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:115)ENcv(t) ≤ 2(cid:88)c∈C (cid:88)v∈N (u)(cid:115)EMcv(t) κ1/(α + β − 2) + κ2 α + β + Ncv(t) − 2 κ1/(α + β − 2) + κ2 α + β + Mcv(t) − 2 14 (20) (21) Then we apply Lemma 6 to obtain the required bound. Proof of Theorem 3. To prove this theorem, we leverage the proof techniques of Agarwal et al in [5]. Without loss of generality, we assume that the set of categories C = [K]; c = 1 is the optimum true category with maximum utility. We also denote τm denotes the time step at which a message with optimal category (i.e., category 1) is posted for the m-th time. In this context, we denote, Lc(T ) := 1 dm log(cid:0)1 + (cid:88)v∈N (u) 1 − exp(−µcv(1 − e−dm)T ) µcv(1 − e−dm) (cid:1) Then, we define two numbers σc, ρc so that, ηc < σc + auxc < ρc + auxc < η1 and, 1 − ρc ρc − σc /∈ Q+, where Q+ is set of positive rational numbers. Note that for both σc, ρc, 0 < σc < ρc < 1. We define Eη event that ηcv(t) ≤ σc, and Eθ we have dKL((σcNcv(t) + nα)/(Ncv(t) + nα), ρc) > 0. Hence, we can define cv(t) as the c (t) as the event that θc(t) ≤ ρc + auxc. Note that, since (1 − ρc)/(ρc − σc) /∈ Q+, So, dm = min c,v min N∈N+ dKL((σcN + nα)/(N + nα), ρc) ≥ 0 (24) To prove the theorem, in the first step, we show that the regret is proportional to the sum of number of times a suboptimal category (kc(T ) for c (cid:54)= 1) is posted. Then we decompose this quantity into three suitable quantities and provide individual bounds and then combine them. From, definition (xi), we note that η1 = maxc ηc. Therefore, the expected regret is proportional to the number of times a suboptimal category c (cid:54)= 1 is posted. where we recall that kc(T ) is the number of times a message with category c has been posted up to and including time T . So, kc(T ) =(cid:80)t∈[T ] 1(ct = c). Therefore, we have, EHT (kc(T )) = EHT (R(T )) =(cid:88)c∈C(cid:0)η1 − ηc(cid:1)E(kc(T )) (cid:92) (cid:88) (cid:88) P(cid:0)ct = c, (cid:91) (cid:88) (cid:92) P(cid:0)ct = c, c (t)(cid:1) + P(ct = c) = cv(t), Eθ t∈[T ] t∈[T ] Eη v t∈[T ] c (t)(cid:1) Eη cv(t), Eθ cv(t)(cid:1) Eη v (cid:88) t∈[T ] + P(cid:0)ct = c, v Now, we are going to bound these three sums individually. -- Bounding P(cid:0)ct = c,(cid:84)v Eη cv(t), Eθ a Eη c (t)(cid:1): P(ct = c,(cid:92)v EHt(cid:16) 1 − pc,t E(cid:16) 1 − pc,t (cid:88)t∈[T ] ≤ (cid:88)t∈[T ] ≤ (cid:88)t∈[T ] pc,t pc,t b cv(t), Eθ c (t)) Eη P(ct = 1,(cid:92)v 1(ct = 1)(cid:17) c T(cid:88)m=1 ≤ cv(t), Eθ c (t))Ht)(cid:17) E(cid:16) 1 − pc,τm pc,τm (cid:17) (22) (23) (25) (26) (27) Inequality a comes from Lemma 7. Inequality b comes from the fact that P(ct = 1,•) ≤ P(ct = 1) and in the corresponding expression, the expectation is taken over all sources of randomness. Since, τm denotes the time step at which a message with optimal category (i.e. c = 1) is posted for the m-th time, at times other than t = τm, the m=1 E(cid:16) 1−pc,τm pc,τm (cid:17) indicator term becomes zero, which explains the last inequality c. From Lemma 8, we note that(cid:80)T is T(cid:88)m=1 (cid:88)v∈N (u) O(cid:16)e−∆2 cvm/2 + 1 cvm/4 − 1(cid:17) e∆2 e−Dcvm (m + 1)∆2 cv + 15 which is Θ(1). Next we give bound of the second term in Eq. 26. cv(t), Eθ c (t)). We observe that, -- Bounding(cid:80)t∈[T ] P(ct = c,(cid:84)v Eη b a Eη P(ct = c,(cid:92)v ≤ P(ct = c, Eθ ≤ P(cid:16) (cid:88)v∈N (u) ≤ P(cid:16) (cid:91)v∈N (u) ≤ (cid:88)v∈N (u) ≤ (cid:88)v∈N (u) ≤ (cid:88)v∈N (u) ≤ (cid:88)v∈N (u) F B d e c cv(t), Eθ c (t)) Eη cv(t),Ht) c (t)(cid:12)(cid:12)(cid:92)v av qcv(t) > ρc (cid:92)v∈N (u) {qcv(t) > ρc} (cid:92)v∈N (u) P(qcv(t) > ρcηcv(t) ≤ σc) {ηcv(t) ≤ σc},Ht(cid:17) {ηcv(t) ≤ σc},Ht(cid:17) (1 − F Beta σcNcv(t)+nα+1,(1−σc)Ncv(t)(ρc)) Ncv(t)+nα,ρc (σcNcv(t) + nα) exp(cid:18)−Ncv(t)dKL(cid:16) σcNcv(t) + nα Ncv(t) + nα , ρc(cid:17)(cid:19) (28) Inequality a is due to the following. If qcv(t) < ρc for all v ∈ N (u), then(cid:80)v∈N (u) av qcv(t) <(cid:80)v∈N (u) ρc < ρc. Inequality c is due to the fact that cdf of Beta(α, β) is decreasing w.r.t. α and increasing w.r.t β [5]. Inequality d is due to the relation between Beta distribution with integer parameters and Binomial distributions [5, Fact 3, Appendix A]. Inequality e is due to Chernoff-Holding bound [5, Fact 1, Appendix A]. Then, from Eq. 28, we obtain that, P(ct = c, Eθ c (t)(cid:12)(cid:12)(cid:92)v Eη cv(t),Ht) ≤ (cid:88)v∈N (u) exp(−Ncv(t)dm) (29) Now, we split Ncv(t) = Mcv(t) + kc(t − 1). For time t such that kc(t − 1) ≥ Lc(T ), we use the definition of dm from Eq. 24 to have, P(ct = c, Eθ exp(−dm(Mcv(t) + Lc(T ))) Now consider that ts is the largest time until kc(t − 1) ≤ Lc(T ). Then we have, cv(t), Eθ c (t)) cv(t),Ht) ≤ (cid:88)v∈N (u) Eη Eη c (t)(cid:12)(cid:12)(cid:92)v P(ct = c,(cid:92)v (cid:88)t∈[T ] EHt(cid:16)P(ct = c, Eθ ≤ (cid:88)t∈[T ] ≤ EHt(cid:16) (cid:88)t∈[ts] + EHt(cid:16) T(cid:88)t=ts+1 ≤ E(cid:0) (cid:88)t∈[ts] 1(ct = c)(cid:1) P(ct = c, Eθ P(ct = c, Eθ c (t)(cid:12)(cid:12)(cid:92)v c (t)(cid:12)(cid:12)(cid:92)v c (t)(cid:12)(cid:12)(cid:92)v Eη Eη cv(t),Ht)(cid:17) cv(t),Ht)(cid:17) cv(t),Ht)(cid:17) Eη 16 T(cid:88)t=ts+1 + (cid:88)v∈N (u) ≤ Lc(T ) +(cid:88)v∈N (u)(cid:90) T ≤ Lc(T ) +(cid:88)v∈N (u) Then we have,(cid:80)t∈[T ] P(ct = c,(cid:84)v Eη 0 EMcv(t) exp(−dmMcv(t)) exp(−dmLc(T )) exp(−µcv(1 − e−dm )t)dt exp(−dmLc(T )) 1 − exp(−µcv(1 − e−dm )T ) exp(−dmLc(T )). µcv(1 − e−dm) c (t)) has order cv(t), Eθ Olog(cid:16)1 + (cid:88)v∈N (u) 1 − exp(−µcvθmT ) µcvθm (cid:17) (30) cv(t)). We define tk is the time at which category c is posted kth time. Then, we where, θm = 1 − e−dm. -- Bounding(cid:80)t∈[T ] P(ct = c,(cid:83)v Eη observe that a (cid:88)t∈[T ] P(ct = c,(cid:91)v ≤ 1 + E(cid:2) (cid:88)m∈[T ] ≤ 1 +(cid:88)v (cid:88)m∈[T ] c Eη cv(t)) ≤ E(cid:2) (cid:88)t∈[T ] cv(tm))(cid:3) b 1(∪vEη 1(ct = c)1(∪vEη ≤ 1 +(cid:88)v E(cid:2) (cid:88)m∈[T ] cv(t))(cid:3) cv(tm))(cid:3) 1(Eη exp(−mdKL(σc, qcv)) = O(1) (31) (32) (33) (34) Inequality a holds because the indicator 1(Eη cv(tk)) is only activated when category c posted. Inequality b is due to an union bound and inequality c is due to Chernoff-Hoeffding bounds [5, Fact 1, Appendix A]. Combining Eq. 27, 30, 31, we obtain the required bound. 8.3 Auxilliary lemmas Lemma 5. If the rate of messages in v's feed are exposed to u with Poisson distribution having rate µcv for each category c, and Mcv(t) are total number of such messages for category c, observed until timestep t, then we have 1 Mcv(t) + δ(cid:17) ≤(cid:40) 1−e−µcv (t−1) (t−1)µcvδ 1−e−((t−1)µcv +δ−1) (t−1)µcv+δ−1 E(cid:16) if δ < 1 if δ ≥ 1 Proof: E(cid:16) 1 Mcv(t)+δ(cid:17) can be written as, ∞(cid:88)n=0 =(cid:90) 1 =(cid:90) 1 0 0 1 n + δ ((t − 1)µcv)ne−(t−1)µcv n! (µcv(t − 1)θ)ne−(t−1)µcv n! θδ−1dθ ∞(cid:88)n=0 e−µcv(t−1)(1−θ)θδ−1dθ -- Case δ < 1. In this case, e−µcv(t−1)(1−θ) is increasing and θδ−1 is decreasing. So we apply Chebyschev inequal- ity [28] to have (cid:90) 1 0 e−µcv(t−1)(1−θ)θδ−1dθ ≤(cid:90) 1 0 e−µcv(t−1)(1−θ)dθ(cid:90) 1 0 θδ−1dθ 17 0.4 which provides the required expression. -- Case δ ≥ 1. Since θ ≤ e−(1−θ), δ ≥ 1 implies θδ−1 ≤ e−(1−θ)(δ−1). Hence, the required integral is less than Proof: For δ < 1, we have which gives the required bound. For δ ≥ 1, we have Lemma 6. If Mcv(t) and µcv have the similar meanings as the previous lemma, then we have 1 − e(t−1)µcv+δ−1 (t − 1)µcv + δ − 1 √T−1√1−e−(µcv (T −1)) 2√(T−1)µcv+δ−1+√δ−1 2√µcv∆tδ T−1 if δ < 1 if δ ≥ 1 1 (cid:115) 1 − e−µcv(T−1) (t − 1)µcvδ dt, e−((t−1)µcv+δ−1)(1−θ)dθ = 0 1 (cid:90) 1 Mcv(t) + δ(cid:17) ≤ T(cid:88)t=2(cid:115)E(cid:16) T(cid:88)t=2(cid:115)E(cid:16) Mcv(t) + δ(cid:17) ≤(cid:90) T Mcv(t) + δ(cid:17) ≤(cid:90) T T(cid:88)t=2(cid:115)E(cid:16) = (cid:112)(T − 1)µcv + δ − 1 − √δ − 1 2µcv = 1 1 1 1 (cid:112)µcv(t − 1) + δ − 1 dt T − 1 2(cid:112)(T − 1)µcv + δ − 1 + √δ − 1 P(ct = 1,(cid:92)v c (t))Ht) cv(t), Eθ Eη Lemma 7. [5] If we define pc,t = P(θ1(t) > ρc + auxcHt), then P(ct = c,(cid:92)v Eη cv(t), Eθ c (t))Ht) ≤ 1 − pc,t pc,t (35) (36) Lemma 8. If τj denote the time step at which the optimal category 1 is selected for the j-th time. Then, where, ∆cv = q1v − ycv, Dcv = ycv log(ycv/q1v) + (1 − ycv) log((1 − ycv)/(1 − q1v)), ∆c = minv∈N (u) ∆cv; ycv = q1v(ρc+au(xc−x1)) w∈N (u) awq1w (cid:80) Proof. We leverage the proof of [5, Lemma 4] to prove this lemma Let sv = n1v(τj), Yvj = N1v(τj). cvj/2 + e−Dcvj (j + 1)∆2 cv O(cid:0)e−∆2 E(cid:16) 1 pc,τj(cid:17) = 1 +(cid:88)v∈N (u) . Note that from Eq. 23, ∆cv > 0 ∀v ∈ N (u). ≥ P(cid:0) (cid:92)v∈N (u) pc,τj =P(θ1(τj) > ρc + auxcHτ ) P(q1v(τj) > ycv) a = (cid:89)v∈N (u) + e∆2 1 cvj/4 − 1(cid:1), {q1v(τj) > ycv}(cid:1) Inequality a is because q1v(τj) > ycv for all v implies av q1v(τj) > (cid:88)v∈N (u) avycv = ρc + au(xc − x1), av q1v(τj) + aux1 > ρc + auxc. (cid:88)v∈N (u) so, (cid:88)v∈N (u) (cid:124) θ1(τj ) (cid:123)(cid:122) (cid:125) 18 Now, P(q1v(τj) > ycv) = 1 − F Beta ≥ 1 − F Beta b= F B a sv+α,Yvj−sv+β(ycv) sv+1,Yvj−sv+nβ (ycv), Yvj +nβ ,ycv (sv) Inequality a is due to the fact that F Beta α,β (y) is increasing in β and decreasing in α, and we choose nβ > max(β, 8/∆cv). Equality b holds due to for simple mapping from Beta distribution to Binomial distribution when the parameters for Beta distribution are integers. Then, we have: 1 E(1/pc,τjYvj) = fYvj ,q1v (sv) (cid:89)v∈N (u) Yvj(cid:88)sv=0 (cid:89)v∈N (u) Yvj(cid:88)sv=0 (cid:89)v∈N (u) We denote Sum(0, Yvj) =(cid:80)Yvj , and observe that Sum(0, Yvj) = Sum(0, Yvj + nβ − 1). This is because, fYvj ,q1v (s) = 0 for s > Ncv. We express Sum(0, Yvj + nβ − 1) as the sum of two terms Sum(0,(cid:98)(Yvj + nβ − 1)δ(cid:99)) + Sum((cid:100)(Yvj + nβ − 1)δ(cid:101), Yvj + nβ − 1), where δ = (q1v − ∆cv/2). We note that, fYvj ,q1v (sv) fYvj ,q1v (sv) Yvj +nβ ,ycv Yvj +nβ ,ycv Yvj +nβ ,ycv sv=0 F B (37) (sv) (sv) F B F B (sv) Sum(0,(cid:98)(Yvj + nβ − 1)δ(cid:99)) = (cid:98)(Yvj +nβ−1)δ(cid:99)(cid:88)sv=0 fYvj ,q1v (sv) F B Yvj +nβ ,ycv (sv) a ≤ 1 (1 − q1v)nβ−1 (cid:98)(Yvj +nβ−1)δ(cid:99)(cid:88)sv=0 fYvj +nβ−1,q1v (sv) F B (sv) Yvj +nβ ,ycv b ≤ Θ(e−∆2 ≤Θ(e−∆2 cvj + cv(Yvj +nβ−1) + e−Djvj (j + 1)∆2 cv ) e−Djv(Yvj +nβ−1) ((Yvj + nβ))∆2 cv ) (Since, Njv ≥ j) (38) Inequality a is due the fact that fYvj +nβ−1,q1v (sv) =(cid:18)Yvj + nβ − 1 (cid:19)qsv 1v(1 − q1v)Yvj +nβ−1−sv ≥ (1 − q1v)nβ−1(cid:18)Yvj sv(cid:19)qsv 1v(1 − q1v)Yvj−sv . Inequality b is obtained by leveraging the proof of Lemma 4 in Agarwal et al in [5]. Now we bound Sum((cid:100)(Yvj +nβ− 1)δ(cid:101), Yvj). Using the proof of Lemma 4 in Agarwal et al in [5], we have, F B cv(Yvj +nβ−1)/4 for sv ≥ (cid:100)(Yvj + nβ − 1)δ(cid:101). Then, we have (sv) > 1 − e−∆2 Yvj +nβ ,ycv sv Sum((cid:100)(Yvj + nβ − 1)δ(cid:101), Yvj + nβ − 1) fYvj ,q1v (sv) F B Yvj +nβ ,ycv (sv) = Yvj +nβ−1(cid:88)sv=(cid:100)(Yvj +nβ−1)δ(cid:101) ≤ 1/(1 − e−∆2 1 = 1 + e∆2 cvj/4 − 1 19 cv(Yvj +nβ−1)/4) ≤ 1/(1 − e−∆2 cvj/4) (39) Adding, Eq. 38 and 39, and then substituting back to Eq. 37, we observe that, E(1/pc,τj ) equals to (cid:89)v∈N (u)(cid:18)1 + Θ(cid:0)e−∆2 ≤ 1 +(cid:88)v∈N (u) O(cid:0)e−∆2 cvj/2 + cvj/2 + e−Dcvj (j + 1)∆2 cv e−Dcvj (j + 1)∆2 cv + + 1 cvj/4 − 1(cid:19) cvj/4 − 1(cid:1), 1 e∆2 e∆2 The last inequality follows by taking only the dominating term. 20
1512.07831
2
1512
2016-02-20T14:46:39
The Lifecycle and Cascade of WeChat Social Messaging Groups
[ "cs.SI" ]
Social instant messaging services are emerging as a transformative form with which people connect, communicate with friends in their daily life - they catalyze the formation of social groups, and they bring people stronger sense of community and connection. However, research community still knows little about the formation and evolution of groups in the context of social messaging - their lifecycles, the change in their underlying structures over time, and the diffusion processes by which they develop new members. In this paper, we analyze the daily usage logs from WeChat group messaging platform - the largest standalone messaging communication service in China - with the goal of understanding the processes by which social messaging groups come together, grow new members, and evolve over time. Specifically, we discover a strong dichotomy among groups in terms of their lifecycle, and develop a separability model by taking into account a broad range of group-level features, showing that long-term and short-term groups are inherently distinct. We also found that the lifecycle of messaging groups is largely dependent on their social roles and functions in users' daily social experiences and specific purposes. Given the strong separability between the long-term and short-term groups, we further address the problem concerning the early prediction of successful communities. In addition to modeling the growth and evolution from group-level perspective, we investigate the individual-level attributes of group members and study the diffusion process by which groups gain new members. By considering members' historical engagement behavior as well as the local social network structure that they embedded in, we develop a membership cascade model and demonstrate the effectiveness by achieving AUC of 95.31% in predicting inviter, and an AUC of 98.66% in predicting invitee.
cs.SI
cs
The Lifecycle and Cascade of WeChat Social Messaging Groups Jiezhong Qiu†, Yixuan Li♯, Jie Tang†, Zheng Lu‡, Hao Ye‡, Bo Chen‡, Qiang Yang⋆, and John E. Hopcroft♯ †Department of Computer Science and Technology, Tsinghua University ♯Department of Computer Science, Cornell University ‡Tencent Corporation, Shenzhen, China ⋆Department of Computer Science, Hong Kong University of Science and Technology [email protected], {yli,jeh}@cs.cornell.edu, [email protected] ABSTRACT Social instant messaging services are emerging as a transformative form with which people connect, communicate with friends in their daily life - they catalyze the formation of social groups, and they bring people stronger sense of community and connection. How- ever, research community still knows little about the formation and evolution of groups in the context of social messaging - their life- cycles, the change in their underlying structures over time, and the diffusion processes by which they develop new members. In this paper, we analyze the daily usage logs from WeChat group messaging platform - the largest standalone messaging communication service in China - with the goal of understanding the processes by which social messaging groups come together, grow new members, and evolve over time. Specifically, we dis- cover a strong dichotomy among groups in terms of their lifecycle, and develop a separability model by taking into account a broad range of group-level features, showing that long-term and short- term groups are inherently distinct. We also found that the lifecycle of messaging groups is largely dependent on their social roles and functions in users' daily social experiences and specific purposes. Given the strong separability between the long-term and short-term groups, we further address the problem concerning the early pre- diction of successful communities. In addition to modeling the growth and evolution from group- level perspective, we investigate the individual-level attributes of group members and study the diffusion process by which groups gain new members. By considering members' historical engage- ment behavior as well as the local social network structure that they embedded in, we develop a membership cascade model and demonstrate the effectiveness by achieving AUC of 95.31% in pre- dicting inviter, and an AUC of 98.66% in predicting invitee. Keywords social messaging; online community; group formation; information diffusion Copyright is held by the International World Wide Web Conference Com- mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the author's site if the Material is used in electronic media. WWW '16, April 11-15, 2016, Montréal, Québec, Canada. ACM 978-1-4503-4143-1/16/04. http://dx.doi.org/10.1145/2872427.2882979. 1. INTRODUCTION The advent and proliferation of social instant messaging services have been shaping and transforming the way people connect, com- municate with individuals or groups of friends, bringing users di- verse and ubiquitous social experiences that traditional text-based short message service (SMS) could not. For example, WhatsApp is the most globally popular messaging service with more than 900 million monthly active users (MAUs), WeChat, the largest messag- ing service in China, has more than 600 million MAUs. These tools have enriched the way people interact by including images, video, location information, audio and text messages. More importantly, they have also catalyzed the formation of social groups, bringing people a stronger sense of community and connection compared with traditional text messaging [12]. While past work has extensively studied the dynamics of group formation and evolution, much of the work is limited to the setting of online communities embedded within the social networking sites - which is inherently different from groups seen in the context of social messaging. Previous study [12] has shown that, for most so- cial messaging tools adopters, the creation and use of instant group messaging occurs more frequently and habitually than other form of group-level social engagement in their daily life. In terms of life- cycle, social messaging groups have a relatively shorter life span - ranging from several hours to months - as opposed to those on- line groups seen in social networking sites such as Reddit [8] and Facebook [29] that can sustain up to years. Furthermore, all the chat groups are by default only visible to the group members and grow in an invitation-only fashion, i.e., new members invited to the group are guaranteed to be on the fringe of group networks (one- hop neighbors of current group members) - thus the membership cascade process is more locally dependent, with unidirectional con- tagion dominated mostly by the existing group members. This is very dissimilar from the diffusion and growing models in previous literature on online communities (e.g., [6, 28]), in which users can make their own decisions to join, even if they are not friends with any of the current group members. Researchers have recently begun interpreting the group messag- ing behavior and processes from a social science perspective, yet concrete empirical measurement and statements cannot be drawn from existing literature. Much of the challenge has been the lack of appropriate datasets - one needs a large collection of messaging groups with sufficient time-resolution so that one can keep track of their emergence, growth and demise over time. Another challenge comes from devising an effective model to depict and quantify the diversified, complex processes by which the groups develop over time. As a result, the research community still knows very little about the formation and evolution of chat groups in the context of social messaging - their lifecycles, the change in their underly- ing structures over time, and the cascade processes by which they develop new members. To address these issues, in this paper, we analyze the daily usage logs from the WeChat 1 group messaging platform - the largest standalone messaging communication service developed by Ten- cent in China [2] - with the goal of understanding the processes by which social messaging groups come together, grow new mem- bers, and evolve over time. To our knowledge, this is so far the first large-scale analysis on messaging group dynamics. WeChat allows users to send and receive multimedia messages in real-time via Internet. One important feature in WeChat is that any user can create a new group and invite friends to join this group. Please note that such group is invited only, which means that the other users (friends) cannot apply to join if no invitation comes from the group. Groups play a very important role in WeChat. Our statistics show that roughly 25% of the messages in WeChat were generated in group conversations. On the other hand, the groups are very dy- namic. Every day, about 2,300,000 new groups were created and about 40% of the newly created groups become silent within only one week. We will describe detailed information about the WeChat dataset along with its mechanics in Section 3. The Present Work: Lifecycle Dichotomy in Social Messaging Groups. In this paper, we contribute to research on group evolu- tion in social messaging platforms by observing and making a con- ceptual difference between two types of groups in terms of their lifecycle: long-term and short-term groups. Our empirical analysis shows that almost 40% of them stop interaction within one week. On the other hand, we also observe 30% of the groups can survive a much longer period of time (≥ 30 days). The strong lifecycle dichotomy of chat groups leads us to a natural lifecycle modeling and prediction questions - how separable are the long-term and short-term groups by taking into account the structural and social behavioral features? To address this issue, we develop a separabil- ity model by studying snapshots of millions of groups, and show the strong distinction between long-term and short-term groups - measured with a broad range of features including the underlying group network structure, the membership cascade tree properties (e.g. tree size and depth), and the demographics entropy of group members such as gender, age and region. We also discuss the phenomena of lifecycle dichotomy from the perspective of the roles and functions that social messaging plat- forms have in users' daily social experiences. This leads to the question of how does the lifecycle and growth pattern of social messaging groups correlate with the social functions it is serving? It turns out that messaging groups have been commonly adopted as a convenient way of connecting with smaller communities all at once, e.g., a family group, a colleague's group, a classmate's group, as well as groups for social events [12]. And the lifecycle of mes- saging groups is largely dependent on it social purpose for being setup - for instance, one may expect that event-driven groups will have a higher chance of dying out than friend groups for frequent catching-up. Furthermore, given the strong separability between the long-term and short-term groups, a fundamental problem concerning the de- sign of successful communities is: Can we predict whether a social group will grow and persist in the long run by analyzing the struc- tural and behavioral patterns exhibited by the group at its early stage? We phrase it as a problem of early prediction in group longevity. Through the lens of various features exhibited by a 1www.wechat.com/en/ group, we demonstrate that strong prediction results can be ob- tained even with a group history of one day. The Present Work: Group Membership Cascade and Pre- diction. In addition to modeling the growth and evolution from a group-level perspective, we take one step further and investigate the individual-level attributes of group members and study the cascade process by which groups gain new members. Specifically, given the historical behavior of group users as well as the local social structure, can we predict which users in the group are more likely to be active and invite new users to the group chat and to whom will he/she send invitations to? Making sense of such questions requires fine-grained inspection into users' historical engagement behavior as well as the local social network structure that users embedded in. To this end, we develop a membership cascade process model in which we consider features of both inviter - a group member who sends invitation to friend(s), and invitee - the individual in the inviter's ego networks who gets invited to the group chat. Our inviter prediction model using all features generally achieves AUC as high as 95.31%, and invitee prediction model reaches AUC of 98.66%. Furthermore, we also attempt to analyze: how does the added new members in return lead to the change of underlying social net- work structure, as the group evolves over time? To address this issue, we take snapshots and compare the same set of sample group at the timestamp of setup and after a month, respectively. Inter- estingly, we observe that although both long-term and short-term groups have increment on features such as close triads, long-term groups have shown to increase the close triads more significantly. Organization. The remainder of the paper is organized as follows. Section 2 describes related work on analyzing group formation and evolution. In Section 3, we introduce the WeChat social messaging group dataset. The discussion on group lifecycle dichotomy as well as early prediction model is provided in Section 4. The membership cascade process is investigated in Section 5. Finally we conclude our work in Section 6. 2. RELATED WORK The study of groups and communities is central to many research problems on mining and analytics of sociological data. There have been two major lines of research in this domain: one focuses on the static snapshots of social graphs and seeks to infer and identify tightly-connected group of members - also known as community detection in literature [15, 19, 26, 27, 33]; another line of research focusing on the group dynamics - the growth and evolution of so- cial groups - is more related to our work here. Below we highlight a few and exlpain how ours contribute to the existing research. Group Dynamics. To understand the process of how social groups form and evolve over time, previous work has extensively investi- gated the growth and longevity of various forms of online commu- nities such as Facebook apps [21], game communities [13], knowl- edge sharing communities [37] and social networks communities [6, 9, 20, 28, 33]. A more generalized work of Riberiro [30] inves- tigates the group growth dynamics by encompassing a broad range of 22 membership-based websites. Our work focuses on studying the group dynamics of a rather understudied realm - the social messaging services. Although re- searchers have recently begun interpreting the group messaging be- havior from a social science perspective (e.g., [12]), research com- munity still knows little about the formation and evolution of social messaging groups with concrete and empirical measurement. Fo- cusing on the Yahoo! instant messaging traffic data, Aral et al. [5] considers the individual-level dynamics from the perspective of peer influence and homophily, yet it is unclear how the groups as a whole evolve over time - their lifecycles, their structural dynamics etc. Our work contributes to the current research by discovering a strong dichotomy among social messaging groups in terms of their lifecycle. By taking into account a broad range of group-level struc- tural and behavioral features, we develop a separability model that distinguishes between long-term groups and short-terms groups, as well as an early prediction model that forecasts the longevity of groups. Cascades. The second half our of work on group membership cas- cade prediction builds on previous literature that studies diffusion processes [17]. In recent years, scientiests have been able to ob- serve and quantify large-scale diffusions from the richness of on- line data, including blog space [3, 25], marketing [24], social sites such as LinkedIn [4], Flickr [10], Twitter [16, 23, 31], Facebook [7, 11, 21, 32], LiveJournal [6]. In work that aligns more closely to our focus on social messaging, Aral et al. [5] have looked into the effects of peer-influence and homophily during the diffusion processes. Our work has a more comprehensive scope than [5] by integrating both individual-level and group-level features into our cascade prediction model. The membership cascade process in the context of social mes- saging groups differs from previous work in two folds. First, in terms of cascade size, in contrast to previous findings on the struc- tural virality in global-scale cascades [4, 16, 35], we observe a relatively smaller scale of cascade in message groups and find a siginificant fraction of short-term group memerbship cascades ter- minate at the depth of 2 or 3. Such difference is caused by the social messaging group nature of maintaining a compact commu- nity size than going "viral" [36]. Second, due to mechanics spe- cific to application, the cascade process we consider here is locally dependent, with unidirectional contagion dominated mostly by the existing group members. In WeChat, all the groups are by default only visible to group members and grow in a invitation-only fash- ion. Only the one-hop neighbors of current group members can be invited to the group chat. And this is very dissimilar to the diffusion models in previous work by Backstrom et al. [6] which assumes that users can make their own decision to join based on the group influence, even if they are not friends with any of the current group members. 3. DATA Preliminaries. Before describing the details of the dataset, we first give a brief overview about WeChat's Group Chat feature that is central to our study here. While WeChat supports many other important features including Moments for photo sharing, Friend Radar for searching nearby friends and Sticker Gallery, it is impor- tant to note that those are beyond the scope of our research focus in this paper. On WeChat, each user keeps a brief profile, including demo- graphical information (e.g., gender, age and region) and address book which saves the contact list of user's friends. We use the tuple (u, v, T ) to denote a friend relationship record if user u becomes friend with user v at timestamp T . A chat group on WeChat can be analogy to a community, where one can chat with several friends all at once. There are two ways in which a user can involve in a chat group: one can either initi- ate a new chat group, or get invited by an existing member of the group. Figure 1 illustrates an example of the WeChat user inter- face of inviting friends to group chat. We consider (u, v, C, T ) as (a) WeChat group membership (b) Membership invitation Figure 1: The WeChat user interaface (UI) of inviting friends to group chat. (a) Group membership UI displays the current users in the group, along with attributes and basic settings for the group such as group name, group capacity etc. Group mem- bers can tap the "+" button to invite friends into the group chat. (b) The UI of inviting friends to the group chat. Users can browse and select contacts to add, and click "OK" to send invitations. When group size is under the capacity 40, invited users will be automatically added into the current group chat without requiring further confirmation. However, under the circumstances that group size exceeds the capacity limit, in- vited users will have to manually click through the invitation message in order to join the group. The largest WeChat group can have as many as 500 members by default. Sourced from WeChat official feature site [1]. a successful invitation if user v joins group C invited by user u at timestamp T . After being a member of a chat group, one can send various forms of messages (e.g., text, photo and voice) to the entire group. We use the tuple (u, C, T ) to denote the a group chat record if user u send a message to group C at timestamp T . Data Collection and Cleaning. The data for this study comes from anonymized logs of complete WeChat group messaging ac- tivities, collected between July 26th, 2015 to August 28, 2015. We first collect all the 2.3 million groups generated on July 26th, 2015, as our group set of interest. We preprocess the data by ignoring groups with less then 5 chat logs- i.e., we only consider groups that are not born to be dead; and also filtering groups with users that are in list of monthly spam users (MSU) or monthly inactive users (MIU). The list is maintained and updated by WeChat on a monthly basis. All the initial groups in consideration consist of at least three members. Data Description. After preprocessing the initial group set, we are left with 474,726 groups for further analysis. We then collect four datasets of interest listed below. Tabel 1 summarizes statistics of the dataset used for this study. • Group Activity Records G: It consists of all the tempo- ral group activity records (u, C, T ) for each of the sampled group, with T running between July 26th, 2015 to August 28, 2015. • User Set U: It consists of all the members belonging to the sampled groups as well as their one-hop neighbors, as of Au- gust 28, 2015. Note that we further remove users in the list of MSU or MIU from the user set. • Invitation Records I: It consists of tuples (u, v, C, T ) where user u successfully invites v to join group C at times- tamp T during our data collection period. • Friendship Records F: It consists of all the tuples (u, v, T ) where u and v (u, v ∈ U) become friends with each other at time T . The friend relationships in WeChat are undirected, and we have both (u, v, T ) ∈ F and (v, u, T ) ∈ F. Table 1: Summary of data set. Category Group User Invitation Friendship Type Total Min group size Max group size Total Total Total Number 474,726 3 500 245,352,140 2,013,351 624,529,005 4. GROUP LIFECYCLE DICHOTOMY One question that we brought up previously is how social mes- saging groups grow and evolve over time - their lifecycles and their structural dynamics. As a high-level characteristic, social messaging groups can have a relatively shorter lifespan - rang- ing from several hours to months - as opposed to those online groups seen in social networking sites such as Reddit [8] and Face- book [29] that can sustain up to years. In this section, we start with discussing the phenomena of lifecycle dichotomy we observe from the group activity temporal data. To do this, we define the lifespan of a social messaging group below. Definition 1. Group Lifespan. We define it by the duration from the timestamp at which a group is initialized, to the times- tamp at which no group member sends chat messages anymore. 100 10-1 n o i t c a r F 10-2 0 5 15 10 25 Group Lifespan(day) 20 (a) Histogram F D C 1.0 0.8 0.6 0.4 0.2 0.0 30 0 5 20 15 10 25 Group Lifespan(day) (b) CDF 30 Figure 2: Group Lifecycle Dichotomy. Left: Histogram of group lifespan (measured by day); Right: Cumulative distri- bution function (CDF) of group lifespan. We begin by analyzing the distribution of lifespan among all the 474,726 group samples. Since we stop our data collection on the day of August 28, 2015, the longest lifespan a group can have is 34 days during the period of our observation. Figure 2(a) and Fig- ure 2(b) display the distribution and Cumulative distribution func- tion (CDF) of group lifespan respectively. A salient observation drawn from the result is that the histogram of group lifespan is dominated by two peaks: one appears on the leftest (near a few hours) and another appears on the rightest side (near one month). This implies a strong dichotomy exists among groups in terms of their lifecycle, and we accordingly make a conceptual difference between two types of groups: • Short-term groups: this type of groups emerge and die very quickly, and usually have lifespan ranging from hours to a few days. For example, Figure 2(b) shows that almost 40% of groups stop interaction within only a week. • Long-term groups: this type of groups can survive a much longer period of time than short-term groups. Figure 2(b) shows that about 30% groups fall into this category and can sustain longer than 30 days. The phenomena of lifecycle dichotomy also leads us to the question of how does the lifecycle and growth pattern of social messaging groups correlate with the social functions it is serv- ing? To address this, we manually examine 100 randomly selected groups, among which 60 are long-term groups and 40 are short- term groups, respectively. We categorize these groups according to their social functions (the title of groups) by hand, and list the details in Table 2. Quite interestingly, we find that most short- term groups are event-driven (e.g., travel groups, meeting groups and dining groups), while long-term groups are more relationship- driven (e.g., family groups, colleague groups and friend groups). Table 2: Case study by group displayed name. Category Travel Meeting Event Entertain Organization Class Friend Family Long Short Example 0 1 4 5 9 12 13 16 8 2 13 13 0 4 0 0 Discuss on a short trip Schedule an official meeting Plan a wedding Dine together Departments of company Course for GRE test Childhood friend A family of three 4.1 Group Structure Dynamics In this subsection, we move on to study the underlying structural change of messaging groups over time. We investigate several rep- resentative structural features (e.g., open triad count, closed triad count and edge density), and quantitatively analyze the how these features evolve in a different pattern with respect to the long-term and short-term groups, respectively. Triad Count. The studies about transitivity in social net- works [18] suggest that the local structure in social networks can be expressed by the triad count. In WeChat groups, we try to examine whether long-term and short-term groups show different transitivity patterns. We take into account both the open triad count and close triad count, based on the friendship networks structure of sampled WeChat groups. To illustrate this, Figure 3(a) shows an example of a small WeChat group friendship networks, in which nodes A, B and C form a closed triad; nodes A, C and D is considered an open triad. Edge Density. We also consider the feature of internal edge den- sity of a group, which is defined by the fraction of edges (friend- ships) within the group among all the possible edges when the group is fully connected. To see how these structural features change over time, we take two snapshots for the groups: one at the time when the groups are initialized (we choose ∼10 minutes in this study), another after one month being setting up. We consider long-term and short-term D C A B (a) Example (b) Open triads (c) Closed triads (d) Edge density Figure 3: Group Structure Pattern. (a): An example of group friendship networks. Group members and friend relationships are represented as nodes and dot lines, respectively. For this example, we can see A, B and C are connected as a closed triad; A, C and D are connected as an open triad. The edge density of this group is 0.476. (b) (c): Horizontal axis is the normalized number of open/closed triads at the setting up of a WeChat group, and vertical axis is the normalized number of open/closed one month later. (c): Horizontal axis is the edge density at the setting up of a WeChat group, and veritcal axis is the edge density one month later. groups separately in order to see the different patterns of structural patterns between these two. We also remark here that although short-term groups may stop messaging interactions at some point, members within the groups are still likely to build friendship as long as they maintain the group membership, and thus affect the underlying friendship network structure for potentially longer pe- riod of time. Figure 3(b), Figure 3(c) and Figure 3(d) show the results for fea- ture dynamics of open triad count, close triad count and edge den- sity, respectively. Note that if the structure of groups are not chang- ing at all, we would expect to see a scatter plot centering around the diagonal line of y = x (with normalization). From the visualiza- tion results, it is interesting to first observe the different evolution patterns exhibited between short-term groups and long-term groups - the long-term ones show stronger dynamics in terms of the un- derlying friendship structure features while most short-term groups are less likely to develop friendship over time. We infer such dichotomy in structure dynamics is related to the social roles and functions for the social groups to be setup. For example, a colleague's group served for long-term communications is more likely to develop social connections between members, as opposed to a group setup for some specific social event. 4.2 Cascade Tree Pattern Beside studying the friendship structure, we also discuss the group formation processes, namely by investigating the group membership invitation cascading tree structure. We start with defining the group cascade tree below. Definition 2. Group Cascade Tree. A directed graph where each group member is a node, and a directed edge from u to v is constructed if u (inviter) successfully invites v (invitee) to the group. The tree is rooted at the user who initiated the group. Cy- cles are impossible since inviters always join the group earlier than invitees. To show how long-term and short-term groups differ in terms of cascade tree structure, Figure 4(a) and Figure 4(b) show the ex- amples for two types of WeChat group cascade tree. We find that long-term groups tend to exhibit a deeper tree structre with more branchings; whereas many short-term group cascade trees display an approximate star graph structure with most members being the leaves of the root node. In order to quantify such difference, we consider here four representative features concerning the structure of cascade trees. Cascade Size. We start our analysis on cascade tree by examin- ing the total number of nodes in the cascade tree, i.e., group size. Figure 5(a) shows the normalized distribution of cascade tree size (a) Example of long-term group (b) Example of short-term group Figure 4: Example of WeChat group cascade tree for long-term group and short-term group, respectively. for both types of groups. We find that long-term groups tend to have larger size (up to 500 by default) while the size of short-term groups diminishes around 100. This is not very surprising since long-term groups can be advantageous in gaining more members give a longer timespan for growth. Invitation as a Function of Cascade Depth. A natural way to measure the difference in cascade tree between long-term groups and short-groups is to examine the distribution of cascade depth at which the invitation occur. We measure the cascade depth for each of the invitation happens during our observation period, which is defined by the number of steps from the root to the group member in the cascade tree. Figure 5(c) shows the normalized distribution of cascade depth among all the invitations in our dataset. We ob- serve that more invitations occurs far from the root in long-term groups than that in short-term groups. For example, 10% of invita- tions in long-term groups occur at depth 3 or greater; whereas for short-term groups, only less than 1% of invitations occur at depth 3 or greater. Invitation as a Function of Subtree Size. Finally, we measure the difference of cascade tree structure between long-term groups and short-term groups by measuring the size of subtree for each node in the cascade tree. In Figure 5(b), we show the distribution of the cas- cade subtree size for each node resides in the cascade tree, aggre- gated among all the sampled groups. Again, we observe substantial difference between long-term groups and short-term groups. For example, 30% of nodes in the cascade tree of long-term groups have subtree size greater than 10; whereas only 10% of nodes have subtree size greater than 10 in short-term groups. Structural Virality. We also quantify cascade trees by measur- ing their structural virality as that used in [16]. Structural virality, also know as Wiener index, is useful for disambiguating between shallow, broadcast-like diffusion and the deep branching structures. 100 10-1 10-2 10-3 10-4 10-5 C ≥ s p u o r g f o n o i t c a r F e z i s h t i w 100 10-1 10-2 10-3 10-4 10-5 x ≥ s r e b m e m e z i s f o s e e r t n i f o n o i t c a r F Long-term Short-term 101 102 Size of group C (a) Group size Short-term Long-term 101 Subtree size (b) Subtree size 102 s n o i t a t i v n i f o n o i t c a r F x ≥ h t p e d t a 100 10-1 10-2 10-3 10-4 10-5 10-6 10-7 Short-term Long-term x ≥ s p u o r g f o n o i t c a r F x e d n i r e n e i w h t i w 100 10-1 10-2 10-3 10-4 10-5 7 8 9 10 1 2 4 3 5 6 Depth (c) Depth Long-term Short-term 1 2 3 4 5 6 7 8 Wiener Index (d) Wiener index Figure 5: Cascade tree related feature distributions. (a): Distribution over group size. Vertical axis is the fraction of groups with size larger than C. (b): Distribution over subtree size. Vertical axis is the fraction of non-singleton members in trees of specific size. (c): Distribution over cascade depth. (d): Distribution over Wiener index. Wiener index is defined by the average distance between any two nodes in the cascade tree. For example, the cascade trees in Fig- ure 4(a) and Figure 4(b) have Wiener indexes of 3.99 and 1.83, respectively. In Figure 5(d), we show the distribution of Wiener in- dex of cascade trees for both long-term and short-term groups. We observe that more than 99% of short-term groups have Wiener in- dex smaller than 2, which implies that most membership cascades happen in a broadcast fashion, settled mostly by the root node. 4.3 Group Lifecycle Prediction The strong dichotomy of group lifecycle and structure dynamics leads us to a natural modeling and prediction questions -– how separable are the long-term and short-term groups by taking into account the structural, behavioral as well as demographical fea- tures? Can we predict whether a social group will grow and persist in the long run by analyzing the structural and behavioral patterns exhibited by the group at its early stage? In this section, we address both issues through analyzing the snapshots of millions of groups, combining a broad range of features. 4.3.1 Separability Model In this model, we consider the task of predicting whether a group is long-term or short-term, from features including the underlying group network structure, the membership cascade tree properties, and the demographics entropy of group members. The full list of features can be found in Table 5, where we are only using group- level ones for this task. To train the separability model, we construct the training dataset by labeling groups with less than 5 days of lifespan as negative ex- amples, and groups with longer than 25 days of lifespan as positive examples. We represent each group as a feature vector extracted one month after groups are built, and further train the dataset using support vector machine (SVM) [14] with 10-fold cross validation. Table 3: Feature contribution analysis on the separability of long-term and short-term groups.(%) Features used All Features -Structure -Cascade -Demographics Random Guess +Structure +Cascade +Demographics AUC Prec. Rec. 66.62 57.66 62.83 64.75 47.67 65.36 65.71 65.24 50.00 50.00 64.21 42.51 65.71 61.23 62.77 41.41 63.23 59.36 64.49 57.35 50.00 61.98 57.35 63.18 F1 60.32 61.04 54.82 61.25 50.00 50.43 61.25 50.03 mance by considering only one at a time. And we find that the set of structural features by itself can yield high accuracy, which again confirms that strong distinctions exist between short-term and long- term group structures. 4.3.2 Early Prediction of Group Lifecycle Given the strong separability between the long-term and short- term groups, we pose a fundamental question of how well can we predict if a group can grow and persist in the long run, from the features exhibited in its early age? Table 4: Group lifecycle early prediction performance re- sults(%). We train the classifier using all the group-level fea- tures. Features used AUC Prec. Rec. 56.80 53.38 54.11 56.81 56.56 57.66 1 hour 1 day 5 days 10 days 20 days 1 month 54.16 61.92 62.52 62.48 62.78 63.23 57.95 65.08 65.46 65.57 65.76 66.62 F1 55.45 57.34 58.01 59.51 59.51 60.32 The way we implement the early prediction model is largely sim- ilar to the separability model previously except for the subtle dif- ference that group features (see group-level features in Table 5) are extracted at earlier timestamps. Specifically, for each group in our training set, we take multiple snapshots at the age of 1 hour, 1 day, 5 days, 10 days, 20 days and 1 month, and calculate the feature vector accordingly. We repeat similar procedure to train the dataset with respect to features extracted at various timestamp, and com- pare the training performance. Table 4 shows the prediction per- formance results at different stages. We find that features extracted one day after the groups being set up can yield AUC accuracy as high as 65.08%, which is almost as good as the prediction accuracy of 66.62% when adopting features at timestamp of 1 month. The results of early prediction model reassure that the likelihood for social messaging group to grow in the future can be well in- ferred from its very early age (e.g., 1 day). Such predictability is in contrast to previous study on predicting the longevity of online so- cial communities [20] which requires features at the age of months for making short-term prediction and years for making long-term prediction. And again this is partly due to the different nature of social messaging groups and online communities in terms of the lifecycle. The prediction results are shown in Table 3. We find that highest classification accuracy (66.62% AUC) can be obtained with full set of features. We further investigated how each set of features (i.e., structure, cascade and demographics) affects the training perfor- 5. MEMBERSHIP CASCADE PROCESS Now we have modeled the growth and evolution of social mes- saging groups from a group-level perspective. In this section, we approach the problem with a focus on the individual-level and study the membership cascade process by which group gain new mem- bers. To start with, we introduce a group membership cascade model, as illustrated in Figure 6. The model captures two important roles: inviter - a group member who sends invitation to friend(s), and invitee - the individual in the inviter's ego networks who gets in- vited to the group chat2. For instance, the big dotted circle in Fig- ure 6 encompasses all the current members within a group. There are two essential steps behind each invitation: 1) a member in a group become active (denoted by blue in Figure 6), and 2) the ac- tive member selects his/her friends (denoted by red in Figure 6) into the group chat. regular inviter invitee fringe invite friendship Figure 6: Graphical example of WeChat groups' cascade pro- cess model. At some timestamp T , some members in a group become active (denoted by blue) and select their friends (de- noted by red) to the group chat. 5.1 Membership Cascade Pattern 5.1.1 Behavioral Pattern To have a better understanding of membership cascade pattern, it is important to first study group members' behavioral pattern. For example, an interesting question would be how often do people invite their friends into the group chat once they become a group member? This can also be phrased as how often do membership cascade happen in social messaging groups? In this subsection, we provide some empirical findings concerning members' invitation behavior pattern measured by the concepts of invitation interval and first invitation latency defined below. Definition 3. Invitation Interval is defined as the time inter- val between any two consecutive invitations from a group member. Additionally, First Invitation Latency is defined as the interval be- tween the timestamp at which a user joins a group (invited by some existing member) and the timestamp when he/she, for the first time, invites another friend to the same group. Intuitively, investigating the action of a group member's first in- vitation is useful since it signifies how well has he/she been adapt- ing to the current group, and how strong the sense of relevance he/she has with respect to the current group. To address above questions, we obtain the distribution of invi- tation interval and first invitation latency, aggregating over each member in each group. Figure 7(a) and Figure 7(b) show the CDF curve of first invitation latency and invitation interval, respec- tively. We observe the invitations in WeChat groups are highly time-sensitive. On the one hand, when one is invited to a group, 2On WeChat, instead of sending group invitation to any registered user, one can only invite his/her current friends into the group chat. F D C 1.0 0.8 0.6 0.4 0.2 0.0 0 5 10 15 20 Time interval between membership and first invitation (day) (a) First invitation latency 1.0 0.8 0.6 0.4 0.2 0.0 0 F D C 25 2 4 6 8 10 Time Interval between two consecutive invitations(day) (b) Invitation interval Figure 7: Dynamic pattern of invitations. Left: Cumulative distribution function (CDF) of first invitation latency (measured by day); Right: Cumulative distribution function (CDF) of in- vitation interval (measured by day). The invitations in WeChat group display a highly time-sensitive pattern. he/she tends to start invite other people soon. For example, about 80% of the first invitations happen within 5 days after the inviter joining the group. On the other hand, we find that members suf- fer from a longer latency in sending their first invitations than the invitation interval in general. For example, more than 80% of con- secutive invitations happen within 2 days of interval. 5.1.2 The Influence of Local Structure In this subsection, we probe into the local structure of group and investigate how the membership cascade process is influenced by the structural features. Specifically, we study how the probability for a user u being invited by his/her friend into a group is affected by the structure of ego networks of u. Backstrom et al. Revisit. In the context of online social networks, Backstrom et al. [6] introduced the probability that an individual adopts and joins a community with the number of friends already in the group. As noted earlier, a significant difference in our setting of social messaging group is that new group members are "passively invited" to the group rather than "actively adopt" the group. To this end, we calculate P (k) - the fraction of user who is invited to a commu- nity as a function of the number of k of their friends who are already members, with slightly tweaking the definition in [6]. Specifically, we first take two snapshots of group membership, with 10 days apart. We find tuples (u, C, k) where u /∈ C at the time of the first snapshot and u has k friends in C at that time. We then compute P (k) by looking at the fraction of tuples (u, C, k) that u ∈ C at the time of the second snapshot. The results for WeChat group (see Figure 8(b)) exhibit an in- teresting contrast to the curves of LiveJournal and DBLP groups shown in Backstrom, Huttenlocher, Kleinberg and Lan [6]. Instead of observing an increasing trend of the curve with respect to larger values of k, we find a qualitatively different shape where the adop- tion probability suffers from a slight decrease at moderate values of k, and drastic fluctuations when k exceeds 40. We infer such dif- ference is caused by the mechanism inherent to WeChat, that when a group has more than 40 users, inviting friends to join the group requires their confirmation. We leave the detailed inspection on this for future investigation. Furthermore, we also observe a strong evidence for the influence of structural locality. In particular when k is small, the fraction of invitee (invited to the group) with 10 friends already in the group (k = 10) is twice as much as the fraction of invitee with 5 friends in the group (k = 5). 2.0 1.5 1.0 0.5 D B A V C f o y t i l i b a b o r P ) % ( p u o r g e h t o t d e t i v n i g n i e b f o y t i l i b a b o r P ) % ( p u o r g e h t o t d e t i v n i g n i e b 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 0 2 friends 3 friends 4 friends 5 friends 6-10 friends >10 friends 2 4 6 8 10 12 14 The number of connected components 0.0 0 The number of friends k already in the group 10 20 30 40 50 60 70 (a) Example of local structure (b) #Friend in group (c) Structure diversity Figure 8: Local structure pattern of invitations. (a): Illustration of a potential invitee's ego networks. Give a group C, blue nodes represent user v's friends who have been in the group, while the white nodes denote those users in v's ego networks who did not join the group. (b): The probability p of being invited to a WeChat group as a function of the number of friends k already in the group. Error bars represent 95% confidence interval. (c): The effect of structure diversity. Structural diversity is represented by the number of connected components formed by the friends already in the group. Horizontal axis is the number of connected components formed by friends already in the group and the vertical axis is the probability p of being invited to a WeChat group. Table 5: List of features used in this study. Group Level (for group C at time T ) Number of individuals with a friend in C (the fringe of C) Number of edges with one end in the group and the other in the fringe. Number of edges with both ends in the group. The number of open triads at time T and at the setting up of group. The number of closed triads at time T and at the setting up of group. Clustering coefficient. Number of Members (C). Tenth quantile of members' depth in the cascade tree. Tenth quantile of members' subtree size. Number of members whose depth equal to k, k = 1, 2, . . . , 9. The sum of the lengths of the shortest paths between all pairs of vertices, i.e., Wiener index. Number, fraction of members from country X. Number, fraction of members who stated their gender to be X. Number, fraction of membes who stated their age to be X. Entropy of member's region (country, province, city) distribution, e.g., − Px∈Countries P (x) log2 P (x). Entropy of member's age: − Px∈Ages P (x) log2 P (x). Entropy of member's gender: − Px∈Genders P (x) log2 P (x). Inviter Level (for member u in group C at time T ) How long has it been since u joined C. How long has it been since u invited others to C. The number of users that u invited to C before time T . The number of chat made by the individual. The number of u's friends in the fringe with ≥ k friends in the group, 1 ≤ k ≤ 20, k = 30, 40, 50 The number and fraction of u's friends in the group: {vv ∈ ego(u) ∧ v ∈ C}. The number and fraction of u's friends not in the group: {vv ∈ ego(u) ∧ v 6∈ C}. The number of cross group edges in u's ego networks: {(v, w)v ∈ C ∧ w 6∈ C ∧ u, w ∈ ego(u)}. The ratio of cross group edges to cross group edges that could possible exist in u's ego networks. The depth of u in cascade tree. Invitee Level (for user u in the fringe of group C at time T ) User u's stated gender. User u's stated age. User u's stated region (country, province and city). The fration of group member who has the same gender as u. The fration of group member who has the same age as u. The fration of group member who has the same region (country, province, city) as u. Number of friends already in the group. Number of friend in group C who are classified as acitive inviters. Number of connected components formed by friends already in the group. Group Structre Cascade Tree Demographics History Behavior Local Structure Demographics Local Structure Structural Diversity. The above analysis informs us that the num- ber of friends in the group can affect whether a user gets invited. Yet it is unclear how it is affected by the local network structure. In this subsection, we study how structural diversity of user u's ego networks [34] affects the probability for u to be invited by friends into a group. For a given user u with k friends already in a group, we mea- sure structural diversity by counting the connected components in the networks formed by these k friends. For example, as illustrated in Figure 8(a), user v has four friends (A, B, C and D) already in a group. A, B, C and D form 3 connected components, i.e., {A, B}, {C} and {D}. Figure 8(c) plots the curves of the proba- bility of being invited to a group with respect to the number of con- nected components formed by friends already in group. We choose the parameter k (i.e., the number of friends already in group) to be 2, 3, 4, 5, 6-10 and > 10, respectively. Interestingly, we find that given a fixed k, the more closely these k friends are connected, the more likely u will be invited to the group. 5.2 Membership Cascade Prediction Now we have seen how the membership cascade process can be affected by both users' behavioral pattern as well as the local structure surrounding a user. In this subsection, we propose a pre- diction model by integrating a comprehensive set of behavioral and structural features. This can be used in practice to make effective inference on the membership cascade process. Specifically, given the historical behavior of group members as well as the local social structure, can we predict which members in the group are more likely to be active and invite new users to the group chat and to whom will he/she send invitations to? To address the issue, we separately model the inviter prediction and invitee prediction problems. Inviter Prediction. At some timestamp T , for a given group C and a specified user u ∈ C, our learning task here is to predict whether u will become active and invite friends to C during the time interval (T , T + ∆t]. Invitee Prediction. At some time T , for a given group C and a user u ∈ f ringe(C), our learning task here is to predict whether u (one-hop neighbor of current members) will be invited to C during the time interval (T , T + ∆t]. For both prediction task, we construct each training example by randomly selecting T from 10 minutes to 1 month, and fix- ing ∆t = 1 day. We also notice that, on average, only 5.6% of group members have invitation action and fewer than 1% among users in the fringe of groups are invited, causing the number of positive examples and negative examples quite unbalanced. We thus down-sample [22] the size of negative examples and maintain a positive/negative ratio of 1:2 in our training set. Table 6: inviter/invitee-level feature contribution analysis (%). Performance of inviter/invitee prediction and Task Features used All Inviter -History Behavior -Local Structure Invitee All -Demographics -Local Structure AUC Prec. Rec. 88.39 95.31 84.31 91.52 93.22 87.04 93.47 98.66 94.68 98.05 89.29 76.53 85.95 82.07 84.50 54.55 45.76 11.85 F1 87.15 83.17 85.75 68.89 61.70 20.52 We incorporate both group-level and inviter-level features seen in Table 5 for training the inviter model; and use instead the group- level and invitee-level features for invitee model. We further train the dataset using support vector machine (SVM) [14] with 10-fold cross validation. The prediction performance results are shown in Table 6. We see that our model is quite effective, with AUC of 95.31% in predicting inviter, and an AUC of 98.66% in predicting invitee. We further investigated how each set of features affects the training performance by considering only one at a time. Quite inter- estingly, we find that historical behavioral features can be important factors in the task of predicting inviter; while local structural fea- tures are the dominant ones in predicting invitee. The information of demographics exert little affect on the performance of predicting invitee, which implies that our model can be generalizable without requiring user-specific attributes. 6. CONCLUSION Summary. In this paper, we studied the formation and evolution of chat groups in the context of social messaging - their lifecy- cles, the change in their underlying structures over time, and the diffusion processes by which they develop new members. We use a large collection of anonymized data from WeChat group messag- ing platform, providing analysis on dynamics of millions of groups by keeping track of their emergence, growth and demise over time. We discovered a strong dichotomy of groups existed in terms of their lifecycle, and defined two types of groups accordingly: long- term and short-term groups. First, we developed an effective sep- arability model by taking into account a broad range of group- level features, showing that long-term and short-term groups are inherently distinct. We also found that the lifecycle of messaging groups is largely dependent on their social roles and functionalities in users' daily social experiences and specific purposes. Specifi- cally, event-driven groups in general have a shorter lifespan as ap- posed to those friendship groups serving for frequent catching-up purpose. Given the strong separability between the long-term and short-term groups, we further addressed the problem of early pre- diction in group longevity, and demonstrated that strong prediction results can be obtained even with a group's history up to one day. In addition to modeling the growth and evolution from a group- level perspective, we also investigated the individual-level at- tributes of group members and study the diffusion process by which groups gain new members. We developed a membership cascade process model in which we consider users' historical engagement behavior as well as the local social network structure that users em- bedded in. We demonstrated the effectiveness by achieving AUC of 95.31% in the inviter prediction model using all features, and an AUC of 98.66% in the invitee prediction model. Future Research. Ours findings raise many important open ques- tions that would be interesting to take into account in future re- search. First, our design of membership cascade model can be used for group member recommendation, and may be potentially inte- grated into current WeChat platform. This can motivate research on conducting online experiments and investigating whether users are likely to adopt the group member recommendations, and under what circumstances. Such studies will also lead to design of better group chat platforms and engage users more effectively. Acknowledgements. We thank Chenhao Tan and Tracy Xiao Liu for their comments. Jiezhong Qiu and Jie Tang are sup- ported by 863 (No. 2014AA015103), 973 (No. 2014CB340506, No. 2012CB316006), NSFC (No. 61222212), and NSSFC (No. 13&ZD190). Yixuan Li and John E. Hopcroft are supported by the US Army Research Office W911NF-14-1-0477. Qiang Yang is supported by 973 (No. 2014CB340304). This work is also sup- ported by research fund of Tsinghua-Tencent Joint Laboratory. 7. REFERENCES [1] WeChat group chat features. www.wechat.com/en/features.html#group. [2] WeChat wiki. en.wikipedia.org/wiki/WeChat. [3] E. Adar, L. Zhang, L. A. Adamic, and R. M. Lukose. Implicit structure and the dynamics of blogspace. In Workshop on the weblogging ecosystem, pages 16989–16995, 2004. [4] A. Anderson, D. Huttenlocher, J. Kleinberg, J. Leskovec, and M. Tiwari. Global diffusion via cascading invitations: Structure, growth, and homophily. In WWW, pages 66–76, 2015. [5] S. Aral, L. Muchnik, and A. Sundararajan. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51):21544–21549, 2009. [6] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In KDD, pages 44–54. ACM, 2006. [7] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of social networks in information diffusion. In WWW, pages 519–528, 2012. [8] C. Buntain and J. Golbeck. Identifying social roles in reddit using network structure. In Proceedings of the companion publication of the 23rd international conference on World wide web companion, pages 615–620. ACM, 2014. [9] B. S. Butler. Membership size, communication activity, and sustainability: A resource-based model of online social structures. Information systems research, 12(4):346–362, 2001. [10] M. Cha, A. Mislove, B. Adams, and K. P. Gummadi. Characterizing social cascades in flickr. In Proceedings of the first workshop on Online social networks, pages 13–18, 2008. [11] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec. Can cascades be predicted? In WWW, pages 925–936. ACM, 2014. [12] K. Church and R. de Oliveira. What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional sms. In Mobile-CHI, pages 352–361. ACM, 2013. [13] N. Ducheneaut, N. Yee, E. Nickell, and R. J. Moore. The life and death of online gaming communities: a look at guilds in world of warcraft. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 839–848, 2007. [14] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. Liblinear: A library for large linear classification. The Journal of Machine Learning Research, 9:1871–1874, 2008. [15] M. Girvan and M. E. Newman. Community structure in social and biological networks. Proceedings of the national academy of sciences, 99(12):7821–7826, 2002. [16] S. Goel, A. Anderson, J. Hofman, and D. Watts. The structural virality of online diffusion. Preprint, 22:26, 2013. [17] M. Gomez Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1019–1028. ACM, 2010. [18] P. W. Holland and S. Leinhardt. Transitivity in structural models of small groups. Comparative Group Studies, 1971. [19] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Natural communities in large linked networks. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 541–546. ACM, 2003. [20] S. R. Kairam, D. J. Wang, and J. Leskovec. The life and death of online groups: Predicting group growth and longevity. In WSDM, pages 673–682. ACM, 2012. [21] I. Kloumann, L. Adamic, J. Kleinberg, and S. Wu. The lifecycles of apps in a social ecosystem. In WWW, pages 581–591, 2015. [22] M. Kubat, S. Matwin, et al. Addressing the curse of imbalanced training sets: one-sided selection. In ICML, volume 97, pages 179–186, 1997. [23] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In WWW, pages 591–600. ACM, 2010. [24] J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Transactions on the Web (TWEB), 1(1):5, 2007. [25] J. Leskovec, M. McGlohon, C. Faloutsos, N. S. Glance, and M. Hurst. Patterns of cascading behavior in large blog graphs. In SDM, volume 7, pages 551–556. SIAM, 2007. [26] Y. Li, K. He, D. Bindel, and J. E. Hopcroft. Uncovering the small community structure in large networks: A local spectral approach. In WWW, pages 658–668, 2015. [27] M. E. Newman. Detecting community structure in networks. The European Physical Journal B-Condensed Matter and Complex Systems, 38(2):321–330, 2004. [28] G. Palla, A.-L. Barabási, and T. Vicsek. Quantifying social group evolution. Nature, 446(7136):664–667, 2007. [29] N. Park, K. F. Kee, and S. Valenzuela. Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. CyberPsychology & Behavior, 12(6):729–733, 2009. [30] B. Ribeiro. Modeling and predicting the growth and death of membership-based websites. In WWW, pages 653–664. ACM, 2014. [31] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In WWW, pages 695–704. ACM, 2011. [32] E. Sun, I. Rosenn, C. Marlow, and T. M. Lento. Gesundheit! modeling contagion through facebook news feed. In ICWSM, 2009. [33] Y. Sun, J. Tang, J. Han, C. Chen, and M. Gupta. Co-evolution of multi-typed objects in dynamic star networks. IEEE TKDE, 26(12):2942–2955, 2014. [34] J. Ugander, L. Backstrom, C. Marlow, and J. Kleinberg. Structural diversity in social contagion. Proceedings of the National Academy of Sciences, 109(16):5962–5966, 2012. [35] D. J. Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences, 99(9):5766–5771, 2002. [36] L. Weng, F. Menczer, and Y.-Y. Ahn. Virality prediction and community structure in social networks. Scientific reports, 3, 2013. [37] J. Yang, X. Wei, M. S. Ackerman, and L. A. Adamic. Activity lifespan: An analysis of user survival patterns in online knowledge sharing communities. In ICWSM, 2010.
1807.03675
1
1807
2018-07-10T14:31:36
Event Detection and Retrieval on Social Media
[ "cs.SI" ]
In the recent years, we have witnessed the rapid adoption of social media platforms, such as Twitter, Facebook and YouTube, and their use as part of the everyday life of billions of people worldwide. Given the habit of people to use these platforms to share thoughts, daily activities and experiences it is not surprising that the amount of user generated content has reached unprecedented levels, with a substantial part of that content being related to real-world events, i.e. actions or occurrences taking place at a certain time and location. Given the key role of events in our life, the task of annotating and organizing social media content around them is of crucial importance for ensuring real-time and future access to multimedia content about an event of interest. In this chapter, we present several research efforts from recent years that tackle two main problems: a) event detection and b) event-based media retrieval and summarization. Given archived collections or live streams of social media items, the purpose of event detection methods is to identify previously unknown events in the form of sets of items that describe them. In general, the events could be of any type, but there are also approaches aiming at events of specific type. Given a target event the goal of event summarization is first to identify relevant content and then to represent it in a concise way, selecting the most appealing and representative content.
cs.SI
cs
Event Detection and Retrieval on Social Media Manos Schinas1,2, Symeon Papadopoulos1, Yiannis Kompatsiaris1, and Pericles Mitkas2 1 Centre for Research and Technology Hellas {manosetro,papadop,ikom}@iti.gr 2 Aristotle University of Thessaloniki [email protected], [email protected] 1 Introduction In the recent years, we have witnessed the rapid adoption of social media plat- forms, such as Twitter, Facebook and YouTube, and their use as part of the everyday life of billions of people worldwide. Given the habit of people to use these platforms to share thoughts, daily activities and experiences it is not sur- prising that the amount of user generated content has reached unprecedented levels, with a substantial part of that content being related to real-world events, i.e. actions or occurrences taking place at a certain time and location. Figure 1 illustrates three main categories of events along with characteristic photos from Flickr3 for each of them: a) news-related events, e.g. demonstrations, ri- ots, public speeches, natural disasters, terrorist attacks, b) entertainment events, e.g. sports, music, live shows, exhibitions, festivals, and c) personal events, e.g. wedding, birthday, graduation ceremonies, vacations, and going out. Depending on the event, different types of multimedia and social media plat- form are more popular. For instance, news-related events are extensively pub- lished in the form of text updates, images and videos on Twitter and YouTube, entertainment and social events are often captured in the form of images and videos and shared on Flickr and YouTube, while personal events are mostly represented by images that are shared on Facebook and Instagram. Given the key role of events in our life, the task of annotating and organizing social media content around them is of crucial importance for ensuring real-time and future access to multimedia content about an event of interest. However, the vast amount of noisy and non-informative social media posts, in conjunc- tion with their large scale, makes that task very challenging. For instance, in the case of popular events that are covered live on Twitter, there are often mil- lions of posts referring to a single event, as in the case of the World Cup Final 2014 between Brazil and Germany, which produced approximately 32.1 million tweets with a rate of 618,725 tweets per minute4. Processing, aggregating and selecting the most informative, entertaining and representative tweets among such a large dataset is a very challenging multimedia retrieval problem. In other 3 https://www.flickr.com/ 4 https://www.engadget.com/2014/07/14/brazil-world-cup-final-records/ 2 M. Schinas et al. Fig. 1. Examples of event categories and images. Figure originally appeared in [61]. cases, the challenge is to discover sets of multimedia items that refer to the same event within a much larger dataset. That is, for instance, the case with the Yahoo-Flickr Event Summarization Challenge5, which called for methods that automatically discover events in the YFCC100M collection [83], which contains approximately 99 million photos and 1 million videos. In addition to the large scale of the problem, a challenge in trying to detect events in this collection stems from the inconsistent quality of user provided metadata: for instance, sev- eral images have no title or description, are erroneously tagged and are missing geographical information. In this chapter, we present several research efforts from recent years that tackle the two main problems that were discussed above: – Event detection. Given archived collections or live streams of social media items, the purpose of these methods is to identify previously unknown events in the form of sets of items that describe them. In general, the events could be of any type, but there are also approaches aiming at events of specific type. – Event-based media retrieval and summarization. Given a target event the goal is first to identify relevant content and then to represent it in a concise way, selecting the most appealing and representative content. In the following, we will always be referring to events E in relation to collections C or streams S of multimedia items (images, videos). Individual multimedia items will be denoted as c (standing for content), and they will refer to tuples of metadata fields, e.g. a given content item will be denoted as c = {u, t, g, l, d, T, v}, 5 http://www.acmmm.org/2015/call-for-contributions/ multimedia-grand-challenges/ Event Detection and Retrieval on Social Media 3 where u denotes the social media user who posted the particular content, t the publication time, g its geographical location (latitude, longitude), if available, l its title (label), d its description, T a set of associated tags, and v its visual content (image, video). The particular fields have been defined based on Flickr, since Flickr is among the most common multimedia sharing platforms, where event detection research is performed. However, very similar representations are applicable to other platforms, e.g. in the case of Twitter, we have a very similar representation, with the difference that l refers to the tweet text, there is no description d, T refers to the set of accompanying hashtags, and v refers to the embedded media content. When necessary the above notation will be used with subscripts to differentiate between different instances, e.g. event x will be denoted as Ex and media item i as ci. For our discussion, an event corresponds to a set of multimedia items that depict scenes from the event, i.e. E = {c}. The remainder of this chapter is structured as follows: Section 2 reviews the rich literature on the topic of event detection, organizing methods into feature- pivot (subsection 2.1), document-pivot (subsection 2.2), and topic modeling ones (subsection 2.3). Then, Section 3 discusses a number of methods that tackle the problems of event-oriented retrieval (subsection 3.1) and summarization (sub- section 3.2). Section 4 provides an overview of evaluation measures and datasets that are used for evaluating event detection and retrieval methods, along with a comparative view of reported results. Finally, the chapter concludes in Section 5. 2 Event Detection Event detection is the problem of associating multimedia items (images, videos) in a collection C or stream S to a real-world event E. Typically, the event is not known in advance and is the result of the event detection process. There is a large variety of methods for event detection, which we group into three categories based on their principle: – Feature-pivot: These are based on detecting abnormal patterns in the ap- pearance of features, such as words. Once an event happens, the expected frequency of a feature will be abnormal comparing to its historical behavior, indicating a potential new event. – Document-pivot: This category comprises methods that represent documents as items to be clustered using some similarity measure. – Topic modeling: This includes methods that utilize statistical models to iden- tify events as latent variables in the documents. A further attribute of methods pertains to their applicability on static collections versus streams of documents (static vs stream). Based on this, the methods can be divided into two main categories: Retrospective Event Detection (RED) and First Story Detection (FSD). RED methods aim to detect unknown events from an accumulated set of documents, e.g. a collection of Flickr images or news articles. On the other hand, FSD methods, also known as new or online event 4 M. Schinas et al. detection, focus on the real-time discovery of events from a live stream of social media messages, e.g. tweets. There is also a third category of methods that we call timeslot-based (TSB): those are positioned between RED and FSD methods and detect events in a pseudo-incremental way. An additional attribute for grouping methods is the use of modalities by each method. Most methods are based on text analysis, but several methods have been proposed that integrate other modalities available in social media such as location, time, visual content, etc. Finally, the presented methods are also categorized by their mode, namely discovery versus detection methods. Fig- ure 2 illustrates a few important processing paradigms (partitioning, clustering, filtering) in relation to whether all items in a collection C need to be assigned to events, and whether all represented events are of interest (discovery mode) or just a subset of them (detection mode). Table 2 presents an overview of the methods to be discussed in this section along with their attributes (principle, static vs stream, modalities, mode). Fig. 2. Main event detection processing paradigms in relation to whether all items in a collection are associated with events and whether all events are of interest. 2.1 Feature-pivot methods This section discusses those event detection methods that rely on the detection of text features, which are likely to refer to events. These feature-pivot tech- niques, proposed originally for the analysis of timestamped document streams, consider an event as a bursty activity that makes some of the text features more prominent. The intuition behind these methods is that once an event emerges, Event Detection and Retrieval on Social Media 5 Table 1. Categorization of event detection methods according to different attributes. The following abbreviations have been used: FEAT/DOC/TOPIC stand for feature- pivot, doc-pivot and topic modeling approaches, RED/FSD/TSB stand for Ret- rospective Event Detection, First Story Detection and Timeslot-based approaches, TXT/VIS/TM/US /SOC/LOC stand for Text, Visual, Time, User, Social links and Location modalities, and DETECT/DISCOV stand for Detection and Discovery mode. Principle Static/Stream Modalities Method FEAT Fung et al., 2005 [29] He et al., 2007 [33] FEAT Mathioudakis & Koudas, 2010 [45] FEAT FEAT Sakaki et al., 2010 [70] FEAT Weng & Lee, 2011 [90] FEAT Li et al., 2012 [38] FEAT Alvanaki et al., 2012 [4] Cataldi et al., 2010 [18] FEAT FEAT Parikh & Karlapalem, 2013 [56] FEAT Chen & Roy, 2009 [20] FEAT Sayyadi et al., 2009 [73] FEAT Guille & Favre, 2014 [31] Zhang et al., 2015 [95] FEAT Sankaranarayanan et al., 2009 [72] DOC DOC Petrovi´c et al., 2010 [63] DOC Becker et al., 2011 [12] DOC Lee, 2012 [37] DOC Petrovi´c et al., 2012 [64] Moran et al., 2016 [51] DOC DOC Aggarwal & Subbian, 2012 [1] DOC Becker et al., 2009 [10] DOC Becker et al., 2010 [11] DOC Reuter & Cimiano, 2012 [66] Petkos et al., 2012 [59] DOC DOC Bao et al., 2013 [7] DOC Wang et al., 2012 [87] DOC Petkos et al., 2017 [62] TOPIC Benson et al., 2011 [13] Ritter et al., 2012 [69] TOPIC TOPIC You et al., 2013 [92] TOPIC Zhou & Chen, 2014 [98] TOPIC Zhou et al., 2015 [97] TOPIC Cai et al., 2015 [17] Diao & Jiang, 2013 [25] TOPIC TOPIC Wei et al., 2015 [89] Hu et al., 2012[35] TOPIC Mode DISCOV TXT DISCOV TXT DISCOV TXT DETECT TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT DISCOV TXT, TM DISCOV TXT DISCOV TXT DISCOV TXT, TM DISCOV TXT DISCOV TXT DISCOV TXT, SOC DISCOV TXT, TM, LOC DISCOV TXT, TM, US, LOC TXT, TM, LOC DISCOV TXT, VIS, TM, US, LOC DISCOV DISCOV TXT, VIS, TM, LOC TXT, TM, LOC DISCOV TXT, VIS, TM, US, LOC DISCOV DETECT TXT TXT DISCOV DISCOV TXT, TM, LOC DISCOV TXT, TM, LOC DISCOV TXT, TM, LOC DISCOV TXT, VIS, TM, LOC TXT, US DISCOV DISCOV TXT, TM, LOC TXT DISCOV TSB RED TSB TSB TSB TSB TSB TSB RED RED TSB TSB TSB FSD FSD FSD RED FSD FSD FSD RED RED, FSD FSD RED RED RED RED RED RED RED RED RED RED RED RED RED 6 M. Schinas et al. certain features related to it will exhibit a similar abnormal rise in their fre- quency. The type of feature can range from single keywords, named entities and phrases to social interactions. Traditionally, the distributions of the extracted features over time is analyzed, anomalies in these distributions are detected, and finally, the discovery of events is conducted by grouping features that exhibit a similar behavior. This process is depicted in Figure 3. According to this, an event is represented as a number of features showing an abnormality in appearance counts. The initial documents are assigned to the detected events, based mainly on the appearance of the event-related features in them. As these methods rely on the modeling of feature appearance in time, a large amount of documents must be available. Despite being applicable to collections of timestamped doc- uments, these techniques cannot work in a pure real-time fashion as there is a need for knowledge of the behavior of feature frequencies over a certain period of time. To overcome that limitation, an incremental approach is usually followed, by detecting events on predefined timeslots. Another drawback of feature-pivot approaches is that as they depend on the detection of a bursty activity, they typically capture trends. Thus events that are not trendy and do no attract a lot of attention are likely to be missed. Fig. 3. Feature-pivot paradigm for event detection. A seminal feature-pivot method was presented by Fung et al. [29]. This aimed at detecting bursty events in text streams based on the temporal distributions of features. Although the approach is related to plain document streams (not social media), the underlying principle is similar to that of later approaches that were designed for social media data. The main steps of the proposed method include a) bursty features identification, b) bursty features grouping into bursty events, and c) determination of hot periods of the bursty events. The detection of bursty features is done using the probability of the number of the documents that contain a feature in a time window. This probability is modeled as a binomial distribution, of which the parameters are estimated from the whole corpus, i.e. all the time windows. For a specific time window, a feature is considered bursty if the number of documents containing it is on the right side of the distribution. To group bursty features of a text stream into bursty events, a cost function that depends on the probability of bursty features grouped together is proposed. This cost function is used in a greedy fashion. Event Detection and Retrieval on Social Media 7 The work of He et al. [33] is similar to the previous approach, as it constructs a time-series signal for each term/feature. The signal is formed based on the DF-IDF values of each term per timeslot, where DF stands for the number of documents containing a specific word, while IDF for the inverse document frequency up to the current time window. The Discrete Fourier Transform is then applied on that signal and the dominant period and dominant power spectrum are determined. Based on these two values, each feature is classified as high or low power and high or low periodicity. Regarding periodicity, a signal with a dominant period higher than T /2 is termed aperiodic, otherwise it is defined as periodic. For the power spectrum, which expresses the overall activity of the feature in the corpus and indicates bursty features, the threshold is more difficult to set. In particular, a set of stop words is determined and the upper bound of these words dominant power spectrum is used as the threshold. Once each term is classified as periodic or aperiodic, the distribution of its appearance in time is modeled. For aperiodic features it is modeled using a single Gaussian, whereas for periodic events it is modeled using a mixture of Gaussian distributions. Then, in order to cluster the features, a cost function that depends on the KL-divergence between pairwise feature distributions and the number of documents in which both features appear is proposed. A greedy algorithm is used to minimize this cost function. TwitterMonitor [45], one of the first feature-pivot approaches applied on social media messages, finds bursty keywords using an algorithm called Queue- Burst. This works with a single pass over the data. Once a set of bursty keywords are determined, they are grouped into trends by an algorithm called GroupBurst that is executed periodically. Not much detail is provided, however it is men- tioned that it is based on the "assessment of co-occurrences in recent tweets" and that a greedy algorithm is used to perform the clustering in a computationally efficient manner. Subsequently, once such groups of terms are determined, Twit- terMonitor uses context extraction algorithms like PCA and SVD over the recent history of trends to identify additional words that are associated with the trend but do not exhibit bursty behavior. Moreover, it detects the most frequently used external sources (URLs) and attempts to find geographical hotspots. It additionally uses Grapevines entity extractor to identify frequently mentioned entities in trends. The work of Sakaki et al. [70], in which the authors mine tweets to detect events such as earthquakes and typhoons, is one of the pioneering works in event detection from Twitter. An SVM classifier, trained on a manually labeled Twitter dataset, is used to classify incoming tweets to the positive (earthquakes and typhoons events) or negative class (anything else). Three types of feature have been employed for this task: the number of words (statistical), the words in a tweet message, and the words before and after query words (contextual). Under the assumption that each Twitter user is regarded as a sensor, and each positive tweet as a sensory value targeting a specific event, the authors model event occurrences in time as an exponential distribution, while the location of earthquakes and trajectory of typhoon is estimated using spatial models based 8 M. Schinas et al. on Kalman and particle filters. Differently, to other feature-pivot methods, in this work the positive tweets constitute the only feature whose evolution is monitored for detection. Weng and Lee (2011) [90] proposed the EDCoW method that uses the Dis- crete Wavelet Transform (DWT) on signals built from terms extracted from tweets. In contrast to the Fourier transform, which have been proposed in [33], DWT is localized both in time and frequency. The signal for each individual term extracted from tweets is built in two stages. In the first stage, the DF · IDF score of a word is calculated for each time point. DF is the percentage of tweets containing the word in a time point compared to the number of all the tweets in the same period of time. IDF is the inverse document frequency of a word from the first time-slot up the the current one. In the second stage, a sliding window is applied to capture the change in the frequency of a word over suc- cessive time windows. More specifically, the difference of the normalized wavelet entropy between the two time-slots is used to construct the second-stage sig- nal. As a large number of words are trivial, auto-correlation is used to discard them on the basis of a dynamic threshold based on the median absolute de- viation of all auto-correlations. The remaining words are then used to form a graph where similarity between them is calculated as the cross-correlation be- tween the corresponding signals. Then, words are clustered to form events with a modularity-based graph partitioning technique, which splits the graph into sub- graphs each corresponding to a single event. Finally, to differentiate significant events from trivial ones, EDCoW also quantifies the events' significance using a score based on the number of words in the event and the sum of cross-correlation among them. Twevent [38] extracts consecutive non-overlapping segments from tweets, where a segment is defined either as a single word (unigram) or a phrase (multi-gram). Statistical information from the Microsoft Web N-gram Service and Wikipedia is used to detect non-trivial word segments by solving an opti- mization problem defined in the paper. Next, the frequency of each segment in a time-window is modeled as a binomial distribution, and bursty segments are defined to be those with frequency exceeding the expected value of each distribu- tion. The bursty segments of a time window are ranked by their user frequency, which is the number of users who post tweets containing a segment during that time period and filtered further by keeping only the top-k among them. A seg- ment similarity that incorporates the content of the associated tweets and the temporal pattern of segments within the specified time window is used to con- struct a graph of segments. Then a variant of the Jarvis-Patrick graph clustering algorithm is applied to group related segments. Finally, the detected events are ranked and filtered based on a newsworthiness score calculated using Wikipedia. EnBlogue [4] detects topics emerging in streams of news documents, blog posts and tweets by detecting abnormal shifts in correlations of tag pairs within a given window of time. In other words, the feature used for the detection of events takes the form of pairs of tags. Initially, seed tags are identified by detecting popular tags compared to a sliding window average, and only these are consider Event Detection and Retrieval on Social Media 9 in the next steps. These seed tags are used to generate candidate topics, i.e. pairs of tags that contain at least one seed tag. For each such pair the correlation between the two tags is calculated over time, based on the amount of documents that are annotated with both tags in each timeslot. For each candidate pair, the previous correlation values are used to predict the correlation in the current timeslot. If the actual correlation is larger than the predicted value then the topic is considered to be an emerging topic and the relative prediction error is used as a ranking criterion. For prediction, exponential smoothing is used, which is a forecasting technique that uses a weighted moving average of past data as the basis for the forecast. The event detection method proposed by Cataldi et al. [18] models the life- cycle of terms according to a novel aging theory based on user authority and uses that lifecycle to select emerging terms. Initially, the method creates a rep- resentative term vector for each tweet within a given time window. The term weights are calculated using the augmented normalized term frequency weighting scheme. In the next step, the authority of users is calculated by using a follower graph, following a PageRank-like approach. The proposed content aging theory is then used to detect the lifecycle of each of the keywords. Given a keyword appearing in a specific time interval, a formula, termed as nutrition formula, evaluates the usage of this keyword by considering its frequency in the tweets that mention it and also the authority of each single user that reports it. Once the nutrition of a keyword is obtained for the current timeslot, its energy in the same timeslot is calculated based on the nutrition values of the current and the previous timeslots. Next, the authors propose an approach for the selection of emerging topics based on thresholding of their content energy, where a critical drop value is calculated dynamically based on the average energy value of all keywords. Every keyword with energy below that drop value is discarded, while the remaining keywords form the set of emerging keywords in that timeslot. Each emerging keyword is associated with a correlation vector formed by a set of weighted terms that defines the relationships among that keyword and all other emerging keywords in the considered time interval. Correlation vectors are used then to generate a graph of keywords, and topics are identified by detecting the strongly connected components of the graph. Parikh and Karlapalem [56] proposed an event detection system targeting Twitter, termed ET. The first step of ET aims at extracting event representative features: those are features exhibiting a significant increase in their appearance in a particular timeslot compared to the previous ones. Features correspond to bi-grams after the removal of stop-words and a list of frequent timeslots is associated with each of the features. Next, the set of event representative keywords, is clustered in groups related to the same event by using a combination of content similarity and appearance pattern similarity. The content similarity between two features is calculated by finding the Jaccard similarity between the sets of their associated tweets, but only for the timeslots that the features are frequent. The appearance pattern similarity is the Jaccard similarity between the frequent timeslots of the features. The overall similarity is the weighted 10 M. Schinas et al. sum of the above two similarities, and an agglomerative hierarchical clustering technique is used to group features into events. The approach of Chen & Roy [20] is one of the first to detect events in mul- timedia collections by using feature-pivot methods in the associated tags. Given a set of Flickr photos associated with user provided tags and other metadata, including time and location, the objective is to discover a set of photo groups, where each group corresponds to an event. Associated with photos, each tag occurrence can be modeled with temporal and spatial distributions. These dis- tributions of tags occurrences are analyzed and events are identified as groups of tags that exhibit a similar temporal and spatial behavior. In this work DWT is employed to discover event-related tags with significant distribution in both dimensions. Due to data sparsity, the authors propose the quantization of the data in the original 3D space before the application of DWT. More specifically, the 3D space is segmented into cells by dividing each dimension into intervals of equal size. For the latitude and longitude dimensions, the interval size is set to 1, while for the time dimension each interval represents one day. Next, DWT is applied on each dimension and the cells with weak wavelet coefficients in the transformed space are removed. Dense regions in the transformed wavelet space are detected and propagated from the transformed space to the original spatio- temporal space. Tags that do not belong to any significant region are removed as they are unlikely to be related to events. Finally, to cluster event-related tags a combination of semantic and spatial similarity is used in conjunction with DBSCAN as the clustering method. Sayyadi et al. [73] present a feature-pivot approach termed KeyGraph. For each term extracted from documents, its DF, IDF and term frequency are cal- culated for each timeslot. Then, a KeyGraph is generated by creating a node for each term with DF above some threshold. Terms that co-appear in a number of documents above a threshold are connected. If the conditional probability of the one appearing given that the other appears in some document is below some threshold, the corresponding edge is filtered. The nodes of the resulting Key- Graph are clustered using a community detection algorithm. The algorithm uses the betweenness centrality of edges. Betweenness centrality quantifies the num- ber of shortest paths between any pair of nodes in the graph that pass through a particular node/edge. Nodes/edges with high betweenness centrality values are likely to connect different communities, parts of the graph that are more densely connected inside them than to the rest of the graph. The algorithm progressively removes edges with higher betweenness centrality and that results in the indi- vidual communities of the graph to separate from each other. Additionally, since a term may be relevant to more than one event, the adjacent nodes of a pruned edge, are duplicated in the two sides of the pruned edge (if the conditional prob- ability of the nodes is above some threshold). Finally, for each cluster, a key document is formed by taking the set of terms that have been assigned to it. The set of actual documents are assigned to the clusters by computing cosine similarities. Regarding implementation, in order to more effectively compute be- tweenness centrality, the authors propose to sample pairs of nodes in order to Event Detection and Retrieval on Social Media 11 compute shortest paths. Also, to deal with streaming data, the authors propose the periodic execution of the algorithm on overlapping windows. Topics that are common on subsequent executions can be determined and merged by looking at the documents that are common on both windows. A different feature-pivot approach is that of Guille and Favre [31], in which the role of features is played by terms contained in tweets with mentions between Twitter users. As stated by the authors, in most existing feature-pivot methods, the focus is on features extracted from the textual content of tweets, while the social aspect of social media platforms is ignored. The system proposed in this work consists of successive phases for the detection of events, the selection of representative words describing the events, and finally their ranking based on impact and significance. Regarding the event detection phase, the method con- siders terms contained in tweets with user mentions, and detects whether a term exhibits a burst at each time point by modeling its appearance as a binomial distribution. To identify the interval of the burst for each term, a maximization problem is solved permitting the identification of events of arbitrary length. The identified burst terms are considered as candidate events, and are annotated with additional terms that describe the event by selecting terms having similar temporal dynamics with the main term. Zhang et al. [95] proposed a system to detect burst novel events and predict their future popularity. For event detection term bursts are detected, where a term burst in a given time window is identified by examining the increase in the term weight in that window. The weight of a term in a micro-blog post is calculated as the combination of the augmented normalized term frequency and authority of the user that posted it. User authority, estimated by the PageR- ank algorithm, is incorporated into term weighting under the assumption that the use of a term from influential users increases the significance of the term. To detect bursts, the term usage in each time window is modeled as a Hidden Markov state model (HMM) with two states, "low" and "high". From the de- tected bursty terms in a time window, a directed graph is constructed, where vertices correspond to the terms, and edges between them represent term co- occurrences. The weight of an edge between two terms is estimated using the set of micro-blogs containing both terms as positive evidence, and the set of micro- blogs containing only one of them as a negative evidence against their relation. As that relation is asymmetric, two directed edges are added for each pair, while a normalization method is used to remove edges with small weights. Next, the strongly connected components are detected to form event clusters. 2.2 Document-pivot methods This section discusses methods that detect events by clustering documents on the basis of their semantic similarity. Document-pivot approaches, originating from the field of Topic Detection and Tracking task (TDT) [2] can be seen as a clustering problem. Both RED and FSD approaches have been proposed. In both cases, the underlying principle is quite similar: documents are modeled in 12 M. Schinas et al. ways that capture their semantic content and then a clustering algorithm is ap- plied to group them into events. What differs between approaches is mainly the characteristics of the clustering approach, the way that documents are mapped to feature vectors, and the similarity metric used to identify whether two doc- uments are from the same event. For example, in retrospective event detection, the whole dataset is available, thus an a priori knowledge of the documents' characteristics is available. Compared to the traditional TDT task that assumes that all documents are relevant to events, in social media data, event-related data are mixed with noisy data. In addition, the amount of social media data is much larger than the typical size of a dataset in traditional TDT. Thus, there is a need for scalable and efficient methods. Also, in contrast to TDT where items are text documents, social media items are multi-modal in nature, and often contain visual content, as well as temporal and spatial information. So, their representation is different from the traditional Bag-of-Words representation of documents used in most TDT approaches. Fig. 4. Document-pivot event detection TwitterStand [72] was proposed as a news processing system based on Twit- ter for capturing tweets corresponding to breaking news and for organizing them around these news. The input to TwitterStand ranges from a set of seeders, which are handpicked users that are known to publish news. As collected tweets are noisy, the authors apply a Naive Bayes classifier to classify incoming tweets as junk or news, where junk tweets have a high probability of not being related to the news and hence, are discarded. Tweets are represented by a feature vector using the TF-IDF weighting scheme and clustered into news topics by applying an online clustering algorithm, called leader-follower clustering, which allows for clustering in both content and time. Unsurprisingly, the proposed method has low performance due to fragmentation of news topics, noisy content and the limited power of Bag-of-Words in short texts as tweets. To this end, the authors suggest additional improvements to ensure better clustering results. The work of Petrovic et al. [63] focuses on the FSD problem, which is closely related to the new event detection task. This is done by finding the closest neighbor of an incoming document. If the similarity is below some predefined threshold, meaning that no such neighbor exists, a new story is detected and added to the collection of stories. The main contribution of this work is that the authors propose the use of Locality Sensitive Hashing (LSH) to retrieve fast the Event Detection and Retrieval on Social Media 13 nearest neighbor of the incoming tweets. Tweets are represented as term features vectors and indexed using LSH. However, LSH, as an approximate method, finds the nearest neighbor only if it is reasonably close to the query. The authors propose to compare the distance of the nearest neighbor with some threshold and if it is above some threshold to execute a linear search on the N most recently arrived documents. Additionally, in order to overcome the problems that appear when dealing with open ended data streams, only the most recent documents are considered. Moreover, the authors discuss the problem of event detection: if the best matching document/cluster has similarity above some threshold, then the new item is added to the cluster, otherwise a new cluster is created. Finally, different ways of ranking and filtering the detected clusters are introduced based on the number of tweets or users as well as on the entropy of the number of users. Becker et al. [12] focus on clustering event-related tweets on the same cluster and mainly on separating clusters of tweets as either representing a real-world event or not. In order to group similar tweets, a simple incremental online clus- tering algorithm is used. Each tweet is represented as a TF-IDF vector and each cluster is represented as the average TF-IDF vector of the tweets that it con- tains. When a new tweet arrives, its cosine similarity to all existing clusters is computed. If the similarity to the best matching cluster is above some threshold, then the tweet is inserted into the cluster, otherwise, a new cluster is created. The main focus of that work is the classification of clusters in Event and Non- Event classes. Compared to other works such as [72], this work attempts to discard irrelevant information at the level of clusters instead of doing that at the level of individual items. For each cluster the following features are computed: 1) Temporal features. Two temporal features are used. The first is the deviation from the expected number of tweets containing some term given the frequency of appearance of the term in the last N time units. The second examines how well the number of term appearances fits an exponential growth pattern. These features are computed for the n most frequent terms of each cluster. 2) Social features. The number of social interactions that appear in the tweets (number of mentions, re-tweets and replies). 3) Topical features. Three different features are used, namely a) the average or median similarity of messages to the cluster cen- troid, b) the percentage of tweets containing the first, second, etc. most frequent term, and c) how many of the most frequent terms are contained in at least n% of the the tweets. 4) Twitter centric features. Three features are used, namely a) the percentage of tweets that contain tags, b) the percentage of tweets that contain the most frequently used tag, c) a binary variable indicating whether the most frequently used tag is a concatenation of multiple words or not. Lee [37] proposed to apply a density-based online clustering method on micro- blog text streams to obtain temporal and spatial features of real-world events. Regarding the representation of incoming documents, a novel term weighting method, called BursT, is used. This method is supposed to handle the concept drift problem that occurs in evolving data streams. The similarity between two documents is defined as the cosine similarity of the corresponding BursT vectors, 14 M. Schinas et al. and a temporal penalty is introduced to adjust the similarity according to the time distance between documents. To deal with the large volume of documents, the authors propose the use of a sliding window model, i.e. only a subset of the most recent documents is kept for analysis. Finally, the employed clustering algorithm is the density-based incremental DBSCAN. Therefore, the shape of clusters may change over time. When event clusters are detected, the next step is to analyze their spatial distribution. A location feature vector, which records the location distribution of the events at specific time points, is used to distinguish whether the detected events are local or global. A major challenge that the previous approaches face is the high degree of lexical variation in documents that makes it difficult to detect stories about the same event using different words. The problem becomes even worse in micro-blog platforms such as Twitter given the brevity (limited text content) of posts. In that scenario, a tweet could be flagged as a first story even if a related tweet, which uses different but synonymous words, was already returned as a first story. Petrovi´c et al. 2012 [64] extended their LSH-based method [63] by suggesting the use of paraphrases to alleviate this problem. They proposed a novel way of integrating paraphrases with LSH in order to obtain an efficient FSD system that can scale to very large datasets. In a similar way, Moran et al. [51] proposed a new way of automatically computing the lexical paraphrases using word em- beddings. There has been an extensive amount of prior research that has shown that the cosine similarity between word embeddings is correlated with the se- mantic relatedness between the corresponding words. Moran et al. made use of this property by considering two words to be lexical paraphrases if the cosine similarity between their word embeddings is sufficiently high. After that step, the same approach the one by Petrovi´c et al. [64] is followed. Aggarwal and Subbian [1] propose an incremental online clustering approach to detect events from social streams. Clusters are represented with cluster sum- maries, which are used for comparisons with the incoming documents. Each summary, corresponding to an event, contains a node-summary, which is the set of users together with their frequencies and a content-summary, which is a set of words and their corresponding TF-IDF values. To maintain and update these summaries per cluster, a sketch-based technique is used. The similarity between a new document and a cluster is the combination of nodes and content similar- ity, controlled by a balancing parameter. By incorporating nodes similarity, the authors propose a novel similarity that exploits the underlying social structure of the network. According to them, this improves the content-based similarity proposed by previous works [12,63,72]. Each incoming document is assigned to its closest cluster, according to the aforementioned similarity, unless this simi- larity is significantly lower than that of other documents assigned to the cluster. A similarity score is considered significantly lower if it is lower than µ − 3σ, where µ is the mean value of all previous similarities, and σ is the standard deviation. In that case, the document creates a cluster of its own, and one of the current clusters is removed on grounds of staleness. In that way, by keeping Event Detection and Retrieval on Social Media 15 a fixed number of cluster summaries, the comparisons required is reduced to a fixed number. Becker et al. [10] address the problem of partitioning a set of documents into clusters in a way that each cluster corresponds to the documents that are associated with one event. They use multiple types of social media features, including text, time and location. For each modality, an appropriate similarity function is used. For example, cosine similarity for text and Haversine distance for location. The paper proposes ensemble clustering in conjunction with online clustering algorithm, as a method to cluster similar documents into events. En- semble clustering is an approach that combines multiple clustering solutions for a documents set. The first step of ensemble clustering is to select a set of clus- terers that partition the data using the different modalities and the appropriate similarity metrics. To cluster the document according to each modality, the au- thors used a single-pass incremental algorithm, similarly to [10]. More precisely, given a threshold µ, a similarity function according to some modality and a set of documents, the algorithm assigns each document to the best matching cluster if the similarity is above µ. Otherwise a new cluster is created. A training step is necessary to select the most suitable threshold setting for each modality and to assign a weight to each clusterer indicating the confidence in its predictions. The second step combines individual partitions to a single partition. Each clusterer is regarded as providing an expert vote on whether two documents belong to the same cluster. For a pair of documents and a clusterer, a prediction function is defined as equal to 1 if the two documents are in the same cluster, and 0 otherwise. Then, the consensus score for that pair of documents is computed as the weighted sum across all clusterers. This is a late fusion strategy, where the different modalities are combined at the last stage of the procedure. There are many research efforts in the direction of early fusion, by integrating different modalities in a single similarity metric. The work of Becker et al. [11] extends their previous approach [10] by proposing alternative ways of combining the results of ensemble clustering. Instead of combining individual partitions as in traditional ensemble clustering setting, the learned weights and thresholds are used as a model for similarity metric across multimodal social media items or between items and cluster centroids. Hence, a single-pass incremental clustering algorithm can be used in conjunction with the combined similarity metric. The authors also propose the use of a classification model to learn document similarity functions for social media. In other words, a classifier using as input features the raw similarity scores corresponding to the document features is used to compute whether a pair of documents belongs to the same event. Both SVM and Logistic Regression have been used, with the latter experimentally shown to perform better. Reuter & Cimiano [66] attempt to solve the problem of grouping documents related with the same event into the same cluster in a similar manner with [11]. The authors use a single-pass incremental clustering algorithm and define the similarity between an incoming document and a given event cluster as the like- lihood probability that the document belongs to the cluster. This probability 16 M. Schinas et al. Fig. 5. Similarity learning approach by Petkos et al. [59]. An annotated dataset X is used to obtain training examples consisting of distance vectors and the corresponding labels. These are used to learn the classifier f that is applied on the distance vectors of a new dataset Y to predict the corresponding indicator vectors that are used for clustering. is computed using an SVM classifier on the textual, geographical and temporal dissimilarities between documents and clusters. Two contributions of [66] com- pared to [11] is the introduction of a candidate retrieval step and the use of an additional classifier that determines whether the incoming document belongs to the top scoring candidate event or rather to a new event. The candidate retrieval step aims to make the method scalable by decreasing the number of comparison between incoming documents and events. Specifically, for each document the nearest events are retrieved with respect to each modality. For the new event detection problem, instead of using a simple threshold and assign a document to an event if the similarity exceeds this threshold, the authors propose the use of a classifier that predicts the probability that a document belongs to an existing or to a new event. Petkos et al. [59] present an approach for multimodal clustering designed for Flickr images. First, a baseline approach is presented, in which a weighted sum of the affinity matrices of the different modalities is computed and then, similarly to a common spectral clustering algorithm, the corresponding graph is pruned, the Laplacian matrix is computed and the minimum cut of the graph is found. Given the difficulty to estimate the best values for the different parame- ters of that approach, and the fact that the clustering output is sensitive to these parameters, an approach that uses a known clustering is proposed to supervise the multimodal fusion and clustering procedure. Pairwise distances per modal- ity are first computed. Then, for each pair of items, the distances per modality are compiled in a single vector. These dissimilarities vectors is used to learn the typical "same cluster" relationship for multimodal items. Having learned such a classifier, one can form an indicator vector for each of the new items to be clus- tered. This indicator vector summarizes the "same cluster" relationship between Event Detection and Retrieval on Social Media 17 each item and all other items to be clustered. Items that have similar indicator vectors should belong to the same cluster. Therefore, a final clustering result can be obtained by clustering the indicator vectors, for example by applying a spectral clustering algorithm. Bao et al. [7] proposed a method for the clustering of social multimedia into events without the need for a single representation for each individual item. Contrary to other methods that adopt early or late fusion for combining the different modalities, the authors represent a collection of social media items as a star-structured K-partite graph, where the items/documents are regarded as the central vertices and different modalities are treated as the auxiliary vertices that are pairwise independent with each other but correlated with the central vertices. Four types of modalities are considered, publication time, location, visual content and text, while different ways to calculate inter-relationships are used. Then, a graph co-clustering approach, termed information theoretic co-clustering, is used to partition the graph into events. Wang et al. [87] proposed an event detection method that incorporates on- line social interaction features. As stated by the authors, as real-world events are intrinsically social, it is natural to expect that participation in the physical event will motivate people attending them to interact online with shared media associated with that event. Social interactions around photos, including actions such as posting a comment, adding a tag, or liking the photo, are modeled using an undirected graph with three conceptual layers: photos, users and tags. Each unique user, photo and tag form the vertices of the graph, while edges, symmet- ric or asymmetric, can have various semantics. The social affinity between two photos is the random walk probability from one photo to the other, calculated by a Random Walk with Restart algorithm. This affinity, combined with other similarities from features like time, location and text, is used in an SVM classifier to calculate a single value similarity measure, as in [11] and [66]. Petkos et al. [62] recently proposed a clustering approach for the multimodal clustering problem. Similar to their previous work [59], relevant clustering ex- amples are used to learn an SVM classifier of the "same cluster" relationship between pairs of multimodal items. The used modalities include text, visual content, the uploader's identity, creation time and location. An important com- ponent of the proposed approach relies on the capability for fast retrieval of same cluster candidates per item for each of the different modalities, so that the model can be applied only on the candidate items. For that purpose a different index was used per modality. Given two images, which are expressed through a set of features, a vector that contains the per-modality distances is calculated. The same cluster model then predicts if the two items belong to the same cluster. The learned model is subsequently used to organize items in a graph, where the nodes represent the items and links between pairs of nodes are inserted if the model predicts that the corresponding items belong to the same cluster. Even- tually, a graph clustering algorithm is applied to produce the final clustering. The proposed approach uses two variants, a batch community detection algo- 18 M. Schinas et al. rithm (SCAN) and an incremental algorithm, the Quick Community Adaptation (QCA). 2.3 Topic modeling methods This section describes approaches based on probabilistic models that detect events in social media documents in a similar way that topic models identify latent topics in text documents. Originally, topic models relied on word occur- rences in text corpora to model latent topics as a mixture of words, and doc- uments as a mixture of the identified set of topics. Latent Dirichlet Allocation (LDA) [15], which is the most known probabilistic topic modeling technique, is a hierarchical Bayesian model where a topic distribution is assumed to have a sparse Dirichlet prior. The model is depicted in Figure a. α is the parameter of the Dirichlet prior on the per-document topic distribution θ and φ is the word distribution for a topic. K denotes the number of topics, M denotes the number of documents while N is the number of words in a document. Given that words W are the only observable variables, the learning of topics, word probabilities per topic, and the topic mixture of each document is tackled as a problem of Bayesian inference solved by Gibbs sampling. Compared to traditional topic modeling, topic modeling in social media dif- fers mainly because social media documents are multimodal items. Thus, it is not only words in the text that are observable variables, but also other modal- ities such as the user who posted the document, visual words extracted from embedded images, publication time and quite often the location from where the document originates. In addition, given the short length of documents in social media, and mainly in micro-blogging platforms such as Twitter, the basic as- sumption that a document is a mixture of topics is more likely to be violated. For that reason many approaches have been proposed that extend traditional models to be aligned with the characteristics of social media data. Some of the most well-known extensions of LDA include TOT [86], TwitterLDA [96], and MMLDA [14]. In TOT, depicted in Figure c, topic discovery is influenced not only by word co-occurrences, but also by the temporal information contained in document timestamps. TwitterLDA, which is depicted in Figure b, extends standard LDA to model tweets. Each tweet is assumed to be related to a single topic Z, which subsequently is influenced by the topic distribution of user u who posted the tweet. In TwitterLDA words in a tweet can be chosen either from a topic-word distribution φ or from a background distribution φB. Given the fact that social media messages may contain multimedia content, there are topic models that take into account not only text but also visual content. A notable method in that direction is MultiModal LDA (MMLDA) that uses visual words alongside text words to identify topics. MMLDA is basically an extension of TwitterLDA as shown by Figure e. The same assumptions of a single topic per document, and two word distributions, a topic-specific φW G and a background distribution φW G, are also made. In addition, MMLDA incorporates visual words for each document that is modeled similarly to textual words. To generated visual words, Event Detection and Retrieval on Social Media 19 SIFT features are extracted from the images, and a bag-of-visual-words model is applied on them. When the target is the detection of events, in contrast to topics, the spatial and temporal dimensions provide important clues. For that reason, approaches aiming at event detection usually employ models built upon the assumptions made by models like TOT, TwitterLDA, and MMLDA. In general, there are two approaches in the use of probabilistic models. The first approach uses these models to represent documents and detect event in a same way as the document- pivot approaches. The second approach includes methods that consider events as latent variables to be learned alongside other variables such as time, location words, and topics. In this section we present methods from both approaches, but we focus mainly on the latter. Zhou and Chen [98] propose a graphical model called Location-Time Con- strained Topic (LTT) that extends TOT by incorporating latitude and longitude of social media messages as additional variables la and lo respectively. In other words, the posterior distribution of topics depends not only on words but on three more attributes, time, latitude and longitude, drawn from three Beta dis- tributions ψ, δ and γ. The plate notation of LTT model is depicted in Figure d. Given the LTT model, messages are represented as a distribution over the topics and the similarity between two messages is measured by a distance metric be- tween these distributions based on the Kullback-Leibler (KL) divergence. As the LTT fuses content, time and location attributes, the calculated distance captures an overall content dissimilarity between two messages over these three modal- ities. The next steps follow the document-pivot paradigm presented in section 2.2. A complementary measure is proposed that embeds the previous content similarity with a link similarity, based on conversational signals between users. Finally, events are detected using efficient similarity joins over the social media stream of messages. You et al. [92] propose an approach for event detection on Twitter that uses a hierarchical Bayesian model named General and Event-related Aspects Model (GEAM). This assumes that in the whole corpus of tweets there are E events and K topics, while each event has A event-related aspects. Figure h depicts the plate notation of GEAM. Attribute e is a latent variable assigned to each tweet specifying to which event that tweet is related. GEAM also introduces a switch variable x, drawn from a binomial distribution that indicates whether a word W in a tweet comes from a general topic word distribution or an event-related aspect word distribution. φ is a multinomial distribution over words specific to topic z or event e, which is drawn from a Dirichlet distribution parameterized by β. In other words, each word in a given tweet can be associated with a general topic Z or an event aspect a (i.e. time, locations, entities, keywords). Each tweet is modeled not only as a multinomial distribution over topics, as in LDA, but also assigned a latent variable e specifying which event the tweet is describing. The collapsed Gibbs sampling method is used in a similar manner as LDA to estimate the unknown parameters of GEAM. 20 M. Schinas et al. To extract events in tweets and assign events to categories, an unsupervised latent variable model, called Latent Event and Category Model (LECM) was proposed by Zhou et al. [97] and depicted in Figure j. To discard noisy tweets, the proposed system trains a lexicon-based binary classifier. Each of the remaining tweets is assigned to a single event e, drawn from an event Dirichlet distribution π, while each event is modeled as a joint distribution over the named entities y, date d, location l and event-related keywords k. The basic assumption in LECM is that tweets containing the same named entities, occurring at the same time and in the same location and having the same keywords are likely to be assigned to the same event. The model also assumes that each event e is assigned to one specific event type t, from a set of C event types. That type is modeled as a joint distribution over multinomial distributions y(cid:48) and k(cid:48) of semantic classes and event-related keywords respectively. Semantic classes are mapped from named entities using the Freebase API. For example, as described in the paper, a named entity corresponding to a singer could be mapped to the "music" class. Compared to GEAM, tweets in LECM are assigned only to an event instance and general topics are missing. Cai et al. [17] proposed a framework for event detection, tracking and vi- sualization from a collection of Twitter data. For the event detection step, the method uses a model termed Spatio-Temporal Multimodal TwitterLDA (STM- TwitterLDA), and TwitterLDA with MMLDA. The plate notation of STM- TwitterLDA is depicted in Figure g. Words in tweets are divided into two cat- egories general and topic-specific words as in TwitterLDA and MMLDA. The same holds for the images contained in tweets. However, instead of sampling visual words using Dirichlet multinomial distributions as in MMLDA, STM- TwitterLDA uses CNN features to represent images and model the normalized CNN features by two Dirichlet distributions, a topic-specific and a general one. Two latent random variables x and y act as the general/specific indicators for words and images in a given tweet. In contrast to TwitterLDA that defines a topic distribution per user, in STM-TwitterLDA a topic distribution θ is shared across tweets collected from the same location. In addition, each topic is a mixture of four distributions: a multinomial distribution over hashtags φ, a multinomial distribution over topic-specific words φW S, a Beta distribution over timestamps ψ, and a Dirichlet distribution over specific images βV S. There are also two dis- tributions not conditioned on topics: a Dirichlet multinomial distribution over general words φW G and a Dirichlet distribution over general images βV G. Hu et al. propose ET-LDA [35], a joint model used to align events transcripts from an event with associated Twitter messages. The model is depicted in Figure i. It consists of two components, an event and a tweets part, with each having an LDA-like structure and being influenced by a shared topic-word distribution φ. In the event part, the model assumes that an event is formed by sequential segments, each of which discusses a set of topics. A segment consists of one or more paragraphs available from the transcript of the event, with each paragraph s ∈ S to be associated with a particular distribution of topics θ(s). The evolution of topics in the event is modeled by associating a binary variable c(s) with each Event Detection and Retrieval on Social Media 21 paragraph. Based on the value of this variable, the distribution of topics θ(s) in a paragraph s is either chosen from a Dirichlet distribution or considered the same as the previous paragraph s − 1. In the later case, these subsequent paragraphs are merged to form a coherent segment. In the tweets part, the words in a given tweet can be sampled from two distinct topic mixtures depending on a binary variable c(t). Based on the value of c(t) for each word w, the word can be drawn either from a distribution of specific topics θ(s), related to the segments of the event, or from a distribution of general topics ψ(t) over K global topics. In the first case, θ(s) is associated with a segment s of the event, which is selected according to a categorical distribution s(t). Wei et al. [89] propose a Bayesian graphical model depicted in Figure f to discover latent events, identify the spatial and temporal region they occur and associate them with tweets. An event is considered as an extension of topics, having a topical focus but also including a spatial and temporal region in which it occurs. Thus, an event instance e, drawn from a multinomial distribution with a prior γ, is defined as a joint distribution over time, location and words. Given a set of E possible events a tweet is associated with a single event instance e. The location of a tweet associated with event e is assumed to be drawn from a two-dimensional Gaussian distribution l ∼ N (θ(L) is the geographical center of the event e and σ(L) its variance. In the same way, the time of a tweet is also modeled as a Gaussian distribution t, with mean θ(T ) and a variance of σ(T ) . The words appearing in a tweet are modeled by a category variable z, which is controlled by a multinomial distribution. This variable de- termines the topic category, therefore the Dirichlet distribution φ∗ from which a word w is drawn. φ0 represents global topics that occur across all tweets. φL defines a set of region-specific topics. φT represents a set of temporally aligned topics that contain words occurring within different temporal factions of the data. φT corresponds to topics that are representative of a particular event e. Thus, each word w in a tweet is chosen from one of the above topic distributions according to category variable z and the corresponding spatial, temporal and event variables, l, t and e. ), where θ(L) e e e , σ(L) e e e Diao and Jiang [25] proposed a model that combines an LDA-like topic model with the Recurrent Chinese Restaurant Process to capture topics and events from a stream of tweets. As in many topic models, topics are modeled as a multino- mial distribution over words. Each event is also a multinomial distribution over words. As topics are long-standing and stable, their number is fixed, while for events a non-parametric model, called the Recurrent Chinese Restaurant Pro- cess (RCRP), is used to model the birth and death of events. Each user has a multinomial distribution over topics. A latent variable drawn from a user-specific Bernoulli distribution indicates whether a tweet is topic- or event-related. For topic tweets, the topic is sampled from the corresponding users topic distribu- tion. For event tweets, the event is sampled according to the Recurrent Chinese Restaurant Process. Apart from LDA-inspired approaches, several works were proposed that are based on other probabilistic and statistical models. The paper of Benson et al. 22 M. Schinas et al. (a) Latent Dirich- let Allocation (LDA) [15] (b) Twitter LDA [96] (c) Topic over Time model (TOT) [86] (d) Location Time Constrained Topic (LTT) [98] (e) MultiModal LDA (MMLDA) [14] (f) Bayesian Graphical Model for Latent Events discovery [89] (g) Spatio Temporal Multi- Modal TwitterLDA (STM- TwitterLDA) [17] (h) General Event Aspects (GEAM) [92] and related Model (i) Joint Event and Tweets LDA (ETLDA) [35] (j) Latent Event and Category Model (LECM) [97] Fig. 6. Probabilistic models for event detection, compared to Latent Dirichlet Alloca- tion [15]. The parts depicted with dotted lines refer to the original LDA model. Event Detection and Retrieval on Social Media 23 [13] proposes a probabilistic graphical model for the discovery of event records in social media feeds. The approach simultaneously analyzes individual messages (tweets), clusters them according to events, and induces a canonical value for each event property. The graphical model addresses the event detection problem by learning a latent set of records and a record-to-message alignment simulta- neously. Records are tuples < R1, R2 > which represent records values for the schema < ART IST, V EN U E >. Each message has a sequence labeling, where the labels consist of the record fields and each token in the message has an as- sociated label. Messages, labels and records represented as a probabilistic factor graph and message to record alignment is performed using a variant of the con- ditional random fields method (CRFs). Although the authors aim at detecting a specific type of event records, the method can be generalized to different and more complex event cases. Similarly to the work of Benson et al. [13], TwiCal [69] provides a struc- tured representation of significant events by extracting a 4-tuple representation of events from Twitter items, which includes a named entity, event phrase, calen- dar date, and event type. Given a raw stream of tweets, TwiCal extracts named entities, event phrases, and resolved temporal expressions to detect events, which are then categorized to specific types. For named entity recognition an optimized named entity tagger trained on in-domain Twitter data was used. Extraction of event phrases is formulated as a sequence labeling task, solved with Conditional Random Fields for learning and inference. As there are many different ways users can refer to the same calendar date, depending on the publishing date of the tweet, a resolution of temporal expressions is performed to identify when the events described by the event phrases occur. To categorize the extracted events into types an unsupervised approach is proposed based on latent variable models that infers an appropriate set of event types to match the data, and also classifies events into types by leveraging large amounts of unlabeled data. Each event phrase in the data is modeled as a mixture of event types, and each event type corresponds to a distribution over named entities. Inference of that generative model is similar to an LDA variant, termed LinkLDA [28]. Finally, extracted events are ranked by measuring the strength of the association be- tween an entity and a specific date in the event. The strength is estimated by the G2 log-likelihood ratio statistic between the occurrences of the entity and the date in the tweets of the dataset. 3 Event-based Retrieval and Summarization Given real-world events, which are detected automatically or can be introduced in the form of user queries, there is a need for methods that identify and orga- nize additional social media content associated with these events. When events take the form of user provided queries, there is no content available. In case of automatically detected events, the content used for the detection is usually associated with the events, but additional content that augments the event, can be discovered. In both cases, the discovery of relevant content can be seen an 24 M. Schinas et al. information retrieval problem. This task is different from the traditional docu- ment search problem, where a user's information need is fulfilled by one or more relevant documents. In social media applications, information needs cannot be satisfied by a limited set of social media posts due to the limited content and context provided by individual messages. To add substantial value for users, more structured and diverse lists must be returned. Furthermore, due to the increasing popularity of micro-blogging platforms, the amount of event-related posts has reached impressive levels. Also, event-related streams or collections are highly diverse, with different associated topics and conversations among users, and a high degree of redundancy. In addition, as relevance and significance of the messages may vary, there is a profound need for event-based summarization mechanisms that can produce concise summaries, covering the main aspects of the event. 3.1 Event-based retrieval An information need is usually expressed as a simple and short query, consist- ing of few terms. That makes the finding of relevant messages a challenging task, since social media messages may not contain any of the terms even if they are related to the query. Furthermore, when it comes to event-related queries, the events have a temporal and very often a spatial dimension that should be considered in the retrieval process. To this end several methods have been pro- posed to support information retrieval on social media messages and mainly on micro-blog collections [21,22,50,77]. For the evaluation of retrieval approaches in micro-blogs a special track6 took place as part of the Text REtrieval Conference (TREC) from 2011 to 2015. Given a set of topics of interest, expressed by title, description and time, the scope of the track was the retrieval of relevant con- tent from collections of tweets. Although, not limited to event-based retrieval, these micro-blog retrieval approaches are the basis for event-oriented retrieval. Additionally, efficient and accurate retrieval is an important step of the event summarization process, as relevance calculation is a core part of summarization. Fig. 7. A general processing pipeline for event summarization. Becker et al. [8] proposed a two-step system to obtain Twitter messages related to planned events. Given an event, the first step is to build a query 6 http://trec.nist.gov/data/microblog.html Event Detection and Retrieval on Social Media 25 derived from the event, aiming at high precision results. Queries are formed based on the structured description of an event, and its other aspects, such as the venue the event takes place. Intuitively, these highly restrictive queries return only messages that relate to the planned event, but at the expense of recall. To improve recall, term-frequency analysis is performed on the high-precision tweets to identify descriptive terms and phrases, which are used, in turn, to define new queries. A rule-based classifier is then used to select among this new candidate queries, and then use them to retrieve additional event messages. Becker et al. [9] extended their previous work [8] to support identification of content for planned events across multiple social media sites. To this end, the authors developed a set of query formulation strategies used to retrieve content associated with an event. The main motivation is that some platforms like Twit- ter can be useful as a mean for timely event detection, while others like Flickr or YouTube can be used to augment the events with additional multimedia con- tent. Similar to [8], a two step query-generation approach is proposed for the retrieval of content given an event. First a precision-driven set of queries is con- structed based on event attributes such as title, description, date and location. These queries are directed to each target platform to retrieve a limited but highly relevant set of social media documents. Two approaches are then proposed to formulate new recall-driven queries based on these documents. The first is to extract the most frequently used n-grams, while weighing down terms that are naturally common in the English language. To normalize n-grams frequency, a language model built from web documents was used. The second approach aims to identify meaningful event-related concepts in the ground-truth data using an external reference corpus. A web-based term extractor was used that leverages a large collection of web documents and query logs to construct an entity dic- tionary, and uses it along with statistical and linguistic analysis methodologies to find a list of significant terms. In addition, the use of event content from one social media site to help retrieve event documents from another social media site is investigated. This is useful when the precision-oriented strategies do not re- trieve results from all sites. For example, if the precision-oriented queries fail to retrieve any documents for one site, and hence the method cannot generate any recall-oriented query for that site, documents retrieved from another platform can be used as input to the query construction step. Liu et al. [41] presented a method that combines semantic inferencing and visual analysis aiming at finding media (photos and videos) illustrating events in an automatic way. As a first step in the procedure, given some event de- scriptions, event directories such as Last.fm, Eventful and Upcoming are used to obtain structured information about the events, which are then converted into the LODE ontology [78]. Explicit relationships between scheduled events and photos hosted on Flickr can be looked up using special machine tags. However, the set of images available on the web that can be explicitly associated to events using machine tags is generally a tiny subset of all media that are actually rele- vant to the event. To this end, the authors investigate several approaches to find 26 M. Schinas et al. these images, querying by title, geo-location and time and pruning irrelevant media. Metzler et al. [49] tackled the problem of structured retrieval of historical event information over micro-blog archives, by proposing a novel temporal query expansion technique. Given a user query, the approach first retrieves a set of timespans for which the query keywords were most heavily discussed. Timespans are subsequently ranked according to the proportion of messages posted during them. Considering these timespans as related to the event is a kind of pseudo- relevance feedback mechanism. For each pseudo-relevant timespan, a burstiness score is computed for all terms that occur in the messages posted during it. The idea is that during a timespan in which a query is being heavily discussed another term that is trending might also be related to the event. The final step of the query expansion process is to aggregate the burstiness scores across all pseudo-relevant timespans to generate an overall score for each term. The k highest weighted terms are then used for expansion. The expanded query is then used to retrieve additional content and identify the highest scoring timespans in the same way as in the first step. The final step of the retrieval process is to produce a short summary for each retrieved timespan. This not only returns ranked individual messages, but also a ranked list of historical event summaries, with respect to the original query. Given a timespan, the summary is produced by a simple IR language model that selects messages that are found to be the most relevant to the expanded representation of the original query in that timespan. 3.2 Event-based summarization Given a set of event-related messages, for example by using an approach such as the previous ones, there is often a need to select only a representative subset of these. A substantial body of research efforts attempt to solve this text summa- rization problem, which is a special case of the Multi-Document Summarization (MDS) problem. One of the first MDS approaches relies on the generation of a content-based centroid. Then, the summary of a set of documents, represented by TF-IDF vectors, consists of those documents that are closest to the centroid. Graph based approaches have also been proposed to detect salient sentences from multiple documents, with LexRank [27] being the most notable among them. This first constructs a graph of sentences (nodes), with the textual sim- ilarity between two sentences serving as the connection (edge) between them. Then, it computes the saliency of each sentence using some centrality measure, such as the Eigenvector Centrality or its well known variant, PageRank. These approaches are based on the observation that the most central messages in a cluster are more likely to reflect key aspects of the event than other, less cen- tral messages. One of the first works that use centrality-based methods to select subsets of messages is that of Becker et al. [9], which propose a centrality-based approaches to extract high-quality and relevant tweets with respect to a specific event. However, the text brevity, informal writing and non-grammatical character of many micro-blogging posts, as well as the diversity of the underlying topics make Event Detection and Retrieval on Social Media 27 the summarization problem much more challenging in the context of social media compared to the traditional MDS setting, where the input collection consists of long well-formed documents. In addition, the temporal dimension, which is a crucial element of micro-blogging posts, and the social interaction between users in social media platforms, are disregarded by previous MDS methods. To this end, numerous methods were proposed that incorporate not only the textual information of documents, but also their temporal and social aspects. The core idea of the majority of previous works is the clustering of documents set into coherent topics or sub-events and the selection of the most "representative" documents in each segment. Although there are works that investigate the use of social dimension to the problem of event detection [31], to our knowledge, this dimension is usually disregarded, compared to the number of methods that are based on content and temporal information. Nichols et al. [53] describe a sports event summarization algorithm. Given a collection of tweets related to a specific event, the method uses a peak detec- tion algorithm to detect important moments in the timeline of tweets. Then, it applies a graph-based technique to extract important sentences from the tweets around these moments. In [23], the authors propose a probabilistic model for topic detection in Twitter that handles the short length of tweets and considers time as well. Instead of relying only on the co-occurrences of words (as the ma- jority of traditional probabilistic text models do), the proposed model uses the temporal proximity of posts to reduce the sparsity of the term co-occurrence ma- trix. Then, for each detected topic, the method considers the set of tweets with the highest similarity to the topic word distribution as the most representative. Shen et al. [79] present a participant-based approach for event summarization, which first detects the participants of the event, then applies a mixture model to detect sub-events at participant level, and finally selects a tweet for each detected sub-event based on the TF-IDF centroid approach. In a similar work, Chakrabarti and Punera [19] propose the use of a Hidden Markov Model to obtain a time-based segmentation of the stream that captures the underlying sub-events. Recent works have focused on the creation of visual event summaries based on messages and content shared on social media. TwitInfo [44] is a system for summarizing events on Twitter through a timeline display that highlights peaks of high activity. Alonso and Shiells [3] create football match timelines annotated with the key match aspects in the form of popular tags and keywords. Dork et al. [26] propose an interface for large events employing several visualizations, e.g., image and tag clouds. However, the aforementioned methods only make use of textual and social features for creating visualizations, and ignore the visual content of the embedded multimedia items. The increasing use of multimedia content in micro-blog platforms has mo- tivated numerous studies to consider visual information alongside text. Bian et al. [14] proposed the use of MMLDA (cf. section 2.3) for detecting topics si- multaneously taking into account the textual and visual content of posts with embedded images. The topics identified by MMLDA are used to calculate cov- 28 M. Schinas et al. erage and diversity for each image in the dataset. Finally, the output of this method is a set of representative images for the underlying event that maximize these measures. A slightly different problem was tackled by Lin et al. [39]. Unlike other methods that generate summaries as sets of posts or images, this method aims to create a storyline from a set of event-related multimedia objects. To this end, it constructs a multi-view graph of objects, with two types of edges, visual and textual, capturing the content similarity along with the temporal proximity among objects. Then, it extracts a time-ordered sequence of important objects based on Steiner trees [85]. Meladianos et al. [48] proposed a system that, given an event-related set of tweets, identifies the key moments (sub-events) of the event, and select a tweet to best describe each sub-event using a simple yet effective heuristic. The input set of tweets is represented as a graph-of-words, where nodes correspond to words extracted from the whole set, while edges indicate that the two terms co-occur in any tweet of the input set. Then, using the graph degeneracy concept, term weights are extracted. To detect sub-events, the stream is divided in time intervals for which a graph-of-words is generated. Then, using the weights of the terms as determined by the degeneracy-based weighting mechanism, a sub-event is reported if there is a sharp increase in the terms, regardless of the number of tweets in that time-interval. If a sub-event has been detected, then the tweets in that time interval are scored, by the the sum of their term weights, and the highest-scored tweet is selected. Gao et al. [30] propose a joint topic modeling method to summarize events across news and social media streams. The method leverages a topic model- ing approach, termed cross-collection Topic-Aspect Model (ccTAM), that com- bines cross-collection LDA (ccLDA) [57] with a Topic-Aspect Model (TAM) [58]. ccLDA is an extension of LDA, in which each topic is associated with two classes of word distributions: a shared distribution among all collections, and one that is specific to the collection from which the document comes. TAM decomposes each document not only into a mixture of topics, but uses a second mixture that represents the underlying aspects in the collection of documents such as different perspectives and viewpoints. The novelty in the work of Gao et al. is that the proposed ccTAM uses two complementary types of information as input, news and tweets, which are represented in a joint fashion as mixtures of topics and as- pects. To produce a summary of the event, a bipartite-graph ranking algorithm is used, where the nodes at one side correspond to sentences extracted from the news and those at the other side correspond to tweets. As a transition probabil- ity is necessary for the edge weights between tweets and sentences, the output ccTAM is used to calculate a complementary measure between these two parts. Finally, the top ranked sentences and tweets at both sides are used to generate a news summary and a tweet summary in such a way that the predefined length of the summaries are met. MacParlane et al. [47] proposed a method to select and rank a diverse set of images with a high degree of relevance to a given event. A unique characteristic of this work is the use of external sources of multimedia content, such as websites, Event Detection and Retrieval on Social Media 29 in cases where the amount of images in the posts of an event is insufficient for the creation of meaningful visual summaries. To detect and remove near-duplicates among the images, and thus to increase visual diversity, the Perceptual Hash (pHash) method 7 is used to cluster images into sets of near-duplicates, such as as brightness or contrast adjusted images, resized or slightly rotated, or images with embedded watermark. Then, they use visual features in conjunction with an SVM classifier to discard irrelevant images and images of low quality, such as memes and images with heavy text. Finally, they evaluate numerous rank- ing methods based on clustering, for selecting a small number of representative images for the event. Schinas et al. [75] proposed a framework that uses an event-related set of so- cial media items, to create a visual summary that describes the main moments of the event. To overcome the problem of spam and noisy messages, the framework first discards irrelevant and low quality messages, using a set of filters based on textual and visual clues. Then a multi-graph is generated, in which vertices correspond to messages, while four types of edge represent different types of as- sociation between the messages. More specifically, two types of undirected edges are used to represent textual and visual similarity, and two types of directed edges represent temporal proximity and social interactions (e.g. shares, replies, etc). Since there is a high degree of redundancy in social media collections, a vi- sual de-duplication step follows. Using the subgraph corresponding to messages with embedded multimedia, the Clique Percolation Method is used to find and merge sets of messages that are visual duplicates. Then, to detect topics and sub-events on a main event, the Structural Clustering Algorithm for Networks (SCAN) is used. To create a visual summary, the messages are ranked accord- ing to a score that integrates social attention topic coverage. Finally, messages having images are re-ranked using the DivRank iterative scheme, a variant of PageRank, designed for improving content diversity in the ranking process. 4 Datasets and Evaluation To evaluate the performance of event detection methods several metrics have been proposed and used in the related literature, with precision and recall being the most common among them. Given a set of candidate events reported by a method, precision measures the percentage that correspond to actual events. Recall on the other hand, indicates the percentage of events that the methods managed to detect out of the whole set of reference events in the dataset. How- ever,these metrics alone are not sufficient, as they cannot capture the quality of the detected events. This is more evident in the case of document-pivot and topic modeling approaches, where an event is reported as a set of documents related to the event. Thus, there is a need for metrics that compare detected and actual events at the level of their documents. Given a set of events and a dataset of related documents combined with non-event documents, the performance of a method that returns documents 7 http://www.phash.org/ 30 M. Schinas et al. for each of the events can be measured by calculating precision and recall at the level of documents. Precision is the fraction of returned documents that truly belong to an event, while recall measures the fraction of all event-related documents returned by an approach. Macro F-score is the harmonic mean of precision and recall. Thus, it measures the goodness of the retrieved photos, but not the number of retrieved events, or how accurate the correspondence between retrieved images and events is. This is done by the Normalized Mutual Information (NMI) [80], which compares two sets of clusters, where each cluster comprises the documents of a single event), jointly considering the goodness of the retrieved documents and their assignment to different events.Another metric is B-Cubed [6] that estimates the precision Pb and recall Rb associated with each document in the dataset individually, and then uses the average precision and recall values for the dataset to compute their harmonic mean: Cluster(d) ∩ GroundTruth(d) 1 D (cid:88) (cid:88) d∈D d∈D Pb = Rb = Cluster(d) Cluster(d) ∩ GroundTruth(d) GroundTruth(d) 1 D B-Cubed = 2 · Pb · Rb Pb + Rb To evaluate event-based retrieval and summarization methods, different evalu- ation metrics have been proposed. Regarding the retrieval of content, the well known Precision and Recall are used. However, in the context of event sum- marization, more sophisticated metrics are needed that take into account the coverage of different aspects of the event, the redundancy in the retrieved set of items, the diversity in text and visual content, etc. Thus in the works pre- sented in section 3, a wide set of metrics have been proposed and used. Typically, to evaluate summarization results, a golden standard is used that represents an ideal summary. In social media data, this golden standard usually takes the form of a set of items that summarize the dataset. Given these items, Precision, Re- call and F-measure can be calculated between the produced summary and the golden standard. However, this may be misleading as the produced summary may contain not the exact set of items, but similar items that convey the same information. For that reason the so-called ROUGE [40] metrics are used, a fam- ily of metrics that measure the similarity between an automated summary and a set of manual summaries, using n-gram co-occurrence statistics between the sets. The simplest among them is the ROUGEN metric: (cid:80) (cid:80) (cid:80) (cid:80) ROU GEN = s∈M S s∈M S ng∈S Match(ng) ng∈S Count(ng) where Count(ng) is the number of n-grams in the manual summary, and Match(ng) is the number of co-occurring n-grams between the manual and au- tomated summaries. Event Detection and Retrieval on Social Media 31 McParlane et al, whose work [47] was presented in section 3 proposed the use of three precision-based and two diversity-oriented metrics to evaluate visual summaries produces by their approach: – Precision (P @N ): The percentage of relevant images among the top N images in the summary. – Success (S@N ): Given summaries for multiple events, the percentage of events, for which there exists at least one relevant image among the top N returned by the method. – Mean Reciprocal Rank (MRR): Computed as 1/r, where r is the rank of the first relevant image returned, averaged over all summaries. – α-Normalised Discounted Cumulative Gain (α-nDCG@N ): This met- ric computes the usefulness, or gain, of an image based on its position in the ranked list. Parameter α balances the importance of relevance and diversity. – Intent-aware Expected Reciprocal Rank (ERR-IA@N ): For this met- ric, the contribution of each image is based on the relevance of images ranked above it, by computing the ERR for each sub-event, with a weighted average computed over sub-events. Despite the proliferation of research methods for event detection and retrieval, the available public datasets for their evaluation are limited. For that reason, most of the works presented in section 2 are evaluated on different datasets col- lected and annotated by their authors. Given the lack of a commonly accepted ground truth dataset, containing annotations on the actual events, most of the works follow a qualitative analysis of the detected events. Also, they may report the precision of the detected events by examining which of them correspond to actual events. However, it is difficult to calculate the recall as the total set of ac- tual events that are present in a collection are unknown. In addition, judgments about the association of documents to events are also missing, so it is difficult to evaluate the obtained results, especially those produced by document-pivot methods that provide events as sets of documents. As a result, an explicit com- parison between these approaches is difficult or even impossible to perform. Table 2 presents the reported results for selected event detection methods. The listed papers have conducted experiments on proprietary datasets for which there is no ground truth regarding the association of social media posts to events, but rather only a list of known events. For that reason, the papers report the number of candidate events detected by the methods and the precision achieved at the event level (i.e. x% of the detected events are correct). This is the case for instance for methods such as the ones presented in [12,31,63] that report precision only for the highest ranked clusters (events). However, the highest ranked clusters are indeed more likley to be related to real-world events. For that reason, a fixed number of clusters K is considered during evaluation and Precision@K (P @K) is calculated. Still, this kind of evaluation does not take into account the quality of clusterings, i.e. how accurately the social media items are assigned to clusters. An additional set of reported results are presented in Table 3 with an emphasis on event detection from multimodal items (Flickr 32 M. Schinas et al. images). It is interesting that despite the different datasets that are used by different researchers the reported NMI scores lie in the same range (∼ 0.95). Table 2. Reported results for selected event detection methods in Twitter. In the cases that the number of reported events is marked with *, the number is selected by the authors to report performance in terms of P @K. Work Weng & Lee, 2011 [90] Tweets 4,331,937 Li et al., 2012 [38] Same as [90] Parikh & Karlapalem, 2013 [56] 1,023,077 Guille & Favre, 2014 [31] Becker et al., 2011 [12] Petrovi´c et al., 2010 [63] 1,437,126 2,086,136 2.6M 163.5M Results Method Events Precision EDCoW 21 EDCoW 21 101 Twevent 23 40* 40* 40* 40* 76.2% 76.2% 86.1% 91% 57.5% 77.5% 70% 82.5% MABED RW-Event 5*, 10* 85%, 70% MABED ET ET ET LSH 1000* 34.0% Table 3. Evaluation of multimodal event detection from Flickr images. Work Becker et al., 2009 [10] Images Events Results NMI B-Cubed Becker et al., 2010 [11] Reuter & Cimiano, 2012 [66] ∼1M 36,782 Petkos et al., 2012 [59] 36 - 270,425 9,515 0.933 270,425 9,515 0.951 594,946 24,958 0.944 0.915 73,645 306,159 14,852 0.975 362,578 17,834 0.981 167,332 0.708 149 - 0.826 0.816 0.744 - - - - Petkos et al., 2017 [62] Bao et al., 2013 [7] One of the few publicly available benchmarks is the Social Event Detection (SED) task, an open challenge that ran within the MediaEval Initiative8 for four successive years (2011-2014). The main objective of the task was the dis- covery of social events in collections of multimedia content posted in social media platforms. The SED 2011 task [55] had two challenges. In both challenges par- ticipants were provided with a set of Flickr images and were asked to retrieve events of a particular type at particular locations. The first challenge sought for all soccer events in Barcelona (Spain) and Rome (Italy), while the second challenge required from the participants to find all events that took place in May 8 http://www.multimediaeval.org/ Event Detection and Retrieval on Social Media 33 2009 in the venue named Paradiso in Amsterdam and in the Parc del Forum in Barcelona. Note that the actual events were unknown to participants, who had to provide the events as sets of images related to them. The dataset for the 2011 task consisted of 73,645 Flickr photos. The SED 2012 task [54] included three challenges, quite similar to those of the previous year. Each challenge required the identification of events that met some predefined criteria: the first challenge required participants to find images associated with technical community events taking place in Germany; the second asked participants to find all soccer events taking place in Hamburg (Germany) and Madrid (Spain); finally, in the third challenge, the target was demonstrations and protest events of the "Indignados movement" occurring in public places in Madrid. A much wider collection of 167,332 photos by 4,422 unique Flickr users was created9, and the collected photos were all licensed under a Creative Commons licence, and were captured between the beginning of 2009 and the end of 2011. The 2013 SED task [67] had a significant difference to the two previous years tasks. Whereas in the previous years, a single dataset that includes both event and non-event photos was provided and the challenges asked for the retrieval of content about specific events, in 2013 two datasets were provided, and two new distinct challenges were defined. The first challenge required participants to provide a complete clustering of images in the dataset according to events. That is, the first challenge asked for a clustering of all images in the relevant dataset, according to the events that they depict. This comes in contrast to the challenges in the first two years, where a) not all images in the collection were related to some event and b) specific criteria were defined for the events of interest. The second challenge required the classification of images into specific event types. The dataset10 for the first challenge consists of 427,370 pictures from Flickr and 1,327 videos from YouTube together with their associated metadata. The pictures, uploaded between January 2006 and December 2012, correspond to 21,169 events. The dataset for Challenge 2 was collected from Instagram. The training set was collected between 27th and 29th of April 2013, based on event-related keywords, and consisted of 27,754 pictures, while the test set was collected between the 7th and 13th of May 2013 and consisted of 29,411 pictures. The 2014 SED task [60] consisted again of two challenges/subtasks. For the first challenge similar to 2013, participants were asked to produce a full clustering of the images, so that each cluster corresponds to a social event. In the second subtask, a collection of events was provided; each event was represented by a set of images with their metadata, and participants were asked to retrieve those events, i.e. other images, that met some criteria. The test dataset11 contains 362,578 images and together with it, the grouping of these images into 17,834 social events. The training dataset, for which grouping of images into clusters is provided, contained 110,541 images. 9 http://mklab.iti.gr/project/sed2012 10 http://mklab.iti.gr/project/sed2013 11 http://mklab.iti.gr/project/sed2014 34 M. Schinas et al. As there was a difference across the challenges from year to year, for their evaluation different approaches were tested. For the challenges in the first two years, 2011 and 2012, two metrics were used, Macro F-measure and NMI. For the first challenge in years 2013 and 2014, which can be seen as a full clustering prob- lem, NMI was also used, in conjunction with the micro F-measure (B-Cubed). Tables 4 and 5 present an overview of the reported results of SED approaches in the task editions for 2013 and 2014 respectively. Regarding the first challenge in both years, most of the participants achieved a decent performance and in many cases the results were surprisingly good. The second challenge of 2013, targeting event type classification, led to results that were lower than expected. Participa- tion in the 2014 second challenge was limited, and the mediocre reported results indicate that there is space for improvements in the event-based retrieval task. Table 4. SED 2013 results Challenge 1 Challenge 2 F-score NMI Fcat FE/NE 0.570 0.873 0.946 0.985 0.704 0.910 0.334 0.716 - - - - Rafailidis et al., 2013 [65] Samangooei et al, 2013 [71] Schinas et al., 2013 [74] Manchon-Vizuete & Gir´o Nieto, 2013 [42] 0.883 0.973 Nguyen et al., 2013 [52] Zeppelzauer et al., 2013 [94] Sutanto & Nayak, 2013 [81] Wistuba & Schmidt-Thieme, 2013 [91] Tserpes et al., 2013 [84] Gautam et al., 2013 [36] Brenner & Izquierdo, 2013 [16] 0.932 0.984 0.449 0.854 0.780 0.940 0.812 0.954 0.131 0.537 0.878 0.965 0.236 0.664 0.142 0.180 0.780 0.940 0.332 0.721 - - - - - - - - - - Table 5. SED 2014 results Zaharieva et al., 2014 [93] Guinaudeau et al., 2014 [32] Riga et al., 2014 [68] Manchon-Vizuete et al., 2014 [43] 0.924 0.982 Sutanto & Nayak, 2014 [82] 0.753 0.902 0.753 0.902 Denman et al., 2014 [24] - Challenge 2 Challenge 1 F-score NMI P 0.948 0.989 0.420 0.406 0.288 0.821 0.955 0.916 0.982 0.708 0.392 0.460 F1 R - - - - - - - - - - - Furthermore, McMinn et al. [46] proposed a methodology for building a cor- pus of tweets, to be used for event detection methods. To create a candidate list of events, McMin et al. used a number of existing event detection approaches and Event Detection and Retrieval on Social Media 35 the Wikipedia Current Events Portal12. The two methods used to detect events were the ones by Petrovi´c et al. [63] and Aggarwal & Subbian [1], both presented in section 2.1. The authors ran the first method [63] over a random sample of tweets using parameters similar to those reported in the original paper. However, rather than ranking clusters every 100,000 tweets, authors opted for a ranking at an hourly basis. For each hour, clusters were ranked by the number of unique users, and clusters with low entropy were removed. This yielded a list 1,340 can- didate events. Using the cluster summarization method of Aggarwal & Subbian [1], McMinn et al. were able to produce 1,097 candidate events. Wikipedia events were used within an information retrieval framework to obtain tweets related to the events. Each Wikipedia event was represented as a short description, a cate- gory, and a link to a relevant news article. The event description was then used as an initial query to retrieve tweets that potentially discuss the event. Query expansion was also performed using some of the best performing approaches in the TREC13 Microblog track [5,34]. For each of the 468 events on the Wikipedia Current Events Portal listed between the dates covered by the corpus, the top 2,000 tweets were retrieved from a window of 72 hours, centered around the date of the event. A by-product of this work is a corpus of about 500 news events sampled over a four-week period, including relevance judgments for thousands of tweets referring to them. For evaluation of event summarization, McParlane et al. [47] created a dataset, built upon the one by McMinn et al. [46]. This dataset is available on demand. Another public dataset, used for the evaluation of the approach proposed in [75] and [76] is also available14. This dataset consists of an exten- sion of McParlane's dataset[47], alongside two more datasets related to the 2015 Baltimore protests15 and the 2012 US Presidential Elections16. The TREC Real-Time Summarization Track17 is the successor of the Mi- croblog Track since 2016. The task focuses on the problem of topic-oriented summarization of a Twitter stream. Given a set of topics of interest, the partici- pants should identify relevant tweets in the stream per topic, and update a sum- mary for each topic when new pieces of information are presented. There are two scenarios for the summaries: a) a real-time scenario where relevant/important messages are pushed to evaluators shortly after their identification and b) an offline schenario, where summaries are produced and sent in batches as email digests. Although the topics of the track are not restricted only to real world events, the task is closely related to the event-based summarization problem, and the approaches presented in section 3 can be used and evaluated in that setting. The evaluation of participants is based on the methodology presented in [88]. 12 https://en.wikipedia.org/wiki/Portal:Current_events 13 http://trec.nist.gov/ 14 https://github.com/MKLab-ITI/mgraph-summarization 15 https://en.wikipedia.org/wiki/2015_Baltimore_protests 16 https://en.wikipedia.org/wiki/United_States_presidential_election,_2012 17 http://trecrts.github.io/TREC2017-RTS-guidelines.html 36 M. Schinas et al. 5 Conclusions The chapter presented an overview of numerous methods for detecting events in large collections and streams of social media content and of methods for retrieving and summarizing content relevant to given events. The proliferation of research on the topic demonstrates the challenging nature of the problem and its potential for creating attractive and useful retrieval applications for end users. Throughout the chapter, a number of key important methodological ele- ments were identified that may be considered as components of the presented approaches: – Feature representation: Text is the primary modality used for representing social media posts, typically using established representations such as Bag- of-Words, which are often enriched by additional more semantically promi- nent elements such as named entities, tags, and topics. Visual content, when used, has extensively relied on Bag-of-Visual-Words representation, Vector of Locally Aggregated Descriptors, while the recently proposed Deep Convo- lutional Neural Network features have become increasingly important. Ad- ditional modalities such as time, location and social interactions are another important component of social media content in relation to event detection and retrieval, with very simple and ad hoc features being used. – Semantic similarity: Another important component of event detection meth- ods is the way that the similarity between content items is computed. Stan- dard measures based on cosine and Jaccard similarity are employed by the majority of methods, especially in relation to Bag-of-Words representations, while more sophisticated methods rely on learned similarity models, i.e. mod- els that are trained with indicative pairs of examples to produce a similarity score. In such cases, the training process is crucial in ending up with an accurate and robust similarity function. – Classification models: These constitute an essential component in several cases, either as a means of filtering non-event or low-quality content or for classifying media items or clusters of items into distinct categories of events. Most approaches rely on standard models, including Naive Bayes, Logis- tic Regression, Random Forests and Support Vector Machines, all of which constitute well-tested and easily deployable solutions. – Clustering algorithms: A crucial component of event detection methods is the clustering algorithm that is used for assigning social media items to clusters corresponding to distinct events. Depending on the input represen- tation, conventional data clustering algorithms (k-means, DBSCAN, etc.) or graph-based ones (Spectral, SCAN, QCA, etc.) can be used. Additionally, an important decision is whether the algorithm should lead to a partition of the collection (i.e. all items assigned to clusters) or a selective clustering (as in the case of DBSCAN and SCAN). – Content ranking: This is a key element of event retrieval and summarization methods and entails a variety of approaches for predicting a score that ex- presses how suitable a given social media item is as a result to an event query. Event Detection and Retrieval on Social Media 37 Important desiderata in this context are the capturing of both relevance and diversity in a selected set of items. Relatively under-explored areas include the personalization of summaries and the consideration of additional criteria such as credibility (especially in the context of news), aesthetics/quality and viewpoint. For researchers and practitioners in the area, who use existing methods or de- velop new ones, it is always useful to think of the aforementioned elements as design choices that could affect the performance of the resulting system. An additional finding of our research is the relative scarcity of public re- sources for evaluating the performance of event detection, retrieval and summa- rization methods. This is primarily due to the fact that considerable amounts of manual effort are needed to create ground truth annotations for large-scale datasets. Another complication in generating persistent datasets is the highly volatile nature of social media content, sizable portions of which tend to disap- pear in the long run. Finally, there is a need for cross-platform datasets referring to the same real-world events. In that way, it will be possible to study interest- ing research questions, such as whether different social media platforms tend to be used in relation to different aspects of an event. To sum up, enriching ex- isting data resources, generating additional ones and conducting comprehensive comparative studies among the multitude of methods that have been proposed would all be valuable contributions towards achieving progress in the field. References 1. Charu C Aggarwal and Karthik Subbian. Event detection in social streams. In Proceedings of the 2012 SIAM international conference on data mining, pages 624– 635. SIAM, 2012. 2. James Allan. Introduction to topic detection and tracking. Topic detection and tracking, pages 1–16, 2002. 3. Omar Alonso and Kyle Shiells. Timelines as summaries of popular scheduled events. In Proceedings of the 22nd International Conference on World Wide Web, pages 1037–1044. ACM, 2013. 4. Foteini Alvanaki, Sebastian Michel, Krithi Ramamritham, and Gerhard Weikum. See what's enblogue: real-time emergent topic identification in social media. In Proceedings of the 15th International Conference on Extending Database Technol- ogy, pages 336–347. ACM, 2012. 5. Gianni Amati, Giuseppe Amodeo, Marco Bianchi, Giuseppe Marcone, Fon- dazione Ugo Bordoni, Carlo Gaibisso, Giorgio Gambosi, Alessandro Celi, Cesidio Di Nicola, and Michele Flammini. Fub, iasi-cnr, univaq at trec 2011 microblog track. In TREC, 2011. 6. Enrique Amig´o, Julio Gonzalo, Javier Artiles, and Felisa Verdejo. A comparison of extrinsic clustering evaluation metrics based on formal constraints. Information retrieval, 12(4):461–486, 2009. 7. Bing-Kun Bao, Weiqing Min, Ke Lu, and Changsheng Xu. Social event detection with robust high-order co-clustering. In Proceedings of the 3rd ACM conference on International conference on multimedia retrieval, pages 135–142. ACM, 2013. 38 M. Schinas et al. 8. Hila Becker, Feiyang Chen, Dan Iter, Mor Naaman, and Luis Gravano. Automatic identification and presentation of twitter content for planned events. In ICWSM, 2011. 9. Hila Becker, Dan Iter, Mor Naaman, and Luis Gravano. Identifying content for planned events across social media sites. In Proceedings of the fifth ACM interna- tional conference on Web search and data mining, pages 533–542. ACM, 2012. 10. Hila Becker, Mor Naaman, and Luis Gravano. Event identification in social media. In WebDB, 2009. 11. Hila Becker, Mor Naaman, and Luis Gravano. Learning similarity metrics for event identification in social media. In Proceedings of the third ACM international conference on Web search and data mining, pages 291–300. ACM, 2010. 12. Hila Becker, Mor Naaman, and Luis Gravano. Beyond trending topics: Real-world event identification on twitter. ICWSM, 11(2011):438–441, 2011. 13. Edward Benson, Aria Haghighi, and Regina Barzilay. Event discovery in social media feeds. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pages 389– 398. Association for Computational Linguistics, 2011. 14. Jingwen Bian, Yang Yang, and Tat-Seng Chua. Multimedia summarization for trending topics in microblogs. In Proceedings of the 22nd ACM international con- ference on Conference on information & knowledge management, pages 1807–1812. ACM, 2013. 15. David M Blei, Andrew Y Ng, and Michael I Jordan. Latent dirichlet allocation. In Advances in neural information processing systems, pages 601–608, 2002. 16. Markus Brenner and Ebroul Izquierdo. Mediaeval 2013: Social event detection, retrieval and classification in collaborative photo collections. MediaEval, 1043, 2013. 17. Hongyun Cai, Yang Yang, Xuefei Li, and Zi Huang. What are popular: exploring twitter features for event detection, tracking and visualization. In Proceedings of the 23rd ACM international conference on Multimedia, pages 89–98. ACM, 2015. 18. Mario Cataldi, Luigi Di Caro, and Claudio Schifanella. Emerging topic detection on twitter based on temporal and social terms evaluation. In Proceedings of the tenth international workshop on multimedia data mining, page 4. ACM, 2010. 19. Deepayan Chakrabarti and Kunal Punera. Event summarization using tweets. ICWSM, 11:66–73, 2011. 20. Ling Chen and Abhishek Roy. Event detection from flickr data through wavelet- based spatial analysis. In Proceedings of the 18th ACM conference on Information and knowledge management, pages 523–532. ACM, 2009. 21. Jaeho Choi and W Bruce Croft. Temporal models for microblogs. In Proceedings of the 21st ACM international conference on Information and knowledge manage- ment, pages 2491–2494. ACM, 2012. 22. Jaeho Choi, W Bruce Croft, and Jin Young Kim. Quality models for microblog retrieval. In Proceedings of the 21st ACM international conference on Information and knowledge management, pages 1834–1838. ACM, 2012. 23. Freddy Chong Tat Chua and Sitaram Asur. Automatic summarization of events from social media. In ICWSM, 2013. 24. Simon Denman, David Dean, Clinton Fookes, and Sridha Sridharan. Saivt-admrg@ mediaeval 2014 social event detection. In Working Notes Proceedings of the Me- diaEval 2014 Multimedia Benchmark Workshop, volume 1263, pages 1–2. CEUR Workshop Proceedings, 2014. 25. Qiming Diao and Jing Jiang. A unified model for topics, events and users on twitter. ACL, 2013. Event Detection and Retrieval on Social Media 39 26. Marian Dork, Daniel Gruen, Carey Williamson, and Sheelagh Carpendale. A vi- sual backchannel for large-scale events. IEEE transactions on visualization and computer graphics, 16(6):1129–1138, 2010. 27. Gunes Erkan and Dragomir R Radev. Lexrank: Graph-based lexical centrality as salience in text summarization. Journal of Artificial Intelligence Research, 22:457– 479, 2004. 28. Elena Erosheva, Stephen Fienberg, and John Lafferty. Mixed-membership mod- els of scientific publications. Proceedings of the National Academy of Sciences, 101(suppl 1):5220–5227, 2004. 29. Gabriel Pui Cheong Fung, Jeffrey Xu Yu, Philip S Yu, and Hongjun Lu. Parameter free bursty events detection in text streams. In Proceedings of the 31st international conference on Very large data bases, pages 181–192. VLDB Endowment, 2005. 30. Wei Gao, Peng Li, and Kareem Darwish. Joint topic modeling for event summa- rization across news and social media streams. In Proceedings of the 21st ACM international conference on Information and knowledge management, pages 1173– 1182. ACM, 2012. 31. Adrien Guille and C´ecile Favre. Mention-anomaly-based event detection and track- ing in twitter. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, pages 375–382. IEEE, 2014. 32. Camille Guinaudeau, Antoine Laurent, and Herv´e Bredin. Limsi@ mediaeval sed 2014. 33. Qi He, Kuiyu Chang, and Ee-Peng Lim. Analyzing feature trajectories for event detection. In Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pages 207–214. ACM, 2007. 34. Thong Hoang Van Duc, Thomas Demeester, Johannes Deleu, Piet Demeester, and Chris Develder. Ugent participation in the microblog track 2012. In Text Retrieval Conference (TREC-2012), pages 1–5, 2012. 35. Yuheng Hu, Ajita John, Fei Wang, and Subbarao Kambhampati. Et-lda: Joint topic modeling for aligning events and their twitter feedback. In AAAI, volume 12, pages 59–65, 2012. 36. Kshitij Gautam Itika Gupta and Krishna Chandramouli. Vit@ mediaeval 2013 social event detection task: Semantic structuring of complementary information for clustering events. 2013. 37. Chung-Hong Lee. Mining spatio-temporal information on microblogging streams using a density-based online clustering method. Expert Systems with Applications, 39(10):9623–9641, 2012. 38. Chenliang Li, Aixin Sun, and Anwitaman Datta. Twevent: segment-based event detection from tweets. In Proceedings of the 21st ACM international conference on Information and knowledge management, pages 155–164. ACM, 2012. 39. Chen Lin, Chun Lin, Jingxuan Li, Dingding Wang, Yang Chen, and Tao Li. Gen- erating event storylines from microblogs. In Proceedings of the 21st ACM inter- national conference on Information and knowledge management, pages 175–184. ACM, 2012. 40. Chin-Yew Lin and Eduard Hovy. Automatic evaluation of summaries using n- gram co-occurrence statistics. In Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1, pages 71–78. Association for Computational Lin- guistics, 2003. 41. Xueliang Liu, Raphael Troncy, and Benoit Huet. Finding media illustrating events. In Proceedings of the 1st ACM International Conference on Multimedia Retrieval, page 58. ACM, 2011. 40 M. Schinas et al. 42. Daniel Manchon Vizuete and Xavier Gir´o Nieto. Upc at mediaeval 2013 social event detection task. In Proceedings of the MediaEval 2013 Multimedia Benchmark Workshop. CEUR Workshop Proceedings, 2013. 43. Daniel Manchon-Vizuete, Irene Gris-Sarabia, and Xavier Gir´o Nieto. Upc at me- diaeval 2014 social event detection task. In MediaEval, 2014. 44. Adam Marcus, Michael S Bernstein, Osama Badar, David R Karger, Samuel Mad- den, and Robert C Miller. Twitinfo: aggregating and visualizing microblogs for event exploration. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 227–236. ACM, 2011. 45. Michael Mathioudakis and Nick Koudas. Twittermonitor: trend detection over the twitter stream. In Proceedings of the 2010 ACM SIGMOD International Confer- ence on Management of data, pages 1155–1158. ACM, 2010. 46. Andrew J McMinn, Yashar Moshfeghi, and Joemon M Jose. Building a large- scale corpus for evaluating event detection on twitter. In Proceedings of the 22nd ACM international conference on Information & Knowledge Management, pages 409–418. ACM, 2013. 47. Philip J McParlane, Andrew James McMinn, and Joemon M Jose. Picture the scene...;: Visually summarising social media events. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Manage- ment, pages 1459–1468. ACM, 2014. 48. Polykarpos Meladianos, Giannis Nikolentzos, Fran¸cois Rousseau, Yannis Stavrakas, and Michalis Vazirgiannis. Degeneracy-based real-time sub-event detection in twit- ter stream. In ICWSM, pages 248–257, 2015. 49. Donald Metzler, Congxing Cai, and Eduard Hovy. Structured event retrieval over microblog archives. In Proceedings of the 2012 Conference of the North Ameri- can Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 646–655. Association for Computational Linguistics, 2012. 50. Taiki Miyanishi, Kazuhiro Seki, and Kuniaki Uehara. Improving pseudo-relevance feedback via tweet selection. In Proceedings of the 22nd ACM international con- ference on Information & Knowledge Management, pages 439–448. ACM, 2013. 51. Sean Moran, Richard McCreadie, Craig Macdonald, and Iadh Ounis. Enhancing first story detection using word embeddings. In Proceedings of the 39th Inter- national ACM SIGIR conference on Research and Development in Information Retrieval, pages 821–824. ACM, 2016. 52. Truc-Vien Nguyen, Minh-Son Dao, Riccardo Mattivi, Emanuele Sansone, Francesco GB De Natale, and Giulia Boato. Event clustering and classification from social media: Watershed-based and kernel methods. In MediaEval, 2013. 53. Jeffrey Nichols, Jalal Mahmud, and Clemens Drews. Summarizing sporting events using twitter. In Proceedings of the 2012 ACM international conference on Intel- ligent User Interfaces, pages 189–198. ACM, 2012. 54. Symeon Papadopoulos, Emmanouil Schinas, Vasileios Mezaris, Raphal Troncy, and Yiannis Kompatsiaris. Social event detection at mediaeval 2012: Challenges, dataset and evaluation. In MediaEval, 2012. 55. Symeon Papadopoulos, Raphael Troncy, Vasileios Mezaris, Benoit Huet, and Ioan- nis Kompatsiaris. Social event detection at mediaeval 2011: Challenges, dataset and evaluation. In MediaEval, 2011. 56. Ruchi Parikh and Kamalakar Karlapalem. Et: events from tweets. In Proceedings of the 22nd international conference on world wide web, pages 613–620. ACM, 2013. 57. Michael Paul and Roxana Girju. Cross-cultural analysis of blogs and forums with mixed-collection topic models. In Proceedings of the 2009 Conference on Empirical Event Detection and Retrieval on Social Media 41 Methods in Natural Language Processing: Volume 3-Volume 3, pages 1408–1417. Association for Computational Linguistics, 2009. 58. Michael Paul and Roxana Girju. A two-dimensional topic-aspect model for discov- ering multi-faceted topics. Urbana, 51(61801):36, 2010. 59. Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. Social event In detection using multimodal clustering and integrating supervisory signals. Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, page 23. ACM, 2012. 60. Georgios Petkos, Symeon Papadopoulos, Vasileios Mezaris, and Yiannis Kompat- siaris. Social event detection at mediaeval 2014: Challenges, datasets, and evalua- tion. In MediaEval, 2014. 61. Georgios Petkos, Symeon Papadopoulos, Vasileios Mezaris, Raphael Troncy, Philipp Cimiano, Timo Reuter, and Yiannis Kompatsiaris. Social event detec- tion at mediaeval: a three-year retrospect of tasks and results. In Proceedings of International Workshop on Social Events in Web Multimedia (co-located with ICMR 2014), pages 27–34, 2014. 62. Georgios Petkos, Manos Schinas, Symeon Papadopoulos, and Yiannis Kompat- siaris. Graph-based multimodal clustering for social multimedia. Multimedia Tools and Applications, 76(6):7897–7919, 2017. 63. Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. Streaming first story detection with application to twitter. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pages 181–189. Association for Computational Linguistics, 2010. 64. Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. Using paraphrases for improv- ing first story detection in news and twitter. In Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 338–346. Association for Computational Lin- guistics, 2012. 65. Dimitrios Rafailidis, Theodoros Semertzidis, Michalis Lazaridis, Michael G Strintzis, and Petros Daras. A data-driven approach for social event detection. In MediaEval, 2013. 66. Timo Reuter and Philipp Cimiano. Event-based classification of social media streams. In Proceedings of the 2nd ACM International Conference on Multime- dia Retrieval, page 22. ACM, 2012. 67. Timo Reuter, Symeon Papadopoulos, Giorgos Petkos, Vasileios Mezaris, Yiannis Kompatsiaris, Philipp Cimiano, Christopher de Vries, and Shlomo Geva. So- cial event detection at mediaeval 2013: Challenges, datasets, and evaluation. In Proceedings of the MediaEval 2013 Multimedia Benchmark Workshop Barcelona, Spain, October 18-19, 2013, 2013. 68. Marina Riga, Georgios Petkos, Symeon Papadopoulos, Manos Schinas, and Yiannis Kompatsiaris. Certh@ mediaeval 2014 social event detection task. In MediaEval, 2014. 69. Alan Ritter, Oren Etzioni, Sam Clark, et al. Open domain event extraction from In Proceedings of the 18th ACM SIGKDD international conference on twitter. Knowledge discovery and data mining, pages 1104–1112. ACM, 2012. 70. Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. Earthquake shakes twit- ter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web, pages 851–860. ACM, 2010. 71. Sina Samangooei, Jonathon Hare, David Dupplaw, Mahesan Niranjan, Nicholas Gibbins, Paul H Lewis, Jamie Davies, Neha Jain, and John Preston. Social event 42 M. Schinas et al. detection via sparse multi-modal feature selection and incremental density based clustering. 2013. 72. Jagan Sankaranarayanan, Hanan Samet, Benjamin E Teitler, Michael D Lieber- man, and Jon Sperling. Twitterstand: news in tweets. In Proceedings of the 17th acm sigspatial international conference on advances in geographic information sys- tems, pages 42–51. ACM, 2009. 73. Hassan Sayyadi, Matthew Hurst, and Alexey Maykov. Event detection and tracking in social streams. In Icwsm, 2009. 74. Emmanouil Schinas, Eleni Mantziou, Symeon Papadopoulos, Georgios Petkos, and Yiannis Kompatsiaris. Certh @ mediaeval 2013 social event detection task. Medi- aEval, 1043, 2013. 75. Manos Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris, and Pericles A. Mitkas. Visual event summarization on social media using topic modelling and graph-based ranking algorithms. In Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, ICMR '15, pages 203–210, New York, NY, USA, 2015. ACM. 76. Manos Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris, and Pericles A Mitkas. Mgraph: multimodal event summarization in social media using topic models and graph-based ranking. International Journal of Multimedia Informa- tion Retrieval, 5(1):51–69, 2016. 77. Aliaksei Severyn and Alessandro Moschitti. Learning to rank short text pairs with convolutional deep neural networks. In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 373–382. ACM, 2015. 78. Ryan Shaw, Raphael Troncy, and Lynda Hardman. Lode: Linking open descrip- tions of events. ASWC, 9:153–167, 2009. 79. Chao Shen, Fei Liu, Fuliang Weng, and Tao Li. A participant-based approach for In HLT-NAACL, pages 1152–1162, event summarization using twitter streams. 2013. 80. Alexander Strehl and Joydeep Ghosh. Cluster ensembles-a knowledge reuse frame- work for combining partitionings. In Aaai/iaai, pages 93–99, 2002. 81. Taufik Sutanto and Richi Nayak. Admrg@ mediaeval 2013 social event detection. In Proceedings of the MediaEval 2013 Multimedia Benchmark Workshop, volume 1043. CEUR-WS. org, 2013. 82. Taufik Sutanto and Richi Nayak. Ranking based clustering for social event detec- tion. In MediaEval, 2014. 83. Bart Thomee, David A Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, and Li-Jia Li. Yfcc100m: The new data in multi- media research. Communications of the ACM, 59(2):64–73, 2016. 84. Konstantinos Tserpes, Magdalini Kardara, and Theodora Varvarigou. A similarity- based chinese restaurant process for social event detection. 85. Dingding Wang, Tao Li, and Mitsunori Ogihara. Generating pictorial storylines via minimum-weight connected dominating set approximation in multi-view graphs. In AAAI, 2012. 86. Xuerui Wang and Andrew McCallum. Topics over time: a non-markov continuous- time model of topical trends. In Proceedings of the 12th ACM SIGKDD interna- tional conference on Knowledge discovery and data mining, pages 424–433. ACM, 2006. 87. Yanxiang Wang, Hari Sundaram, and Lexing Xie. Social event detection with in- teraction graph modeling. In Proceedings of the 20th ACM international conference on Multimedia, pages 865–868. ACM, 2012. Event Detection and Retrieval on Social Media 43 88. Yulu Wang, Garrick Sherman, Jimmy Lin, and Miles Efron. Assessor differences and user preferences in tweet timeline generation. In Proceedings of the 38th In- ternational ACM SIGIR Conference on Research and Development in Information Retrieval, pages 615–624. ACM, 2015. 89. Wei Wei, Kenneth Joseph, Wei Lo, and Kathleen M Carley. A bayesian graphical model to discover latent events from twitter. In ICWSM, pages 503–512, 2015. 90. Jianshu Weng and Bu-Sung Lee. Event detection in twitter. ICWSM, 11:401–408, 2011. 91. Martin Wistuba and Lars Schmidt-Thieme. Supervised clustering of social media streams. In MediaEval, 2013. 92. Yue You, Guangyan Huang, Jian Cao, Enhong Chen, Jing He, Yanchun Zhang, and Liang Hu. Geam: A general and event-related aspects model for twitter event detection. In International Conference on Web Information Systems Engineering, pages 319–332. Springer, Berlin, Heidelberg, 2013. 93. Maia Zaharieva, Daniel Schopfhauser, Manfred Del Fabro, and Matthias Zeppelza- uer. Clustering and retrieval of social events in flickr. In MediaEval, 2014. 94. Matthias Zeppelzauer, Maia Zaharieva, and Manfred Del Fabro. Unsupervised clustering of social events. In MediaEval, 2013. 95. Xiaoming Zhang, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li, and Jiali Xia. Event detection and popularity prediction in microblogging. Neurocom- puting, 149:1469–1480, 2015. 96. Wayne Xin Zhao, Jing Jiang, Jianshu Weng, Jing He, Ee-Peng Lim, Hongfei Yan, and Xiaoming Li. Comparing twitter and traditional media using topic models. In European Conference on Information Retrieval, pages 338–349. Springer, 2011. 97. Deyu Zhou, Liangyu Chen, and Yulan He. An unsupervised framework of exploring events on twitter: Filtering, extraction and categorization. In AAAI, pages 2468– 2475, 2015. 98. Xiangmin Zhou and Lei Chen. Event detection over twitter social media streams. The VLDB journal, 23(3):381–400, 2014.
1902.02954
2
1902
2019-04-19T19:33:01
Synergistic Effects in Networked Epidemic Spreading Dynamics
[ "cs.SI", "q-bio.PE" ]
In this brief, we study epidemic spreading dynamics taking place in complex networks. We specifically investigate the effect of synergy, where multiple interactions between nodes result in a combined effect larger than the simple sum of their separate effects. Although synergistic effects play key roles in various biological and social phenomena, their analyses have been often performed by means of approximation techniques and for limited types of networks. In order to address this limitation, this paper proposes a rigorous approach to quantitatively understand the effect of synergy in the Susceptible-Infected-Susceptible model taking place in an arbitrary complex network. We derive an upper bound on the growth rate of the synergistic Susceptible-Infected-Susceptible model in terms of the eigenvalues of a matrix whose size grows quadratically with the number of the nodes in the network. We confirm the effectiveness of our result by numerical simulations on empirically observed human and animal social networks.
cs.SI
cs
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Synergistic Effects in Networked Epidemic Spreading Dynamics Masaki Ogura, Member, IEEE, Wenjie Mei, and Kenji Sugimoto, Member, IEEE 9 1 0 2 r p A 9 1 ] I S . s c [ 2 v 4 5 9 2 0 . 2 0 9 1 : v i X r a Abstract -- In this brief, we study epidemic spreading dynamics taking place in complex networks. We specifically investigate the effect of synergy, where multiple interactions between nodes result in a combined effect larger than the simple sum of their separate effects. Although synergistic effects play key roles in various biological and social phenomena, their analyses have been often performed by means of approximation techniques and for limited types of networks. In order to address this limitation, this paper proposes a rigorous approach to quantitatively understand the effect of synergy in the Susceptible-Infected-Susceptible model taking place in an arbitrary complex network. We derive an upper bound on the growth rate of the synergistic Susceptible- Infected-Susceptible model in terms of the eigenvalues of a matrix whose size grows quadratically with the number of the nodes in the network. We confirm the effectiveness of our result by numerical simulations on empirically observed human and animal social networks. Index Terms -- Complex networks, spreading processes, syner- gistic interactions. I. INTRODUCTION U NDERSTANDING epidemic spreading dynamics taking place in complex networks is of utmost importance with applications in epidemiology [1], opinion formation, rumor propagation, and cyber security [2], [3]. During the last two decades, several important advances have been made toward the analysis, modeling, and control of networked spreading processes [4]. For example, fundamental connections between the eigenvalues of a network and epidemic thresholds were identified in [5]. A unified framework for the analysis of spreading processes evolving on multilayer networks was presented in [6]. The dynamical change of network structures dependent on the evolution of spreading processes has been actively investigated in the context of adaptive networks [7]. Recently, control and optimization tools have been proven to be effective for containing spreading processes in static [8], multi-layer [9], and temporal [10] networks. A prominent example of the achievements of network epidemiology can be found in, for example, effective predictions of the pandemic of H1N1 influenza on 2009 [11], [12]. All the aforementioned results assume nearest-neighbor in- teractions, in which individual nodes are directly influenced by only their neighbors. However, in realistic epidemic spreading processes, we frequently observe multi-node interactions, in which a node can affect not only its neighbors but also other nodes such as the neighbors of its neighbors. A typical M. Ogura, W. Mei, and K. Sugimoto are with the Division of Information Science, Nara Institute of Science and Technology, Ikoma, Nara 630-0192, Japan. e-mail: {oguram, mei.wenjie.mu2, kenji}@is.naist.jp. This work was supported by JSPS KAKENHI Grant Number JP18K13777. example of such phenomena can be found in the colonization by fungal and bacterial pathogens [13] and tumor growth [14]. In the context of human social networks, it has been exper- imentally confirmed that the spreads of opinions [15] and behaviors [16] are effectively accelerated by synergistic effects, which make the combined effect from multiple interactions greater than the simple sum of the effect of individual inter- actions. We find in the literature several works providing theoretical insight for understanding the effect of synergistic interactions on spreading processes. The authors in [17] considered an extended Susceptible-Infected-Recovered (SIR) model with synergistic effects, and numerically confirmed on lattices that synergy can significantly alter asymptotic behaviors of the spread. Similar models were further investigated analytically on lattices [18] and small-world networks [19], respectively. The authors in [20] studied the effect of synergy in the Susceptible-Infected-Susceptible (SIS) model under the as- sumption that the nodes having the same degree behave in the same manner. The effect of synergy on deterministic spreading processes was investigated in [21] with a mean-field approximation technique. This brief proposes a rigorous but tractable approach to quantitatively analyze the effect of synergy in the SIS model taking place in arbitrary networks, without resorting to mean- field approximations. A primary challenge in this context is to obtain computationally tractable results, because the state space of the spreading model grows exponentially with the number of nodes in the network. To overcome this difficulty, in this brief we show that the growth rate of the size of the infected population in the network can be bounded from above by the maximum real part of the eigenvalues of a matrix whose size grows only quadratically with the number of the nodes. In the derivation of the upper bound, we use Poisson-type stochastic differential equations describing the spreading model. The effectiveness of our theoretical results is numerically illustrated by simulations on empirical human and animal social networks. This brief is organized as follows. After preparing mathe- matical notations, in Section II we introduce the synergistic SIS model over arbitrary complex networks. In Section III, we derive our upper-bound on the growth rate of the model. Numerical simulations are presented in Section IV. Notations: The maximum real part of the eigenvalues of a square matrix A is denoted by λmax(A). An undirected graph is defined as the pair G = (V, E), where V = {1, . . . , N} is a set of nodes and E is a set of edges, i.e., unordered pairs of nodes. We say that nodes i and j are adjacent if {i, j} ∈ E. The JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 neighborhood of node i, denoted by Ni, is defined as the set of nodes adjacent to node i. The adjacency matrix A = [aij]i,j of G is defined as the N × N matrix such that aij = 1 if nodes i and j are adjacent, and aij = 0 otherwise. II. SYNERGISTIC SIS MODEL We introduce the synergistic SIS model over complex networks in this section. Let us start by reviewing the standard SIS model without synergy (see, e.g., [22]). Let G be an undi- rected graph having N nodes labeled as i = 1, . . . , N, with edges representing interactions between nodes. At time t ≥ 0, each node can be either susceptible or infected. When a node i is infected, the node transitions into the susceptible state with an instantaneous rate δi. Also, if node i is susceptible and has an infected neighbor, then the neighbor can infect node i with an instantaneous rate βi. The rates δi and βi are called the recovery and transmission rate of node i, respectively. We suppose that the above model evolves in the continuous-time; therefore, the rates represent probabilities per unit time [1] and, therefore, can be greater than one. The SIS model uses a pair-wise description for infection events and, therefore, does not allow synergistic effects. In order to study the effect of synergy, we study the synergistic SIS model [23], which we describe below. In the model, while an infected node recovers with the rate δi as in the SIS model, the rate at which a susceptible node i is infected by its infected neighbor, say, node j, is equal to βi + γjmj(t), (1) where γj denotes the strength of synergy and is dependent on individual nodes, and mj(t) denotes the number of the infected neighbors of node j at time t. The second term in (1) is introduced to describe synergistic effects: a susceptible node is directly affected not only by its infected neighbors but also their neighbors (see Fig. 1 for a schematic picture). We remark that, according to the classification in [17], the synergistic SIS model incorporates only the d-synergies, which are caused by adjacent pairs of infected nodes. Due to the limitations of the space, this brief does not deal with the other category of synergies called r-synergies arising in the interactions between a susceptible node and its infected neighbors. In this brief, we are interested in quantifying the rate at which the spreading process described by the synergistic SIS model grows. Therefore, we introduce the following definition: Definition 1. For all node i and time t ≥ 0, let pi(t) denote the probability that node i is infected at time t. Define the growth rate of the synergistic SIS model by ρ = supV0⊂{1,...,n} lim supt→∞ t−1log(cid:80)N i=1 pi(t), where V0 sion lim supt→∞ t−1 log(cid:80)N i=1 pi(t) represents the ex- the expres- i=1 pi(t) measures the asymptotic growth of the expected number of infected nodes. Hence, the growth rate in Definition 1 quantifies the worst-case growth of the average size of the infected population. pected number of infected nodes. Therefore, the sum (cid:80)N denotes the set of initially infected nodes. In Definition 1, The growth rate is closely related to fundamental notions in the network epidemiology such as mean-time-to-absorption [5] Fig. 1. Synergistic SIS model. Node j infects node i with an instantaneous rate βi + γj because node j has one infected neighbor, while node k infects node i with an instantaneous rate βi as in the SIS model. and epidemic thresholds [22]. However, it is hard in practice to exactly compute the growth rate. Since the synergistic SIS model, as a Markov process, has a total of 2N states, the computation of the growth rate requires finding the eigenvalues of a 2N × 2N matrix representing the infinitesimal generator of the Markov process [22]. Therefore, the computational complexity of exactly calculating the growth rate increases exponentially with the number of the nodes [24]. To overcome this difficulty, in the next section we introduce an upper-bound on the growth rate in terms of the eigenvalues of a matrix whose size grows only quadratically with N. III. GROWTH RATE In this section, we derive an upper bound on the growth rate of the synergistic SIS model. For each node i and let us define the variable xi(t) as xi(t) = 1 if time t, node i is infected at time t, and xi(t) = 0 otherwise. Then, since mj(t) = (cid:80)k∈Nj\{i} xk(t), the synergistic rate of infection (1) shows that the transition probability of the variable xi is described as Pr(xi(t + h) = 1 xi(t) = 0) = (cid:80)j∈Ni xj(t)(βi + γj(cid:80)k∈Nj\{i} xk(t))h + o(h) and Pr(xi(t + h) = 0 xi(t) = 1) = δih + o(h) for h > 0. This implies that the variable xi obeys the following stochastic differential equation with Poisson jumps (see, e.g., [25]): dxi = −xidΠδi + (1 − xi)(cid:88)j∈Ni xjdΠβi (2) + (1 − xi)(cid:88)j∈Ni (cid:88)k∈Nj\{i} xjxkdΠγj , where Πδi, Πβi, and Πγj are independent Poisson counters with rates δi, βi, and γj, respectively. In the stochastic differential equation (2), the first, second, and third terms represent the recovery, direct infection from neighbors, and synergy effects. By (2), the expectation E[xi] satisfies d dt E[xi] = −δiE[xi] + (cid:88)j∈Ni + (cid:88)j∈Ni (cid:88)k∈Nj\{i} βiE[(1 − xi)xj] γjE[(1 − xi)xjxk]. Notice that we have pi(t) = E[xi(t)]. Also, introduce the notations pij(t) = E[xi(t)xj(t)] (3) let us and 𝛽𝑖+𝛾𝑗𝛽𝑖𝑘𝑗𝑖SusceptibleInfected JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 aijpj + N(cid:88)j=1 dpi dt ≤ −δipi + βi N(cid:88)j=1(cid:88)k<j dt ≤ −δ(cid:96)pi(cid:96) + βi(cid:96)(pi − pi(cid:96)) +(cid:88)m<i k(cid:54)=i dpi(cid:96) aijakjγjpkj + N(cid:88)j=1(cid:88)k>j k(cid:54)=i am(cid:96)β(cid:96)pmi +(cid:88)m>i am(cid:96)β(cid:96)pim + − δipi(cid:96) + βiai(cid:96)(p(cid:96) − pi(cid:96)) +(cid:88)j<(cid:96) ajiβipj(cid:96) +(cid:88)j>(cid:96) ajiβip(cid:96)j + aijakjγjpjk, 3 (9) N(cid:88)m=1(cid:32)(cid:88)n<m N(cid:88)j=1(cid:32)(cid:88)k<j n(cid:54)=(cid:96) k(cid:54)=i am(cid:96)anmγmpnm + (cid:88)n>m ajiakjγjpkj +(cid:88)k>j n(cid:54)=(cid:96) am(cid:96)anmγmpmn(cid:33) ajiakjγjpjk(cid:33). k(cid:54)=i (10) pijk(t) = E[xi(t)xj(t)xk(t)] for all i, j, k ∈ {1, . . . , N} and t ≥ 0. Then, the differential equation (3) is rewritten as dpi dt = −δipi + (cid:88)j∈Ni βi(pj − pij) + (cid:88)j∈Ni (cid:88)k∈Nj\{i} (4) γj(pjk − pijk). This differential equation rigorously describes the evolution of the infection probabilities pi, which we require to compute the growth rate ρ. However, the differential equation contains the higher-order terms pij and pijk and, therefore, is not closed in the first-order term pi. For this reason, we cannot readily use the differential equation for calculating the growth rate. We avoid this difficulty by ignoring the third order terms pijk and deriving a set of differential inequalities for upper-bounding the growth rate of the synergistic SIS model. Intuitively, we can expect that ignoring the higher-order terms brings relatively small errors in the regime of extinction (i.e., when the epidemics dies out), in which lower-order terms become dominant. From differential equation (4), we obtain dpi dt ≤ −δipi + βi N(cid:88)j=1 N(cid:88)j=1(cid:88)k(cid:54)=i aijpj + aijakjγjpjk. (5) It should be emphasized that, in deriving inequality (5), we chose to ignore the negative second order terms −βipij for j ∈ Ni as well as the third-order terms. We discuss the reason for and consequence from this manipulation later in Remark 2. Then, let us derive differential equations for the evolution of the second-order terms. If we apply Ito's formula [25] to the mapping (xi, x(cid:96)) (cid:55)→ xix(cid:96) and, then, take mathematical expectations in the resulting stochastic differential equation, we obtain d dt E[xix(cid:96)] =−δ(cid:96)E[xix(cid:96)] + am(cid:96)β(cid:96)E[xi(1 − x(cid:96))xm] N(cid:88)m=1 am(cid:96)anmγmE[xi(1 − x(cid:96))xmxn] ajiβiE[(1 − xi)xjx(cid:96)] + N(cid:88)m=1(cid:88)n(cid:54)=(cid:96) − δiE[xix(cid:96)] + N(cid:88)j=1 N(cid:88)j=1(cid:88)k(cid:54)=i + ajiakjγjE[(1 − xi)xjxkx(cid:96)]. (6) is {0, 1}-valued, Since xi the second term on the right- hand side of the differential equation (6) is bounded from above as (cid:80)N m=1 am(cid:96)β(cid:96)E[xi(1 − x(cid:96))xm] ≤ ai(cid:96)β(cid:96)(pi − pi(cid:96)) + (cid:80)m(cid:54)=i am(cid:96)β(cid:96)pim. Likewise, the fifth term on the right-hand side of (6) can be bounded as(cid:80)N j=1 ajiβiE[(1 − xi)xjx(cid:96)] ≤ a(cid:96)iβi(p(cid:96) − pi(cid:96)) +(cid:80)j(cid:54)=(cid:96) ajiβipj(cid:96). Furthermore, we have E[xi(1 − x(cid:96))xmxn] ≤ pmn, E[(1 − xi)xjxkx(cid:96)] ≤ pjk. These observations yield that (7) dpi(cid:96) dt ≤ −δ(cid:96)pi(cid:96) + ai(cid:96)β(cid:96)(pi − pi(cid:96)) +(cid:88)m(cid:54)=i N(cid:88)m=1(cid:88)n(cid:54)=(cid:96) am(cid:96)β(cid:96)pim + am(cid:96)anmγmpmn − δipi(cid:96) + a(cid:96)iβi(p(cid:96) − pi(cid:96)) +(cid:88)j(cid:54)=(cid:96) ajiβipj(cid:96) + N(cid:88)j=1(cid:88)k(cid:54)=i (8) ajiakjγjpkj. is not Remark 1. One can derive different bounds on the derivative dpi(cid:96)/dt by replacing the reductions in (7) with others such as E[xi(1 − x(cid:96))xmxn] ≤ pim and E[(1 − xi)xjxkx(cid:96)] ≤ pj(cid:96). It theoretically easy to identify the best reduction giving the tightest bound on the derivative. However, we have numerically observed that using different reductions does not significantly alter the results of numerical simulations performed in Section IV. By replacing second-order moments pij having in- dices i > j with their equivalent counterparts pji = E[xjxj] = E[xixj] = pij, we rewrite the differential inequality (5) as (9) for all i. In the same manner, we rewrite the differential in- equality (8) as (10), which contains only the variables belong- ing to the set P = {pi, pjk : i, j, k ∈ {1, . . . , N} and j < k}. Now, let p denote the N 2+N -dimensional vectorial variable that can be obtained by stacking the variables in the set P. Then, we rewrite the system of differential inequalities (9) and (10) as 2 dp dt ≤ Mp (11) for a uniquely determined N 2+N Remark 2. Since we ignored second order terms −βipij for deriving (5), one should expect a certain conservativeness in the bound (11) and, therefore, the bound of the decay rate 2 matrix M. 2 × N 2+N JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 4 Fig. 2. Meta-stable number y(cid:63) of infected nodes in the synergistic SIS model for various values of δ and β. Colored region: the numerically obtained extinction region E. Dashed black line: the boundary ∂E of E. White (black) solid line: the boundary ∂E (∂E SIS, respectively) of the extinction region estimated from Theorem 1 (by the conventional method, respectively). Since the boundary ∂E SISlies in the region of epidemic outbreak, the conventional method overestimates the extinction region, while our estimate E is contained in E for all networks. Fig. 3. A sample path of the number of infected nodes, denoted by I(t), versus time t in the Facebook network. The transmission rate is fixed to be β = 0.02, while the recovery rates are changed as δ = 0.1, 0.4, 1, and 3. The corresponding points (δ, β) are plotted in Fig. 2.3. Inequality (11) shows that, for all t ≥ 0, to be later derived in Theorem 1. However, it is necessary to ignore the negative second order terms because, if not ignored, we cannot use the fact that the matrix M is Metzler for the proof of the theorem. there exists a nonnegative vector (t) such that dp/dt = Mp − . From differential inequalities (9) and (10), we see that the off-diagonals of M are nonnegative, i.e., M is a Metzler matrix. This implies that the exponential exp(Mt) has only nonnegative entries for all t ≥ 0 (see, e.g., [26]). Furthermore, by definition, each entry of the vector (t) is nonnegative for all t ≥ 0. Therefore, we obtain p(t) = exp(Mt)p(0) − (cid:82) t 0 exp(M(t − τ ))(τ ) dτ ≤ exp(Mt)p(0). This inequality bounds the vector p, which contains the infection probabilities p1, . . . , pN , by the matrix exponential exp(Mt). We have thus proved the following theorem, which is the main theoretical result of this brief: Theorem 1. The growth rate ρ of the synergistic SIS model satisfies ρ ≤ λmax(M). IV. NUMERICAL SIMULATIONS In this section, we illustrate the effectiveness of Theorem 1 by numerical simulations. From Theorem 1, we can obtain a sufficient condition for the spreading process to become extinct (i.e., the spread is not invasive) as λmax(M) < 0. (12) This section is devoted to numerically validating the suffi- ciency of the extinction condition (12). To determine if the spreading process becomes extinct, we use the notion of the meta-stable number of infected nodes that is commonly used in the Network Science. To identify the meta-stable number of infected nodes, we begin by computing the fol- lowing long-time average of the number of infected nodes i=1 xi(τ ) dτ for a sufficiently large t. In simulations, the spreading process can die out due to random fluctuations. To prevent this from happening, we use the re- infection procedure [27] in which a randomly chosen node is infected immediately after the spreading process dies. After we finish the simulation, we determine the meta-stable number of infected nodes, denoted by y(cid:63), by y(t) = t−1(cid:82) t 0(cid:80)N y∗ = y(t) − 1, where we subtract one to compensate for the effect of the re- infection procedure. Finally, when y(cid:63) < 1, it is determined that the spreading process becomes extinct. In our numerical simulations, we use the following three empirical human and animal social networks: (1) a social network of Zachary's Karate club [28] (Karate, N = 34), (2) a social network of bottlenose dolphins [29] (Dolphin, N = 62), and (3) a friendship network in Facebook (Facebook, N = 247). For simplicity of illustration, we assume that the network consists of homogeneous nodes; i.e., we assume βi = β, δi = δ, and γj = γ for constants β, δ, and γ. In this numerical simulation, we fix γ = 10−2. For the above three networks and various values of the transmission rate β and the recovery rate δ, we compute the meta-stable number y(cid:63) of infected nodes using the procedure described above, as well as our upper-bound λmax(M) on the growth rate. We then JOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST2015400.51ExtinctionEpidemicoutbreak(1)Karate00.51(2)Dolphin00.51(a)(b)(c)(d)(3)FacebookFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2c.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(a)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(b)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(c)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenJOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST20154JOURNALOFLATEXCLASSFILES,VOL.14,NO.8,AUGUST2015400.51ExtinctionEpidemicoutbreak(1)Karate00.51(2)Dolphin00.51(a)(b)(c)(d)(3)FacebookFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2c.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(a)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(b)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(c)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenFig.2.Meta-stablenumbery?ofinfectednodesinthesynergisticSISmodelforvariousvaluesofδandβ.Coloredregion:thenumericallyobtainedextinctionregionE.Dashedblackline:the'boundary∂EofE.White(black)solidline:theboundary∂E(∂ESIS,respectively)oftheextinctionregionestimatedfromTheorem1(bytheconventionalmethod,respectively).Sincetheboundary∂ESISliesintheregionofepidemicoutbreak,theconventionalmethodoverestimatestheextinctionregion,whileourestimateEiscontainedinEforallnetworks.(a)δ=0.1(b)δ=0.4(c)δ=1(d)δ=3Fig.3.Asamplepathofthenumberofinfectednodes,denotedbyI(t),versustimetintheFacebooknetwork.Thetransmissionrateisfixedtobeβ=0.02,whiletherecoveryratesarechangedasδ=0.1,0.4,1,and3.Thecorrespondingpoints(δ,β)areplottedinFig.2.3.tobelaterderivedinTheorem1.However,itisnecessarytoignorethenegativesecondordertermsbecause,ifnotignored,wecannotusethefactthatthematrixMisMetzlerfortheproofofthetheorem.Inequality(11)showsthat,forallt≥0,thereexistsanonnegativevector(t)suchthatdp/dt=Mp−.Fromdifferentialinequalities(9)and(10),weseethattheoff-diagonalsofMarenonnegative,i.e.,MisaMetzlermatrix.Thisimpliesthattheexponentialexp(Mt)hasonlynonnegativeentriesforallt≥0(see,e.g.,[26]).Furthermore,bydefinition,eachentryofthevector(t)isnonnegativeforallt≥0.Therefore,weobtainp(t)=exp(Mt)p(0)−Rt0exp(M(t−τ))(τ)dτ≤exp(Mt)p(0).Thisinequalityboundsthevectorp,whichcontainstheinfectionprobabilitiesp1,...,pN,bythematrixexponentialexp(Mt).Wehavethusprovedthefollowingtheorem,whichisthemaintheoreticalresultofthisbrief:Theorem1.ThegrowthrateρofthesynergisticSISmodelsatisfiesρ≤λmax(M).IV.NUMERICALSIMULATIONSInthissection,weillustratetheeffectivenessofTheorem1bynumericalsimulations.FromTheorem1,wecanobtainasufficientconditionforthespreadingprocesstobecomeextinct(i.e.,thespreadisnotinvasive)asλmax(M)<0.(12)Thissectionisdevotedtonumericallyvalidatingthesuffi-ciencyoftheextinctioncondition(12).Todetermineifthespreadingprocessbecomesextinct,weusethenotionofthemeta-stablenumberofinfectednodesthatiscommonlyusedintheNetworkScience.Toidentifythemeta-stablenumberofinfectednodes,webeginbycomputingthefol-lowinglong-timeaverageofthenumberofinfectednodesy(t)=t−1Rt0PNi=1xi(τ)dτforasufficientlylarget.Insimulations,thespreadingprocesscandieoutduetorandomfluctuations.Topreventthisfromhappening,weusethere-infectionprocedure[27]inwhicharandomlychosennodeisinfectedimmediatelyafterthespreadingprocessdies.Afterwefinishthesimulation,wedeterminethemeta-stablenumberofinfectednodes,denotedbyy?,byy∗=y(t)−1,wherewesubtractonetocompensatefortheeffectofthere-infectionprocedure.Finally,wheny?<1,itisdeterminedthatthespreadingprocessbecomesextinct.Inournumericalsimulations,weusethefollowingthreeempiricalhumanandanimalsocialnetworks:(1)asocialnetworkofZachary'sKarateclub[28](Karate,N=34),(2)asocialnetworkofbottlenosedolphins[29](Dolphin,N=62),and(3)afriendshipnetworkinFacebook(Facebook,N=247).Forsimplicityofillustration,weassumethatthenetworkconsistsofhomogeneousnodes;i.e.,weassumeβi=β,δi=δ,andγj=γforconstantsβ,δ,andγ.Inthisnumericalsimulation,wefixγ=10−2.Fortheabovethreenetworksandvariousvaluesofthetransmissionrateβandtherecoveryrateδ,wecomputethemeta-stablenumbery?ofinfectednodesusingtheproceduredescribedabove,aswellasourupper-boundλmax(M)onthegrowthrate.WethenobtainthetrueextinctionregionE={(δ,β):y?<1} JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 5 obtain the true extinction region E = {(δ, β) : y(cid:63) < 1} and its inner estimate from the sufficient condition (12): ¯E = {(δ, β) : λmax(M) < 0}. In Fig. 2, we illustrate the regions E and ¯E for the three empirical networks. We confirm that, for any of the networks, ¯E is contained in the true extinction re- our inner-estimate ¯E indicated by the white line passes gion E (i.e., the boundary ∂ through the colored region). For comparison, in Fig. 2, we also illustrate the estimate ¯ESIS = {(δ, β) : ¯ρSIS < 0} of the extinction region based on the conventional upper- bound ¯ρSIS = βλmax(A) − δ on the growth rate of the SIS model without synergy [22]. Since the boundary ∂ ¯ESIS passes outside the true extinction region for any of the three graphs, we observe that the use of the conventional method, which does not take into account synergistic effects, can lead to the overestimate of the extinction regions. In Fig. 3, we show sample paths of the time-evolution of the number of infected nodes for β = 0.02 and δ = 0.1, 0.3, 1, and 3. From Fig. 3.b, we confirm that the conventional method does overestimate the region of extinction. V. CONCLUSION In this brief, we have studied the synergistic SIS model over arbitrary complex networks. Since the state space of the model grows exponentially fast with the number of nodes, it is almost impossible to directly analyze the model except when the network size is very small. To overcome this difficulty, we have derived an upper-bound on the growth rate the spreading model in terms of the eigenvalues of a matrix whose size grows quadratically with the number of the nodes. We have illustrated the effectiveness of our theoretical results by numerical simulations on empirical human and animal social networks. A possible direction for future research is eliminating the computational complexity for calculating our upper-bound. Since the size of M grows quadratically, it is still not easy to apply the current bound for large-scale networks. It is of theoretical interest to examine if we can exploit the sparsity structure of M to efficiently calculate the upper bound. REFERENCES [1] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani, "Epidemic processes in complex networks," Reviews of Modern Physics, vol. 87, pp. 925 -- 979, 2015. [2] Y. Xia and D. J. Hill, "Attack vulnerability of complex communication networks," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 55, pp. 65 -- 69, 2008. [3] M. Babaei, H. Ghassemieh, and M. Jalili, "Cascading failure tolerance of modular small-world networks," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 58, pp. 527 -- 531, 2011. [4] C. Nowzari, V. M. Preciado, and G. J. Pappas, "Analysis and control of epidemics: A survey of spreading processes on complex networks," IEEE Control Systems, vol. 36, pp. 26 -- 46, 2016. [5] A. Ganesh, L. Massouli´e, and D. Towsley, "The effect of network topology on the spread of epidemics," in 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005, pp. 1455 -- 1466. [6] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, "Generalized epidemic mean-field model for spreading processes over multilayer complex networks," IEEE/ACM Transactions on Networking, vol. 21, pp. 1609 -- 1620, 2013. [7] P. Zhu, Q. Zhi, Y. Guo, and Z. Wang, "Analysis of epidemic spread- ing process in adaptive networks," IEEE Transactions on Circuits and Systems II: Express Briefs (Early Access). doi: 10.1109/TC- SII.2018.2877406 [8] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas, "Optimal resource allocation for network protection against spreading processes," IEEE Transactions on Control of Network Systems, vol. 1, pp. 99 -- 108, 2014. [9] D. Zhao, B. Gao, Y. Wang, L. Wang, and Z. Wang, "Optimal dismantling of interdependent networks based on inverse explosive percolation," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 65, pp. 953 -- 957, 2018. [10] M. Ogura and V. M. Preciado, "Stability of spreading processes over time-varying large-scale networks," IEEE Transactions on Network Science and Engineering, vol. 3, pp. 44 -- 57, 2016. [11] D. Balcan et al., "Seasonal transmission potential and activity peaks of the new influenza A(H1N1): a Monte Carlo likelihood analysis based on human mobility." BMC Medicine, vol. 7:45, 2009. [12] S. Merler, M. Ajelli, A. Pugliese, and N. M. Ferguson, "Determinants of the spatiotemporal dynamics of the 2009 h1n1 pandemic in europe: Implications for real-time modelling," PLoS Computational Biology, vol. 7, 2011. [13] E. Ben-Jacob, O. Schochet, A. Tenenbaum, I. Cohen, A. Czir´ok, and T. Vicsek, "Generic modelling of cooperative growth patterns in bacterial colonies," Nature, vol. 368, pp. 46 -- 49, 1994. [14] L. A. Liotta and E. C. Kohn, "The microenvironment of the tumourhost interface," Nature, vol. 411, pp. 375 -- 379, 2001. [15] C. Castellano, S. Fortunato, and V. Loreto, "Statistical physics of social dynamics," Reviews of Modern Physics, vol. 81, pp. 591 -- 646, 2009. [16] D. Centola, "The spread of behavior in an online social network experiment," Science, vol. 329, pp. 1194 -- 1197, 2010. [17] F. J. P´erez-Reche, J. J. Ludlam, S. N. Taraskin, and C. A. Gilligan, "Synergy in spreading processes: from exploitative to explorative forag- ing strategies," Physical Review Letters, vol. 106, p. 218701, 2011. [18] S. N. Taraskin and F. J. P´erez-Reche, "Effects of variable-state neighbor- hoods for spreading synergystic processes on lattices," Physical Review E, vol. 88, p. 062815, 2013. [19] D. Broder-Rodgers, F. J. P´erez-Reche, and S. N. Taraskin, "Effects of local and global network connectivity on synergistic epidemics," Physical Review E, vol. 92, p. 062814, 2015. [20] Q.-H. Liu, W. Wang, M. Tang, T. Zhou, and Y.-C. Lai, "Explosive spreading on complex networks: The role of synergy," Physical Review E, vol. 95, p. 042320, 2017. [21] J. S. Juul and M. A. Porter, "Synergistic effects in threshold models on networks," Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 28, p. 013115, 2018. [22] P. Van Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, pp. 1 -- 14, 2009. [23] J. J. Ludlam, G. J. Gibson, W. Otten, and C. A. Gilligan, "Applications of percolation theory to fungal spread with synergy," Journal of The Royal Society Interface, vol. 9, pp. 949 -- 956, 2012. [24] V. Y. Pan and Z. Q. Chen, "The complexity of the matrix eigenproblem," in 31st Annual ACM Symposium on Theory of Computing. New York, New York, USA: ACM Press, 1999, pp. 507 -- 516. [25] F. B. Hanson, Applied Stochastic Processes and Control for Jump- Diffusions: Modeling, Analysis and Computation. Society for Industrial and Applied Mathematics, 2007. [26] M. Ogura and V. M. Preciado, "Epidemic processes over adaptive state- dependent networks," Physical Review E, vol. 93, p. 062316, 2016. [27] E. Cator, R. van de Bovenkamp, and P. Van Mieghem, "Susceptible- infected-susceptible epidemics on networks with general infection and cure times," Physical Review E, vol. 87, p. 062816, 2013. [28] W. W. Zachary, "An information flow model for conflict and fission in small groups," Journal of Anthropological Research, vol. 33, pp. 452 -- 473, 1977. [29] J. Kunegis, "KONECT -- the Koblenz network collection," in Proceed- ings of the 22nd International Conference on World Wide Web, 2013, pp. 1343 -- 1350.
1506.01513
2
1506
2015-09-24T10:41:41
Social signals and algorithmic trading of Bitcoin
[ "cs.SI", "q-fin.TR" ]
The availability of data on digital traces is growing to unprecedented sizes, but inferring actionable knowledge from large-scale data is far from being trivial. This is especially important for computational finance, where digital traces of human behavior offer a great potential to drive trading strategies. We contribute to this by providing a consistent approach that integrates various datasources in the design of algorithmic traders. This allows us to derive insights into the principles behind the profitability of our trading strategies. We illustrate our approach through the analysis of Bitcoin, a cryptocurrency known for its large price fluctuations. In our analysis, we include economic signals of volume and price of exchange for USD, adoption of the Bitcoin technology, and transaction volume of Bitcoin. We add social signals related to information search, word of mouth volume, emotional valence, and opinion polarization as expressed in tweets related to Bitcoin for more than 3 years. Our analysis reveals that increases in opinion polarization and exchange volume precede rising Bitcoin prices, and that emotional valence precedes opinion polarization and rising exchange volumes. We apply these insights to design algorithmic trading strategies for Bitcoin, reaching very high profits in less than a year. We verify this high profitability with robust statistical methods that take into account risk and trading costs, confirming the long-standing hypothesis that trading based social media sentiment has the potential to yield positive returns on investment.
cs.SI
cs
Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Social signals and algorithmic trading of Bitcoin David Garcia, Frank Schweitzer Chair of Systems Design, ETH Zurich Weinbergstrasse 56/58, 8092 Zurich, Switzerland September 25, 2015 Published in Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 Abstract The availability of data on digital traces is growing to unprecedented sizes, but inferring ac- tionable knowledge from large-scale data is far from being trivial. This is especially important for computational finance, where digital traces of human behavior offer a great potential to drive trading strategies. We contribute to this by providing a consistent approach that integrates various data- sources in the design of algorithmic traders. This allows us to derive insights into the principles behind the profitability of our trading strategies. We illustrate our approach through the analysis of Bitcoin, a cryptocurrency known for its large price fluctuations. In our analysis, we include economic signals of volume and price of exchange for USD, adoption of the Bitcoin technology, and transac- tion volume of Bitcoin. We add social signals related to information search, word of mouth volume, emotional valence, and opinion polarization as expressed in tweets related to Bitcoin for more than 3 years. Our analysis reveals that increases in opinion polarization and exchange volume precede rising Bitcoin prices, and that emotional valence precedes opinion polarization and rising exchange volumes. We apply these insights to design algorithmic trading strategies for Bitcoin, reaching very high profits in less than a year. We verify this high profitability with robust statistical methods that take into account risk and trading costs, confirming the long-standing hypothesis that trading based social media sentiment has the potential to yield positive returns on investment. 1 Introduction Our online society generates data on the digital traces of human behavior at unprecedented scales and resolutions. This produces a data deluge, in which researchers are confronted with a vast amount of obser- vational data that is not the product of carefully designed experiments [1]. One of the main challenges of the scientific community is to develop methods to extract meaningful knowledge from that data beyond mere descriptive analyses [2]. This is particularly important in financial trading: Data can be available to all financial agents, but it is the analysis and its applications what makes a difference. Within com- putational finance, the field of algorithmic trading [3] deals with the implementation and evaluation of automatic trading strategies, which are often kept in private companies and away from publicly accessible research. The most common kind of algorithmic trading is based on the principles of technical analysis [4], using the time series of prices to formulate predictions about returns. Technical analysis is often insufficient to derive satisfactory returns [5], motivating the inclusion of large-scale social signals and the evaluation through data-driven simulations on historical data, called backtesting [6, 7]. In this article, we present a set of methods to derive stylized facts from the analysis of multidimensional economic and 1/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: social signals, and to apply that knowledge in the design and evaluation of algorithmic trading strategies. We illustrate an application of our approach to algorithmic trading of the Bitcoin cryptocurrency, using a wide variety of digital traces about economic and social aspects of the Bitcoin ecosystem. Bitcoin (BTC) is a digital currency designed to operate in a distributed system without any central authority, based on a cryptographic protocol that does not require a trusted third party [8]. Introduced in a 2008 paper written under the pseudonym of Satoshi Nakamoto [9], Bitcoin serves as a technology to transfer money quickly for negligible fees [10]. One of the first markets to adopt Bitcoin was the Silk Road, a website where illegal commerce became possible thanks to the relative anonymity of Bitcoin [11], in line with the evidence in search trends that relates Bitcoin usage to computer expertise and illegal activities [12]. Since then, the use of Bitcoin has widely expanded beyond criminal activities: At the time of writing, Bitcoin is accepted by many legal merchants and charities [13], including large businesses like Dell [14]. Bitcoin-accepting businesses, exchange markets, and wallet services compose the Bitcoin ecosystem [8], where different kinds of agents interact, trade, and communicate through digital channels. The increasing adoption of Bitcoin and its online nature allow us to simultaneously monitor its social and economic aspects. Every purchase of goods or services in Bitcoin leaves a trace in a public ledger called the Block Chain, creating a publicly accessible economic network [15]. Bitcoin’s delocalized technology aligns with the online interaction of its users through social networks and forums, motivating its adoption by new users through word-of-mouth [16]. Previous research has shown how search trends and Wikipedia views are related to price changes [17] and to the speculative and monetary aspects of Bitcoin [18], leading to dynamics that combine search interest, user adoption, word-of-mouth, and prices [16]. Contributions of this article. Based on established principles of time series analysis and financial trading, we present a framework to derive general knowledge from multidimensional data on social and economic aspects of a market. We apply a general statistical model to detect temporal patterns in the co-movement of price and other signals. Those patterns are tested through a method robust to the em- pirical properties of the analyzed data, formulating concise principles on which signals precede market movements. We combine those principles to produce tractable trading strategies, which we evaluate over a leave-out sample of the data, quantifying their profitability. Our approach, rather than focusing on improving a particular method, takes a multidisciplinary stance in which we combine principles from social psychology and economics with methods from information retrieval, time series analysis, and com- putational finance. We apply our framework to the Bitcoin ecosystem, monitoring the digital traces of Bitcoin users with daily resolution. We combine economic signals related to market growth, trading volume, and use of Bitcoin as means of exchange, with social signals including search volumes, word-of-mouth levels, emotional valence, and opinion polarization about Bitcoin. Our results reveal which signals precede changes of Bitcoin prices, a knowledge that we use to design algorithmic trading strategies. We evaluate the power of our strategies through backtesting data-driven simulations, comparing returns with technical analysis strategies. As a consequence, we test the hypothesis that social media sentiment predicts financial returns in the Bitcoin ecosystem. Social signals in finance. Understanding the role of social signals in finance not only has the potential to generate significant profits, but also has scientific relevance as a research question [19]. Two different 2/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: research approaches give insights to this question: One is the statistical analysis of social and financial signals in order to test the existence of temporal correlations that lead financial markets. The second one applies these signals in prediction scenarios, measuring their accuracy as a validation of the underlying behavior of the system, but not necessarily of their profitability. The statistical analysis of search engine data reveals that search trends can predict trading volumes of individual stocks [20]. In addition, stock prices in S&P 500 are correlated with tweet volumes [21], but the applicability of these patterns into trading strategies is yet to be evaluated. Sentiment in social media is closely related to socio-economic phenomena, including public opinion [22]. This motivates the application of sentiment indicators in the statistical analysis of financial data. Early works on the sentiment in specialized forums gave negative results about their impact on returns [23]. Further research showed that emotions in private instant messaging between workers of a trading company precede stages of market volatility [24]. The expression of anxiety in publicly accessible data from general blogs precedes trading peaks and price drops in the S&P 500 [25], and sentiment in Twitter can be used to predict movements in large-scale stock indices [26]. It is important to note that, to date, there is no evidence that such sentiment-based predictions produce significant returns on investment [19]. Online Polarization. While most of previous works on sentiment in financial markets focus on di- mensions of valence or mood, the collective phenomenon of polarization of opinions is often overlooked. The emergence of polarization in a society gives early warnings on political and economic phenomena: Polarization in social networks of Swiss politicians precedes controversial elections [27], and polarization patterns in the Eurovision Song Contest appear before states of distrust in the European economy [28]. With respect to financial markets, speculation theories point to the role of diverse beliefs in financial transactions [29], leading to the hypothesis that polarization and disagreement influence trading volumes and prices [30]. In this line, the empirical analysis of polarization in stock message boards shows that states of disagreement lead to increased volatility [31]. The missing link. To date, there is a significant knowledge gap between the analysis and application of social signals to trading scenarios. Findings from statistical analyses alone are not guaranteed to lead to profitable strategies at all [25]. For example, movements of the Dow Jones Industrial Average (DJIA) can be predicted with mass media sentiment [32] and Twitter mood [26], but to date no research has shown that such prediction methods can be profitable in trading scenarios. Similarly, the analysis of discussion patterns in specialized blogs predict returns of some technology companies [33], but it is still open to evaluate the potential returns of such a predictor. The application of methods that process arbitrarily large datasets lead to results difficult to apply, for example the predicting power of search volumes of the query "moon patrol" [34] in backtesting over the DJIA [6]. Furthermore, analyses of Twitter discussions about companies can be applied in a portfolio strategy, yet its evaluation through backtesting leads to very moderate returns and their statistical significance is not assessed [35]. In addition, no previous research has proposed a prediction technique that derives significant returns on investment from online sentiment data [19]. Our research aims at closing the gap between these lines of research. To do so, we unify the statistical analysis and its application to design and evaluate trading strategies, based on tractable principles with potential impact in the finance community. 3/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: 2 Trading strategy framework To design and evaluate trading strategies, we present a framework that uses a set of economic and social signals related to the agents of the market under scrutiny. Among those signals, the only required one is an economic signal of prices of an asset, namely a stock, currency, or tradable index. To understand profitability, we convert the price time series P (t) into a return time series: Ret(t) = P (t) − P (t − 1) P (t − 1) (1) which quantifies proportional changes in the price at every time step. The data on these signals is divided in an analysis period and a leave-out period, as depicted in Figure 1. The division in these periods needs to allocate enough data in the leave-out sample to provide the testing power to assess the statistical significance of strategy profits. For daily trading, a leave-out period of about one year is usually sufficient, but this ultimately depends on the expected profitability and variance of the trading strategies. Figure 1: Framework for analysis of social and economic signals and trading strategy de- sign and evaluation. Multidimensional analysis. The first step in our framework focuses on the analysis period, applying a multidimensional model of Vector Auto-Regression (VAR) [36], which is commonly used in the analysis of multidimensional time series in finance [23, 37, 16]. A VAR models multidimensional linear relations with given lags, which in our analysis we set to one day. Thus, given the vector of signals V (t) we fit the equation V (t) = φV (t − 1) + r ∗ t + c +  (2) where φ is a matrix of weights of the linear relations between variables, r is a deterministic trend vector, c is the vector of constant intercepts, and  is a vector of uncorrelated errors. While more advanced models can be considered, including longer lags and non-linear terms, we choose the VAR model of lag 1 for its general character and its proved power to reveal patterns in finance [23, 16]. More complex models might have higher power to reveal nuance patterns, but at the expense of a loss of generality due to the focus on particular systems. We include all the time series in a single model to avoid the false positives associated with pairwise Granger tests. To ensure the correct application of the VAR model, we need to verify that our analysis is consistent with its fundamental assumptions: i) that the elements of V (t) do not have a unit root, and ii) 4/19 Economic SignalsPrice, Volume, TradeSocial SignalsSearch, WoM, EmotionsAnalysis periodLeave-out periodMultidimensional ModelImpulse AnalysisTrading strategydesignBacktesting evaluationV(t)=φV(t−1) + rt + c + ϵ Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: that the error term  has no temporal nor structural correlations. We verify the first set of assumptions on the properties of V (t) by applying a set of tests and transformations prior to the application of the VAR model. We ensure that our conclusions are robust to the second set of assumptions by correcting for correlations in the noise term, as explained in the Materials and methods section. Impulse analysis. The VAR weights φ are only informative when there are no correlations in the error term  of equation 2, which is usually not the case in practice. To extract stylized facts that can be used in the design of trading strategies, we perform an impulse analysis by measuring Impulse Response Functions (IRF) [38] while correcting for correlations in the empirical error. This method simulates the system dynamics when it receives a shock in one of the variables, applying the VAR dynamics of Equation 2 to reproduce the changes in the rest of the variables through time. By recording the changes in each variable, we can estimate the total size and the timespan of the perturbation produced by the shock. In essence, the IRF method creates a computational equivalent of the system under scrutiny, to test its reaction to exogenous impulses in each of its elements. Trading strategy design and evaluation. The output of the impulse analysis step, shown in Figure 1, is a set of patterns of Granger-type "causation", i.e. it tests the null hypothesis of the absence of temporal correlations among the variables. We use these patterns as stylized facts that indicate which variables precede changes in price returns. For example, if variable Y (t) has a significant impact on Ret(t) in the impulse analysis, we will include Y (t) in our trading strategy design with sign sY , which takes the value 1 if the response of Ret(t) to Y (t) was positive, and −1 otherwise. Thus, a predictor based on Y (t) would be sign(Ret(t + 1)) = sign(sY ∗ (Y (t) − Y (t − 1))) (3) This way, we predict increases (decreases) in price between time t and t + 1 if signals with positive responses increase (decrease) between time t− 1 and t, and vice versa for signals with negative responses. Since our multidimensional analysis is robust to confounds between multiple time series, the findings of impulse analysis can be integrated in a Combined strategy based on a voting mechanism. The Combined strategy applies the other predictors and formulates a prediction corresponding to the sign of the sum of their outputs, i.e. the majority vote. We evaluate the profitability of the designed strategies in comparison to the benchmark of standard strategies, based on the backtesting over the leave-out sample as indicated in Figure 1. For each strategy, we make a data-driven simulation of a trader following that strategy, and we record the profits of that trader on a daily basis. Details on the computational simulation of financial traders can be found in the Materials and methods section. Bitcoin social economic and signals We apply our approach to the case of trading Bitcoin based on social and economic signals of the Bitcoin ecosystem. We set up a system that monitors different data sources, retrieving data in real time in combination with historical time series. The data volumes recorded during our study period of almost four years is shown in Figure 2, and can be interactively browsed in our online visualization1. The signals we measure, explained more in detail in the Materials and methods 1www.sg.ethz.ch/btc 5/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: section include economic signals of price P (t) and returns Ret(t), trading volume in a wide range of Bitcoin exchange markets F XV ol(t). Furthermore, we measure the economic signal of transaction volume in the Block Chain BCT ra(t), which measures the volume of usage of Bitcoin as a currency, and the amount of downloads of the most important Bitcoin client Dwn(t) as a measure of growth in adoption of the Bitcoin technology. The social signals we measure are the level of search volume in Google for the term "bitcoin" S(t), the word-of-mouth level as measured by the amount of tweets containing Bitcoin-related terms TN (t), and the emotional valence TV al(t) and opinion polarization TP ol(t) expressed in those tweets using lexicon-based approaches from psycholinguistics [39, 40] (more details in Materials and methods). All these signals are shown in Figure 2, illustrating the large oscillations of price and other signals related to Bitcoin. Figure 2: Time series of data volumes in the Bitcoin ecosystem. Interactive version: www.sg.ethz.ch/btc 3 Results 3.1 Data-driven Bitcoin trading strategy design For our statistical analysis, we include all the data up to January 1st, 2014, covering almost 3 years. After applying stationarity tests, we conclude that the time series of price returns Ret(t) can be assumed to be stationary, as well as the first differences of the other seven signals (details on the stationarity test results can be browsed in www.sg.ethz.ch/btc and in the SI). As a consequence, we define our variable 6/19 04008001200FX Volume [BTCx1000]02550Downloads [x1000]020406080100BC Transactions [x1000]02505007501000Price [USD/BTC]02/201107/201101/201207/201201/201307/201301/201407/201412/2014leave−outperiodPrice (BPI)Exchange VolumeSourceForge DownloadsBlock Chain Transactions04080120Tweets Number [x1000]00.51Google search volume5.45.65.86.0Valence0.10.20.30.40.5Polarization02/201107/201101/201207/201201/201307/201301/201407/201412/2014DateNumber of TweetsSearch VolumeValence (weekly)Polarization (weekly) Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Figure 3: Results of Impulse Response Function analysis. (A) Impulse Response Functions of return to shocks in Twitter polarization and exchange volume, (B) of Twitter polarization to shocks in return and Twitter valence, and (C) of exchange volume to shocks in Twitter valence and polarization (right). Solid lines show responses, dashed lines show 95% confidence intervals. (D) Cumulative Impulse Response Functions of price return to changes in the other signals. Dashed lines indicate responses below the 0.1% level. vector as: V (t) = [Ret(t), ∆F XV ol(t), ∆BCT ra(t), ∆Dwn(t), ∆S(t), ∆TN (t), ∆TV al(t), ∆TP ol(t)] composing the input to the multivariate analysis of our framework. We fit a VAR as explained in Materials and methods over the analysis period. We compute IRF for all pairs of variables, all results including VAR estimates and IRF values can be browsed in www.sg.ethz.ch/btc and in the SI. Here, we comment on the most relevant results, which serve as input for our trading strategy design. Figure 3 A shows the IRF of returns to shocks in polarization and volume in exchange markets, where the response is measured in return percentages. Both polarization and exchange volume have significantly positive influences in price returns one day after the shock, decreasing rapidly afterwards. The increase of returns with polarization is consistent with the hypothesis that disagreement fuels trading in speculative scenarios [30, 31], where information asymmetries fuel price bubbles. Exchange volume also increases with polarization, as shown in Figure 3 C, but the the relationship is instantaneous rather than lagged as in the case of returns. 7/19 01234567−0.20.20.6Response of Return [%]Return to PolarizationReturn to FX Volume01234567−0.150.000.10Response [sd]Polarization to ValencePolarization to Return01234567−0.050.05t [days]Response [sd]FX Volume to ValenceFX Volume to Polarizationt [days]01234567−0.20.20.40.6Cumulative response of Return [%]DownloadsSearchBC TransactionsFX VolumeTweets NumberValencePolarizationABCD Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Figure 3 B shows the response of polarization in Twitter to shocks in returns and valence. The negative effect of polarization shows that price drops lead to increases in polarization, signaling the disagreement in the Bitcoin community due to price crashes. The pattern linking valence to polarization is relevant, revealing that periods with increasing positivity in expression precede stages of higher polarization. The role of valence can further be observed in the IRF of exchange volumes in Figure 3 C, in which valence has a significant effect. The combination of patterns of increasing polarization and exchange volume following stages of increasing valence show the relevance of valence in price returns, in addition to the effects of polarization and exchange volume. We further validated these results in two ways. First, we fit a VAR with lags longer than a day, selecting the optimal lag that optimizes the Bayesian Information Criterion. We found that a lag of 2 is optimal, but the results of the fits and IRF analysis did not qualitatively change (see SI). Second, we performed a Monte Carlo test, computing the impulse response functions for time series with randomized permutations of the values. The results of these permutation tests show are consistent with the above results, as reported in the SI, showing the robustness of our approach. Turning analysis into strategy We summarize the above findings as stylized facts that can drive the decisions of an algorithmic trader. We focus closer on the role of each signal into returns, by computing the cumulative changes given by the IRF analysis. This way, we can identify which signals show a sizable pattern that precedes changes in returns, and filter out those that are not significant or can be explained as confounds of the others. Figure 3 D shows the results, measuring the cumulative change in return percentage when each one of the other signals receives a shock of size one standard deviation. The three signals with effects above the 0.1% level are polarization, valence, and exchange volume, reaching effects up to 0.5% in one day that prevail through time. Note that this is a relatively large value, because trading results in multiplicative returns. Such effect sizes have strong potential impact on the profitability of trading strategies over long time periods. This allows us to discard the rest of the signals, feeding into our trading strategy design by producing four strategies: three strategies of positive sign, Valence, Polarization, and FXVolume, and a fourth Combined strategy determined by a voting mechanism as explained in the Trading strategy framework section. 3.2 Bitcoin strategy evaluation To evaluate the profitability of our four strategies, we set up a benchmark against random strategies and technical strategies, using the actual exchange rate of BTC for USD in bitfinex.com as well as the Bitcoin Price Index (see www.sg.ethz.ch/btc for results with BPI). Random strategies sample a random number with 0 mean at every time t, and formulate a prediction based on the sign of the random number. Among technical strategies, the simplest is Buy and Hold, which simply buys BTC with the initial capital at time t = 1, selling it only once at the time when profits are evaluated. The technical strategies we use are a benchmark of simple standard predictions [5]: i) the Momentum strategy, which predicts that price changes at time t + 1 will be the same as at time t, ii) the Up and Down Persistency strategy UPD, which predicts that price increases at time t are followed by decreases at time t + 1, and vice versa, and iii) the Relative Strength Index strategy RSI, which computes an additional time series of ratios of return sign 8/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Figure 4: Profits of trading strategies. Left: Time series of profit for our strategies (top), and technical strategies (bottom). Shaded areas show one standard deviation of the random strategy. Interactive version: www.sg.ethz.ch/btc Right: Kernel density plots of the profit of each strategy (bandwidth=15%). frequencies over a rolling window of five days, and predicts price changes based on reversals of this time series (more details in [5]). The simulation of each strategy produces a time series of profits Profit(t) = C(t) − C(0) C(0) ∗ 100 (4) where C(t) is the capital of the trader at time t and C(0) is the initial investment capital. Figure 4 shows the time series of profits for our four strategies and the technical strategies. In addition, we compute the profit of Buy and Hold, and the results of the simulation of 10000 random traders. The Valence, Polarization and Combined strategies clearly perform better than a random trader, while the FXVolume is not very far from the result of random traders. Among the technical strategies, only RSI and Momentum are able to eventually reach beyond the outcome of random traders, but are still clearly outperformed by the Polarization and Combined strategies. The stopping time of the simulation of a trading strategy is given by our data, but a variety of factors might trigger a trader to stop trading earlier in a real scenario [3]. For that reason, we explore the distribution of profits of each strategy, assuming that the trading stops at any arbitrary point of our backtesting period. Thus, for each strategy we have a set of profit values, one for each possible trading end date. The right panel of Figure 4 shows the Kernel Density Plots of the distributions of profits for each strategy. It can be appreciated that the most profitable strategy is Combined, followed by Polarization and then Valence and RSI. We quantitatively assessed this result, through Wilcoxon tests [41] over the distributions of profits (more details in SI), confirming the observation that the most profitable strategies are Combined, and Polarization. More precisely, the Combined strategy gives profits beyond 100% for most of the time during the trading period. 9/19 −100−50050100Profit [%]2014−01−012014−03−012014−05−012014−07−012014−09−012014−11−012015−01−01DateMomentumBuy and HoldRSIUPD−50100200Profit [%]2014−01−012014−03−012014−05−012014−07−012014−09−012014−11−012015−01−01CombinedValencePolarizationFXVolumeRandom0.0000.0050.0100.0150.020−100−500501000.0000.0050.0100.0150.020−100050150250P(Profit)Profit [%]Profit [%] Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: While surveying cumulative returns is illustrative of the performance of the strategies, the multiplicative nature of cumulative returns overweights early positions and is biased towards the beginning of the evaluation period. To properly evaluate trading strategies, we calculated the Sharpe Ratio [42], measuring risk-corrected profits as: SR = µR−Rf , where µR and σR are the mean and standard deviation of the daily rate of return of a strategy R(t) = (C(t) − C(t − 1))/C(t − 1). Rf is the "risk- free" return rate of a theoretical investment that would give certain profit under no risk at all, which is often estimated as the interest rate of high-quality sovereign bonds. At the time of writing, some European sovereign bonds are giving interest rates close to zero or even negative [43], which motivates our conservative choice of Rf = 0. The value of SR is calculated in annualized units, taking into account that Bitcoin can be traded 365 days a year. σR Combined Polarization Valence FXVolume Buy and hold -0.7741 -0.1635 Random -1.6590 -0.0963 1.7653 0.3229 Momentum 0.9146 0.1625 0.5738 0.1082 DJIA 0.7995 0.0345 1.0120 0.1779 UPD -0.8990 -0.1736 0.6410 0.1183 RSI -0.1772 -0.0346 SR µR SR µR Table 1: Sharpe Ratios and mean daily returns of strategies. Table 1 reports the Sharpe Ratio SR and the mean daily return µR for all strategies, as well as for the DJIA and the average of 10000 random traders. The Sharpe Ratio analysis is consistent with the results of the cumulative returns analysis, showing that the Combined strategy provides the highest returns, with the best SR value above 1.75 and with daily returns above 0.3 % per day. The profitability of these strategies illustrate how social media sentiment can produce positive returns on investment, especially when including polarization measures beyond the trivial quantification of valence or mood. 3.3 Costs and risks of the Combined strategy To understand better the possible weaknesses of the Combined strategy, we run a series of tests to evaluate the role of trading costs and additional risks. Trading Bitcoin in an online market usually comes at a cost, which often depends on the activity and the traded capital. These trading costs should not be confused with the transaction fees in the Block Chain [9], which do not depend on the transacted cost and are not associated to any market of exchange to other currencies. Trading costs can potentially erode the profitability of trading strategies, especially if they require many movements. We simulated the same backtests for costs increasing from 0 to 0.3% of the exchanged capital, a value well above the maximum costs of major trading platforms [44]. As a simplification, we assume that buying, selling, and borrowing costs are the same, yet their values might depend on the trading volume of a strategy [44]. Figure 5 shows the final profits of the Combined strategy, which decrease monotonically with trading costs. The strategy is still highly profitable for low costs, but for costs above 0.25%, the strategy is not profitable any more. Furthermore, we repeat this analysis assuming the limitation that daily positions need to be forcefully closed at the end of each trading period (shown in SI), finding a decrease in returns but that the strategy is still profitable for trading costs of 0.1%, a typically high cost of current exchange platforms [45]. 10/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Figure 5: Final profit of the Combined strategy versus trading cost. In this application, the leave-out period is characterized by decreasing BTC prices. Thus, it is important to evaluate the role of each possible trading action: longing when BTC are bought to be sold later, and shorting when they are borrowed and traded as explained above. We repeat the backtesting of the Combined strategy allowing only short and only long positions, following the methodology of [6]. As reported more in detail in the SI, the only short strategy yields higher cumulative returns than the only long strategy, as expected from a period in which prices decrease steadily. We test further properties of the behavior of the Combined strategy in the leave-out period. The distribu- tion of daily returns of the Combined strategy during the leave-out period follows a lognormal distribution, as tested through maximum likelihood fits and Kolmogorov-Smirnov tests (see SI). The time series of returns of this strategy is also not autocorrelated and can be considered stationary (see SI for stationarity tests of daily returns). This additional analysis shows that the high profitability of the Combined strategy is not due to risky correlations in the behavior of the trading strategy. 4 Concluding remarks Our work applies established methods of time series analysis and computational finance to integrate the analysis, design, and evaluation of trading strategies and social and economic signals. We have shown that our approach successfully reveals temporal patterns in the Bitcoin ecosystem, in particular the relation between price returns and the signals of exchange volume and Twitter valence and polarization. Our statistical analysis is robust to noise correlations and the finite nature of time series, providing a consistent set of results that we can apply to strategy design. We evaluated the profitability of our strategies through data-driven simulations of a computational model of a trader, showing that a strategy that combines valence, polarization, and exchange volume can reach very high profits in less than a year. The added value of including polarization in our analysis constitutes evidence that collective factors of emotions and opinions have the potential to predict financial returns, beyond trivial macroscopic aggregates like average valence. 11/19 0.000.050.100.150.200.250.30050100150Trading cost [%]Profit [%] Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: Our framework can be applied to other trading scenarios in which social signals are available, like in the case of company stock trading driven by sales data, news information, and social media sentiment towards a company. The general nature of our methods are of special relevance for real trading scenarios, as the stylized facts we use to design strategies provide a tractable explanation for their mechanisms. This allows traders to understand and evaluate the principles of the algorithmic trading strategies designed in our framework. Such tractability is an advantage in comparison to more complex, non-linear, or subsymbolic models that do not have straightforward interpretations. Nevertheless, improvements can be expected from the addition of longer time lags, higher frequency trading, and real-time optimization approaches. Furthermore, the rules that drive our trading strategies do not require retraining or calibration during trading, and the social and economic signals we employ can be quantified during a day in order to have an instant trading decision ready at the beginning of the next day. Our application to Bitcoin trading is thus realistic, making use of shorting options and performing well under the typical trading costs of Bitcoin markets [44]. The application of our results should be taken with caution. Historical profit through backtesting do not necessarily predict future ones, and the information sources analyzed here could be adopted by Bitcoin traders. Our evaluation goes as far as the representativity of the leave-out sample, and future research should evaluate the performance of our approach when prices rise and when traders are aware of the existence of our trading strategies. Financial markets are known to quickly absorb knowledge, as it happened with the inclusion of search trends data in stock trading [7]. It is also difficult to estimate the scalability of automatic trading strategies, as financial markets are complex adaptive systems that react to trades of large volume. Furthermore, systemic risk emerges from algorithmic trading, creating flash crashes due to algorithmic resonance [8]. In addition, structural changes and additional risks in borrowing and lending Bitcoin for shorting can emerge when exchange markets close or governments regulate Bitcoin, changing the rules of the game in a way such that our trading strategies might not work any more. With our study, we have shown that it is possible to turn social signals into profit. This extends the range of typical business applications for social media data like viral marketing or user engagement. Specifically, our combination of statistical analysis and backtesting serves as a framework for future applications of social media data in algorithmic trading. It allows a robust validation of strategy profits and a clear understanding of the system dynamics behind these profits. The application of our framework to Bitcoin trading illustrates that (asymmetric) information and profit are two manifestations of the same thing, and how traders can apply these macroscopic information sources to derive large profits. We foresee that the applications of social signals to finance will reach far beyond Bitcoin, not only to make private profit but also to understand the dynamics of individual and collective decisions and emotions. 5 Materials and methods Stationarity tests. Before fitting the VAR model, we test the stationarity of each time series through two alternative tests: i) the Augmented Dickey Fuller (ADF) test [46], which has the null hypothesis that the tested time series is non-stationary, and ii) the Kwiatkowski-Phillips-Schmidt-Shin (KPSS) test [47], with the null hypothesis that the time series is stationary. Under these two tests, it can be considered 12/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: safe that a time series is stationary if it passes the ADF test with a p-value below 0.05 and does not pass the KPSS test, giving a p-value above 0.1 [38, 16]. We first analyze the time series of levels of each signal X(t), applying the differentiation operator ∆X(t) = X(t) − X(t − 1) until each time series is stationary. This step is inspired in the Box-Jenkins method of ARIMA time series analysis [48], and it is usual to reach stationarity after first differences [38, 16]. The stationary properties of these time series imply that their means and standard deviations are bound, allowing us to renormalize them through the Z-transformation Z(t) = (X(t) − µX )/σX, where µX and σX are the mean and standard deviation of each time series. This way, all time series have the same scale and variance, and their effects in statistical analysis can be compared. In the impulse analysis, we correct for the correlations in  in Impulse response function analysis. two ways. First, we apply orthogonalized impulses of unit covariance, creating a shock of one standard deviation in a variable under the error correlations of the VAR [49]. Second, we apply bootstrapping on the resulting responses by producing surrogate time series from resampling the residuals [38]. This way, we numerically compute confidence intervals of the responses in a very strict way, avoiding false positives and taking into account the finite size of the analysis period. In our case, we create 10, 000 bootstrap samples to estimate 95% confidence intervals of the responses. As a result, we simultaneously measure the dynamics of the system and test their statistical significance. Trading based on predictions. During each timestep, the prediction function makes a forecast either based on Equation 3, or based on the price time series for technical strategies. Positive predictions translate into buy decisions when the trader does not own the asset, and hold if it does. When the predictor takes value 0, no change is done and the previous position is imitated. Negative predictions translate into sell positions when the trader owns the asset or short when it does not own it. Shorting works as follows: Traders can make profit from correct predictions of price drops even if they do not own the asset predicted to drop in price. This is implemented by borrowing the asset, selling it first and buying it later for a lower price. The limitation for borrowing is usually imposed on the amount of capital already held by the trader, and often incurs in additional trading costs and legal regulations [50]. The simulation of each strategy produces a time series of profits, allowing us to measure their profitability based on historical data. Buy and sell orders have respective costs cb and cs, which are proportional to the total traded capital. In our case we assume all costs are equal c = cb = cs, leaving particular realizations of the costs as open for future research. We compute daily cumulative returns when trading stops at t+1, holding USD or selling BTC at the price of t+1. Our trading simulations have a limit on short selling set by the amount of capital held by the trader and assume that short selling needs to be instantly executed, i.e. short positions are limited to one iteration. In summary, the strategy we execute is a single-asset backtesting scenario in which 100% of the capital is invested at each time step and shorting is limited. The pseudocode of this simulation is shown in Algorithm 1. Economic signals from financial data The establishment and bankruptcy of various Bitcoin ex- change markets motivated the creation of the Bitcoin Price Index (BPI) [51]. The BPI combines a set of price indices from well-performing exchange marketplaces to provide a reference for BTC/USD exchange 13/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: nUSD = 1; CR[1]=1; for each t from 1 to T-1 do if prediction(X,t) == 1 and nBTC == 0 then nBTC = nUSD * (1-cb) / P[t] ; nUSD = 0 else if prediction(X,t) == -1 and nBTC > 0 then nUSD= nBTC * (1-cs) * P[t] ; nBTC = 0 else if prediction(X,t) == -1 and nBTC == 0 then nBTCb = nUSD / P[t] ; nUSD = nUSD + nBTCb * (1-cs) * P[t] - nBTCb * P[t+1] / (1-cb) CR[t+1] = nUSD + nBTC * P[t+1] *(1-cs); end Algorithm 1: Algorithm of trading simulation. rates, and is accepted as a standard measure of Bitcoin price in economics [52, 53, 18]. We use the daily closing prices of each day t at 23:59 GMT from coindesk.com, composing the time series of price P (t) from February 1st, 2011 to December 31th, 2014, shown in the top panel of Figure 2. The BPI is not nec- essarily tradeable, and for that reason we evaluate our trading strategies with the actual exchange rate of BTC for USD in bitfinex.com, one of the largest markets reported in coindesk.com. We also retrieved the daily volume of BTC exchanged in 80 online markets for other currencies from bitcoincharts.com. Aggregating all these data sources, we compose an Internet-wide measurement of Foreign eXchange (FX) volume of BTC traded every day F XV ol(t), including more than 152 Million BTC in exchange trades as we recorded in early 2015. Every purchase of products and services in BTC leaves a trace in the Block Chain, the distributed ledger that records all transactions in the Bitcoin network. We construct a time series with the daily amount of Block Chain transactions BCT ra(t), as measured by blockchain.info every day at 18:15:05 UTC, which we approximate to 00:00 GMT of the next day. While some data is lost in this additional delay of few hours, further research can provide more precise measurements up to the minute level using the raw information in the Block Chain itself as in [16]. This way, we include more than 55 million transactions in the studied period, measuring the overall activity of the system when using Bitcoin as means of exchange. In addition, we measure the growth of the Bitcoin market through its amount of adopters, using the operationalization of measuring the amount of downloads of the most popular Bitcoin client2 [16], daily binned in line with other time series. The resulting time series of downloads Dwn(t) is shown in the top panel of Figure 2. Social signals We record the overall interest towards Bitcoin through information search, as quantified by the Google trends volume for the term "bitcoin", S(t), as recorded in early 2015 and shown in the bottom panel of Figure 2. We choose the search term "bitcoin" instead of the "Bitcon - Currency" topic, which was introduced as a functionality of Google Trends during our analysis period. While the topic approach can be more precise for demographics and motive analysis [12], we follow a homogeneous 2http://sourceforge.net/projects/bitcoin 14/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: approach including only the term trend data that was available during the whole study period. It is important to note that Google Trends data is provided with an additional lag of one day and on the basis of Pacific Standard Time instead of GMT, adding almost another day of lag. While this is not an issue for the historical analysis, the evaluation of any trading strategy using S(t) needs to take into account this additional delay. We track the attention of social media about Bitcoin in Twitter via the Topsy data service3 . From the full track of data accessible by Topsy [54], we focus on tweets that contain Bitcoin terms as in previous research [16], finding a total of 19, 578, 671 Bitcoin-related tweets. The first social signal we extract from Twitter is the daily amount of unique tweets about Bitcoin TN (t) binned in 24 hour windows starting at 00:00 GMT, measuring the level of word-of-mouth and attention towards Bitcoin and shown in the bottom panel of Figure 2. We continue by measuring the collective emotional valence with respect to Bitcoin, as expressed through the text of Bitcoin-related tweets. Valence is considered the most important dimension of affect, quantifying the degree of pleasure or displeasure of an emotional experience [55]. The expression of valence through text is a common practice in psychological research, in which lexicon techniques are used to empirically measure emotions [56, 57]. We measure the average daily valence of Bitcoin-related tweets through a state-of-the-art lexicon technique [40], which improves the previous ANEW lexicon method [56] with more than 13000 valence-coded words. We compute the daily average Twitter valence about Bitcoin during day t in two steps: First we measure the frequency of each term in the lexicon during that day, and second we compute the average valence weighting each word by its frequency. This measurement matches more than 50 million valence-carrying tokens, and produces the time series of Twitter valence TV al(t). Our last social signal is opinion polarization, which builds up on measuring the semantic orientation of words into positive and negative evaluation terms [58]. We apply the LIWC psycholinguistics lexicon- based method [39], and expand its lexicon of stems into words by matching them against the most frequent English words of the Google Books dataset [59]. As a result, we consider 3463 positive and 4061 negative terms that appear as more than 8 million Twitter tokens. We compute the daily polarization of opinions in Twitter around the Bitcoin topic TP ol(t), calculating the geometric mean of the daily ratios of positive and negative words per Bitcoin-related tweet. Note that, instead of repeating a measurement of valence through two different lexica, we quantify polarization as a complementary dimension to emotional valence. This way, opinion polarization measures the simultaneous coexistence of positive and negative subjective content, rather than its overall orientation [58, 23]. References [1] Lazer, D., Pentland, A. S., Adamic, L., Aral, S., Barabasi, A. L., Brewer, D., Christakis, N., Contrac- tor, N., Fowler, J., Gutmann, M. et al., 2009 Life in the network: the coming age of computational social science. Science (New York, NY) 323, 721. [2] Schweitzer, F. & Vespignani, A., 2012 Editorial. EPJ Data Science 1, 1. ISSN 2193-1127. (doi: 10.1140/epjds1). 3http://topsy.com/ 15/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: [3] Treleaven, P., Galas, M. & Lalchand, V., 2013 Algorithmic trading review. Communications of the ACM 56, 76–85. [4] Park, C.-H. & Irwin, S. H., 2004 The profitability of technical analysis: A review. Technical report, University of Illinois at Urbana-Champaign, Department of Agricultural and Consumer Economics. [5] Biondo, A. E., Pluchino, A., Rapisarda, A. & Helbing, D., 2013 Are random trading strategies more successful than technical ones? PloS one 8, e68344. [6] Preis, T., Moat, H. S. & Stanley, H. E., 2013 Quantifying trading behavior in financial markets using google trends. Scientific reports 3. [7] Curme, C., Preis, T., Stanley, H. E. & Moat, H. S., 2014 Quantifying the semantics of search behavior before stock market moves. Proceedings of the National Academy of Sciences 111, 11600–11605. [8] Cusumano, M. A., 2014 The bitcoin ecosystem. Communications of the ACM 57, 22–24. [9] Nakamoto, S., 2008 Bitcoin: A peer-to-peer electronic cash system. Technical report, Bitcoin Foun- dation. [10] Van Alstyne, M., 2014 Why bitcoin has value. Communications of the ACM 57, 30–32. [11] Christin, N., 2013 Traveling the silk road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web, pp. 213–224. [12] Yelowitz, A. & Wilson, M., 2015 Characteristics of bitcoin users: an analysis of google search data. Applied Economics Letters 22, 1030–1036. [13] Bitpay. Over 44,000 businesses and charities accept bitcoin with bitpay. (https://bitpay.com/directory#). [14] Dell. Dell now accepts bitcoin. (http://dell.to/1uk8ocZ). [15] Schweitzer, F., Fagiolo, G., Sornette, D., Redondo, F. V., Vespignani, A. & White, D. R., 2009 Economic networks: The new challenges. Science 325, 422– 425. ISSN 1095-9203. (doi:10.1126/ science.1173644). [16] Garcia, D., Tessone, C. J., Mavrodiev, P. & Perony, N., 2014 The digital traces of bubbles: Feedback cycles between socio-economic signals in the bitcoin economy. Journal of the Royal Society Interface 11, 20140623. (doi:10.1098/rsif.2014.0623). [17] Kristoufek, L., 2013 Bitcoin meets google trends and wikipedia: Quantifying the relationship between phenomena of the internet era. Scientific reports 3. [18] Kristoufek, L., 2015 What are the main drivers of the bitcoin price? evidence from wavelet coherence analysis. PLoS ONE 10(4): e0123923 . [19] Schoen, H., Gayo-Avello, D., Metaxas, P. T., Mustafaraj, E., Strohmaier, M. & Gloor, P., 2013 The power of prediction with social media. Internet Research 23, 528–543. 16/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: [20] Bordino, I., Battiston, S., Caldarelli, G., Cristelli, M., Ukkonen, A. & Weber, I., 2012 Web search queries can predict stock market volumes. PloS one 7, e40014. [21] Mao, Y., Wei, W., Wang, B. & Liu, B., 2012 Correlating s&p 500 stocks with twitter data. In Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, pp. 69–72. ACM. [22] Gonzalez-Bailon, S., Banchs, R. E. & Kaltenbrunner, A., 2010 Emotional reactions and the pulse of public opinion: Measuring the impact of political events on the sentiment of online discussions. arXiv preprint arXiv:1009.4019 . [23] Tumarkin, R. & Whitelaw, R. F., 2001 News or noise? internet postings and stock prices. Financial Analysts Journal pp. 41–51. [24] Saavedra, S., Duch, J. & Uzzi, B., 2011 Tracking traders’ understanding of the market using e- communication data. PloS one 6, e26705. [25] Gilbert, E. & Karahalios, K., 2010 Widespread worry and the stock market. In ICWSM, pp. 59–65. [26] Bollen, J., Mao, H. & Zeng, X., 2011 Twitter mood predicts the stock market. Journal of Compu- tational Science 2, 1–8. [27] Garcia, D., Abisheva, A., Schweighofer, S., Serdult, U. & Schweitzer, F., 2015 Network polarization in online politics participatory media. To appear in Policy and Internet (http://bit.ly/1zGCPOv). [28] Garcia, D. & Tanase, D., 2013 Measuring cultural dynamics through the eurovision song contest. Advances in Complex Systems 16, 33. [29] Hirshleifer, J., 1977 The theory of speculation under alternative regimes of markets. The Journal of Finance 32, 975–999. [30] Harris, M. & Raviv, A., 1993 Differences of opinion make a horse race. Review of Financial studies 6, 473–506. [31] Antweiler, W. & Frank, M. Z., 2004 Is all that talk just noise? the information content of internet stock message boards. The Journal of Finance 59, 1259–1294. [32] Tetlock, P. C., 2007 Giving content to investor sentiment: The role of media in the stock market. The Journal of Finance 62, 1139–1168. [33] De Choudhury, M., Sundaram, H., John, A. & Seligmann, D. D., 2008 Can blog communication dynamics be correlated with stock market activity? In Proceedings of the Nineteenth ACM Conference on Hypertext and Hypermedia, HT ’08, pp. 55–60. ISBN 978-1-59593-985-2. [34] Challet, D. & Bel Hadj Ayed, A., 2013 Predicting financial markets with google trends and not so random keywords. Predicting Financial Markets with Google Trends and Not so Random Keywords (August 14, 2013) . 17/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: [35] Ruiz, E. J., Hristidis, V., Castillo, C., Gionis, A. & Jaimes, A., 2012 Correlating financial time series with micro-blogging activity. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, WSDM ’12, pp. 513–522. ISBN 978-1-4503-0747-5. (doi:10.1145/2124295. 2124358). [36] Whittle, P., 1953 The analysis of multiple stationary time series. Journal of the Royal Statistical Society. Series B (Methodological) 15, pp. 125–139. [37] Adamic, L., Brunetti, C., Harris, J. & Kirilenko, A., 2009 On the informational properties of trading networks. SSRN eLibrary . [38] Lütkepohl, H., 2007 New introduction to multiple time series analysis. Springer. [39] Pennebaker, J. W., Chung, C. K., Ireland, M., Gonzales, A. & Booth, R. J., 2007 The development and psychometric properties of liwc2007. LIWC.net . [40] Warriner, A. B., Kuperman, V. & Brysbaert, M., 2013 Norms of valence, arousal, and dominance for 13,915 english lemmas. Behavior research methods 45, 1191–1207. [41] Wilcoxon, F., 1945 Individual comparisons by ranking methods. Biometrics bulletin pp. 80–83. [42] Sharpe, W. F. & Sharpe, W., 1970 Portfolio theory and capital markets, volume 217. McGraw-Hill New York. [43] Edwards, B., 2014 European bond yields go negative. The Wall Street Journal . [44] Bitfinex. Features - short. (https://www.bitfinex.com/pages/features). [45] Bitfinex. Fees schedule. (https://www.bitfinex.com/pages/fees). [46] Fuller, W. A., 2009 Introduction to statistical time series, volume 428. John Wiley & Sons. [47] Kwiatkowski, D., Phillips, P. C., Schmidt, P. & Shin, Y., 1992 Testing the null hypothesis of station- arity against the alternative of a unit root: How sure are we that economic time series have a unit root? Journal of econometrics 54, 159–178. [48] Anderson, O. D., 1976 Time series analysis and forecasting: the Box-Jenkins approach. Butterworths London. [49] Zeileis, A., 2004 Econometric computing with hc and hac covariance matrix estimators. Journal of Statistical Software 11, 1–17. [50] Chance, D. & Brooks, R., 2015 Introduction to derivatives and risk management. Cengage Learning. [51] Coindesk. Coindesk launches proprietary bitcoin price index. (http://bit.ly/11dDAAK). [52] Brito, J., Shadab, H. B. & Castillo, A., 2014 Bitcoin financial regulation: Securities, derivatives, prediction markets, & gambling. Derivatives, Prediction Markets, & Gambling (April 10, 2014) . [53] Shadab, H. B., 2014 Regulating bitcoin and block chain derivatives. SSRN Preprint 2508707 . 18/19 Royal Society Open Science 2:150288 (2015) http://rsos.royalsocietypublishing.org/content/2/9/150288 David Garcia, Frank Schweitzer: [54] Aitken, T., 2013 Topsy: The social search engine allows you to scan every public tweet ever published on twitter. CEO World Magazine . [55] Russell, J. A., 2003 Core affect and the psychological construction of emotion. Psychological review 110, 145. [56] Bradley, M. M. & Lang, P. J., 1999 Affective norms for english words (anew): Instruction manual and affective ratings. Technical report, The Center for Research in Psychophysiology, University of Florida. [57] Garcia, D. & Schweitzer, F., 2012 Modeling online collective emotions. In Proceedings of the 2012 Workshop on Data-driven User Behavioral Modelling and Mining from Social Media, DUBMMSM ’12, pp. 37–38. (doi:10.1145/2390131.2390147). [58] Osgood, C. E., 1964 Semantic differential technique in the comparative study of cultures. American Anthropologist 66, 171–200. [59] Lin, Y., Michel, J.-B., Aiden, E. L., Orwant, J., Brockman, W. & Petrov, S., 2012 Syntactic annota- tions for the google books ngram corpus. In Proceedings of the ACL 2012 System Demonstrations, pp. 169–174. Acknowledgements: We thank Emre Sarigol for his technical assistance. Funding: This work was funded by the Swiss National Science Foundation (CR21I1_146499). Authors’ contributions: DG conceived the research, retrieved data, and performed the analyses. DG and FS wrote the manuscript. Competing interests: The authors declare that they have no competing financial interests. Ethics statement: This research is based on observational data shared publicly. No personal or indi- vidual information was retrieved, stored, or analyzed. Data and materials availability: All data used for this article is publicly available through the corre- sponding Application Programming Interfaces. Processed data and scripts to reproduce these results are available at https://www.sg.ethz.ch/btc 19/19
1801.05802
2
1801
2018-03-15T11:11:05
Measuring, Understanding, and Classifying News Media Sympathy on Twitter after Crisis Events
[ "cs.SI", "cs.CY" ]
This paper investigates bias in coverage between Western and Arab media on Twitter after the November 2015 Beirut and Paris terror attacks. Using two Twitter datasets covering each attack, we investigate how Western and Arab media differed in coverage bias, sympathy bias, and resulting information propagation. We crowdsourced sympathy and sentiment labels for 2,390 tweets across four languages (English, Arabic, French, German), built a regression model to characterize sympathy, and thereafter trained a deep convolutional neural network to predict sympathy. Key findings show: (a) both events were disproportionately covered (b) Western media exhibited less sympathy, where each media coverage was more sympathetic towards the country affected in their respective region (c) Sympathy predictions supported ground truth analysis that Western media was less sympathetic than Arab media (d) Sympathetic tweets do not spread any further. We discuss our results in light of global news flow, Twitter affordances, and public perception impact.
cs.SI
cs
Measuring, Understanding, and Classifying News Media Sympathy on Twitter after Crisis Events Abdallah El Ali 1,2, Tim C Stratmann 2, Souneil Park 3, Johannes Schöning 4, Wilko Heuten 5, Susanne CJ Boll 2 1 Centrum Wiskunde & Informatica (The Netherlands), 2 University of Oldenburg (Germany), 3 Telefonica Research (Spain), 4 University of Bremen (Germany), 5 OFFIS - Institute for IT (Germany) [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] 8 1 0 2 r a M 5 1 ] I S . s c [ 2 v 2 0 8 5 0 . 1 0 8 1 : v i X r a ABSTRACT This paper investigates bias in coverage between Western and Arab media on Twitter after the November 2015 Beirut and Paris terror attacks. Using two Twitter datasets covering each attack, we investigate how Western and Arab media differed in coverage bias, sympathy bias, and resulting information propagation. We crowdsourced sympathy and sentiment la- bels for 2,390 tweets across four languages (English, Arabic, French, German), built a regression model to characterize sympathy, and thereafter trained a deep convolutional neural network to predict sympathy. Key findings show: (a) both events were disproportionately covered (b) Western media ex- hibited less sympathy, where each media coverage was more sympathetic towards the country affected in their respective region (c) Sympathy predictions supported ground truth analy- sis that Western media was less sympathetic than Arab media (d) Sympathetic tweets do not spread any further. We discuss our results in light of global news flow, Twitter affordances, and public perception impact. ACM Classification Keywords H.5.3. Group and Organization Interfaces: Web-based interac- tion Author Keywords Twitter; sympathy; sentiment analysis; news media bias; crisis informatics; cross-cultural; crowdsourcing; NLP INTRODUCTION On 12 November, 2015, the city of Beirut (Lebanon) wit- nessed two bombings1 at approximately 18:00 Eastern Euro- pean Time (EET) (UTC+02:00), coordinated by two suicide bombers that detonated explosives in Bourj el-Barajneh, a southern suburb of Beirut. This suburb is largely inhabited by 1https://en.wikipedia.org/wiki/2015_Beirut_bombings; last retrieved: 24.12.2017 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. CHI 2018, April 21–26, 2018, Montreal, QC, Canada © 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM. ISBN 978-1-4503-5620-6/18/04. . . $15.00 DOI: https://doi.org/10.1145/3173574.3174130 Shia Muslims, and reports estimate the number of deaths to be anywhere between 37 to 43, with over 200 injured. These bombings constituted the worst attack in Beirut since the end of the 1990 Lebanese Civil War. Shortly after the attacks, the Islamic State (IS)2 claimed responsibility for the attacks. A day later, on 13 November, 2015 beginning at 21:20 Central European Time (CET) / UTC+01:00, three suicide bombers carried out a series of coordinated terrorist attacks in Paris3 on its northern suburb, Saint-Denis. They struck near the Stade de France in Saint-Denis, followed by suicide bombings and mass shootings at cafés, restaurants and a music venue in central Paris. The attacks resulted in the deaths of 130 people, and injury of 368 people. These attacks were purported to be the deadliest on France since World War II. Shortly after the attacks, IS also claimed responsibility for the attacks. The days after the November attacks in Paris, people took so- cial media by storm in response to the events. From outcries of sympathy and solidarity with Paris, to outcries against or sup- port for Islam [38], to proclamations that mainstream coverage of the Beirut attacks have been sparse and uncaring. In such press reports, we find allegations suggesting reports about at- tacks, bombings and other crisis events that Western media do not sympathize with attacks in the Arab world as much as they do for attacks in the Western world. Even though many studies have already shown that news providers are inherently biased (such as in what to cover) [3, 25] where attention asymmetries exist [1], the question arises why differential coverage across crisis events may occur in social media content. According to Kwak and An [32], how a piece of news is re- ported (specifically how sympathetic it is to those affected) has the capacity to evoke compassion, which can facilitate monetary support and launch collective public action. This has far reaching implications given the media's power (even on microblog platforms like Twitter) in shaping public dis- course and perception of global events [48], which raises the following questions: To what extent cultural, religious, or geo-political factors account for news media bias in coverage of global terror attacks? And what makes a country news- worthy of sympathy under such events? We believe this has 2In Arabic also known as Da'ish. 3https://en.wikipedia.org/wiki/November_2015_Paris_attacks; last retrieved: 24.12.2017 implications for how news organizations can better manage public opinion using social media sites during the immediate and long-term aftermath of a political and/or religious crisis event (e.g., terror attack). Importantly, exposure to biases has been shown to have the capability to foster intolerance and create ideological segregation in major political and social is- sues [19], and this may be amplified across Western and Arab cultures. Considering the time-critical nature of Twitter news reporting, it becomes key to develop approaches for under- standing sympathy, and as we show later, our work contributes a first step towards such an approach for viewing Twitter as a journalism tool that can help in detecting sympathy. During November 2015, examples of online news headlines included: "Beirut, Also the Site of Deadly Attacks, Feels For- gotten"4 by The New York Times, "Paris, Beirut, and the Language Used to Describe Terrorism"5 by The Atlantic, or "Did the media ignore the Beirut bombings? Or did readers?"6 by Vox. While coverage of the attacks may have been dispro- portionate, discussion as to why this was so was polarized. On one end, public and journalistic response attributed blame to- wards the media and its volume and style of coverage (cf., The Atlantic), and on the other end (cf., Vox) there were claims that the media did its part in adequate news reporting, but since Western readers did not care, coverage was drastically reduced. Given such statements, this paper tries to quantify the differences across this observed differential news coverage. We believe these events provide an interesting use-case to study, because: (a) it allows us to examine in detail whether Western and Arab media exhibit differences in reporting global crisis events, and if so, how such differences manifest (b) the unique context of our study, marked by the rare successive oc- currences of two crisis events at places within the Western and Arab world, allows exploring the relative differences specific to those two worlds (c) it allows us to examine such biases us- ing publicly available social media data (in our case, Twitter), and in turn how this can aid journalistic social media practice in ensuring transparency and quality in produced content. In this paper, we adopt research on media bias to study news on Twitter (cf., [20, 59]). Our focus here is not on whether media biases exist within Twitter as a social media platform specifically, but rather we use Twitter as a journalism tool to study time-critical news reporting and provide first steps to develop an approach for classifying sympathetic tweets. Here, the affordances of Twitter as a platform can be redesigned to aid news reporters by automatically detecting (sympathy) biases. Twitter data was deemed suitable because: (a) Twitter has become a popular channel for news reporting by main- stream media [30, 42] (b) the large quantity of tweets allows us to gain insight into the temporal aspect of news coverage at a finer grained level than with news articles (c) the uncensored nature of tweets that are collected with the Twitter Streaming 4http://www.nytimes.com/2015/11/16/world/middleeast/beirut- lebanon-attacks-paris.html; last retrieved: 24.12.2017 5http://www.theatlantic.com/international/archive/2015/11/paris- beirut-media-coverage/416457/; last retrieved: 24.12.2017 6http://www.vox.com/2015/11/16/9744640/paris-beirut-media; last retrieved: 24.12.2017 API (d) the costs involved in labeling tweets for sympathy are lower than lengthier pieces of news coverage. RESEARCH QUESTIONS & CONTRIBUTIONS Given the foregoing motivation, we aim to better understand media coverage differences on Twitter through computation- ally capturing news sympathy during such unexpected, human- induced crisis events. Bias can be viewed as a partial perspec- tive on facts [53], which can be further broken down into three aspects [9]: selection bias (gatekeeping), or which stories are selected; coverage bias, or how much attention is given to a story; and statement bias, or how a story is reported. Here, we used these concepts and zoomed in on the Beirut and Paris attacks, to examine in detail whether their coverage on Twitter differed. Here, we focus on coverage bias, statement bias (specifically on characterizing news sympathy), and whether sympathetic messages propagate further on Twitter. Since we are only concerned with the differences in reporting of these two events, we do not consider selection bias. The underlying assumption we make here is that it is important to minimize such bias, even if only on social networks like Twitter. We posit the following questions: • RQ1 - Coverage bias: Was there a difference (in terms of normalized tweet volume) between Western and Arab media coverage of the Beirut and Paris attacks? • RQ2 - News media sympathy bias: Was there a difference between Western and Arab media in how sympathetic the tweets were towards affected individuals across each event? • RQ3 - Information propagation: Do sympathetic and pos- itive sentiment tweets propagate further throughout the Twit- ter network (i.e., receive more retweets)? For coverage bias, we hypothesized that the Beirut attacks would receive less coverage from Western media, but not from Arab news media accounts on Twitter, with the inverse for coverage of Paris. This is in line with the news flow theory [51], which states that the prominence of a foreign country in the news is attributed to three groups of variables: (a) na- tional traits (e.g. size and power of the foreign country), (b) relatedness (e.g., proximity to a foreign country in terms of ge- ography, demography, etc.) and (c) events (e.g., wars, disasters, protests) [51, 60]. In this case, Paris is both geographically and culturally closer to Western countries, and given the timeline of both attacks, Paris would likely attract more coverage. Given news statements (e.g., NYTimes's article7) on differen- tial coverage and Diakopoulos's [14] work on Twitter news- worthiness, we expected that tweets from Western media cov- ering the Beirut attacks would overall exhibit less sympathy than coverage of the Paris attacks, while the inverse is true for Arab Twitter news media, which would exhibit more sympathy towards the Beirut attacks. In this paper, our objective is to ex- plore these questions using a combination of NLP techniques and crowdsourcing on Twitter datasets. Finally, we look at information diffusion [56], where previous research has found that negative news sentiment on Twitter enhances virality [24], 7http://www.nytimes.com/2015/11/16/world/middleeast/beirut- lebanon-attacks-paris.html; last retrieved: 24.12.2017 while other work found that emotionality and positivity in online news content increases virality [4]. Despite mixed find- ings, we expected that tweets which are sympathetic (as well as ones with positive sentiment) to be more likely to spread throughout the Twitter network, by resulting in more retweets. In this paper, we make the following contributions to human- computer interacton and social computing research: 1. We provide a deeper, data-driven understanding of how the Western and Arab news coverage of the Paris and Beirut at- tacks differed with respect to coverage bias, news sympathy, and information propagation. 2. We provide a public annotated multi-language (English, Arabic, French, German) dataset that can be used to train learning algorithms to predict news sympathy on Twitter during terror events (see Supplementary Material A8). RELATED WORK Media Bias in Communication and Social Media Trumper et al. [49] examined biases in online news sources and social media communities around them, and by analyzing 80 international news sources during a two-week period, they showed that biases are subtle but observable, and follow geo- graphical boundaries more closely than political ones. Sert et al. [61] proposed to leverage user comments along with the content of the online news articles to automatically identify the latent aspects of a given news topic, to be used as a first step in detecting the news resources that are biased towards certain subsets of these latent aspects. Park et al. [46] took a different approach towards media bias with NewsCube, where they automatically provide readers with multiple classified viewpoints on a news event of interest. Dallmann et al. [10] investigated a dataset covering all political and economical news from four leading online German newspapers over four years, and showed that statistically significant differences in the reporting about specific parties can be detected between the analyzed online newspapers. More generally, social media content biases have been ob- served across datasets. In a study of Twitter, Flickr, and Swarm, it was shown that volunteered geographic information is "local" (geotags correspond closely with the home loca- tions of its contributors) in only about 75% of cases [27], and compounded by how localness is defined [28]. This effect in- fluences the design of geolocation inference algorithms, which have been shown to exhibit significantly worse performance for underrepresented populations (i.e. rural users), even when overcorrecting for populations biases [26]. Twitter for Crisis and Controversy Understanding Twitter has shown to be a rich resource to study media bias and controversy, especially after major events, whether political, religious, or natural (e.g., [2, 6, 52]). Morgan et al. [43] found that Twitter users share news in similar ways regardless of outlet or perceived outlet ideology, and that as users share more news content, they tend to quickly include outlets with opposing views. Younes et al. [62] looked at how traditional 8https://github.com/abdoelali/CrisisNewsSympathy media outlets and social media differ in coverage of an event, and focused on coverage patterns of NYTimes articles and tweets during the Egyptian uprising in 2011. To discover such patterns, they proposed a simple media bias measurement model for day-to-day news items built on top of topic models. They found that traditional news sources have a wider disparity in the ranks and hence a strong presence of media bias. Wei et al. [59] proposed an empirical measure to quan- tify mainstream media bias based on sentiment analysis and showed that it correlates better with the actual political bias in the UK media than pure quantitative measures based on media coverage of various political parties. They then studied media behavior on Twitter during the 2010 UK General Elec- tion, and showed that while most information flow originated from the media, they seem to lose their dominant position in shaping public opinion during this general election. Olteanu et al. [44] investigated several crises using public Twitter data – including natural hazards and human-induced disasters – in a systematic manner and found that tweets expressing sympa- thy and emotional support constituted on average 20% of the crisis-related datasets. The four crises in which the messages in this category were most prevalent (>40%) all pertained to instantaneous disasters (which included terror attacks). News Sentiment and Polarity Analysis Typically, assessing news articles for polarity involves classi- fying text for three-valued sentiment: positive, neutral, and negative (e.g., [16]). However, recently researchers have taken more fine grained approaches towards modeling complex emo- tions, such as Lin and Margolin's [35] work on quantifying the diffusion of fear, sympathy, and solidarity during the Boston bombings, and Schulz et al.'s [50] work on multi-valued senti- ment classification. Moreover, Vargas et al. [57] showed that there are marked differences between the overall tweet senti- ment and the sentiment expressed towards subjects mentioned in the tweets. Mejova et al. [40] took a data-driven approach to understand how controversy interplays with emotional ex- pression and biased language in news using crowdsourcing, and found negative affect and biased language prevalent in controversial issues, while using strong emotions is tempered. METHODOLOGY Defining News Sympathy and Sentiment To quantify sympathy, we needed firstly to define sympathy. We use Decety & Chaminade's [11] definition where ?sympa- thy is an affective response that?consists of feelings of concern for the distressed or needy other person?. While attempts have been to capture sentiment through tokenization [45], both sentiment and sympathy are hard to capture computationally. However, sympathy [35] and sentiment [15] can be detected from text. Therefore, we consider sympathy (is the tweet sympathetic or not towards the affected individuals?) and sentiment (is the tweet negative, neutral, or positive?) as rele- vant variables to study in higher resolution whether Arab and Western media covered the two attacks differently. Approach Overview To build a dataset of tweets from news media accounts for later analysis to answer our research questions, we employ Region Middle East (6) Western (5) Country (population per million) Egypt (89.6), Iraq (34.8), Saudi Arabia (30.9), United Arab Emirates (9.1), Jordan (6.6), Lebanon (4.5) USA (318.9), Germany (80.9), France (66.2), United Kingdom (64.5), Spain (46.4) Table 2: Regions and countries of interest for our analysis. Population esti- mates drawn from the World Bank (http://www.worldbank.org/; last retrieved: 24.12.2017) Paris Ruest dataset: In addition to our collection, we use a larger dataset created by Nick Ruest9, who collected tweets shortly after the attacks occurred (approx. 23:00 UTC on November 13) with the following hashtags: #paris, #parisat- tacks, #prayforparis, and #porteouverte. We hydrated (col- lected metadata for tweets based on tweet IDs) the dataset on 2015-11-19 using the Twitter public API, and collected a total of 12,788,201 tweets. Tweet volume was less (attrition rate: 14.4%) than the original collection (N=14,939,154), which is common given that some tweets are removed (either by Twitter or by users). This collection spanned 33.96 days, from 2015- 11-04 21:14:39 UTC till 2015-12-08 20:54:03 UTC. NH's Paris dataset had a total of 9,742,241 (76.18%) retweets and 4,127,762 unique users. Paris Combined dataset: For later analysis, we combined both datasets. We expanded the Paris dataset (by merging with the Paris Ruest dataset) because it spanned only 1.17 days after the Paris attacks, while the Beirut dataset spanned 3.31 days. This step is important for temporally aligning the Paris dataset with the Beirut dataset. Additionally, the imbalanced dataset size notwithstanding, we later downsample all datasets to ensure the datasets are balanced and any effects seen are not an artifact of a large sample size. Merging datasets resulted in a total of 16,868,318 tweets. Our dataset consisted of 75.6% retweets, resulting in a total of 4,110,291 unique tweets with 4,013,489 unique users. This combined Paris dataset (with retweets and duplicates removed) is used for all subsequent analyses, and will be referred to simply as the Paris dataset. Crawling & Extracting News Media Tweets To answer our questions about media coverage bias (specifi- cally differences in news sympathy), we apply multiple pro- cessing steps. We first crawl Twitter news (and blog) accounts, extract the news tweets from our datasets, identify the lan- guage of the tweets, slice our data by time to ensure that the two event timelines match in duration, and finally draw samples to ensure our data is sizeable and ready for human computation. Details of each step is described below. Crawling Twitter news accounts Our first step was to identify and collect influential Western and Arab news accounts on Twitter. The list of countries cho- sen across the Middle East and the Western world are shown in Table 2. With respect to the Middle East, we chose countries that were geographically near Lebanon, and that did not have explicit and/or visible political nor religious conflicts with Lebanon at the time of collection (e.g., Syria was excluded 9http://ruebot.net/post/look-14939154-paris-bataclan-parisattacks- porteouverte-tweets; last retrieved: 24.12.2017 Figure 1: Overview of methodological pipeline. the following methodology (pipeline shown in Fig. 1): (1) Twitter Data Collection & Preprocessing (2) Crowdsourcing Annotation (3) Analysis and Prediction. The first two steps are described in detail below, the third in the following section. Twitter Data Collection & Preprocessing We have collected and used four different datasets (described below): Beirut, Paris, Paris Ruest, and Paris Combined. Beirut dataset: We collected 906,538 tweets on the Beirut bombings on November 12, 2015 shortly after news break- out (approx. 21:00 CET), using the Twitter Streaming API and with these hashtags: #lebanon, #beirut, #beirut2paris, #beirutattacks, #beirutbombing. The dataset was pruned for duplicates. Collection spanned 3.31 days, from 2015-11-12 18:51:07 UTC till 2015-11-16 02:17:04 UTC. Our dataset con- sisted of 667,073 (73.58%) retweets and 610,879 unique users. After removing retweets, our dataset had 239,093 unique tweets. The top five hashtags for this dataset are shown in Table 1. What is immediately striking here are the high oc- currences of the hashtags #paris and #parisattacks, where we attribute this due to the overlap between people's attention to the Paris attacks after having heard about the Beirut attacks. Beirut Count 95,280 66,898 56,021 41,245 21,546 Hashtag #beirut #paris #lebanon #parisattacks #isis Paris (merged) Count Hashtag 6,777,117 5,765,292 1,672,152 778,132 760,320 #parisattacks #paris #prayforparis #bataclan #porteouverte Table 1: Top five most frequent hashtags for each dataset. Paris dataset: We collected a total of 5,339,452 tweets dur- ing the two days (13th and 14th) after the November 2015 Paris attacks using the Twitter Streaming API and with the following hashtags: #paris, #france, #parisattacks, #prayfor- paris, and #porteouverte. Some of these JSON records (0.03%) were poorly structured and others were duplicates, and thus removed. This resulted in a total of 5,337,840 tweets. Collec- tion spanned 1.17 days, from 2015-11-14 13:30:49 UTC till 2015-11-15 18:06:54 UTC. Our Paris dataset had a total of 4,045,046 (75.78%) retweets and 2,538,348 unique users. Paris DatasetBeirut Attacks Twitter DatasetParis Attacks Twitter DatasetsWestern Twitter News AccountsArab Twitter News AccountsWestern Media Covering Beirut AttacksArab Media Covering Beirut AttacksWestern Media Covering Paris AttacksArab Media Covering Paris AttacksAR tweetsDE tweetsEN tweetsFR tweetsProcessingExtracting News Media TweetsProcessed DatasetsCrowdsourcingCrawling &Preprocessing(1)(2)Analysis & Prediction(3)Tweet Filtering by AccountsNear-duplicates RemovalTerm FilteringTemporal Slicing and SamplingLanguage IdentificationCoverage BiasTweet PropagationSympathy Bias AnalysisNews Sympathy ClassificationUnderstanding Sympathy and Sentiment due to the ongoing conflict at the time of data collection). For Western countries, we based our decision on population size, language (English being most prominent), and proximity to France. Despite that Twitter is dominated by English language users10, we wanted to ensure that we were collecting news media tweets from both English as well as the native language of the countries of interest. To find news media11 accounts on Twitter from these countries, we followed a two-step approach: We found a seed set of accounts automatically (using Twit- ter's relevance-based Search API) by crawling user accounts (see Supplementary Material B) with news related queries (e.g., 'France news' for English queries; 'Nouvelles France' for native language queries). This first step deliberately takes a crude computational approach as curating news organiza- tions by experts may be subject to bias, and could exclude unfamiliar news accounts that possibly became highly active during the time of crisis (e.g., bloggers new to the scene). We included bloggers because (a) Bloggers play an important role in disseminating news, cf., during the Arab spring in Tunisia and Egypt [36]) (b) They are typically uncensored, since they do not 'officially' provide public service [54]. To ensure a measure of influence, we only retrieve user ac- counts with at least 5k followers. Despite earlier research that showed a high number of followers does not always mean an influential user [8], we used follower count as a simple heuris- tic to gather prominent news accounts. While our collection could also have include state-sponsored news (which is diffi- cult to identify), our intention was to capture tweet samples that users would likely see. We also checked for romanized Arabic queries (e.g., Akhbar Masr), but did not find additional accounts matching the >5k follower requirement. Our queries returned six results (which we kept) with a follower count <5k (Max=4,935, Min=4,473), with the rest >5k (Max=31.4M, "CNN Breaking News"). We did not set a limit on account creation date nor on Twitter verification, as our experiments showed: (a) new bloggers and news agencies with accounts created only a year earlier (2014) appeared to be quite active in reporting events (b) even major news accounts were some- times not Twitter verified, wherein we could potentially miss important news accounts if we enabled this filter. Returned accounts were manually inspected to ensure they comprise news media outlets and blogger accounts. As a sanity check, we also cross-checked whether account names occur in public lists (e.g., Wikipedia pages 'News media in {Country}'12) and for blogger accounts, whether they cross- link to a webpage. It is important to mention here that there is no such benchmark list of news media accounts on Twitter. We had a total of unique 208 news media accounts, where 93.3% (194/208) of our dataset consists of news outlet accounts, and the remainder 8 journalist and 6 blog accounts. Furthermore, there was some overlap in accounts for Western media (38/117) 10http://www.beevolve.com/twitter-statistics/#a3; 24.12.2017 11We use Wikipedia's definition of news media, which includes blog accounts: https://en.wikipedia.org/wiki/News_media ; last retrieved: 24.12.2017 12E.g., https://en.wikipedia.org/wiki/News_media_in_the_United_States; last retrieved: 24.12.2017 retrieved: last coverage and for Arab media (38/91) coverage of Paris and Beirut. The final list of unique crawled news organizations (N=208) is provided as a supplementary dataset to this paper (see Supplementary Material C)13. Tweet Filtering by Accounts After gathering a set of news accounts across countries using both English and native language queries, we then matched these user IDs with all IDs in our Beirut and Paris datasets. The full set of queries used, the total number of Twitter news accounts found, and the amount and percentage extracted from both datasets are shown in Supplementary Material B. This process resulted in four datasets: (1) Arab media covering the Beirut attacks (N=2,766) (2) Arab media covering the Paris attacks (N=2,728) (3) Western media covering the Beirut attacks (N=245) (4) Western media covering the Paris attacks (N=9,245). The datasets combined resulted in 14,984 tweets. Term Filtering As an additional step, we made sure that within each dataset, there was no mention of the other set of attacks (e.g., we removed all mentions of Paris from the Beirut dataset), and that all tweets pertained to the events in question. Even though the two attacks happened a day apart, where we would expect cross-pollination across messages, we deliberately chose not to include tweets that reference both the Paris and Beirut attacks, as this may influence our attempts at investigating media bias within each tweet dataset separately. For the Beirut dataset, we filtered out tweets that included these terms: paris, parís france, parisattacks, bataclan, parisattacks, porteouverte. For the Paris dataset, we filtered out the following terms: beirut, lebanon, beirutattacks, ) (cid:203) [Lebanon], Near-duplicates Removal Finally, to ensure that our dataset contains only unique tweets without any near duplicates (as this would cause redundancy later in the annotation task), we removed all partial duplicates from our resulting datasets. This was done by applying the Levenshtein distance [34] string similarity metric on the tweet texts of each dataset, with a threshold set to 0.1. This reduced the size of our dataset to 12,814 tweets. Language Identification To prepare our Beirut and Paris datasets for analysis of sympa- thy, we need to be able to identify the language of the tweets so crowdworkers can annotate them. To do so, we used the langid.py [37] language identification Python package, and computed the (percentage) distribution of languages. We used langid.py as it provided us with classification probabilities while Twitter's 'lang' value does not provide such a metric, so we could manually adjust the 'lang' of low confidence tweets. To deal with any misclassifications from langid.py, we disqual- ified any tweets with a normalized classification probability of < 0.95, reducing our dataset to 10,460 unique tweets. For the remainder of the tweets, we manually inspected and re- classified all tweets with a normalized probability of > 0.95. 03 [Beirut]. 13We show the name, user name, user description, the country / query used to retrieve the account, and follower count at the time of crawling – all of which are publicly available data. Additionally, we include tweet count and mean scores and standard deviations across all labels. We found that across all datasets combined, the languages of tweets were either English (67%), German (13.9%), Arabic (10.1%), French (8.3%), or Spanish (0.7%). Given the low percentage of Spanish in our dataset, we decided to exclude any Spanish tweets from all subsequent analyses. Temporal event slicing and sampling Given that our Beirut and Paris datasets differed temporally in coverage of the attacks, we need to normalize coverage duration as tweets posted 5 days after the attacks may differ for example than tweets posted two weeks after the attacks. Since we were constrained by the size and coverage duration of our Beirut dataset, we used the coverage length of that dataset as a seed to slice the Paris dataset. For our processed Beirut dataset, our earliest coverage started on 2015-11-12 18:52:30 UTC (approx. 4 hours after the Beirut attacks that took place around 18:00 EET) and went until 2015-11-16 02:00:10 UTC. This amounts to exactly 3.3 days. Thereafter, we applied the same time slice for the processed Paris dataset, where earliest coverage started from 2015-11-13 21:15:20 UTC (approximately one hour after the Paris attacks, which started at 20:20 UTC) until 2015-11-17 02:30:23 UTC, giving exactly 3.22 days. This time slicing further reduced the total size of our combined datasets to 7,768 unique tweets: Western media coverage of Beirut (N=131), Western media coverage of Paris (N=5,298), Arab media coverage of Beirut (N=287), and Arab media coverage of Paris (N=1,566). Finally, to send our tweets for annotation by crowdworkers, we only needed a sufficient sample from each of our four re- sulting datasets to avoid lengthy crowdwork time and costs. Even though this annotated data is limited, we later train and classify our unlabeled data automatically which handles the limitations of crowdsourcing. Therefore, we drew a random sample of 1,000 tweets from the Paris datasets. However, ran- dom sampling may miss important tweets that occurred on specific days within our 3.3 days. Therefore, we split each dataset into separate buckets of approximately 24 hours, and drew normalized random samples from each bucket to elimi- nate bias in drawing more samples from a day that happens to have more records. The normalization constant was calculated by dividing the size of the desired sample draw (1,000) by the total number of rows in each dataset. For each bucket, the sample drawn was the number of records in that bucket mul- tiplied by the normalization constant, and rounded to ensure all day buckets cap at 1,000 records. This process reduced the size of the Paris attacks datasets (Western and Arab media coverage) each to N=1,000. The final language distribution of our language-specific datasets ready for annotation is shown in Fig. 2. Crowdsourced Overall Sympathy Annotation To annotate our datasets, we employed crowdworkers through the CrowdFlower14 platform. We had four language-specific datasets with corresponding annotation instructions. A language-specific dataset covered both the Beirut and Paris attacks, which meant there was an assumption that a worker had to be familiar with both events to accurately label tweets. For each language-specific annotation task, we provided task 14http://crowdflower.com/; last retrieved: 24.12.2017 Figure 2: Language distribution of tweets to be annotated across datasets. instructions and examples in that target language (translated from English by native speakers). For each tweet (and any accompanying media), a worker had to label it for sympathy (sympathetic15, unsympathetic) and sentiment (positive, neu- tral, negative), and optionally 'NA' for non-applicable tweets. For worker selection, we ensured workers spoke the target language. We did not set a restriction on worker location, as a worker could speak a target language (e.g., Arabic) yet reside in a non-Arabic speaking country. While we set target lan- guage requirements, we did not make our tweets into images (cf., [5]), which can be a limitation. Following standard guide- lines from CrowdFlower, 10-15 tweets per language-specific task were classified by the paper authors. We did not trust assessments of any worker who differed significantly from our own (cut-off point of < 70% agreement). Workers were presented with the original tweet, and included media items (image or video), and were asked to label it. While we are aware of the potential ethical concerns on behalf of Twitter users in displaying their name (cf., [44]), in our case we were only displaying tweets from news organizations, who are pre- sumably aware and even encourage publicizing their content. Importantly, omitting the username of our tweets would risk misrepresenting the original tweet and its overall sympathy. Trusted workers took on average (across all languages) 57 seconds (interquartile mean) to label each tweet. We collected labels from at least 3 different trusted workers per tweet and task16, where the final label of the tweet was determined by majority vote. We followed the guidelines of CrowdFlower, and set a limit of no worker labeling more than 300 items in our rating task. Workers were paid 10 cents per page, where each page contained 5 tweets. This amounted to approximately $10 per 100 tweets. In the end, we had a total of 2,390 x 2 x 3 = 14,340 labels (excluding the 'not applicable' checkbox). Annotation Quality Despite that labeling sentiment can be subjective (cf., [45]), we provided detailed instructions and examples of Positive, Negative, and Neutral tweets (see Supplementary Material D) to ensure workers correctly label the data. Moreover, our inter-rater agreement scores drawn from CrowdFlower (Table 3) are promising, with the lowest being 69.1% for sentiment classification of Arabic tweets, which is in line with previous work, and highlights the reliability of crowdsourced social 15E.g., thoughts, prayers, sadness, solidarity with affected individuals. 16Note that if a tweet has different labels from all 3 workers, the CrowdFlower platform brings in additional workers. Paris attacks Arab mediaParis attacks Western mediaBeirut attacks Arab mediaBeirut attacks Western media0%25%50%75%100%Language Distribution (%)Media CoverageLanguage:ArabicGermanEnglishFrench Lang. EN # Tweets 1732 AR FR DE 354 147 185 Label Sentiment Sympathy Sentiment Sympathy Sentiment Sympathy Sentiment Sympathy a=3 (%) Fleiss' Kappa 69.3 83.4 69.1 82.7 73.1 82.4 73.1 85.5 0.27 0.42 0.32 0.29 0.22 0.32 0.28 0.38 Table 3: Trusted worker agreement (a=3) scores across languages (from CrowdFlower) and our own computed Fleiss' Kappa scores. media annotation [44, 13]. As a further measure, we also computed Fleiss' Kappa for the labeled tweets, and found rea- sonable agreement scores (Table 3), with sentiment expectedly exhibiting lowest agreement across languages17. Furthermore, we followed Olteanu et al.'s [44] approach and independently (N=2) rated a random sample of 15 tweets from each lan- guage dataset18 (total N=60) and computed unweighted Co- hen's Kappa for each factor except sentiment (which was weighted). Our ratings reached substantial agreement on sen- timent (κ=0.70, CI: [0.52,0.88]) and sympathy (κ=0.71, CI: [0.50,0.91]) labels. Thereafter, we took our agreement ratings and compared their joint label with those provided by workers, and we reached reasonable agreement for sentiment (κ=0.64, CI: [0.42,0.87]) and sympathy (κ=0.59, CI: [0.37,0.82]). Access to our anonymized data set is available (see Supple- mentary Material A) and on GitHub: https://github.com/ abdoelali/CrisisNewsSympathy. RESULTS Coverage Bias We looked at normalized tweet volume from Western and Arab media across both attacks (N=7,768), and visualize this daily and hourly in Fig. 3. Attention bursts reflect day-night cycles. From the graphs, we can see that for the Beirut attacks, there was more coverage from Arab media, with the inverse for the Paris attacks, which shows more Western media coverage. We ran a Chi-square test with Yates' continuity correction across all days to compare the difference between Arab and Western media coverage. In line with our hypothesis, our test revealed a statistically significant difference in tweet activity volume between how much Western (M=0.909) and Arab media (M=5.37) covered the Beirut attacks and by how much Western (M=36.79) and Arab media (M=10.87) covered the Paris attacks (χ2(1, N=7,768) = 1489, p<0.001, φ=0.44, odds ratio=0.05). From this, we accept the alternative hypothesis that there was indeed coverage bias across both attacks. Furthermore, did Western and Arab media follow a similar pattern of tweeting? We ran correlation analyses between hourly tweet volume for both attacks across media coverage, and found that for the Beirut attacks, Western and Arab me- dia exhibited a medium-sized correlation (Spearman (ρ) = 0.608, p<0.001; φc=0.698) and for the Paris attacks exhibited a significant and strong correlation (Spearman (ρ) = 0.943, 17Since sentiment is 3-valued instead of binary, it could more likely result in higher rating variance. 18We ensured that the tweets were translated by native speakers. Figure 3: Hour by hour normalized tweet activity volume across the days after the Beirut attacks (left) and Paris attacks (right). Best seen in color. p<0.001; φc=0.918). We see that for tweet activity volume, Western and Arab media are engaged at approximately similar time points, which supports the fairness of our collected data on Western and Arab media across these two attacks. News Media Sympathy Bias Understanding Sympathy and Sentiment The percentage level distributions for sympathy and sentiment are shown in Fig. 4. As previous work showed sentiment alone may not be enough to capture subtleties, especially in crisis data [44, 50, 57], we needed to build on this prior work and explore whether sentiment may be a useful construct in our analysis. To understand the relationship between sentiment and sympathy, we developed a binomial logistic regression model, since the categorical variable sympathy to predict is binary. We report our results in Table 4. We did this to delve deeper into the relationship between these two variables. No multicollinearity effects were found. Our regression model (Eq. 1) is as follows: (cid:19) (cid:18) pSymp 1− pSymp logit(pSymp) = log = β0 + β1Si (1) where: pSymp is the probability that a tweet is sympathetic, given the predictor sentiment (Si). pSymp ranges between 0 and 1, so pSymp ∈ {0, . . . ,1}. β0 is the intercept from the linear regression equation (the value of the criterion when the predictor is equal to zero). β1Si is the regression coefficient multiplied by our sentiment predictor. We first present the goodness of fit of our model and how it fares against the (intercept) null model (Table 4). Compared to the null model, our model provides considerable explanatory power with significant reduction in deviance. However, while the difference may be statistically significant, the difference between model deviances do not differ much, as is evident by the goodness of fit McFadden R2, which is 0.2. Testing our sentiment19 model against the null model yields signif- icant results (χ2(1, N=2,390) = 2425.7, p<0.001). To test out the performance of our model, we used 80% of our data for training purposes and parameter tuning and the remaining 20% were held out for testing. For training, we used k-fold (k=10) cross-validation given the small dataset size (N=2,390). Next we report our results on the 20% held-out test dataset. 19Sentiment is split between neutral and positive in our models due to dummy variable coding for non-binary categorical variables. 01234512th00:0013th00:0014th00:0015th00:0016th00:00TimeNews Tweet Activity (%)Coverage of Beirut attacks:WesternArabρ = 0.6080123413th00:0014th00:0015th00:0016th00:0017th00:00TimeNews Tweet Activity (%)Coverage of Paris attacks:WesternArabρ = 0.943 Characterizing Sympathy Model Coefficient (Standard error) -1.0*** (0.07) 2.38*** (0.15) -0.79*** (0.07) 0.2 2453.6 2453.6 Variable SentimentNEUT SentimentPOS Intercept McFadden's R2 Deviance AIC *p<.05, **p<.01, ***p<.001 Table 4: Logistic regression model examining sentiment factor associated with tweet sympathy. of a sentence to corresponding word2vec embeddings; con- volutional layer that applies filters over sliding windows of words and extracts a feature through max-pooling; final layer performs dropout regularization [55] and classifies the result using softmax (see [29] for more details of the model). Since we pre-trained embeddings on our entire corpus, it makes binary classification easier to fit on smaller data. Also, complexity of conventional models (logit regression, SVM) is not low for NLP tasks: n-grams easily make the feature space very large. They often require language specific pre- processing and feature selection techniques, which increases complexity since we deal with multiple languages. Instead, such problems (e.g., capturing local context [21]) are dealt with by the CNN model itself, increasing clarity and method replicability. The word2vec embeddings were pre-trained for each language [41]. Given a text corpus, word2vec learns a lower-dimensional vector (100 dimensions in our experiment) representation of words that preserves the semantic distance between them. As we deal with tweets for a particular topic, we used the entire set of collected tweets for training the em- beddings instead of using an available general corpus. Since we pre-train on our entire corpus, it makes binary classification easier to fit on smaller data. Also, complexity of conventional models (e.g., SVMs) is not low for NLP tasks: n-grams easily make the feature space very large. Especially since we deal with multiple languages. Instead, such problems (e.g., captur- ing local context [21]) are dealt with by the CNN model itself, increasing clarity and method replicability. We briefly describe the configuration of the model (the details can be found in the TensorFlow implementation we used [7]). The model is trained through stochastic gradient descent with the Adadelta update rule [63]. It trains for 100 epochs using shuffled mini-batches of 64 instances. Three different filter sizes (3, 4, and 5 words) were used for convolution, and 128 filters were made for each size. Dropout rate was set to .5. For evaluation of the approach, we ran 10-fold cross validation (Table 5). We chose balanced accuracy21 to account for class imbalances in our data, and report the precision and recall for each class. Overall, the weighted average of the balanced accuracies across languages was 72.5% (shown in Table 5). (a) Sympathy (b) Sentiment Figure 4: Factor level distributions for Arab media coverage of Paris attacks (AFR), Western media coverage of Paris attacks (WFR), Arab media coverage of Beirut attacks (ALB), Western media coverage of Beirut attacks (WLB). Accuracy of our model is 79% (Precision = 0.79, Recall = 0.41, F-1 = 0.54), which highlights that sentiment appears to have sufficient power for predicting sympathy. Nevertheless, while sentiment is important, from our data it is also clear that is different from sympathy. To better understand the relationship between sympathy and sentiment, we further tested correlations20 between them. There was a strong positive correlation between sentiment and sympathy (Spearman (ρ) = 0.19, p<.001; Cramer's V (φc) = 0.49), indicating we are likely measuring closely related con- cepts. These results support our regression model coefficients. Given the results of of both our regression modeling and corre- lation analyses, we find that sympathy as a concept is related to sentiment. Since our crowd sourcing results analysis revealed that they are more or less capture similar signals, we chose to focus on sympathy. Below, we present our approach to predict sympathy from the tweet text, where we investigate sympathy classification performance on unseen (i.e., unlabeled) data. Classifying News Media Sympathy The crowdsourced annotation task was not able to cover the entire corpus due to practical constraints (e.g., the cost and availability of workers). To generalize the analysis to unla- beled data, we also developed machine learning models that recognize the sympathy of tweets. The learning task was de- signed as a binary classification problem where a model aims to classify if a given tweet is sympathetic or unsympathetic. A classification model was built for each language, and each model was trained using the data annotated through crowd- sourcing and applied to the rest. For the classification model, we adopted a convolutional neural network (CNN) combined with word2vec embeddings (cf., [29]). This work extended the recent successful applications of deep learning models in NLP tasks to sentence classification and showed the model achieves high performance even with a very simple architecture (i.e., one convolutional layer) and little tuning, which keeps pa- rameter count low and reduces needed training samples. This CNN architecture has a single channel (word2vec embeddings) and three layers: the embedding layer which translates words 20We use Spearman's rho in addition to Cramer's V (since our data is not normally distributed) by making an assumption that our dichoto- mous variables exhibit a monotonic relationship, and therefore can be treated as ordinal variables. Moreover, Cramer's V is symmetric, and does not show negative relationships (i.e., no correlation direction). News Media Sympathy Analysis Since our sympathy labels are not normally distributed, we ran Mann-Whitney U tests to compare the difference in sympathy 21Arithmetic mean of class-specific accuracies. 0%25%50%75%100%AFRWFRALBWLBMedia CoverageSympathy Factor Level Distribution (%)UnsympatheticSympathetic0%25%50%75%100%AFRWFRALBWLBMedia CoverageSentiment Factor Level Distribution (%)NegativeNeutralPositive Overall balanced accuracy: 0.725 EN balanced accuracy: 0.762 Unsympathetic Sympathetic 0.643 0.568 AR balanced accuracy: 0.699 Unsympathetic 0.8882 0.911 Sympathetic 0.65 0.381 FR balanced accuracy: 0.812 Unsympathetic 0.748 0.846 Sympathetic DE balanced accuracy: 0.501 Unsympathetic Sympathetic 0.783 0.32 0.867 0.811 0.841 0.964 0.135 0.208 Precision Recall Precision Recall Precision Recall Precision Recall Table 5: Balanced accuracies (Sympathetic, Unsympathetic) for unlabeled news media tweets (N=5,378) across each language. between Arab and Western media for each of the datasets on the Paris and Beirut attacks. We found a statistically signifi- cant difference in sympathy scores between Western and Arab media in coverage of the Beirut attacks (Z=5.146, p<0.001, r=0.22), as well as between Western and Arab media in cover- age of the Paris attacks (Z=4.151 p<0.01, r=0.09). To ensure that the effects we observe are not due to imbalances in the size of the compared datasets, we down-sampled all datasets to the minimum dataset size, namely Western media reporting of Beirut (N=112). We used random downsampling with- out replacement to align each pair of datasets, and to ensure any downsampling biases are removed, we tested differences (Mann-Whitney U tests) in sympathy scores across 1000 sam- pling runs (seeds)22 To combine probabilities, we used Fisher's method23 [17, 31] shown in Eq. 2 below: − 2 k ∑ i=1 log(pi) ∼ x2 2k (2) where pi is the p-value for the ith hypothesis test and k is number of sampling runs. When the p-values tend to be small, the test statistic X 2 will be large, which suggests that the null hypotheses are not true for every test. Here again, we found a statistically significant differences in sympathy scores between Western and Arab media coverage of the Beirut attacks (χ2(1, N=2,000) = 22467.62, p<0.001) as well as coverage of the Paris attacks (χ2(1, N=2,000) = 19458.9, p<0.001). Table 6 presents CNN-based classification results of the un- labeled data, showing the ratio of sympathetic tweets. For Western media coverage of the Beirut attacks, we had very few unlabeled tweets (N=1). Thus we instead report the ratio from the labeled (ground truth) data. The findings described above were consistently observed in the results. Western media had less sympathetic tweets than Arab media in coverage of the Beirut attacks, and the difference in the amount of sympathetic tweets is larger than that for the Paris attacks. Another way 22Since p-value combination under Fisher's method follows a X 2- square distribution, we needed a minimum of 220 runs to achieve 0,95 power and 0.3 effect size under α=0.05. 23This is a common method used for aggregating probabilities, how- ever we tested other methods (e.g., voting) and results did not differ. Arab Western Paris 0.609 (N=708) 0.215 (N=4270) Beirut 0.976 (N=338) 0.152† (N=112) †Value drawn from labeled (ground truth) data. Table 6: Ratio of sympathetic tweets. to view this is that each media coverage (Arab, Western) was overall more sympathetic towards the country affected in their respective region. Western media was more sympathetic to- wards Paris, while Arab media was more sympathetic towards Beirut. This aligns with prior work showing strong region- alism in news geography [33] and with producer-consumer attention asymmetries across countries [1]. Sympathy and Sentiment in Tweet Propagation Finally, we tested whether news sympathy has network effects, specifically whether sympathetic tweets result in higher infor- mation propagation. Given prior work on what makes online content go viral (cf., emotionality and positivity in Berger et al.'s work [4]), we expected sympathy and positive senti- ment to be good indicators. Therefore, we tested sympathy as well as sentiment. Combining all (crowdsourced labeled) data together, we tested whether sympathy labels were cor- related with retweet count. We found a weak yet significant negative correlation (Spearman (ρ) =-0.06, p<0.05). Given the low correlation, we cannot state that such sympathetic tweets would result in higher information propagation. We further tested whether sentiment correlates with tweet spread, however we did not find a significant effect (Spearman (ρ) =0.011, p=5.78). While these findings may be in contrast to what Hanson et al. [24] and to what Berger et al. [4] found, where neither sympathy nor sentiment increased virality, this could be due to hidden factors such as the timeliness and informativeness of the crisis news tweets in our dataset. What is interesting to observe here is that while retweeting behavior appears to be impartial as to whether a tweet is sym- pathetic or not, it does appear (within our dataset) that this similarly applies to sentiment labels, which is in contrast to Berger et al.'s findings that emotionality enhances virality. This is likely attributed to changing user information needs in the days following an attack (e.g., retweeting cries for help). DISCUSSION Foreign News Coverage Differences Examining differences in foreign news coverage is important as the media has the power to shape the public perception about foreign countries [58]. Not just selection, but how a piece of news is reported has the capacity to evoke compassion, which could lead to various charitable acts, such as fund-raising to provide monetary support [32]. When an unexpected crisis such as a terror attack on Beirut or Paris strikes, with quality coverage, it has the power to instigate collective worldwide public action. The unique context of our study, marked by the rare successive occurrences of two crisis events at places within the Western and Arab world, allows exploring the rel- ative differences specific to those two worlds. We believe looking into this closely is especially important in this era as tensions between those two worlds intensify in various regions and the need to deepen mutual understanding increases. As mentioned earlier, the issue of differential coverage was picked up by media and speculations were made that the Beirut attacks received less attention than Paris. Our analysis sup- ports the speculation that at least on Twitter, indeed there were less coverage of Beirut (RQ1). It may be obvious that the Paris attacks were more newsworthy than the Beirut attacks; this is what news flow theory would predict [51, 60], since Paris fulfills the criteria of a familiar, powerful foreign coun- try, close geographically to other European states, and had an unexpected, human-induced crisis occur. This is also what the newsworthiness theory by Galtung and Holmboe [18] would predict, as newsworthiness depends on factors such as fre- quency, intensity, unambiguity, and unexpectedness. Although such theories offer explanations about coverage bias, one can draw different opinions about the news value considering the contemporary context of the two worlds (e.g., perhaps Arab states have heightened empathy towards other Arab states), and we believe our study provides one possible way of framing the discussion; how the media of two worlds allocated atten- tion to the event abroad in relation to the domestic event. This framing can be further extended to coverage of other events and other countries, opening a space for future work. While our main finding was that the media of both worlds produced less amount of sympathetic coverage for a crisis abroad (RQ2), an additional observation was that Arab media coverage was more sympathetic, even though we expected that Western media would be more sympathetic when cover- ing Paris. We interpret this result interesting as it could be capturing cultural differences in journalism practice [12, 23]. We believe it is important to understand and consider cultural differences as it can enable more sophisticated analyses of bi- ases in the media of different cultural regions. This result also suggests the possibility of approaching cultural differences in journalism practice using advanced computational methods. As we applied a deep learning technique to detect sympathetic tweets, we provide an initial step towards further large-scale quantitative analysis techniques that can shed light on captur- ing such cultural differences. As an example, while we did not observe differences in how sympathetic news tweets spread by Twitter users (RQ3), we found that the best predictor of retweeting activity is the number of followers (Spearman (ρ) = 0.76, p<0.001). While this fits our intuitions and understand- ing of how Twitter works [8], it invites further thought on how network effects manifest across content and global events. Relatedly, as platforms such as Twitter are widely used for journalism at a global scale, our work also invites the devel- opment of tools or design features to support reflections on the newsworthiness of international events. For example, a dynamic dashboard to track foreign news topics covered in the media of different countries. From an end-user perspec- tive, our work furthermore contributes a first step towards an approach that can be implemented as a Twitter feature that automatically detects not just sentiment, but also sympathy. By accounting for time-criticality in news reporting during crisis situations, this can can aid journalistic practice in situ, by automatically detecting sympathy in Twitter text as news re- porters rush to formulate event-specific content. Finally, while we did not test this, it is relevant to investigate whether/how English and non-English language media differ in reporting. Limitations We have analyzed a snapshot of Twitter data after the Beirut and Paris attacks, where we made several decisions in how we treated the data. Also, it was not viable to test whether news sympathy differed across all countries in the Western world, and compare with news coverage of all Arab countries. Instead, we focused on geographic regions that made sense to test in the context of these attacks, and in this regard, our work provides an approximation of the differences in news coverage across Western and Arab media. Furthermore, our hashtags for the Beirut dataset were written in Latin alphabet. However, we were able to collect a sufficient number of tweets to run our analyses, where 62.1% of Arab media tweets in our final Beirut dataset consisted of Arabic tweets. A potential limiting factor is the 'hostile media effect' [47], a perceptual theory of mass communication that refers to the tendency for individuals with strong preexisting attitudes on an issue to perceive neutral media coverage as biased against their perspective, and instead adopt the antagonists' point of view. This phenomenon could have surfaced in crowdworkers, where workers from one country could have held biases when rating tweets. This may be amplified since we did not conceal names of news accounts (which we did to ensure tweets were close to real-world conditions). However, since each tweet received at least three trusted judgments, we have confidence that our annotations are likely to be untainted by such a bias. One way to address this is to survey crowdworkers for demographics and political orientation (cf., [39]). Finally, we looked only at Twitter, which is shown to contain network biases [22]. Nevertheless, the large quantity of tweets and prevalence of reactions on this divided issue of Arab versus Western news coverage provided an initial step to test our approach. CONCLUSION AND FUTURE WORK We presented a data-driven approach to tease out differences between Western and Arab Twitter news reporting of the 2015 Paris and Beirut attacks, where we found evidence for differen- tial coverage across the attacks. For sympathy bias, we found that Western media tweets were less sympathetic when cover- ing the Beirut attacks, however Western media was overall less sympathetic than Arab media, even for Paris. Finally, based on our labeled data, we trained a deep CNN to predict sympathy from unlabeled data, and results further supported our ground truth analysis that Western media had less sympathetic tweets than the Arab media, across both attacks. As a more general framework, our work contributes to an understanding of media bias on Twitter, and factors that may influence it, which are not necessarily limited to the studied attacks. We believe the methods we adopted are more widely applicable to other areas of computational journalism, and can serve as useful tools to better understand, expose, and design around media bias. ACKNOWLEDGMENTS This research was supported in part by the Volkswagen Foun- dation through a Lichtenberg Professorship. REFERENCES 1. Sofiane Abbar, Jisun An, Haewoon Kwak, Yacine Messaoui, and Javier Borge-Holthoefer. 2015. Consumers and Suppliers: Attention asymmetries. A Case Study of Aljazeera's News Coverage and Comments. In Computation+Journalism Symposium 2015. http://cj2015.brown.columbia.edu/papers/ consumers-and-suppliers.pdf 2. Jisun An, Haewoon Kwak, Yelena Mejova, Sonia Alonso Saenz De Oger, and Braulio Gomez Fortes. 2016. Are You Charlie or Ahmed? Cultural Pluralism in Charlie Hebdo Response on Twitter. In Proc. ICWSM '16. 2–11. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/ view/12997 3. David P. Baron. 2006. Persistent media bias. Journal of Public Economics 90, 1-2 (January 2006), 1–36. https: //ideas.repec.org/a/eee/pubeco/v90y2006i1-2p1-36.html 4. Jonah Berger and Katherine L. Milkman. 2012. What Makes Online Content Viral? Journal of Marketing Research 49, 2 (2012), 192–205. DOI: http://dx.doi.org/10.1509/jmr.10.0353 5. Shane Bergsma, Paul McNamee, Mossaab Bagdouri, Clayton Fink, and Theresa Wilson. 2012. Language identification for creating language-specific twitter collections. In Proc. LSM '12. ACL, 65–74. 6. Javier Borge-Holthoefer, Walid Magdy, Kareem Darwish, and Ingmar Weber. 2015. Content and Network Dynamics Behind Egyptian Political Polarization on Twitter. In Proc. CSCW '15. ACM Press, 700–711. DOI: http://dx.doi.org/10.1145/2675133.2675163 7. D. Britz. 2015. Implementing a CNN for Text Classification in Tensorflow. (2015). https: //github.com/dennybritz/cnn-text-classification-tf 8. Meeyoung Cha, Hamed Haddadi, Fabrício Benevenuto, and Krishna P. Gummadi. 2010. Measuring user influence in Twitter: The million follower fallacy. In Proc. ICWSM '10. http://twitter.mpi-sws.org/icwsm2010_fallacy.pdf 9. D D'Alessio and M Allen. 2000. Media bias in presidential elections: a meta-analysis. Journal of Comm. 50, 4 (2000), 133–156. http://dx.doi.org/10.1111/j.1460-2466.2000.tb02866.x 10. Alexander Dallmann, Florian Lemmerich, Daniel Zoller, and Andreas Hotho. 2015. Media Bias in German Online Newspapers. In Proc. HT '15. ACM, New York, NY, USA, 133–137. DOI: http://dx.doi.org/10.1145/2700171.2791057 11. Jean Decety and Thierry Chaminade. 2003. Neural correlates of feeling sympathy. Neuropsychologia 41, 2 (2003), 127 – 138. DOI:http://dx.doi.org/https: //doi.org/10.1016/S0028-3932(02)00143-4 The cognitive neuroscience of social behavior. 12. Mark Deuze. 2002. National news cultures: A comparison of Dutch, German, British, Australian, and US journalists. Journalism & Mass Communication Quarterly 79, 1 (2002), 134–149. 13. Nicholas Diakopoulos, Munmun De Choudhury, and Mor Naaman. 2012. Finding and Assessing Social Media Information Sources in the Context of Journalism. In Proc. CHI '12. ACM, 2451–2460. DOI: http://dx.doi.org/10.1145/2207676.2208409 14. Nicholas Diakopoulos and Arkaitz Zubiaga. 2014. Newsworthiness and Network Gatekeeping on Twitter: The Role of Social Deviance.. In ICWSM '14. AAAI. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/ view/8065 15. Nicholas A. Diakopoulos and David A. Shamma. 2010. Characterizing Debate Performance via Aggregated Twitter Sentiment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 1195–1198. DOI: http://dx.doi.org/10.1145/1753326.1753504 16. Júlio Cesar dos Reis, Fabrício Benevenuto, Pedro Olmo S. Vaz de Melo, Raquel O. Prates, Haewoon Kwak, and Jisun An. 2015. Breaking the News: First Impressions Matter on Online News., In Proc. ICWSM '15. CoRR (2015). http://arxiv.org/abs/1503.07921 17. R.A. Fisher. 1925. Statistical methods for research workers. Edinburgh Oliver & Boyd. 18. Johan Galtung and Mari Holmboe Ruge. 1965. The Structure of Foreign News: The Presentation of the Congo, Cuba and Cyprus Crises in Four Norwegian Newspapers. Journal of Peace Research 2, 1 (1965), 64–90. DOI: http://dx.doi.org/10.1177/002234336500200104 19. C.J. Glynn, S. Herbst, G.J. O'Keefe, and R.Y. Shapiro. 2004. Public Opinion. Westview Press. https://books.google.de/books?id=b3OqBAAAQBAJ 20. Jennifer Golbeck and Derek Hansen. 2011. Computing Political Preference Among Twitter Followers. In Proc. CHI '11. ACM, 1105–1108. DOI: http://dx.doi.org/10.1145/1978942.1979106 21. Yoav Goldberg. 2015. A Primer on Neural Network Models for Natural Language Processing. CoRR abs/1510.00726 (2015). http://arxiv.org/abs/1510.00726 22. Sandra González-Bailón, Ning Wang, Alejandro Rivero, Javier Borge-Holthoefer, and Yamir Moreno. 2014. Assessing the bias in samples of large online networks. Soc. Net. 38 (2014), 16–27. 23. Thomas Hanitzsch, Folker Hanusch, Claudia Mellado, Maria Anikina, Rosa Berganza, Incilay Cangoz, Mihai Coman, Basyouni Hamada, María Elena Hernández, Christopher D Karadjov, and others. 2011. Mapping journalism cultures across nations: A comparative study of 18 countries. Journalism Studies 12, 3 (2011), 273–293. 24. Lars Kai Hansen, Adam Arvidsson, Finn Aarup Nielsen, Elanor Colleoni, and Michael Etter. 2011. Good Friends, Bad News - Affect and Virality in Twitter. Springer Berlin Heidelberg, 34–43. DOI: http://dx.doi.org/10.1007/978-3-642-22309-9_5 25. E.S. Herman and N. Chomsky. 1988. Manufacturing consent: the political economy of the mass media. Pantheon Books. https://books.google.de/books?id=Up5sAAAAIAAJ 26. Isaac Johnson, Connor McMahon, Johannes Schöning, and Brent Hecht. 2017. The Effect of Population and "Structural" Biases on Social Media-based Algorithms: A Case Study in Geolocation Inference Across the Urban-Rural Spectrum. In Proc. CHI '17. ACM, 1167–1178. DOI: http://dx.doi.org/10.1145/3025453.3026015 27. Isaac L. Johnson, Subhasree Sengupta, Johannes Schöning, and Brent Hecht. 2016. The Geography and Importance of Localness in Geotagged Social Media. In Proc. CHI '16. ACM, 515–526. DOI: http://dx.doi.org/10.1145/2858036.2858122 28. Ankit Kariryaa, Isaac Johnson, Brent Hecht, and Johannes Schöning. 2018. Defining and Predicting the Localness of Volunteered Geographic Information using Ground Truth Data. In Proc. CHI '18. ACM. http://doi.acm.org/10.1145/3173574.3173839 29. Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In Proc. EMNLP '14, Alessandro Moschitti, Bo Pang, and Walter Daelemans (Eds.). ACL, 1746–1751. http://aclweb.org/anthology/D/D14/D14-1181.pdf 30. Yonghwan Kim, Youngju Kim, Joong Suk Lee, Jeyoung Oh, and Na Yeon Lee. 2015. Tweeting the public: journalists' Twitter use, attitudes toward the public's tweets, and the relationship with the public. Information, Communication & Society 18, 4 (2015), 443–458. DOI: http://dx.doi.org/10.1080/1369118X.2014.967267 31. James T Kost and Michael P McDermott. 2002. Combining dependent P-values. Statistics & Probability Letters 60, 2 (2002), 183 – 190. 32. Haewoon Kwak and Jisun An. 2014a. SocInfo. Springer, Chapter A First Look at Global News Coverage of Disasters by Using the GDELT Dataset, 300–308. DOI: http://dx.doi.org/10.1007/978-3-319-13734-6_22 33. Haewoon Kwak and Jisun An. 2014b. Understanding News Geography and Major Determinants of Global News Coverage of Disasters. CoRR abs/1410.3710 (2014). http://arxiv.org/abs/1410.3710 34. V. I. Levenshtein. 1966. Binary codes capable of correcting deletions, insertions and reversals. Soviet Phys. Doklady. 10, 8 (Feb. 1966), 707–710. 35. Lin, Yu-Ru and Margolin, Drew. 2014. The ripple of fear, sympathy and solidarity during the Boston bombings. EPJ Data Sci. 3, 1 (2014), 31. DOI: http://dx.doi.org/10.1140/epjds/s13688-014-0031-z 36. Gilad Lotan, Erhardt Graeff, Mike Ananny, Devin Gaffney, Ian Pearce, and danah boyd. 2011. The Arab Spring The Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian Revolutions. International Journal of Communication 5, 0 (2011). http://ijoc.org/index.php/ijoc/article/view/1246 37. Marco Lui and Timothy Baldwin. 2012. Langid.Py: An Off-the-shelf Language Identification Tool. In Proc. ACL '12 System Demonstrations. ACL, Stroudsburg, PA, USA, 25–30. http://dl.acm.org/citation.cfm?id=2390470.2390475 38. Walid Magdy, Kareem Darwish, Norah Abokhodair, Afshin Rahimi, and Timothy Baldwin. 2016. #ISISisNotIslam or #DeportAllMuslims?: Predicting Unspoken Views. In Proc. WebSci '16. ACM, New York, NY, USA, 95–106. DOI: http://dx.doi.org/10.1145/2908131.2908150 39. Winter Mason and Siddharth Suri. 2012. Conducting behavioral research on Amazon's Mechanical Turk. Behavior Research Methods 44, 1 (2012), 1–23. DOI: http://dx.doi.org/10.3758/s13428-011-0124-6 40. Yelena Mejova, Amy X. Zhang, Nicholas Diakopoulos, and Carlos Castillo. 2014. Controversy and sentiment in online news. Symposium on Computation and Journalism (2014). https://arxiv.org/abs/1409.8152 41. Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. ICLR (2013). https://arxiv.org/abs/1301.3781 42. Soo Jung Moon and Patrick Hadley. 2014. Routinizing a New Technology in the Newsroom: Twitter as a News Source in Mainstream Media. Journal of Broadcasting & Electronic Media 58, 2 (2014), 289–305. DOI: http://dx.doi.org/10.1080/08838151.2014.906435 43. Jonathan Scott Morgan, Cliff Lampe, and Muhammad Zubair Shafiq. 2013. Is News Sharing on Twitter Ideologically Biased?. In Proc. CSCW '13. ACM, New York, NY, USA, 887–896. DOI: http://dx.doi.org/10.1145/2441776.2441877 44. Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to Expect When the Unexpected Happens: Social Media Communications Across Crises. In Proc. CSCW '15. ACM, New York, NY, USA, 994–1009. DOI: http://dx.doi.org/10.1145/2675133.2675242 45. Bo Pang and Lillian Lee. 2008. Opinion Mining and Sentiment Analysis. Found. Trends Inf. Retr. 2, 1-2 (Jan. 2008), 1–135. DOI: http://dx.doi.org/10.1561/1500000011 46. Souneil Park, Seungwoo Kang, Sangyoung Chung, and Junehwa Song. 2009. NewsCube: Delivering Multiple Aspects of News to Mitigate Media Bias. In Proc. CHI '09. ACM, New York, NY, USA, 443–452. DOI: http://dx.doi.org/10.1145/1518701.1518772 47. Richard M. Perloff. 2015. A Three-Decade Retrospective on the Hostile Media Effect. Mass Communication and Society 18, 6 (2015), 701–729. http://dx.doi.org/10.1080/15205436.2015.1051234 48. Vincent Price and David Tewksbury. 1997. News values and public opinion: A theoretical account of media priming and framing. Progress in communication sciences (1997), 173–212. 49. Diego Saez-Trumper, Carlos Castillo, and Mounia Lalmas. 2013. Social media news communities: gatekeeping, coverage, and statement bias. In Proc. CIKM '13. ACM, 1679–1684. DOI: http://dx.doi.org/10.1145/2505515.2505623 50. Axel Schulz, T Thanh, H Paulheim, and Immanuel Schweizer. 2013. A fine-grained sentiment analysis approach for detecting crisis related microposts. ISCRAM 2013 (2013). http://idl.iscram.org/files/schulz/2013/ 927_Schulz_etal2013.pdf 51. Elad Segev. 2015. Visible and invisible countries: News flow theory revised. Journalism 16, 3 (2015), 412–428. DOI:http://dx.doi.org/10.1177/1464884914521579 52. David A. Shamma, Lyndon Kennedy, and Elizabeth F. Churchill. 2009. Tweet the Debates: Understanding Community Annotation of Uncollected Sources. In Proc. WSM '09. ACM, New York, NY, USA, 3–10. DOI: http://dx.doi.org/10.1145/1631144.1631148 53. P.J. Shoemaker and S.D. Reese. 1996. Mediating the Message: Theories of Influences on Mass Media Content. Longman. https://books.google.de/books?id=E_HtAAAAMAAJ 54. J. Singer. 2006. Journalists and News Bloggers: Complements, Contradictions and Challenges. In Uses of Blogs, A. Bruns and J. Jacobs (Eds.). Peter Lang, New York, 23 – 32. http://openaccess.city.ac.uk/4024/ 55. Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research 15 (2014), 1929–1958. http://jmlr.org/papers/v15/srivastava14a.html 56. Kate Starbird and Leysia Palen. 2012. (How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising. In Proc. CSCW '12. ACM, 7–16. http://dl.acm.org/citation.cfm?id=2145212 57. Saúl Vargas, Richard Mccreadie, Craig Macdonald, and Iadh Ounis. 2016. Comparing Overall and Targeted Sentiments in Social Media during Crises. In Proc. ICWSM '16. https://www.aaai.org/ocs/index.php/ICWSM/ ICWSM16/paper/view/13066 58. Wayne Wanta, Guy Golan, and Cheolhan Lee. 2004. Agenda Setting and International News: Media Influence on Public Perceptions of Foreign Nations. Journalism & Mass Communication Quarterly 81, 2 (2004), 364–377. DOI:http://dx.doi.org/10.1177/107769900408100209 59. Zhongyu Wei, Yulan He, Wei Gao, Binyang Li, Lanjun Zhou, and Kam-fai Wong. 2013. Mainstream Media Behavior Analysis on Twitter: A Case Study on UK General Election. In Proc. HT '13. ACM, 174–178. DOI: http://dx.doi.org/10.1145/2481492.2481512 60. HD Wu. 2000. Systemic determinants of international news coverage: a comparison of 38 countries. Journal of Comm. 50, 2 (2000), 110–130. http://dx.doi.org/10.1111/j.1460-2466.2000.tb02844.x 61. Sevgi Yigit-Sert, Ismail Sengor Altingovde, and Özgür Ulusoy. 2016. Towards Detecting Media Bias by Utilizing User Comments. In Proc. WebSci '16. ACM, New York, NY, USA, 374–375. DOI: http://dx.doi.org/10.1145/2908131.2908186 62. Arjumand Younus, Muhammad Atif Qureshi, Suneel Kumar Kingrani, Muhammad Saeed, Nasir Touheed, Colm O'Riordan, and Pasi Gabriella. 2012. Investigating Bias in Traditional Media Through Social Media. In Proc. WWW '12 Companion. ACM, New York, NY, USA, 643–644. DOI: http://dx.doi.org/10.1145/2187980.2188168 63. Matthew D. Zeiler. 2012. ADADELTA: An Adaptive Learning Rate Method. CoRR abs/1212.5701 (2012). http://arxiv.org/abs/1212.5701
1612.08644
1
1612
2016-12-27T14:39:23
Finding Influential Institutions in Bibliographic Information Networks
[ "cs.SI", "cs.IR" ]
Ranking in bibliographic information networks is a widely studied problem due to its many applications such as advertisement industry, funding, search engines, etc. Most of the existing works on ranking in bibliographic information network are based on ranking of research papers and their authors. But the bibliographic information network can be used for solving other important problems as well. The KDD Cup $2016$ competition considers one such problem, which is to measure the impact of research institutions, i.e. to perform ranking of research institutions. The competition took place in three phases. In this paper, we discuss our solutions for ranking institutions in each phase. We participated under team name "anu@TASL" and our solutions achieved the average NDCG@$20$ score of $0.7483$, ranking in eleventh place in the contest.
cs.SI
cs
Finding Influential Institutions in Bibliographic Information Networks Anubhav Gupta Department of Computer Science and Automation Indian Institute of Science Bangalore, India [email protected] M. Narasimha Murty Department of Computer Science and Automation Indian Institute of Science Bangalore, India [email protected] ABSTRACT Ranking in bibliographic information networks is a widely studied problem due to its many applications such as ad- vertisement industry, funding, search engines, etc. Most of the existing works on ranking in bibliographic information network are based on ranking of research papers and their authors. But the bibliographic information network can be used for solving other important problems as well. The KDD Cup 2016 competition considers one such problem, which is to measure the impact of research institutions, i.e. to per- form ranking of research institutions. The competition took place in three phases. In this paper, we discuss our solutions for ranking institutions in each phase. We participated un- der team name "anu@TASL" and our solutions achieved the average NDCG@20 score of 0.7483, ranking in eleventh place in the contest. Keywords Ranking, Heterogeneous networks, Time-series 1. INTRODUCTION In recent years, ranking in information network has at- tracted a lot of attention due to its wide applications in search engines, advertisements, etc. Most of the work on ranking in information networks is focused on analyzing ho- mogeneous network [11, 8], which covers only a small part of the large information network. This information net- work forms very large heterogeneous networks, that are com- posed of multiple types of objects connected by links be- tween them. Some of the recent work [16, 13, 10] also takes into consideration, the heterogeneous structure to perform ranking. Because of the importance associated with the problem of ranking, KDD Cup 2016 is also based on this exciting problem. The task of KDD Cup Data Mining Contest 2016 hosted by Microsoft Azure is finding influential institutions ACM ISBN 978-1-4503-2138-9. DOI: 10.1145/1235 in the academic network. To be exact, given any upcoming conference such as KDD, the task is to perform ranking of institutions based on predicting how many of their research papers will be accepted in KDD in 2016. The contestants were given the choice to use any publicly available dataset, for predicting next year's top institutions. We have used Mi- crosoft Academic Graph dataset for this purpose. We have considered this problem as a supervised learning problem and also used temporal information in our ranking model. The competition took place in three phases. In each phase, the contestants were evaluated on one conference which was chosen from some given conferences in that phase. In this paper, we present our solution towards solving this problem. After each phase, we modified our model and used a differ- ent algorithm for performing the ranking. In this paper, we describe the algorithms used in each phase individually and demonstrate their performance in all the three phases. To evaluate the rankings produced by our model, the metric NDCG (Normalized Discounted Cumulative Gain) is used. In information retrieval, Normalized Discounted Cu- mulative Gain [7] is a standard metric for evaluating rank- ings. The Discounted Cumulative Gain (DCG) at position n is calculated using the following formula: DCG@n = n X i=1 reli log2(i + 1) Then, NDCG at position n is defined as: NDCG@n = DCG@n IDCG@n where i is the predicted rank of an institution and reli is its true relevance score. For a perfect ranking algorithm, IDCG is equal to DCG producing an NDCG of 1.0. For the calculation of true relevance scores, the number of accepted full research papers from every institution is used. The rest of the papers is organized as follows. Section 2 describes relevant notation and assumptions made by our approach. Our ranking frameworks are proposed in detail in section 3. In section 4, we perform some experiments and discuss the results of our methods. Finally, we conclude our work in section 5. 2. NOTATION AND ASSUMPTIONS The competition took place in three phases. In each phase, contestants were asked to predict ranking of institutions for a different set of conferences. Let the number of institutions for which we predict rankings be m. In the competition, Phase Conferences Algorithm 1: RankIns1 SIGIR, SIGMOD, SIGCOMM Input: Bibliographic Information Network G and conference Cb to predict rankings for Result: Rankings of institutions corresponding to the conference Cb 1: Initialize all w ← (cid:2) 1 20 , 2 2: Initialize max score ← 0 3: Initialize w opt ← 1 4: for k = 1 to m do 5: 20 , ..., 1(cid:3) ry b,k ← ranking score (fraction of papers) of institute Ik in year y with respect to conference Cb 6: end for for k = 1 to m do // Use ranking scores of institutions in year 2015 to learn β's 7: for w in all w do 8: 9: 10: 11: end for score ← NDCG@20 score of ranking s2015 true ranking given by r2015 if score ≥ max score then b,k + w2 · r2012 b,k + w · r2013 s2015 b,k ← r2014 b b,k + w3 · r2011 b,k b , with the max score ← score w opt ← w 12: 13: 14: 15: end if 16: end for 17: for k = 1 to m do b,k ← r2015 s2016 18: 19: end for 20: Normalize s2016 b,k 21: Output s2016 b,k + w · r2014 b,k + w2 · r2013 b,k + w3 · r2012 b,k scores so that they sum to 1 b,k as relevance scores of institutions In our case, let Yi's denote the ranking scores of an institu- tion in different years. We also assume that ranking score of an institution in any year depends only on its ranking scores in previous four years. So, ranking score of an institution in year 2016 is given by Y2016 = α[Y2015 +(1−α)Y2014 +(1−α)2Y2013 +(1−α)3Y2012] Now, since α is same for all institutions given a confer- ence, for the purpose of ranking, we only need to learn the parameter β such that Y2016 = Y2015 + β Y2014 + β2 Y2013 + β3 Y2012 To learn β for a conference Cb, we use the data upto year 2014 for training and find the parameter β that optimizes the NDCG@20 score for ranking of institutions for conference Cb in year 2015. Then, this β is used to predict the ranking of institutions for year 2016. The algorithm for ranking institutions is summarized in Algorithm 1 3.2 Solution for Phase-2 In phase-2, contestants were asked to predict rankings for the conferences KDD and ICML. The algorithms used for ranking institutions in this phase is same as the one used in phase-1, which is given by Algorithm 1. 3.3 Solution for Phase-3 In the third phase, contestants were asked to predict rank- ing of institutions for the conferences FSE, MobiCom and MM. In this section, we discuss the algorithm used in the 1 2 3 KDD, ICML FSE, MobiCom, MM Table 1: List of different conferences for different phases of KDD Cup 2016 m = 741. Let us call these institutions I1, I2, ..., Im. The list of conferences for each of these phases is given in table 1. Following assumptions were imposed by the KDD Cup organizers for finding the relevance of institutions: • For any conference, all the accepted papers are equally important. i.e. each accepted paper has equal vote. • Whenever a research paper is authored by multiple authors, each author is assumed to have made equal contribution to the paper. • If an author is affiliated with multiple institutions, each institution has equal contribution to the paper. 3. PROPOSED METHODS In this section, we discuss our approaches in each phase of the competition. 3.1 Solution for Phase-1 In phase-1, contestants were asked to predict institution rankings for SIGIR, SIGMOD and SIGCOMM. In this phase, we tried a simple approach where we predict the rankings score of institution for a conference based on their ranking scores in the same conference in previous years. But here, the ranking scores for previous years are weighted differently for different years. Our intuition is that rank of an institu- tion in a conference in 2016 will depend on its rank in the same conference in year 2015 more than it depends on its rank in year 2014 and so on. 3.1.1 Learning weights of past ranking scores As discussed above, ranking score (fraction of research papers) of an institution in the conference Cb in year 2016 is obtained by taking the weighted average of ranking scores of this institution in conference Cb in years 2015, 2014, etc. The weights for rankings scores of years 2015, 2014, etc. are learned using Brown's simple exponential smoothing. Brown's Simple Exponential Smoothing: Brown's sim- ple exponential smoothing (exponentially weighted moving average) [1, 2] is a popular technique for smoothing time series data. This technique has the property that it doesn't treat all the past observations equally and assigns them dif- ferent weights, such that the most recent observation gets more weight than 2nd most recent and 2nd most recent gets more weight than 3rd most recent, and so on. In the simple exponential smoothing method, forecast for a variable Y at time t + 1 is given by Yt+1 = α[Yt + (1 − α)Yt−1 + (1 − α)2Yt−2 + ...] where α is called the smoothing constant and takes value in the range [0, 1]. phase-3 of the competition -- RankIns3. This algorithm is different from the algorithm used in previous two phases. We are given the name of a conference, say Cb, as a query, and our task is to predict the ranking of institutions based on predicting how many of their research papers will be ac- cepted in this conference in year 2016. For this purpose, we have used the information provided by heterogeneous bib- liographic network upto year 2015 for training the ranking model. 3.3.1 Intuition Behind our Approach Our ranking model is based on the intuition that rank of the institution Ik for a conference Cb depends on ranks of other similar institutions in conference Cb as well as on its rank in conferences similar to Cb. Also, rank of Ik in confer- ence Cb depends on rank of Ik in the past instances of Cb, i.e. rank of Ik in conference Cb in 2015, 2014, etc. Therefore, conferences and institutions are represented as feature vec- tors as such a representation allows the similarity between institutions and conferences, and between the institutions to be measured in terms of cosine of their feature vectors. The RankIns2 algorithm works as follows. The existing problem is first transformed into a learning-to-rank problem [9] and then learning-to-rank techniques such as RankSVM [5], RankBoost [4], AdaRank [14] can directly be used to solve the learning problem. To rank institutions, RankIns2 first constructs the data matrix for year 2016 and the data matrices upto year 2015 are used to train the learning-to- rank model. Then this learned model is used to predict ranks of institutions for data matrix of year 2016. 3.3.2 Construction of Features Vectors RankIns2 uses the following method in order to construct feature vectors of institutions: • Authors and keywords associated with papers are used to identify the institutions. • Instead of using individual authors, clusters of authors are used as features. To perform the clustering of au- thors, methods such as BAGC [15] and SI-Cluster [17] can be used. Let the number of clusters be K. Let these K clusters be represented by their respective cen- ters a1, a2, ..., aK. • For the datasets in which topic information is not avail- able, methods such as Latent Dirichlet Allocation [3] and Probabilistic Latent Semantic Indexing [6] can be used to find topics of research papers. Feature vectors for all the conferences are constructed in the same way. Let us say, feature vector of institution Ik is given by: Ik = Author Clusters z (cid:2)αi1 αi2 } . . αiK { T opics z βi1 βi2 } . { . βis(cid:3) and feature vector of conference Cb is given by: Cb = Author Clusters z (cid:2)αc1 αc2 } . . αcK { T opics z βc1 βc2 } . { . βcs(cid:3) Here, s is the number of distinct topics in the dataset. Now, the feature vector of institution Ik corresponding to conference Cb is obtained by taking the element-wise multi- plication of their feature vectors, and is given by Ik Ik (b) = Ik ⊙ Cb (b) = (cid:2)αi1 αc1 . . αiK αcK βi1 βc1 . . βis βcs(cid:3) Let these feature vectors corresponding to conference Cb be together denoted by matrix Mb, which is defined as fol- lows: Mb =   (b) −−−−−→ ←−−−−− I1 (b) −−−−−→ ←−−−−− I2 . . . (b) −−−−−→ ←−−−−− Ik  k×(K+s) So, the matrix Mb is a k × d matrix, where d = K + s. 3.3.3 Constructing Data Matrix for Year 2016 Here, we describe the procedure to find data matrix for year 2016 corresponding to conference Cb. Since, the institu- tions in data matrices are represented in the form of clusters of authors and topics, the data matrix for year 2016 can be obtained by using data matrices of past years because any new research paper will belong to either some of the exist- ing topics or some mixture of them, and will be written by an author belonging to one of the ranked categories. Let us assume that data matrix of any year depends only on the data matrices of previous three years. So, the data matrix of 2016 depends only on data matrices of years 2015, 2014 and 2013. Let us denote by M (y) , data matrix for year y corresponding to conference Cb. b To learn the data matrix for year 2016, we make the as- sumption that data matrix of any year y is a linear combi- nation of data matrices of years y − 1, y − 2 and y − 3. i.e. data matrix of year 2016 M (2016) b = w1 · M 2015 b + w2 · M 2014 b + w3 · M 2013 b (1) where w1, w2 and w3 are the weights of data matrices for years 2015, 2014 and 2013 respectively. Let us represent these weights by a 3-dimensional vector w = [w1 w2 w3]T . To learn these weights, we first learn the initial weight vector w(0) by solving the following optimization problem using the data upto year 2015 for training: w(0) = arg min w (cid:13)(cid:13)(cid:13)M 2015 b − M 2015 b 2 F (cid:13)(cid:13)(cid:13) (2) where M 2015 b = w1 · M 2014 b + w2 · M 2013 b + w3 · M 2012 b To find the solution of the above equation, we introduce some additional notation. Let n be the number of authors in the dataset. Let us denote by R, a (n × d × 3) matrix tensor, such that Rij: = (cid:2)(M 2014 b )ij (M 2013 b )ij (M 2012 b )ij(cid:3) Let us define a matrix X ∈ R(md)×3 whose rows are the tube fibers of the tensor R, as follows: X = [R11: R12: . . . Rmd:]T Also, let z = (cid:2)(M 2015 b )11 (M 2015 b )12 . . . (M 2015 b )md(cid:3)T Then, one can easily see following relationship: (cid:13)(cid:13)(cid:13)M 2015 b 2 F (cid:13)(cid:13)(cid:13) Using this equality, the problem given in equation (2) re- duces to w(0) = arg min w kz − Xwk2 The above equation has a closed form solution, which is obtained by equating the gradient of the above equation to zero. The solution is given by: w(0) = (X T X)−1X T z (3) After learning the initial weight vector w(0), the algorithm iteratively updates this weight vector by using the data of previous years. We use data upto years 2014, 2013, ... at each iteration of the algorithm. At lth iteration, the fol- lowing optimization problem is solved to update the weight vector w = [w1 w2 w3]T : w(l) = arg min b w (cid:13)(cid:13)(cid:13)M (2015−l) + λl (cid:13)(cid:13)(cid:13)w(l−1) − w(cid:13)(cid:13)(cid:13) 2 − M (2015−l) b 2 F (cid:13)(cid:13)(cid:13) (4) Here, M (2015−l) b = w1 · M (2014−l) b + w2 · M (2013−l) b + w3 · M (2012−l) b The λl's above are the hyper-parameters, used to make sure that recent links in the network are given more impor- tance than past links. The second term in the above equa- tion is a regularizer and it ensures that the updated weight vector is not too far away from its previous value. Again, for easy calculation, we introduce some notation. Let us denote by S(l), a (n × d × 3) matrix tensor, such that ij: = h(M (2014−l) S(l) b )ij (M (2013−l) b )ij (M (2012−l) b )iji Let us define the matrix Xl ∈ R(md)×3 whose rows are the tube fibers of matrix tensor S(l), as follows: md:iT Xl = hS(l) 11: S(l) . S(l) 12: . . Also, let us define the vector zl as follows: zl = h(M (2015−l) b )11 (M (2015−l) b )12 . . . (M (2015−l) b )mdiT Then, one can observe following relationship: (cid:13)(cid:13)(cid:13)M (2015−l) b 2 F (cid:13)(cid:13)(cid:13) − M (2015−l) b = kzl − Xlwk2 Using the above equality, the problem given by equation (4) reduces to w(l) = arg min w kzl − Xlwk2 + λl (cid:13)(cid:13)(cid:13)w(l−1) − w(cid:13)(cid:13)(cid:13) 2 By taking the gradient of above equation and equating it to zero, we get: 2X T (Xlw − zl) − 2λl(w(l−1) − w) = 0 − M 2015 b = kz − Xwk2 1: Construct feature vectors for all the institutions and Algorithm 2: RankIns2 Input: Bibliographic Information Network G and conference Cb to predict rankings for Result: Rankings of institutions corresponding to conference Cb all the conferences 2: Construct feature vectors corresponding to every institution and conference pair 3: Create matrices M (i) b conference Cb for i = 2011, 2012, ..., 2015 for 4: Create matrix X and vector z as discussed in Section 3.3.3 5: Initialize w(0) ← (X T X)−1X T z 6: for l = 1 to u do 7: Create matrix Xl and vector zl as discussed in Section 3.3.3 Update the weight vector w as follows: 8: w(l) ← (X T l Xl + λlI)−1(X T l zl + λlw(0)) 9: end for 10: Final weight vector w∗ ← w(u) 11: Construct data matrix for year y as M 2016 b = w∗ 1 · M 2015 b + w∗ 2 · M 2014 b + w∗ 3 · M 2013 b 12: Train the learning model with data upto year 2015 13: Use this model to make predictions for all the institutions in M 2016 b By, solving the above equation, we obtain the following solution for w(l) w(l) = (X T l Xl + λlI)−1(X T l zl + λlw(l−1)) (5) 3.3.4 Solving the learning problem Using the weights learned above, we create the data ma- trix of all institutions for year 2016 corresponding to con- ference Cb as given in equation (1). Then, using the data matrices upto year 2015 for all the conferences for training, we treat the problem as a regression problem and predict the scores for institutions using random forest regression method. These scores are the predicted relevance scores of institutions. Algorithm 2 summarizes the working of our method. The input to RankIns2 is a bibliographic information network G and a conference Cb to predict rankings for. RankIns2 then predicts the rankings of institutions corresponding to this given conference. 4. EXPERIMENTS AND RESULTS 4.1 Dataset Description For performing the ranking of institutions, we have used the Microsoft Academic Graph (MAG) dataset which is a huge dataset containing information about scientific docu- ments from different research domains. Figure 2 shows the schema of MAG. Figure 1: Performance of RankIns1 and RankIns2 on validation dataset Phase Conference NDCG@20 Algorithm 1 2 3 SIGIR KDD MM 0.7364464224 RankIns1 0.7815387475 RankIns1 0.7210261755 RankIns2 Table 2: Performance of RankIns1 and RankIns2 on test dataset where i is the predicted rank of an institution and reli is its true relevance score. For a perfect ranking algorithm, IDCG is equal to DCG producing an NDCG of 1.0. 4.3 Results and Discussion To evaluate the proposed methods, one conference out of all the given conferences was selected in each phase, to form the test dataset. Name of the conference selected and the results of our methods for these conferences are given in Table 2. We also create a validation set, where we predicted the ranks of institutions for all the conferences appearing in the three phases in year 2015. The performance of RankIns1 and RankIns2 for each of these conferences is given in figure 1. To compare our methods, we also take one more ranking of institutions. This ranking, called PreviousYear, ranks an institution corresponding to a conference in year y, same as its rank in y − 1 for this conference. In our implementation of RankIns2, we have used u = 2 and λl = 200. The number of clusters of authors used to create feature vectors is 500. The results on validation set show that proposed meth- ods RankIns1 and RankIns2 outperforms PreviousYear for 7 our of 8 conferences. From results, however, it is not clear whether RankIns1 should be preferred over RankIns2 or not. But RankIns1 has a clear drawback compared to RankIns2. For the conferences where there is a sudden change in the rankings of institutions in the current year, but rankings are similar in previous years, rankings predicted by RankIns1 will be heavily affected by current year rankings (which seems to be an outlier). Data preprocessing was performed on an Intel Xeon E5- Figure 2: Schema of Microsoft academic graph dataset, adapted from [12] Along with the MAG dataset, organizers of KDD Cup ad- ditionally provided two separate files for the purpose of this competition. These two files contain the names of institu- tions for which we have to predict the rankings and details of full research papers accepted in the asked conferences during the time period 2011 - 2015. We merged MAG dataset with the given two files and then divided the dataset on a yearwise basis. i.e. we cre- ated several small heterogeneous bibliographic networks by considering the research papers of year 2011, 2012, ..., 2015 respectively. 4.2 Evaluation To evaluate the proposed ranking algorithms, the metric Normalized Discounted Cumulative Gain is used: Normalized Discounted Cumulative Gain: In infor- mation retrieval, Normalized Discounted Cumulative Gain (NDCG) [7] is a standard metric for evaluating rankings. The Discounted Cumulative Gain (DCG) at position n is calculated using the following formula: DCG@n = n X i=1 reli log2(i + 1) Then, NDCG at position n is defined as: NDCG@n = DCG@n IDCG@n Stanford InfoLab, 1999. [12] A. Sinha, Z. Shen, Y. Song, H. Ma, D. Eide, B.-j. P. Hsu, and K. Wang. An overview of microsoft academic service (mas) and applications. In Proceedings of the 24th International Conference on World Wide Web Companion, pages 243 -- 246. International World Wide Web Conferences Steering Committee, 2015. [13] Y. Sun, J. Han, P. Zhao, Z. Yin, H. Cheng, and T. Wu. Rankclus: integrating clustering with ranking for heterogeneous information network analysis. In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pages 565 -- 576. ACM, 2009. [14] J. Xu and H. Li. Adarank: a boosting algorithm for information retrieval. In SIGIR '07: Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pages 391 -- 398, New York, NY, USA, 2007. ACM. [15] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. A model-based approach to attributed graph clustering. In Proceedings of the 2012 ACM SIGMOD international conference on management of data, pages 505 -- 516. ACM, 2012. [16] D. Zhou, S. A. Orshanskiy, H. Zha, and C. L. Giles. Co-ranking authors and documents in a heterogeneous network. In Data Mining, 2007. ICDM 2007. Seventh IEEE International Conference on, pages 739 -- 744. IEEE, 2007. [17] Y. Zhou and L. Liu. Social influence based clustering of heterogeneous information networks. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 338 -- 346. ACM, 2013. 2640 v3 2.60 GHz (Haswell-based) machine with 128 GB of memory. All the experiments were performed on an Intel Core I5 4200U machine with 4GB of memory. Our codes are written in Python 2.7.11. Our codes are all single-threaded. 5. CONCLUSION In this paper, we have discussed the problem of rank- ing institutions and proposed our methods RankIns1 and RankIns2. Both RankIns1 and RankIns2 consider the rank- ing problem as a supervised learning problem and both the approaches consider the bibliographic data in the form of time-series. RankIns1 predicts the ranking scores of insti- tutions by giving weights to their ranking scores in previ- ous years. Whereas, RankIns2 works by transforming the problem into a learning-to-rank problem and then uses the learning-to-rank framework to predict the rankings of insti- tutions. 6. ACKNOWLEDGMENTS We would like to acknowledge SIGKDD for organizing such a challenging and inspiring competition. We also thank Microsoft for providing the dataset and the user friendly platform for the competition. Finally, we would like to ac- knowledge Sharad Nandanwar of IISc for the fruitful discus- sions we had with him. 7. REFERENCES [1] http://people.duke.edu/ rnau/411avg.htm. [2] https://en.wikipedia.org/wiki/exponential smoothing. [3] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. the Journal of machine Learning research, 3:993 -- 1022, 2003. [4] Y. Freund, R. Iyer, R. E. Schapire, and Y. Singer. An efficient boosting algorithm for combining preferences. J. Mach. Learn. Res., 4:933 -- 969, 2003. [5] R. Herbrich, T. Graepel, and K. Obermayer. Large margin rank boundaries for ordinal regression. MIT Press, Cambridge, MA, 2000. [6] T. Hofmann. Probabilistic latent semantic indexing. In Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pages 50 -- 57. ACM, 1999. [7] K. Jarvelin and J. Kekalainen. Ir evaluation methods for retrieving highly relevant documents. In Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, pages 41 -- 48. ACM, 2000. [8] J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM), 46(5):604 -- 632, 1999. [9] T.-Y. Liu. Learning to rank for information retrieval. Foundations and Trends in Information Retrieval, 3(3):225 -- 331, 2009. [10] Q. Meng and P. J. Kennedy. Discovering influential authors in heterogeneous academic networks by a co-ranking method. In Proceedings of the 22nd ACM international conference on Conference on information & knowledge management, pages 1029 -- 1036. ACM, 2013. [11] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web.
1309.5762
3
1309
2016-02-24T06:10:55
A new hierarchical clustering algorithm to identify non-overlapping like-minded communities
[ "cs.SI", "physics.soc-ph" ]
A network has a non-overlapping community structure if the nodes of the network can be partitioned into disjoint sets such that each node in a set is densely connected to other nodes inside the set and sparsely connected to the nodes out- side it. There are many metrics to validate the efficacy of such a structure, such as clustering coefficient, betweenness, centrality, modularity and like-mindedness. Many methods have been proposed to optimize some of these metrics, but none of these works well on the recently introduced metric like-mindedness. To solve this problem, we propose a be- havioral property based algorithm to identify communities that optimize the like-mindedness metric and compare its performance on this metric with other behavioral data based methodologies as well as community detection methods that rely only on structural data. We execute these algorithms on real-life datasets of Filmtipset and Twitter and show that our algorithm performs better than the existing algorithms with respect to the like-mindedness metric.
cs.SI
cs
A new hierarchical clustering algorithm to identify non-overlapping like-minded communities Talasila Sai Deepak Indian Institute of Technology, Guwahati Hindol Adhya Shyamal Kejriwal Indian Institute of Technology, Indian Institute of Technology, [email protected] [email protected] [email protected] Guwahati Guwahati 6 1 0 2 b e F 4 2 ] I S . s c [ 3 v 2 6 7 5 . 9 0 3 1 : v i X r a Bhanuteja Gullapalli Indian Institute of Technology, Saswata Shannigrahi Indian Institute of Technology, Guwahati Guwahati [email protected] [email protected] ABSTRACT A network has a non-overlapping community structure if the nodes of the network can be partitioned into disjoint sets such that each node in a set is densely connected to other nodes inside the set and sparsely connected to the nodes out- side it. There are many metrics to validate the efficacy of such a structure, such as clustering coefficient, betweenness, centrality, modularity and like-mindedness. Many methods have been proposed to optimize some of these metrics, but none of these works well on the recently introduced metric like-mindedness. To solve this problem, we propose a be- havioral property based algorithm to identify communities that optimize the like-mindedness metric and compare its performance on this metric with other behavioral data based methodologies as well as community detection methods that rely only on structural data. We execute these algorithms on real-life datasets of Filmtipset and Twitter and show that our algorithm performs better than the existing algorithms with respect to the like-mindedness metric. Keywords Community detection; Social networks; Modularity; Like- mindedness 1. INTRODUCTION Networks present a natural way of representing complex systems having many components and inter-component re- lationships. A network may represent a social, biological or a technological system. Networks in real life display certain properties such as the power law of degree distribution and small world phenomenon. Another such property is the com- munity structure, i.e., the presence of either overlapping or non-overlapping groups of nodes having dense connections internally. There are many algorithms in the literature for ACM ISBN X-XXXXX-XX-X/XX/XX. DOI: http://dx.doi.org/10.1145/0000000.0000000 finding non-overlapping communities, e.g., the hierarchical clustering algorithms [3, 4, 17, 15], Girvan-Newman algo- rithm [14] and Louvain method [1] for modularity maxi- mization. Most of these algorithms exploit the structural properties of a network, such as the existence of an edge be- tween two particular vertices. However, there can be many behavioral properties associated with each node in a net- work, such as purchasing habits in transactional data, and in the context of our experiments, movie ratings or celebrity following by the users in an online social network. Modani et al. [12] recently presented a method to identify an over- lapping community structure having high like-mindedness. Even though this method works well in practice, it does not give a theoretical upper bound on its worst-case running time. Moreover, the efficacy of this method has not been evaluated with respect to structural metrics like modularity. In this paper, we present a new algorithm Like-mindedness Maximization which achieves a high value of the goodness metric like-mindedness in the non-overlapping community structure it finds. We compare this algorithm with other ex- isting behavioral and structural data based non-overlapping community finding algorithms and show that it outperforms all of these on this metric on Filmtipset and Twitter data sets. Moreover, we modify an existing structural based al- gorithm Louvain method and supplement it with behav- ioral data in its input to compare its performance with our algorithm on both metrics like-mindedness and modular- ity. We observe that our algorithm achieves higher like- mindedness than what is obtained after this modification of Louvain method as well. We also observe that the modular- ity achieved by our algorithm is not significantly lower than what is obtained by the algorithms that only use structural properties of a graph with the objective of modularity max- imization. The worst-case running time of our algorithm is O(V 2 log V ), which is slower than the best-known hierar- chical clustering algorithms only by a factor of O(log V ). Definitions and Notations: At this point, let us intro- duce the definitions and notations that we use in this paper. A network is denoted by an undirected and unweighted (i.e., each edge having weight 1) graph G = (V, E) with vertex set V = {1, 2, . . . , V }. Since the graph represents a social net- work, we assume that the graph is sparse, i.e., E = O(V ). Each vertex v ∈ V is associated with a behavioral vector Xv of dimension d. The behavioral vector and its dimension de- pend on the particular dataset being used. For example, the ratings given by a user on a movie rating website (with some default rating being given to those movies he has not rated) can be his behavioral vector, the dimension of which is the number of movies available for rating. A similarity met- ric sim(u, v) is a distance measure between the vectors Xu and Xv representing the behavior of the vertices u, v ∈ V , respectively. Examples of such distance measures are co- sine similarity, Manhattan distance, Euclidean distance and squared Euclidean distance. Throughout this paper, we use cosine similarity Xu·Xv kXukkXv k as the distance measure. Let C = {C1, C2, . . . , Ck} be a partition of V , each repre- senting a set of vertices (community) in a community struc- ture having k non-overlapping communities. Modularity [14] is a well-known measure to capture the notion that a good community structure should have denser connections inside the communities, compared to the con- nections in-between communities. The modularity Q(C) of the set of communities C is defined as Q(C) = Pk i=1 (cid:0)ai − b2 i (cid:1), where ai is the fraction of E edges with both its vertices in the same community Ci and bi is the fraction of E edges with at least one vertex in community Ci. Like-mindedness [12] is a recent measure to capture the notion that members of a good community should share similar type of interests. The like-mindedness L(C) of the set of communities C is defined as the average of all intra- community vertex pair similarities. In other words, L(C) = 1 P u,v∈V :u≤v δ(u, v) X u,v∈V :u≤v sim(u, v) · δ(u, v) , where the boolean function δ(u, v) is 1 if and only if there exists a community Ci ∈ C such that u, v ∈ Ci. 2. STRUCTURE BASED CLUSTERING AL- GORITHMS In this section, let us briefly review the known struc- tural property based clustering algorithms to detect non- overlapping communities. These methods only take the struc- tural data into account, while deciding the optimal commu- nity structure for a given network. We evaluate these algo- rithms against our proposed algorithm with respect to both the metrics like-mindedness and modularity. Algorithm 1: Girvan Newman Algorithm Calculate edge betweenness for all edges in the network. while no edges remain do Remove the edge with highest edge betweenness. Recalculate edge betweenness for all edges affected by the removal. 2.1 Girvan-Newman Algorithm Girvan and Newman [8] proposed a top-down algorithm in which they focused on edges that are the least central, i.e., the edges belonging to E that are most "between" com- munities. The edge betweenness of an edge e ∈ E is defined as the sum of the weighted number (defined below) of short- est paths passing through e. If there are k distinct shortest paths between u and v for a pair of vertices u, v ∈ V , each of the shortest paths connecting them is counted as 1/k. By Algorithm 2: Louvain Method Initialization: Assign each node to its own community. while modularity is improved do for each i ∈ V do for each j ∈ neighbors(i) do Calculate modularity gain by shifting i to j's community. Place i in community for which gain is maximum. progressively removing the edge e ∈ E having the highest edge-betweenness among all edges at the time of its removal, one is left with the communities as connected components of the graph. The running time of this method is O(V E2), i.e., O(V 3) on a sparse graph. 2.2 Modularity Maximization Given a graph, finding a partition that maximizes the modularity is known to be an NP-hard problem [2]. As a result, all practical algorithms for modularity maximiza- tion employ some approximate optimization methods such as greedy algorithm, simulated annealing or spectral opti- mization. One such example is the Louvain method [1], which is the most popular and fastest method for modu- larity maximization. It is a greedy algorithm in which we start with a community structure such that each node is its own community. In each step, we identify if shifting a vertex i to any of its neighbor's community leads to an increase in modularity. If there is such an increase, we place i in the community for which the increase is maximum. The steps are executed till there is no further improvement possible by shifting any vertex to any of its neighbor's communi- ties. The running time of this method is estimated to be O(V log V ) on sparse graphs. The method of using modularity maximization to identify a community structure has a few drawbacks. First, it suffers from resolution limit [6], i.e., as the network size increases, the ability to identify smaller communities by this method decreases. Secondly, there may be a huge number of parti- tions, each very different from the others, having high but similar modularity values, all close to the absolute maximum [9]. 2.3 Modified Louvain method As mentioned before, both Girvan-Newman algorithm and Louvain Method only use structural properties of a graph while detecting communities. As a result, these algorithms may not perform well with respect to the like-mindedness metric. Motivated by this, we present a slightly modified version of Louvain method in which behavioral data is used in addition to structural data to identify communities. We start with an identical copy G′ = (V, E′) of the graph G = (V, E). In each iteration of the Louvain method, the idea is to shift a node from its own community to another community to gain modularity. After the shift of a node, the community structure changes along with its like-mindedness. At this point, there might be pairs of nodes /∈ E′ having equal or higher similarity than the current like-mindedness of the community structure. In the modified Louvain Method that we propose, we add each such pair to E′ as additional edges. The intuition behind such addition of pairs to E′ is to increase the like-mindedness of the community structure in Algorithm 3: Modified Louvain method Initialization: Assign each node to its own community. while modularity w.r.t. G′ is improved do for each i ∈ V ′ do for each j ∈ neighbors(i) in G′ do Calculate modularity gain w.r.t. G′ by shifting i to j's community. Place i in community for which gain is maximum. Identify pairs of vertices /∈ E′ having similarity greater than or equal to the like-mindedness of the current set of communities; add such pairs to E′. Table 1: Summary of linkage criteria commonly used by hierarchical clustering algorithms to decide whether to merge two communities X and Y Linkage criteria Formula min{sim(u, v) : u ∈ X, v ∈ Y } Single linkage XY Pu∈X Pv∈Y sim(u, v) Average linkage Complete linkage max{sim(u, v) : u ∈ X, v ∈ Y } 1 the future iterations since such additional edges are likely to help the placement of a node to a community having similar nodes. However, it can be noted that the inclusion of such additional edges might lead to a drop in modularity of the set of communities with respect to the given network G. 3. OUR ALGORITHM: LIKE-MINDEDNESS MAXIMIZATION In this section, we present our algorithm to optimize like- mindedness. Our algorithm is a bottom-up hierarchical clus- tering approach in which one starts with having each vertex belonging to V as its own community. In each subsequent step, pairs of communities are merged till there is only one cluster left. The pair of communities that gives the mini- mum value of a pre-defined linkage criterion (defined below) is selected for being merged in each step. In this agglom- erative approach, we get a hierarchy of communities, often visualized as a dendrogram. There are a variety of hierarchical clustering algorithms [15], [4], [3], [17] depending on two parameters: a similarity metric between each pair of vertices and a linkage criterion. As mentioned before, we use cosine similarity as the simi- larity metric in this paper. The linkage-criterion defines the similarity between a pair of communities A and B as a func- tion of the pair-wise similarities of the members of the com- munities. In Table 1, the three linkage criteria commonly used by hierarchical clustering algorithms are summarized. Note that each of these requires O(V 2) time to produce the complete hierarchy of communities. In the following para- graph, we give a new linkage criterion to determine the pair of communities to be merged at any step. Algorithm 4: Like-mindedness Maximization (LMM) Initialization: Assign each node to its own community. while there is more than one community do Merge the pair of communities {Ci, Cj} having the highest score S(Ci, Cj). We observe from the dendograms (not shown here due to space constraints) of hierarchical clustering algorithms that an algorithm produces higher like-mindedness if small clusters are merged in the early iterations in order to avoid the creation of large heterogeneous communities. Motivated by this fact, we design an algorithm in which we discour- age the merging of two large communities at every itera- tion. At every iteration, we identify the pair of communities {Ci, Cj} with the highest score S(Ci, Cj ) = max{Ci,Cj } + CiCj Pu∈Ci,v∈Cj sim(u, v). The left term is used to dis- courage the merging of two large communities, and the right term accounts for the average like-mindedness of the inter- community pairs from {Ci, Cj}. A high value of the right term ensures that the like-mindedness of the set of communi- ties after merging is high, since Pu∈Ci,v∈Cj sim(u, v) is the sum of the similarities of CiCj pairs of inter-community vertices belonging to Ci and Cj . 1 1 To implement the algorithm, we index each community by its smallest numbered node and maintain a V × V matrix M that stores the pointers to the scores S(Ci, Cj) of the respective pairs of communities {Ci, Cj}. To begin with, a max-heap H with O(V 2) nodes is created in O(V 2) time to store the scores. When the pair of communities {Ci, Cj} with the highest score has been identified from the heap and merged into Ck, we need to update the heap entries corresponding to {Ci, Ck} for all i 6= k and {Cj, Ck} for all j 6= k. The update operation in a node requires the respective score to be recalculated, which takes a total of O(V 2) time over all iterations due to the fact that the similarity of a pair of vertices is used for the score calculation only when they belong to two different communities being merged. Since pairs of communities are merged in O(V ) iterations, each of which requires O(V ) update operations in a max-heap requiring O(log V ) time per operation, the running time of the algorithm is O(V 2 log V + V 2) = O(V 2 log V ). 4. DATASET & EXPERIMENTAL SETUP 4.1 Filmtipset Filmtipset is Sweden's largest movie rating website, in which a user has the option to rate a movie on a scale of 1 to 5. Apart from this, there is a social network element of the website where a user can follow another user in the net- work. We have 86, 725 such following relationships between the users. We designate two users u, v ∈ V as friends if u is following v, and vice-versa. To use the dataset in our experiments, we apply a couple of filters. The first filter is applied on the number of times a movie has been rated. Some movies are popular since they are rated by many. We focus on the unpopular movies as an indication of the behavior of a user in this network, since a user is likely to know about an unpopular movie from the activities of his friends on filmtipset. We also observe that removing the most popular movies from being considered re- sults in a higher ratio of the average similarity (w.r.t. rating vectors defined below) of the pairs of friends to the average similarity of the non-friend pairs. We denote this ratio for a graph G as its homophily ratio H(G). Table 3: Properties of Filmtipset dataset Parameter Unfiltered Network Filtered Network 1 Network 2 Filtered Number of nodes Number of isolated nodes Edge count (friendships) Avg. clustering coefficient Avg. degree Diameter Avg. path length Size of giant component 91530 61211 56387 0.467 1.232 20 7.508 29.54% Homophily ratio Not calculated 4305 168 10940 0.434 5.082 18 5.796 90.77% 26.44 983 152 1807 0.338 3.676 16 4.817 72.94% 62.07 Table 4: Properties of Twitter dataset Parameter Unfiltered Network Filtered Network 1 Number of Nodes Zero degree Nodes Edge count Avg. degree 40096646 17522652 232157703 11.5799 Avg. Clustering coefficient Not Calculated Diameter Avg. path length 18 [10] 4.12 [10] Size of giant component Homophily ratio Not Calculated Not Calculated 5013 1 1636971 653.09 0.2063612 4 1.874073 5012 1.18 H(G) = P sim(u,v) u,v∈V :(u,v)∈E E P sim(u,v) u,v∈V :(u,v) /∈E (V 2 )−E It can be noted that aiming for too high a homophily ratio reduces the number of movies a lot. Since the number of movies left is used for filtering out inactive users (see below), a high homophily ratio implies a reduction in the number of active users as well. Therefore, we remove movies that are rated at least 50 times in filter 1 since it ensures a large number of movies left after filtering. To see the results of our experiments on networks having high homophily ratio, we remove movies that are rated at least 5 times in filter 2. For each of the movie filters 1 and 2, we define a user fil- tering criterion as follows. For movie filter 1 (filter 2), we say a user to be active if he rates at least 5 movies among the movies left after removing all movies rated more than 50 (5, respectively) times. A user is called social if he has at least 5 friends in the network. For each of movie filter 1 and 2, we create an induced subgraph such that each user in this subgraph is active and social. Here, it is worth remind- ing that movie filtering is always done before user filtering. In Table 3, we summarize the properties of these datasets, which we would denote by Filmtipset Filtered Networks 1 and 2 from now onwards. We also note that the Unfiltered Network as well as the Filtered Networks follow a power law degree distribution. For either of Filmtipset Filtered Network 1 and 2, we con- sider the movies in an order and each user u is assigned a rating vector Ru, each entry of which is either the rating given by him to that particular movie or 0 if he has not rated it. We also create another (un)interested vector Su for each user u, each entry of which is 1 or 0 depending on whether a user has rated that movie or not, respectively. In order to implement the behavioral property based community find- ing algorithms, either Ru or Su is used as the behavioral vector Xu of u ∈ V . 4.2 Twitter Fimltipset Filtered Network 1 Filtered Network 2 Filmtipset Filtered Network 1 Filtered Network 2 LMMS LMMR 0.118 0.107 0.154 0.111 AR SR 0.162 0.082 0.141 0.204 GN 0.738 0.627 CR 0.099 0.1 S SS 0.101 0.143 LS 0.762 0.676 LMM 0.078 CS AS 0.111 0.176 0.196 0.115 MLS MLR 0.593 0.582 0.611 0.614 ML 0.147 0.182 L Table 5: Highest Modularity achieved by an algo- rithm Twitter A C Filtered Network 0.095 0.107 0.004 Table 6: Symbols used in Figure 1, and Tables 5 and 2 Symbol Full form LMM/LMMS LMM Algorithm using (un)interested vector LMMR L LMM Algorithm using rating vector Louvain method ML/MLS Modified Louvain method using (un)interested vector MLR GN S/SS A/AS C/CS SR AR CR Modified Louvain method using rating vector Girvan-Newman algorithm Single-linkage Clustering using (un)interested vector Average-linkage Clustering using (un)interested vector Complete-linkage Clustering using (un)interested vector Single-linkage Clustering using rating vector Average-linkage Clustering using rating vector Complete-linkage Clustering using rating vector Twitter is one of world's largest micro-blogging website, in which a user has an option to follow another user. We use the publicly available dataset [10] which has the data of about 40 million users. All the people having more than 10, 000 followers are designated as celebrities. For our experiments, we create a friendship graph called Twitter Filtered Network of the non-celebrity users who have at least 5000 non-celebrity friends. In Table 4, we sum- marize the dataset. We also note that the Twitter Filtered Network follows a power law degree distribution. As before, two users u and v are said to be friends if u is following v, and vice-versa. We create a 0/1 vector Fu (the i-th entry of which corresponds to the i-th celebrity) for each user u ∈ V and use it as his behavioral vector Xv. The entry in i-th position of Fu for u is 1 or 0 depending on whether u is following the i-th celebrity or not, respectively. 5. RESULTS AND CONCLUSIONS We execute the Girvan-Newman algorithm, Louvain method, the single-linkage, average-linkage and complete linkage based hierarchical clustering algorithms, LMM and Modified Lou- vain methods on Filmtipset Filtered Networks 1 and 2. Among these, the Girvan-Newman algorithm and the Louvain method use only the edges of the networks. The remaining algo- rithms are executed using the rating and the (un)interested vectors separately. On Twitter Filtered Network, we execute all the algorithms mentioned above, except Girvan-Newman since the running time of this algorithm is too high on such a large graph. Note that the Louvain and the Modified Lou- vain methods terminate when a certain number of communi- ties corresponding to the approximately highest modularity score is identified. All other algorithms used in this paper produce an hierarchy of communities, starting with V com- munities and ending when there is only one community left, or vice-versa. In Figure 1, the like-mindedness and modularity scores achieved by different algorithms are compared by plotting their values against C, the number of communities iden- Table 2: Comparison of running time on sparse graphs (graphs in which E = O(V )) LMM L (estimated) ML (estimated) O(V 2 log V ) O(V 2) O(V 2) O(V 2) O(V 3) O(V log V ) O(V 2 log V ) A [13] S [15] C [4] GN Modularity vs. C Modularity vs. C Modularity vs. C 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 -0.1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 l y t i r a u d o M s s e n d e d n m - e k L i i LMMS LMMR L MLS MLR GN SS SR AS AR CS CR l y t i r a u d o M 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Number of communities (C) Like-mindedness vs. C LMMS LMMR L MLS MLR GN SS SR AS AR CS CR s s e n d e d n m - e k L i i 0.2 0 500 1000 1500 2000 2500 3000 3500 4000 4500 Number of communities (C) 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 -0.1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 LMMS LMMR L MLS MLR GN SS SR AS AR CS CR 0 200 400 600 800 1000 Number of communities (C) Like-mindedness vs. C l y t i r a u d o M 0.2 0.18 0.16 0.14 0.12 0.1 0.08 0.06 0.04 0.02 0 -0.02 LMM L ML S A C 0 1000 2000 3000 4000 5000 6000 Number of communities (C) Like-mindedness vs. C LMMS LMMR L MLS MLR GN SS SR AS AR CS CR 0 200 400 600 Number of communities (C) 800 1000 s s e n d e d n m - e k L i i 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 LMM L ML S A C 0 1000 2000 3000 4000 5000 6000 Number of communities (C) Figure 1: Comparison of modularity (top row) and like-mindedness (bottom row) scores on Filmtipset Filtered Networks 1 (left) and 2 (middle), and Twitter Filtered Network (right) tified. In Table 5, we tabulate the maximum modularity achieved by the algorithms on all 3 datasets. In Table 2, we summarize the running time of the algorithms considered in this paper. The notations we have used in these Figures and Tables are explained in Table 6. The key observation from these figures and tables is that our algorithm Like-mindedness Maximization outperforms all other algorithms (even Modified Louvain method) on Like-mindedness metric. We also observe from Table 5 that it does not perform that well to obtain a community struc- ture with high modularity. However, when the number of identified communities is large, we observe from Figure 1 that our algorithm obtains a community structure with com- parable (to other algorithms) modularity. The running time of our algorithm is O(V 2 log V ), which is much faster than the Girvan-Newman algorithm but slightly slower than other hierarchical clustering algorithms. We also note that the actual ratings (not just the data about whether a user has rated a movie or not) given by Filmtipset users does not give any significant advantage to the performance of the commu- nity detection algorithms. This is due to the fact that the similarity matrices of rating and (un)interested vectors of the user pairs are quite similar, e.g., having a cosine similar- ity of 0.9420 and 0.9062 for Filmtipset Filtered Network 1 and 2, respectively. Another interesting observation is that all the algorithms obtain higher like-mindedness and modu- larity scores in Filmtipset Filtered Network 2 compared to Network 1, due to it having higher homophily ratio. Let us conclude the paper with a few remarks on the po- tential applications of this work. Leskovek et al. [5] showed that community finding is important in the context of vi- ral marketing, in which a small group of users are targeted to promote a product in a community. Since the com- munity structure identified by our algorithm has high like- mindedness, it is likely that viral marketing would be more successful among such like-minded groups of people. Also, the non-overlapping communities identified by our algorithm can be used as the core community structure in a network to create overlapping communities by adding additional nodes to each community. One drawback of our algorithm is its running time that is not suitable for very large networks. However, it can be used to identify the like-minded commu- nity structure among the most active and social users of a network, the size of which may not be very large. Finally, it is an interesting open problem to design an algorithm that optimizes both the metrics modularity and like-mindedness of the identified community structure. Acknowledgment This work has been supported by Ramanujan Fellowship, Department of Science and Technology, Government of In- dia, grant number SR/S2/RJN-87/2011. 6. REFERENCES [1] V. D. Blondel, J. L. Guillaume, R. Lambiotte and E. Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 10:P10008, 2008. [2] U. Brandes, D. Delling, M. Gaertler, R. Goerke, M. Hoefer, Z. Nikoloski and D. Wagner. Maximizing Modularity is hard. e-print arXiv:physics/0608255, 2006. [3] W. H. Day and H. Edelsbrunner. Efficient Algorithms for Agglomerative Hierarchical Clustering Methods. Journal of Classification, Volume 1, pp. 1-24, 1984 [4] D. Defays. An Efficient Algorithm for a Complete Linkage Method. The Computer Journal (British Computer Society), 20 (4): 364-366, 1977. [5] J. Leskovek, L. A. Adamic and B. A. Huberman The Dynamics of Viral Marketing ACM Transactions on the Web, Vol. 1, No. 1, Article 5, 2007. [6] S. Fortunato and M. Barthelemy. Resolution Limit in Community Detection. Proceedings of the National Academy of Sciences 104 (1), 36-41, 2007. [7] L. C. Freeman. A Set of Measures of Centrality Based on Betweenness. Sociometry, 35-41, 1977. [8] M. Girvan and M.E.J. Newman. Community Structure in Social and Biological Networks. Proc. National Academy of Sciences, 99(12): 7821-7826, 2002. [9] B. H. Good, Y.-A. de Montjoye and A. Aaron. Performance of Modularity Maximization in Practical Contexts. Physical Review E, 046106, 2010. [10] H. Kwak, C. Lee, H. Park and S. Moon. What is Twitter, a Social Network or a News Media? Proc. 19th international conference on World Wide Web, 591-600, 2010. [11] J. Leskovec, K. J. Lang and M. Mahoney. Empirical Comparison of Algorithms for Network Community Detection. Proc. 19th international conference on World Wide Web, 631-640, 2010. [12] N. Modani, R. Gupta, S. Nagar, S. Shannigrahi, S. Goyal and K. Dey. Like-minded Communities: Bringing the Familiarity and Similarity Together. World Wide Web, 17 (5), 899-919, 2014. [13] F. Murtagh. Complexities of Hierarchic Clustering Algorithms: the State of the Art. Computational Statistics Quarterly 1: 101-113, 1984. [14] M.E.J. Newman and M. Girvan. Finding and Evaluating Community Structure in Networks. Physical review E, 69(2): 026113, 2004. [15] R. Sibson. SLINK: an Optimally Efficient Algorithm for the Single-link Cluster Method. The Computer Journal (British Computer Society) 16 (1): 30-34, 1972. [16] J. Yang and J. Leskovec. Defining and Evaluating Network Communities Based on Ground-truth. Proc. of the ACM SIGKDD Workshop on Mining Data Semantics, 2012. [17] W. Zhang, X. Wang, D. Zhao and X. Tang. Graph Degree Linkage: Agglomerative Clustering on a Directed Graph. Proceedings of the 12th European Conference on Computer Vision, Florence, Italy, 428-441, 2012.
1810.08498
3
1810
2018-10-25T09:31:55
Data-driven Analysis of Complex Networks and their Model-generated Counterparts
[ "cs.SI", "cs.DM", "cs.LG", "physics.data-an", "physics.soc-ph" ]
Data-driven analysis of complex networks has been in the focus of research for decades. An important question is to discover the relation between various network characteristics in real-world networks and how these relationships vary across network domains. A related research question is to study how well the network models can capture the observed relations between the graph metrics. In this paper, we apply statistical and machine learning techniques to answer the aforementioned questions. We study 400 real-world networks along with 2400 networks generated by five frequently used network models with previously fitted parameters to make the generated graphs as similar to the real network as possible. We find that the correlation profiles of the structural measures significantly differ across network domains and the domain can be efficiently determined using a small selection of graph metrics. The goodness-of-fit of the network models and the best performing models themselves highly depend on the domains. Using machine learning techniques, it turned out to be relatively easy to decide if a network is real or model-generated. We also investigate what structural properties make it possible to achieve a good accuracy, i.e. what features the network models cannot capture.
cs.SI
cs
Data-driven Analysis of Complex Networks and their Model-generated Counterparts Marcell Nagy∗ and Roland Molontay† MTA-BME Stochastics Research Group, Budapest, Hungary Department of Stochastics, Budapest University of Technology and Economics, Hungary (Dated: October 26, 2018) Data-driven analysis of complex networks has been in the focus of research for decades. An important question is to discover the relation between various network characteristics in real-world networks and how these relationships vary across network domains. A related research question is to study how well the network models can capture the observed relations between the graph metrics. In this paper, we apply statistical and machine learning techniques to answer the aforementioned questions. We study 400 real-world networks along with 2400 networks generated by five frequently used network models with previously fitted parameters to make the generated graphs as similar to the real network as possible. We find that the correlation profiles of the structural measures significantly differ across network domains and the domain can be efficiently determined using a small selection of graph metrics. The goodness-of-fit of the network models and the best performing models themselves highly depend on the domains. Using machine learning techniques, it turned out to be relatively easy to decide if a network is real or model-generated. We also investigate what structural properties make it possible to achieve a good accuracy, i.e. what features the network models cannot capture. I. INTRODUCTION Data-based analysis of complex networks has attracted a lot of research interest since the millennium when the prompt evolution of information technology made the comprehensive exploration of real networks possible. The study of networks pervades all of science, such as Biol- ogy (e.g. neuroscience networks), Chemistry (e.g. pro- tein interaction networks), Physics, Information Technol- ogy (e.g. WWW, Internet), Economics (e.g. interbank payments) and Social Sciences (e.g. collaboration and acquaintance networks) [1]. Despite the fact that net- works can originate from different domains, most of them share a few common characteristics such as scale-free and small-world property [2, 3], high clustering [4] and sparse- ness [5]. Modelling real-networks is of great interest, since it may help to understand the underlying mechanisms and principles governing the evolution of networks, more- over such models are mathematically tractable and al- low for rigorous analysis. Furthermore, an appropriate model preserves the key characteristics, yet ensures the anonymity of the original real network [6]. Throughout the years several network models have been proposed to gain better understanding of real-world networks, for an extensive overview see [7], however with- out attempting to be comprehensive the most influential models are for example the scale-free Barab´asi-Albert model [2], small-world Watts-Strogatz model [3], New- man's highly clustered community structure model [4], each of them was motivated by some of the aforemen- tioned characteristics of real-networks. ∗ [email protected][email protected] In order to characterize the topology and capture the structure of networks, numerous graph metrics have been introduced such as node-level features e.g. centrality measures and local clustering coefficient, and global fea- tures such assortativity coefficient and density [1]. Nat- urally, there is significant redundancy among these mea- sures and there is a great deal of effort in studying the correlation between the metrics in accordance with iden- tifying a non-redundant selection of measurements that describes every aspect of networks [8 -- 11]. In this work, we rely on the results of the aforecited works by using a minimal set of graph metrics that well-describes the net- works. Our selection of metrics is detailed in Section II 1. The main purpose of this work is to use data-driven techniques to analyze complex networks. The study relies on our large dataset: we calculated a few non-redundant metrics of 400 real networks and their 2400 modelled counterparts generated by five network models. The real networks are collected from different domains such as brain, food, social, and protein interaction networks and the source of these graphs are online network databases [12 -- 16] (see Section II A). For each real network, we generated an additional six graphs by five different models with previously fitted pa- rameters to fit the data as well as possible (see Section II B). The five models are: clustering modification of the Barab´asi -- Albert model [17], Watts -- Strogatz model [3], Community Structure model [18, 19], Divergence Dupli- cation model [20] that was aimed at modelling protein networks and the 2K-Simple model [21], which captures the joint-degree distribution of a graph. In Section III we study the correlation profiles of the structural characteristics across network domains and identify the domain of the networks by a small number of graph metrics. We also investigate what models gen- erate networks that are most similar to the real ones. Using machine learning techniques we examine if it can be determined whether a network is real or artificially generated and what structural properties make it possi- ble to achieve a good accuracy. Our paper relates to recent studies that reflect the growing interest in the identification of network domains and structures based on graph measurements. The most closely related work is that of Kansuke and Clauset [22] who utilized machine learning techniques to study the structural diversity of 986 real networks from different domains along with 575 graphs generated by four network models. Canning et al. [23] used Random Forest to pre- dict the origin (network domains and names of models) of 402 real and 383 generated graphs, however, they used arguably unnormalized metrics such as the total num- ber of triangles, which is clearly correlated with the size of the network that is a very strong distinguishing fea- ture for classification of networks as Figure 1 illustrates. Bonner et al. [24] generated numerous graphs with five well-known network models and then used Deep Learning to classify the graphs according to their measurements. Middendorf et al. trained alternating decision tree to identify the generation mechanism of protein interaction networks [25]. In related works, the parameters of the network mod- els are rather heuristically chosen [23, 24] or often not detailed at all [22]. Our main contribution to the field is that we have fitted the parameters of the models to each real network to ensure that the generated graphs are as similar to the original networks as possible according to reasonably chosen metrics, detailed in Section II B. Us- ing fitted parameters instead of arbitrarily selected ones makes it a more reasonable research objective to study whether the model-generated graphs are distinguishable from real networks. II. DATA AND METHODS This study relies on our dataset containing graph mea- surements of 2800 graphs. We have collected 100-100 real networks from four domains, and then for each net- work, we generated 6 additional graphs with fitted net- work models. In this section, we detail the composition of our dataset and describe our method of model fitting. 1. Metrics and notations As we have already mentioned, we aimed to describe the networks as fully as possible using only a small num- ber of graph metrics. Generally, we can say that there are a few groups of metrics that measure the same as- pects of the networks e.g. there are distance, clustering, centrality, and density related metrics. Hence, based on the literature [8, 11], we selected from each group of mea- sures a few numbers of graph measurements detailed in Table I. TABLE I. The attributes of the dataset 2 Name size density assort avg clust avg deg max eigenv c Maximum of the eigenvector centralities avg path length Average of the distances in the components, Description The number of nodes The density of the graph The assortativity coefficient The average local clusterig coefficient The average degree skew deg dist domain category subcategory normalized by V − 1 Skewness of the degree distribution The domain of the real networks: social, food, brain, cheminformatics (chems) Indicates whether the network is real or generated: real or model In case of generated graphs indicates the type of the model as well: Real (original), 2K, CBA (Clustering Barab´asi -- Albert), WS (Watts -- Strogatz), DD (Duplication Divergence), Com (Community Structure model) Note that for the domain classification problem and the principal component analysis we excluded the size (i.e. number of nodes) of the networks since this vari- able has significant predictive power itself due to the difference between the typical network sizes of different domains and we are more interested in the topological properties. The average and the range of the sizes of the collected networks are listed in Table II. Many real net- works have heavy-tailed degree distribution, for example, the well-known scale-free networks However, there are also some real-world graphs with non-heavy-tailed degree distribution e.g. infrastructure networks [26], hence we calculated the skewness of the degree distributions of the graphs, to describe and quantify the tail of the degree distributions. While the density and the average degree both measure the relative number of edges in the graph, it is not obvi- ous which one should be used. Considering density, the number of edges is normalized by the square of the size, while in the average degree it is normalized only by the size. The reason why we selected the average degree is that due to the sparseness of the real networks, the num- ber of edges rather grows linearly than quadratically with the number of nodes, hence the density contains more information on the size of the graph, which is a strong distinguishing factor of the domains, and we are more in- terested in finding distinctive topological properties. The definitions of the metrics are detailed in Appendix A. A. Real networks Networks from four different domains are studied in this paper, namely food, social, cheminformatics and brain networks. The gathered dataset is balanced, mean- ing that there is the same number of graphs from each 3 The fitting algorithm of the WS and the WS STD meth- ods are as follows: 1. Naturally n is chosen to agree the size of the net- work. 2. K is simply the average degree, i.e.: K = 2k = 2 · E(G) V (G) . 3. The p rewiring parameter was chosen such that it minimizes the difference of the average clustering coefficient ¯C or the σdeg standard deviation of the degree distribution of the original and the fitted graph. Formally: • in the first case (WS): p = arg min q∈[0.001,1] ¯C(G) − ¯C(WSn,K,q) • in the second case (WS STD): p = arg min q∈[0.001,1] σdeg(G) − σdeg(WSn,K,q) Note that in the minimization we search for q > 0.001, to avoid the degenerate case of the Watts -- Strogatz model. 2. Clustering Barab´asi -- Albert model The Clustering Barab´asi -- Albert model [17] has three input parameters: n number of nodes, m new edges of a newcomer vertex and p probability of triad formation. Obviously, the scaling of the degree distribution cannot be tuned, but the clustering of the model depends on the p parameter, furthermore for fixed n and m there is a linear relationship between p and the average clustering coefficient of the model [17], however there is no explicit formula describing this relation. Thus, in order to find the optimal value of p we follow an analogous approach to the fitting of WS model. 1. Parameter n is the size of the network. 2. Parameter m is simply the number of edges divided by the number of nodes. 3. The p triad formation parameter is chosen to min- imize the difference of the average clustering coef- ficient of the original and the modelled graph: p = arg min q∈[0,1] ¯C(G) − ¯C(CBAn,m,q) FIG. 1. The number of nodes and edges of the real networks. Figure was created in Tableau. domains (4 × 100 networks). The graphs were gathered one by one from online databases, namely Network Repository [16], Index of Complex Networks [12], NeuroData's Graph Database [14], The Koblenz Network Collection [15] and Interac- tion Web Database [13]. After importing the graphs, we removed self-loops and treated them as undirected, un- weighted graphs. Figure 1 shows the distribution of the number of nodes and edges of the networks and Table II briefly describes the network domains. B. Model fitting One of our goals is to study whether real-world net- works can be distinguished from generated graphs, i.e. to study the descriptive ability of the models. In con- trast to related works [22 -- 24], we fit the models to the real networks one by one in order to obtain as similar synthetic graphs as possible. In this section, we describe how we fit the models to real networks. The model de- scriptions are detailed in the Appendix B. 1. Watts -- Strogatz model The Watts-Strogatz model [3] has two input parame- ters: n number of nodes, K even number of neighbours of the initial vertices, which determines the density of the model and p rewiring probability which affects for example the clustering coefficient and the diameter of the graph. For each real network we set the parameters according to two different approaches: 1. (WS) Fitting according to the average clustering coefficient 2. (WS STD) Fitting according to the standard de- viation of the degree distribution, motivated by a recent work [27]. 101001 00010 000Number of nodes1001 00010 000100 000Number of edgesTwitter networksFacebook networksDomainBrainChemsFoodSocial TABLE II. Network domains Domain Social Food Brain Cheminformatics Protein-protein (enzyme) interaction networks Description Facebook, Twitter and collaboration networks What-eats-what, consumer-resource networks Human and animal connectomes Range of network sizes 16-56K (avg: 5,824) 19-1,500 (avg: 118) 50-2,995 (avg: 946) 44-125 (avg: 55) 4 3. Duplication-Divergence model The Duplication-Divergence model [20] has two input parameters: n is the size of the graph and p is the proba- bility of edge activation. It is easy to see that parameter p affects the density of the model, hence the authors fit- ted their models to real networks according to the density [20]. Here we follow a similar approach as before: 1. Parameter n is the size of the network, 2. The probability parameter p is chosen to minimize the difference between the densities of the original and the fitted networks. Domain Name Size Social Brain Food Cheminformatics Enzymes-g292[16] Astro Physics Jung2015[31] Srep[32] 17,903 2,995 237 60 Number of edges 196,972 31,551 1,744 100 TABLE III. Chosen graphs for stability analysis the community For the community multilevel function of the igraph Python package [29]. detection we used 4. Community Structure model 5. 2K model The Community Structure model [18] has the follow- ing input parameters: L = (l1, . . . , lk) list of the sizes of the communities and the pin, pout probabilities. We es- timated these parameters with the help of a multi-level modularity optimization community detection algorithm, introduced in [28], as follows: 1. From the output of the community detection algo- rithm we defined the subgraphs corresponding to the communities. 2. The input list L simply contains the size of the subgraphs. 3. Parameter pin is calculated from the density of the subgraphs as follows: (cid:80) iV (Gi)(cid:0)V (Gi) − 1(cid:1) , (cid:80) iE(Gi) pin = 1 2 where Gi denotes the ith subgraph, and V (Gi) and E(Gi) is its vertex and edge set respectively. In other words, pin is the total number of edges in- side the subgraphs divided by the total number of possible edges inside the subgraphs. 4. Parameter pout is obtained by dividing the number of edges between different groups by the maximum number of possible edges between different groups of sizes L = (l1, . . . , lk). Formally: (cid:0)V (Gi) (cid:1) iE(Gi) E(G) −(cid:80) (cid:0)V (G) (cid:1) −(cid:80) pout = 2 i 2 To fit the 2K model [21], we only have to calculate the joint degree matrix of the network. We used the joint degree graph function of the NetworkX [30] mod- ule to generate the simple random graphs with the given joint degree matrices. C. Stability of the models Since the network models generate random graphs, the question naturally comes up: How stable are the graph metrics of the fitted models with fixed parameters? We have analyzed the sensitivity of the models on four graphs of significantly different sizes, the chosen networks are detailed in Table III. For each real network, we gen- erated 30-30 graph instances with each model using the previously fitted parameters. For the sensitivity analysis, we studied the distribution of the graph measurements of the graph instances. As Figures 2, 7, 8 and 9 show as the size of the net- works increases, the graph measurements of the fitted models converge, however the variance of the metrics is relatively small even on the small graphs. Compared to other models, the Duplication Divergence model has sig- nificantly larger scattering especially regarding density, however the standard deviations are still of smaller mag- nitude than the means. We can conclude, that the characteristics of the fitted models are stable enough, making it reasonable to an- alyze the goodness-of-fit of the network models and to perform machine learning tasks. 5 FIG. 2. Boxplots of the metrics across different models. The modelled graph is a social network with 17903 nodes. Since the 2K model captures all the information about the joint degree distribution, it is capable of exactly fitting the assortativity, density and the skewness of the degree distribution. Overall the models could not estimate the average clustering coefficient well, except for the WS model that was fitted according to this metric. Clearly, the density of the models can be directly adjusted, except for the Duplication Divergence model. The skewness of the degree distribution of the CBA and WS models is around zero since these models are not scale-free. Generally, the DD and CBA models are the least stable. III. RESULTS In this section, we present a data-driven analysis of real networks and their model-generated counterparts. A. Correlation profiles and results of model fitting First, we study how the relationship of the metrics vary across different domains by looking at correlation heatmaps, the results are shown in Figure 3. To measure how well the network models fit the data, relying on [33], we calculate the mean Canberra distance between the feature vectors of graph measures (see Table I) regarding the graphs generated by the models and the original ones. Figure 4 shows a heatmap of the pairwise average Canberra distances. As we expected, the graphs generated by the 2K model turned out to be the most similar to the real networks. Figure 4 also shows that the Watts -- Strogatz model can be more efficiently fitted according to the average cluster- ing coefficient than the deviation of the degree distribu- tion, which is slightly in contrast with [27]. Hence later in this work, we only used the graphs that were fitted by the clustering coefficient. Figure 4 is also consistent with Figure 5 since it clearly shows on a scatter plot that graphs generated by the 2K model are the most similar to the original ones and that the food webs are relatively easy to model. B. Classification problems We solve three different classification problems to gain a better understanding of the identifiability of domains from structural properties and about the distinguishabil- ity of model-generated graphs from real networks. We also aim to find the graph properties that make the dis- tinctions possible. The problems are as follows: 1. Domain prediction: a multi-class classification of the domains of 400 real networks based on the graph metrics 2. Category prediction: a binary classification of the networks to decide whether it is a real network or a realization of a network model in each domain 2KCBAComDDWSWS_..0,00080,00100,00120,00140,00160,00180,00200,0022DensityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,60,7Average clustering coefficientOriginal value2KCBAComDDWSWS_S..-0,2-0,10,00,10,20,3AssortativityOriginal value2KCBAComDDWSWS_..0,000200,000250,000300,000350,00040Average path lengthOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,5Max eigenvector centralityOriginal value2KCBAComDDWSWS_S..010203040Skewness of degree distributionOriginal value 6 FIG. 3. Correlations between graph metrics across different domains. Although there are a few universal relations e.g. the high correlation between the maximum eigenvector centrality and the skewness of degree distribution, most of the relationships are rather domain-specific. The reason behind the aforementioned universal correlation is that both metrics depend on the occurrence of hubs. The domain-specific correlations are well-illustrated e.g. the unique block diagonal structure in the Cheminformatics networks, however, the study of these relationships require a deeper understanding of the underlying domains and is beyond the scope of this paper. separately (600 networks in each domain) based on the graph metrics 3. Subcategory prediction: a multi-class classification problem where we also aim to predict the model that generated the graph (600 networks in each do- main, 100-100 in each class) based on the graph metrics For explanatory variables, we use the graph metrics from Table I, namely assortativity, average clustering co- eff., average degree, max. eigenvector centrality, average path length, and the skewness of the degree distribution. In this work, we assume that the reader is familiar with the basic concepts of machine learning, otherwise, we recommend [34] and some important notions can be also found in Appendix A. In our experiments, we trained different machine learning models such as Naive Bayes, kNN, Generalized Linear Model, Decision Tree, and Random Forest that we evaluated using 5-fold cross- validation with stratified sampling. The two best per- forming models were the Random Forest and Decision Tree algorithms, hence we only detail the performance of these models in Table IV. As a performance metric we use accuracy in the case of the multi-class classifica- tions and for the binary classification, we calculate the AUC (Area Under the ROC Curve) score since multi- class predictions are built on balanced data, while the binary classification uses unbalanced data, for which the accuracy is less meaningful. First of all, the Domain Prediction column of Table IV suggests that the domain of a network is efficiently identifiable, which is consistent with prior works [22, 23], however, the category and subcategory identification of assortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.77-0.76-0.01-0.070.100.340.53-0.771.000.74-0.040.06-0.13-0.44-0.77-0.760.741.000.20-0.18-0.23-0.32-0.51-0.01-0.040.201.00-0.25-0.230.06-0.15-0.070.06-0.18-0.251.000.810.25-0.230.10-0.13-0.23-0.230.811.000.270.040.34-0.44-0.320.060.250.271.000.140.53-0.77-0.51-0.15-0.230.040.141.00Socialassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.000.130.010.240.17-0.22-0.23-0.240.131.000.500.280.05-0.36-0.21-0.390.010.501.000.60-0.01-0.53-0.35-0.530.240.280.601.00-0.18-0.87-0.61-0.740.170.05-0.01-0.181.000.130.130.01-0.22-0.36-0.53-0.870.131.000.710.93-0.23-0.21-0.35-0.610.130.711.000.65-0.24-0.39-0.53-0.740.010.930.651.00Cheminformaticsassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.35-0.240.13-0.41-0.43-0.05-0.24-0.351.000.65-0.060.33-0.16-0.21-0.39-0.240.651.000.29-0.16-0.20-0.25-0.190.13-0.060.291.00-0.54-0.49-0.80-0.40-0.410.33-0.16-0.541.000.330.31-0.05-0.43-0.16-0.20-0.490.331.000.550.76-0.05-0.21-0.25-0.800.310.551.000.62-0.24-0.39-0.19-0.40-0.050.760.621.00Brainassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_degassortmax_eigenv_cskew_deg_distsizeavg_path_lengthdensityavg_clustavg_deg1.00-0.51-0.280.36-0.590.110.190.56-0.511.000.77-0.220.51-0.32-0.23-0.62-0.280.771.000.20-0.06-0.43-0.28-0.400.36-0.220.201.00-0.49-0.26-0.130.24-0.590.51-0.06-0.491.000.09-0.01-0.500.11-0.32-0.43-0.260.091.000.900.630.19-0.23-0.28-0.13-0.010.901.000.590.56-0.62-0.400.24-0.500.630.591.00Food1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation1.000.750.500.250.000.250.500.751.00Correlation 7 FIG. 4. The average Canberra distance between the original and the model-generated graphs. In every domain, the 2K model efficiently captured the features of the original networks, the second-best performing models are varying across domains though. While the Duplication Divergence was designed to model protein networks, it performed on this domain the worst but mimicked the food webs quite well. The graphs generated by the clustering Barab´asi -- Albert and the Duplication Divergence models, and similarly the ones generated by the Watts -- Strogatz and the Community structure models are relatively similar to each other. On the other hand, the graphs generated by these two pairs of models are quite dissimilar, which suggests that they capture different aspects of real networks. The figure also shows that food webs are the easiest to model: 2K, CBA and DD algorithms generated graphs are very similar to the real ones. TABLE IV. The performance of the Random Forest and Decision Tree classifiers. Subcategory Domain Classification Problems Models Measures Random Forest Decision Tree Prediction Accuracy 94% 93% Category Prediction AUC Prediction Accuracy Social Food Chems Brain Social Food Chems Brain 88% 71% 83% 92% 0.94 0.60 84% 68% 76% 89% 0.93 0.97 0.81 0.64 0.92 0.79 the graphs turned out to be more difficult, especially on the Food domain. The reason behind the weaker accu- racy in this classification problem is that in contrast to [22 -- 24] we fitted the models to each graph, hence the model-generated graphs are as similar to the real ones, and thus to each other, as possible. The results of the Category and Subcategory Predic- tion problem show that the food webs are easy to model since the small values of AUC and accuracy scores mean that it is more difficult to distinguish the modelled food networks from the original ones. This observation agrees with the results that we can deduct from Figures 4, 5 and 6. The most important attribute according to the ma- chine learning algorithms, i.e. that significantly differs in real networks and generated graphs is the average path length, followed by assortativity and the average clus- tering coefficient. This means that the applied models are unable to capture the exact diameter and clustering of real networks. Although protein interaction networks original2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.651.902.452.853.233.030.650.002.222.503.192.982.711.902.220.001.862.582.913.432.452.501.860.003.293.193.612.853.192.583.290.001.592.983.232.982.913.191.590.002.573.032.713.433.612.982.570.00Socialoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.001.002.213.022.162.201.631.000.002.492.852.422.172.062.212.490.001.722.091.992.253.022.851.720.002.632.513.022.162.422.092.630.001.632.112.202.171.992.511.630.002.151.632.062.253.022.112.150.00Chemsoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.932.372.282.753.082.310.930.002.082.642.742.571.592.372.080.002.252.502.552.752.282.642.250.003.253.113.382.752.742.503.250.001.422.553.082.572.553.111.420.002.342.311.592.753.382.552.340.00Brainoriginal2KCBADDWSWS_STDcomoriginal2KCBADDWSWS_STDcom0.000.771.321.152.332.292.680.770.000.981.842.232.112.211.320.980.001.792.071.962.361.151.841.790.002.712.562.972.332.232.072.710.001.482.052.292.111.962.561.480.001.832.682.212.362.972.051.830.00Food0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distance0.00.51.01.52.02.53.03.5Mean Canberra distance are clustered and have relatively large average distances, none of the models were able to capture these properties at the same time as it is depicted in Figure 6. IV. CONCLUSION In this paper, we used machine learning techniques in order to study the relationship of the graph metrics across different domains, furthermore, to identify the structural properties that discriminate either the network domains or the model-generated graphs from real net- works. We gathered 400 real-world networks and gen- erated an additional 2400 networks by five frequently used network models using previously fitted parameters to mimic original networks as closely as possible. We showed that the characteristics of the fitted models are quite stable, making it possible to perform statisti- cal learning tasks such as goodnes-of-fit tests and do- main prediction. We found that the correlation profiles vary across network domains and the domain can be ef- ficiently determined by a small number of metrics. The goodness-of-fit of the network models also depends on the domains. We observe that using machine learning tech- niques it is not difficult to decide if a network is real or model-generated and identify the properties that network models cannot capture. There are several possible future directions, such as co- operating with domain experts to gain a better under- standing of the different correlation profiles across net- work domains. Other hidden relationships may be also discovered if more domains and instances were appended to our dataset. FIG. 5. On the left: The scatter plot of the networks from the food web domain with respect to the maximum eigenvec- tor centrality and the assortativity features. Both the orig- inal (real) and the model-generated networks are illustrated (see the colours). On the right: The projection of the real networks to the first two principal components show a clear distinction of the different domains. 8 FIG. 6. Scatter plot of real and modelled graphs along the most important variables with respect to the category predic- tion problem determined by the machine learning algorithms in each domain. ACKNOWLEDGMENT The research reported in this paper was supported by the Higher Education Excellence Program of the Ministry of Human Capacities in the frame of Artificial Intelligence research area of Budapest University of Technology an Economics (BME FIKP-MI/SC). The publication is also supported by the EFOP-3.6.2-16-2017-00015 project en- titled "Deepening the activities of HU-MATHS-IN, the Hungarian Service Network for Mathematics in Industry and Innovations" through University of Debrecen. The project has been supported by the European Union, co- financed by the European Social Fund. The research of R. Molontay is supported by NKFIH K123782 research grant. APPENDIX A: GLOSSARY Here we detail some important concepts of network theory and machine learning that we use throughout the paper. Graph Theory Definition 1 (Graph density). Graph density D is the ratio of the number of edges of the graph divided by the number of edges of a complete graph with the same number of vertices, i.e: D = . E 1 2V (V − 1) Definition 2 (Average path length). A path is a se- quence of edges which connect a sequence of vertices. Principal component 1Principal component 2Real Networks0,10,20,30,40,50,6Max Eigenvector Centrality-1,0-0,8-0,6-0,4-0,20,00,20,4AssortativityFood websDomainBrainChemsFoodSocialSubcategoryOriginal2KBAWSDDCom0,20,40,6Max. Eigenvector Centrality0,00,20,40,60,8Average ClusteringBrain0,050,100,15Average Path Length0,00,20,4Average ClusteringCheminformatics-0,50,00,5Assortativity0,00,20,40,60,8Average ClusteringSocial0,20,40,6Max. Eigenvector Centrality0,00,20,40,6Average ClusteringFoodCategoryRealModel The distance d(u, v) between the vertices u and v is the length (number of edges) of the shortest path connecting them. The lG average path length of a graph G of size n is defined as: (cid:88) i(cid:54)=j lG = 1 n(n − 1) d(vi, vj) Remark (Small-world property). A network is said to be small-world if the l average shortest path length grows proportionally to the logarithm of the size of the network i.e. l ∝ log V . Definition 3 (Degree distribution). The degree deg(v) of a vertex v in a simple, undirected graph is its number of incident edges. The degree distribution P is the proba- bility distribution of the degrees over the whole network, i.e. P (k) is the probability that the degree of a randomly chosen vertex is equal to k. Remark (Scale-free network). In a scale-free network the P (k) degree distribution scales as a power-law i.e. P (k) ∝ k−γ, where γ > 1. Definition 4 (Assortativity coefficient). The assortativ- ity coefficient is the Pearson correlation coefficient of de- gree between pairs of linked nodes. The assortativity coefficient is given by (cid:80) j,k j · k(ej,k − qjqk) , σ2 q r = where the term qk is the mass function of the distribu- tion of the remaining degrees (degree of the nodes minus one) and j and k indicates the remaining degrees. Fur- thermore, ej,k refers to the mass function of the joint probability distribution of the remaining degrees of the two vertices. Finally, σ2 q denotes the variance of the re- maining degree distribution with mass function qk i.e. σ2 k k2qk − ((cid:80) q =(cid:80) k kqk)2 Definition 5 (Local clustering coefficient). The local clustering coefficient of vertex v is the fraction of pairs of neighbors of v that are connected over all pairs of neighbors of v. Formally: Cloc(v) = {(s, t) edges : s, t ∈ Nv and (s, t) ∈ E} deg(v)(deg(v) − 1) , where Nv is the neighbourhood of the node v i.e. the vertices adjacent to v. The average (local) clustering coefficient of a G graph is defined as: ¯C(G) = 1 n (cid:88) v∈V (G) Cloc(v), where n is the size of the graph. 9 Definition 6 (Eigenvector centrality). For a graph, the vector of eigenvector centralities c satisfies the eigenvec- tor equation A · c = λ1c , where λ1 is the largest eigen- value of the graph's adjacency matrix A. In other words, for a connected undirected graph, the vector of eigen- vector centralities is given by the (suitably normalized) eigenvector of corresponding to the largest eigenvalue of the adjacency matrix. Statistical Learning Definition 7 (Classification Problem). Classification is a supervised learning task where based on training dataset we attempt to predict the categorial target vari- able of a new observation. Definition 8 (Stratified k-fold cross validation). In stratified k-fold cross-validation, the original sample is randomly partitioned into k equal sized subsamples such that the class distribution in the subsets is the same as in the whole dataset, i.e. stratified sampling ensures that each fold is a good representative of the whole dataset. Then one of the k subsamples is retained for testing the model (validation) and the remaining k − 1 subsamples are used as training data. The cross-validation process is repeated k times with each subsample used once as the validation data. Finally, to produce a single estimation, the k results can be averaged. Definition 9 (Confusion Matrix). The performance of a classifier is calculated associated with the confusion matrix. The confusion matrix itself is not a perfor- mance metric, however, almost every performance met- ric is based on the values of the matrix. Let us say that we have k different classes, then the confusion matrix M = (mij) is a k × k matrix, where the rows correspond to the predicted values and the columns correspond to the real category of the observations, i.e. mij denotes the number of cases when the actual class is the jth cat- egory and the classifier predicted the ith category. Definition 10 (Accuracy). Let M = (mij) denote the k × k confusion matrix of a k-class problem. Then the accuracy of the classifier is defined as (cid:80)k (cid:80)k i=1 mii j,l=1 mjl , Accuracy = i.e. the accuracy is the total number of the number of hits (total of the diagonal) divided by the size of the test set. Definition 11 (ROC curve and AUC score). A ROC curve is an easily interpretable visual representation of the diagnostic ability of a binary classifier, and most fre- quently it is used to compare the performance of different models. In binary classification problems, we usually re- fer to the classes as positive and negative. The ROC Clustering Barab´asi -- Albert model 10 The original Barab´asi -- Albert (BA) model lacks high clustering coefficient so a modification was proposed by Holme and Kim [17], that can better capture the high clustering of real networks. Recall the growth of the orig- inal1 BA model: [2] 0. Input: n number of nodes, m number of new edges of a newcomer vertex and p probability of triad formation at each iteration. 1. Initial condition: The model starts with a small network of m0 nodes. 2. Growth: At each iteration step, a newcomer node v is connected to u1, . . . , um, m ≤ m0 existing nodes, with probability that is proportional to the degree of the ui nodes, i.e. according to the mech- anism, which means that the probability pi, that v is connected to the node ui is (cid:80) deg(ui) j deg(vj) , curve is created by plotting the true positive rate (TPR) against the false positive rate (FPR) at various threshold setting. The TPR is the number of correctly classified ob- servations of the positive class divided by the size of the positive class. The FPR measures the proportion of the Type I error i.e. it is the number of false alarms i.e. false positives (misclassified negative observations) divided by the size of the negative class. The greater the area under the ROC curve (AUC) is the more accurate the model is. Definition 12 (Canberra distance). Let p and q be two n-dimensional vectors. The Canberra distance between the vectors p and q is defined as follows: pi − qi pi + qi n(cid:88) d(p, q) = (1) i APPENDIX B: NETWORK MODELS In this section we describe the network models that we used to model real-world networks. pi = Watts -- Strogatz model Tha Watts -- Strogatz model (WS), proposed by Duncan J. Watts and Steven Strogatz [3], was motivated by the small-world and highly clustered property of real-world networks. The description of the model generating pro- cedure is as follows: 0. Input: n number of nodes, initial K = 2·k number of neighbours of each vertex and p edge rewiring probability. 1. Initialization: We start with a regular lattice ring (also called as circulant graph) of N nodes, i.e. a cycle, where every node is connected with its 2k nearest neighbours. Formally, if the nodes are la- belled v1, v2, . . . , vN , then the there is a link be- tween vi and vj if and only if i − j mod (N − k) ≤ k. 2. Rewiring the edges: Each edge is rewired iden- tically with probability p by changing one of the endpoints of the edge, making sure that no self- loop or multiple edge is created. Formally for ev- ery 1 ≤ i ≤ N , every (vi, vj) edge is replaced by (vi, vk), with probability p, such that k (cid:54)= i and k (cid:54)= j, and k is chosen uniformly from the set of allowed values. where the sum is made over all already existing vj nodes, which is eventually twice the current number of edges of the network. The difference between the original and the Clustering BA model, is that each newly connected edge is com- pleted to a triad with a given probability, i.e. as an extra step: after drawing a (v, ui) edge in the preferential at- tachment step, with a given probability p a new edge is drawn between v and one of the neighbours of ui to form a new triangle. Formally, the steps 1 and 2 are supple- mented with the following step: 3. Triad formation: = If the set W {w : ∃i (w, ui) ∈ E and w (cid:54)= v and (v, w) /∈ E} is non-empty, then with probability p we connect v with a randomly chosen w ∈ W , else we connect v to a random node according to the preferential attachment mechanism. Note that p is a previously defined parameter, and in the definition of the set W , the vertices ui are from the previous (Growth) step. Notation: CBAn,m,p denotes a random graph generated by the Clustering BA model with n, m, p parameters. Duplication-Divergence model The following analytically tractable model was intro- duced in [20] in order to describe the evolution of protein Notation: WSn,k,p denotes a random graph generated by the WS model with n, k, p parameters. 1Note that this definition of the Barab´asi -- Albert model is mathe- matically non-rigorous, but Bollob´as et al. [35] introduced a precise version of the model. interaction networks. The growth of the model consists of a and a step as follows: 0. Input: n number of nodes, p > 0 probability of the activation of a duplicated edge. 1. Initialization: The model starts with two nodes connected via a link. 2. Growth: At each iteration step a randomly se- lected target v node is duplicated: (a) Duplication: The v(cid:48) replica of v is added to the network and v(cid:48) is connected to each neighbour of v. (b) Divergence: Each newly generated link of v(cid:48) is with probability p, i.e. independently with probability 1 − p we delete each newly con- nected edge. If at least one link is remained, then the v(cid:48) replica is preserved, otherwise the attempt is considered as a failure and the net- work does not change. Community Structure model The following model is a generalization of the "planted l-partition" model introduced in [18] or it can be viewed as a special case of the Stochastic Block model [19]. It is more general then the "planted l-partition" model since the size of each community can be adjusted arbitrarily. On the other hand, it is less general then the Stochastic Block model since here the probabilities of edge forma- tions within and between communities are constant for each partition. The algorithm of the model is as follows: 0. Input: L = (n1, . . . , nk) list of sizes of communi- ties, pin and pout probabilities of edge formations within and between communities respectively. 1. Initialization: The model partitions n = n1+n2+ . . .+nk vertices in k different groups with n1, . . . , nk nodes. Vertices of the same group are connected independently with a probability pin, i.e. each sub- graph corresponding to a group is an Erdos -- R´enyi random graph, with connection probability pin. 2. Connecting communities: Vertices of different groups are linked independently with a probability pout. 2K-Simple model 11 performance of the property-specific models to a univer- sal one, furthermore, this model is more computationally efficient than the Stochastic Kronecker graph model that can also capture several well-known properties of real- world networks [36]. The 2K-Simple algorithm constructs a simple graph with a target joint degree matrix (JDM) i.e. its input is a JDM and the output is a simple graph with the given JDM. The JDM's entry in the kth row and lth column is the number of edges between nodes of degree k and nodes of degree l. Note that the joint degree distribution contains significant information of the network for exam- ple density, degree distribution, and degree correlation, but it cannot capture information about the clustering of the network since in that case, the distribution of the triplets would be also necessary. However, in [21] there is an extension of the 2K-Simple algorithm which can approximate the average clustering coefficient, without knowing the distribution of the triplets. There are several methods to generate a graph with given joint degree distribution [37] and this algorithm builds on a prior attempt: the joint configuration model (also known as pseudograph) [37], but it is more sophis- ticated, since it is always possible to connect two discon- nected v and w nodes without exceeding their desired degree, even if they do not have free stubs and still main- tain the simplicity of the generated graph, which is where the configuration model fails. The operation that allows us to ensure the simplicity of the graph is referred to as . The algorithm can be summed up as follows: 0. Input: A valid (graphical) joint degree matrix 1. Initialization: Create n = V nodes, each v ∈ V has deg(v) free stubs. 2. Wire edges: Pick two disconnected nodes v and w, of degree k and l respectively. i If the current degree of v and w has not reached its target yet, i.e. they have free stubs, then connect v and w ii Otherwise apply the Neighbour Switch opera- tion to v or w to get free stubs. The goal of the Neighbour Switch (NS) operation is to free a stub such that the joint degree distribution remains unchanged. The algorithm of NS is as follows: 0. Input: node v 1. Find v(cid:48) node such that deg(v(cid:48)) = deg(v) 2. Find t node such that t is neighbour of v but not connected to v(cid:48) 3. Replace the edge (v, t) with (v(cid:48), t) The 2K-Simple algorithm is a general modeling frame- work introduced in [21] that can capture the degree cor- relation profile of an arbitrary network. The reason why we applied this model is that we aspired to compare the APPENDIX C: AUXILIARY FIGURES In this section we present a few auxiliary figures. 12 FIG. 7. Boxplots of the metrics across different models. The modelled graph is a brain network with 2995 nodes. FIG. 8. Boxplots of the metrics across different models. The modelled graph is a food web with 237 nodes. 2KCBAComDDWSWS_S..0,0040,0060,0080,0100,0120,0140,016DensityOriginal value2KCBAComDDWSWS_S..-1,0-0,8-0,6-0,4-0,20,00,20,40,6AssortativityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,6Average clustering coefficientOriginal value2KCBAComDDWSWS_..0,00080,00100,00120,00140,00160,00180,0020Avgerage path lengthOriginal value2KCBAComDDWSWS_S..02468101214Skewness of degree distributionOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,4Max eigenvector centralityOriginal value2KCBAComDDWSWS_S..0246810Skewness of degree distributionOriginal value2KCBAComDDWSWS_S..-1,0-0,8-0,6-0,4-0,20,0AssortativityOriginal value2KCBAComDDWSWS_S..0,000,050,100,150,200,250,30Average clustering coefficientOriginal value2KCBAComDDWSWS_S..0,10,20,30,40,5Max eigenvector centralityOriginal value2KCBAComDDWSWS_..0,0080,0090,0100,0110,0120,013Average path lengthOriginal value2KCBAComDDWSWS_S..0,000,020,040,060,080,100,120,140,16DensityOriginal value 13 FIG. 9. Boxplots of the metrics across different models. The modelled graph is a protein interaction network with 60 nodes. [1] A.-L. Barab´asi, Network science (Cambridge University [16] R. A. Rossi and N. K. Ahmed, in Proceedings of the 29th Press, 2016). [2] A.-L. Barab´asi and R. Albert, Science 286, 509 (1999). [3] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998). [4] M. E. J. Newman, Physical Rev. E 68, 026121 (2003). [5] C. I. Del Genio, T. Gross, and K. E. Bassler, Physical AAAI Conference on Artificial Intelligence (2015). [17] P. Holme and B. J. Kim, Physical Review E 65, 026107 (2002). [18] A. Condon and R. M. Karp, Random Structures & Al- gorithms 18, 116 (2001). Review Letters 107, 178701 (2011). [19] P. W. Holland, K. B. Laskey, and S. Leinhardt, Social [6] P. W. Fong, M. Anwar, and Z. Zhao, in Europ. Symp. on Res. in Comp. Security (Springer, 2009) pp. 303 -- 320. [7] A. Goldenberg, A. X. Zheng, S. E. Fienberg, et al., Foun- dations and Trends in Machine Learning 2, 129 (2010). [8] G. Bounova and O. de Weck, Physical Review E 85, 016117 (2012). [9] A. Garcia-Robledo, A. Diaz-Perez, and G. Morales- Luna, in Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on (IEEE, 2013) pp. 1 -- 6. [10] A. Jamakovic and S. Uhlig, Networks and Heterogeneous Media 3, 345 (2008). [11] M. Nagy, Data-driven Analysis of Fractality and Other Characteristics of Complex Networks, Master's the- sis, Budapest University of Technology and Economics (2018). [12] E. T. Aaron Clauset and M. Sainz (2016). [13] J. G. Diego Vzquez and R. Naik (2003). [14] N. Kasthuri and J. Lichtman (2008). [15] J. Kunegis, in Proc. Int. Conf. on World Wide Web Com- panion (2013) pp. 1343 -- 1350. Networks 5, 109 (1983). [20] I. Ispolatov, P. L. Krapivsky, and A. Yuryev, Physical Review E 71, 061911 (2005). [21] M. Gjoka, B. Tillman, and A. Markopoulou, in Com- puter Communications (INFOCOM), 2015 IEEE Con- ference on (Citeseer, 2015) pp. 1553 -- 1561. [22] K. Ikehara and A. Clauset, arXiv preprint arXiv:1710.11304 (2017). [23] J. P. Canning, E. E. Ingram, S. Nowak-Wolff, A. M. Or- tiz, N. K. Ahmed, R. A. Rossi, K. R. Schmitt, and S. Soundarajan, arXiv preprint arXiv:1805.02682 (2018). [24] S. Bonner, J. Brennan, G. Theodoropoulos, I. Kureshi, and A. S. McGough, in 2016 IEEE International Con- ference on Big Data (Big Data) (IEEE, 2016) pp. 3290 -- 3297. [25] M. Middendorf, E. Ziv, and C. H. Wiggins, Proceedings of the National Academy of Sciences 102, 3192 (2005). [26] M. Barth´elemy, Physics Reports 499, 1 (2011). [27] M. B. Menezes, S. Kim, and R. Huang, PloS one 12, e0179120 (2017). 2KCBAComDDWSWS_S..-0,6-0,4-0,20,00,20,40,6AssortativityOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,4Average clustering coefficientOriginal value2KCBAComDDWSWS_S..0,00,10,20,30,40,50,6Max eigenvetor centralityOriginal value2KCBAComDDWSWS_S..0,000,050,100,150,200,25Average path lengthOriginal value2KCBAComDDWSWS_S..0,030,040,050,060,070,080,090,10DensityOriginal value2KCBAComDDWSWS_S..01234Skewness of degree distributionOriginal value 14 [28] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, J. of Stat. Mech.: Theory and Experiment 2008, P10008 (2008). [29] G. Csardi and T. Nepusz, InterJournal, Complex Systems 1695, 1 (2006). [30] A. Hagberg, P. Swart, and D. S Chult, Exploring net- work structure, dynamics, and function using NetworkX, Tech. Rep. (Los Alamos National Lab.(LANL), NM, USA, 2008). [31] G. Kiar, GREMLIN: Graph Estimation From MR Images Leading to Inference in Neuroscience, Ph.D. thesis, Johns Hopkins University (2016). [32] J. A. Dunne, H. Maschner, M. W. Betts, N. Huntly, R. Russell, R. J. Williams, and S. A. Wood, Scientific reports 6, 21179 (2016). [33] S. Bonner, J. Brennan, G. Theodoropoulos, I. Kureshi, and A. McGough, (2016). [34] J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, Vol. 1 (Springer series in statistics New York, NY, USA:, 2001). [35] B. Bollob´as, O. Riordan, J. Spencer, G. Tusn´ady, et al., Random Structures & Algorithms 18, 279 (2001). [36] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani, J. Mach. Learn. Res. 11, 985 (2010). [37] P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat, in ACM SIGCOMM Computer Communication Review, Vol. 36 (ACM, 2006) pp. 135 -- 146.
1512.07258
3
1512
2018-02-27T16:40:59
Improving Website Hyperlink Structure Using Server Logs
[ "cs.SI" ]
Good websites should be easy to navigate via hyperlinks, yet maintaining a high-quality link structure is difficult. Identifying pairs of pages that should be linked may be hard for human editors, especially if the site is large and changes frequently. Further, given a set of useful link candidates, the task of incorporating them into the site can be expensive, since it typically involves humans editing pages. In the light of these challenges, it is desirable to develop data-driven methods for automating the link placement task. Here we develop an approach for automatically finding useful hyperlinks to add to a website. We show that passively collected server logs, beyond telling us which existing links are useful, also contain implicit signals indicating which nonexistent links would be useful if they were to be introduced. We leverage these signals to model the future usefulness of yet nonexistent links. Based on our model, we define the problem of link placement under budget constraints and propose an efficient algorithm for solving it. We demonstrate the effectiveness of our approach by evaluating it on Wikipedia, a large website for which we have access to both server logs (used for finding useful new links) and the complete revision history (containing a ground truth of new links). As our method is based exclusively on standard server logs, it may also be applied to any other website, as we show with the example of the biomedical research site Simtk.
cs.SI
cs
Improving Website Hyperlink Structure Using Server Logs Ashwin Paranjape∗ Stanford University [email protected] Robert West∗ Stanford University [email protected] Leila Zia Wikimedia Foundation [email protected] Jure Leskovec Stanford University [email protected] 8 1 0 2 b e F 7 2 ] I S . s c [ 3 v 8 5 2 7 0 . 2 1 5 1 : v i X r a ABSTRACT Good websites should be easy to navigate via hyperlinks, yet main- taining a high-quality link structure is difficult. Identifying pairs of pages that should be linked may be hard for human editors, es- pecially if the site is large and changes frequently. Further, given a set of useful link candidates, the task of incorporating them into the site can be expensive, since it typically involves humans editing pages. In the light of these challenges, it is desirable to develop data-driven methods for automating the link placement task. Here we develop an approach for automatically finding useful hyperlinks to add to a website. We show that passively collected server logs, beyond telling us which existing links are useful, also contain im- plicit signals indicating which nonexistent links would be useful if they were to be introduced. We leverage these signals to model the future usefulness of yet nonexistent links. Based on our model, we define the problem of link placement under budget constraints and propose an efficient algorithm for solving it. We demonstrate the effectiveness of our approach by evaluating it on Wikipedia, a large website for which we have access to both server logs (used for find- ing useful new links) and the complete revision history (containing a ground truth of new links). As our method is based exclusively on standard server logs, it may also be applied to any other website, as we show with the example of the biomedical research site Simtk. INTRODUCTION 1. Websites are networks of interlinked pages, and a good website makes it easy and intuitive for users to navigate its content. One way of making navigation intuitive and content discoverable is to provide carefully placed hyperlinks. Consider for instance Wiki- pedia, the free encyclopedia that anyone can edit. The links that connect articles are essential for presenting concepts in their appro- priate context, for letting users find the information they are looking for, and for providing an element of serendipity by giving users the chance to explore new topics they happen to come across without intentionally searching for them. Unfortunately, maintaining website navigability can be difficult and cumbersome, especially if the site is large and changes fre- *AP and RW contributed equally, RW as a Wikimedia Research Fellow. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). WSDM'16, February 22–25, 2016, San Francisco, CA, USA. © 2016 Copyright held by the owner/author(s). ACM ISBN 978-1-4503-3716-8/16/02. . . $15.00 DOI: http://dx.doi.org/10.1145/2835776.2835832 quently [7, 21]. For example, about 7,000 new pages are created on Wikipedia every day [35]. As a result, there is an urgent need to keep the site's link structure up to date, which in return requires much manual effort and does not scale as the website grows, even with thousands of volunteer editors as in the case of Wikipedia. Neither is the problem limited to Wikipedia; on the contrary, it may be even more pressing on other sites, which are often maintained by a single webmaster. Thus, it is important to provide automatic methods to help maintain and improve website hyperlink structure. Considering the importance of links, it is not surprising that the problems of finding missing links and predicting which links will form in the future have been studied previously [17, 19, 22, 32]. Prior methods typically cast improving website hyperlink structure simply as an instance of a link prediction problem in a given net- work; i.e., they extrapolate information from existing links in order to predict the missing ones. These approaches are often based on the intuition that two pages should be connected if they have many neighbors in common, a notion that may be quantified by the plain number of common neighbors, the Jaccard coefficient of sets of neighbors, and other variations [1, 17]. However, simply considering the existence of a link on a website is not all that matters. Networks in general, and hyperlink graphs in particular, often have traffic flowing over their links, and a link is of little use if it is never traversed. For example, in the English Wikipedia, of all the 800,000 links added to the site in February 2015, the majority (66%) were not clicked even a single time in March 2015, and among the rest, most links were clicked only very rarely. For instance, only 1% of links added in February were used more than 100 times in all of March (Fig. 1). Consequently, even if we could perfectly mimic Wikipedia editors (who would a priori seem to provide a reasonable gold standard for links to add), the suggested links would likely have little impact on website naviga- tion. Furthermore, missing-link prediction systems can suggest a large number of links to be inserted into a website. But before links can be incorporated, they typically need to be examined by a human, for several reasons. First, not all sites provide an interface that lets content be changed programmatically. Second, even when such an interface is available, determining where in the source page to place a suggested link may be hard, since it requires finding, or introducing, a phrase that may serve as anchor text [19]. And third, even when identifying anchor text automatically is possible, human verification and approval might still be required in order to ensure that the recommended link is indeed correct and appropriate. Since the addition of links by humans is a slow and expensive process, presenting the complete ranking of all suggested links to editors is unlikely to be useful. Instead, a practical system should choose a well composed subset of candidate links of manageable size. and demonstrate that our models of human browsing behavior are accurate and lead to the discovery of highly relevant and useful hy- perlinks. Having full access to the logs of Wikipedia, one of the highest-traffic websites in the world, is particularly beneficial, as it allows us to perform a unique analysis of human web-browsing behavior. Our results on Simtk show that our method is general and applies well beyond Wikipedia. The following are the main contributions of this paper: • We introduce the link placement problem under budget con- straints, and design objective functions anchored in empir- ically observed human behavior and exposing an intuitive diminishing-returns property. We also provide an efficient algorithm for optimizing these objectives (Sec. 2). • We identify signals in the logs that can indicate the usage of a future link before it is introduced, and we operational- ize these signals in simple but effective methods for finding promising new links and estimating their future clickthrough rates (Sec. 3). • We characterize the usage and impact of newly added links by analyzing human navigation traces mined from Wikipe- dia's server logs (Sec. 5). 2. THE LINK PLACEMENT PROBLEM First we introduce the link placement problem under budget con- straints. In this context, the budget refers to a maximum allow- able number of links that may be suggested by an algorithm. As mentioned in the introduction, realistic systems frequently require a human in the loop for verifying that the links proposed by the al- gorithm are indeed of value and for inserting them. As we need to avoid overwhelming the human editors with more suggestions than they can respond to, we need to carefully select our suggestions. Formally, the task is to select a set A of suggested links of a given maximum size K, where the quality of the chosen set A is determined by an objective function f : f (A) A ≤ K. maximize subject to (1) (2) In principle, any set function f : 2V×V → R may be plugged in (where V is the set of pages on the site, and 2V×V is the set of all sets of page pairs), but the practical usefulness of our system relies vitally on a sensible definition of f . In particular, f should be based on a reasonable model of human browsing behavior and should score link sets for which the model predicts many clicks above link sets for which it predicts fewer clicks. In the following we introduce two simplified models of human browsing behavior and propose three objective functions f based on these models. Then, we show that two of these objectives have the useful property of diminishing returns and discuss the impli- cations thereof. Finally, we show that all three objectives can be maximized exactly by a simple and efficient greedy algorithm. 2.1 Browsing models and objective functions We first define notation, then formulate two web-browsing models, and finally design three objective functions based on the models. Notation. We model hyperlink networks as directed graphs G = (V,E), with pages as nodes and hyperlinks as edges. We refer to the endpoints of a link (s,t) as source and target, respectively. Un- linked pairs of nodes are considered potential link candidates. We denote the overall number of views of a page s by Ns. When users are in s, they have a choice to either stop or follow out-links of s. To simplify notation, we model stopping as a link click to a special Figure 1: Complementary cumulative distribution function of the number of clicks received in March 2015 by links intro- duced in the English Wikipedia in February 2015. Thus, what is needed is an automatic approach to improving website hyperlink structure that accounts for website navigation patterns and suggests a limited number of highly relevant links based on the way they will impact the website's navigability. Present work. Here we develop an automatic approach for sug- gesting missing but potentially highly used hyperlinks for a given website. Our approach is language- and website-independent and is based on using access logs as collected by practically all web servers. Such logs record users' natural browsing behavior, and we show that server logs contain strong signals not only about which existing links are presently used, but also about how heavily cur- rently nonexistent links would be used if they were to be added to the site. We build models of human browsing behavior, anchored in empirical evidence from log data, that allow us to predict the usage of any potentially introduced hyperlink (s,t) in terms of its click- through rate, i.e., the probability of being chosen by users visiting page s. The models are based on the following intuition: Consider a page s not linked to another page t. A large fraction of users visiting s and later on, via an indirect path, t, suggests that they might have taken a direct shortcut from s to t had the shortcut ex- isted. Even though one could hope to detect such events by parsing the logs, our approach is even more general. One of our models is able to estimate the fraction of people who would take a shortcut (s,t) only based on the pairwise page transition matrix. That is, we are able to estimate navigation probabilities over longer paths by combining information about individual link transitions. The second important aspect of our solution is that we only sug- gest a small number of the top K most useful links, where K is a 'link budget' constraint. Consider a naïve approach that first ranks all candidate links by their probability of being used and then sim- ply returns the top K. An extreme outcome would be for all K links to be placed in a single page s. This is problematic because it seems a priori more desirable to connect a large number of pages reason- ably well with other pages than to connect a single page extremely well. This intuition is confirmed by the empirical observation that the expected number of clicks users take from a given page s is limited and not very sensitive to the addition of new links out of s. Thus we conclude that inserting yet another out-link to s after some good ones have already been added to it achieves less benefit than adding an out-link to some other page s(cid:48) first. This diminishing-re- turns property, besides accurately mirroring human behavior, leads to an optimization procedure that does not over-optimize on single source pages but instead spreads good links across many pages. We demonstrate and evaluate our approach on two very differ- ent websites: the full English Wikipedia and Simtk, a small com- munity of biomedical researchers. For both websites we utilize complete web server logs collected over a period of several months 1101001000100001e−061e−041e−021e+00Mininum number of clicksFraction of new linksNo clicks: 66%At least one click: 34% sink page ∅ /∈ E that is taken to be linked from every other page. Further, Nst counts the transitions from s to t via direct clicks of the link (s,t). Finally, a central quantity in this research is the click- through rate pst of a link (s,t). It measures the fraction of times users click to page t, given that they are currently on page s: pst = Nst /Ns. (3) The stopping probability is given by ps∅. Note that, since in reality users may click several links from the same source page, pst is generally not a distribution over t given s. Next we define two models of human web-browsing behavior. Multi-tab browsing model. This model captures a scenario where the user may follow several links from the same page s, e.g., by opening them in multiple browser tabs. We make the simplifying assumption that, given s, the user decides for each link (s,t) inde- pendently (with probability pst) if he wants to follow it. Single-tab browsing model. This is a Markov chain model where the user is assumed to follow exactly one link from each visited page s. This corresponds to a user who never opens more than a single tab, as might be common on mobile devices such as phones. The probability of choosing the link (s,t) is proportional to pst. Based on these browsing models, we now define objective func- tions that model the value provided by the newly inserted links A. Note that the objectives reason about the clickthrough rates pst of links A that do not exist yet, so in practice pst is not directly avail- able but must be estimated from data. We address this task in Sec. 3. Link-centric multi-tab objective. To capture the value of the newly inserted links A, this first objective assumes the multi-tab browsing model. The objective computes the expected number of t:(s,t)∈A pst and aggregates this new-link clicks from page s as(cid:80) (cid:88) quantity across all pages s: (cid:88) f1(A) = ws pst . (4) s t:(s,t)∈A If we choose ws = Ns then f1(A) measures the expected number of clicks received by all new links A jointly when s is weighted according to its empirical page-view count. In practice, however, page-view counts tend to follow heavy-tailed distributions such as power laws [2], so a few top pages would attract a disproportional amount of weight. We mitigate this problem by using ws = logNs, i.e., by weighting s by the order of magnitude of its raw count. Page-centric multi-tab objective. Our second objective also as- sumes the multi-tab browsing model. However, instead of mea- suring the total expected number of clicks on all new links A (as done by f1), this objective measures the expected number of source pages on which at least one new link is clicked (hence, we term this objective page-centric, whereas f1 is link-centric): (cid:88) s 1− (cid:89) t:(s,t)∈A  . 1− pst f2(A) = ws (5) Here, the product specifies the probability of no new link being clicked from s, and one minus that quantity yields the probability of clicking at least one new link from s. As before, we use ws = logNs. Single-tab objective. Unlike f1 and f2, our third objective is based on the single-tab browsing model. It captures the number of page views upon which the one chosen link is one of the new links A: (cid:88) s (cid:80) (cid:80) t:(s,t)∈A pst +(cid:80) t:(s,t)∈A pst f3(A) = ws . (6) t:(s,t)∈E pst The purpose of the denominator is to renormalize the independent probabilities of all links-old and new-to sum to 1, so pst be- comes a distribution over t given s. Again, we use ws = logNs. 2.2 Diminishing returns Next, we note that all of the above objective functions are mono- tone, and that f2 and f3 have a useful diminishing-returns property. Monotonicity means that adding one more new link to the solu- tion A will never decrease the objective value. It holds for all three objectives (we omit the proof for brevity): f (A∪{(s,t)})− f (A) ≥ 0. (7) The difference f (A∪{(s,t)})− f (A) is called the marginal gain of (s,t) with respect to A. The next observation is that, under the link-centric multi-tab ob- jective f1, marginal gains never change: regardless of which links are already present in the network, we will always have f1(A∪{(s,t)})− f1(A) = ws pst . (8) This means that f1 assumes that the solution quality can be in- creased indefinitely by adding more and more links to the same source page s. However, we will see later (Sec. 5.2) that this may not be the case in practice: adding a large number of links to the same source page s does not automatically have a large effect on the total number of clicks made from s. This discrepancy with reality is mitigated by the more complex objectives f2 and f3. In the page-centric multi-tab objective f2, further increasing the probability of at least one new link being taken becomes ever more difficult as more links are added. This way, f2 discourages adding too many links to the same source page. The same is true for the single-tab objective f3: since the click probabilities of all links from s-old and new-are required to sum to 1 here, it becomes ever harder for a link to obtain a fixed portion of the total probability mass of 1 as the page is becoming increas- ingly crowded with strong competitors. More precisely, all three objective functions f have the submod- ularity property (proof omitted for brevity): f (B∪{(s,t)})− f (B) ≤ f (A∪{(s,t)})− f (A), for A ⊆ B, (9) but while it holds with equality for f1 (Eq. 8), this is not true for f2 and f3. When marginal gains decrease as the solution grows, we speak of diminishing returns. To see the practical benefits of diminishing returns, consider two source pages s and u, with s being vastly more popular than u, i.e., ws (cid:29) wu. Without diminishing returns (under objective f1), the marginal gains of candidates from s will nearly always dominate those of candidates from u (i.e., ws pst (cid:29) wu puv for most (s,t) and (u,v)), so u would not even be considered before s has been fully saturated with links. With diminishing returns, on the contrary, s would gradually become a less preferred source for new links. In other words, there is a trade-off between the popularity of s on the one hand (if s is frequently visited then links that are added to it get more exposure and are therefore more frequently used), and its 'crowdedness' with good links, on the other. As a side note we observe that, when measuring 'crowdedness', f2 only considers the newly added links A, whereas f3 also takes the pre-existing links E into account. In our evaluation (Sec. 6.1.3), we will see that the latter amplifies the effect of diminishing returns. 2.3 Algorithm for maximizing the objectives We now show how to efficiently maximize the three objective func- tions. We first state two key observations that hold for all three ΣE ←(cid:80) clickthrough rates pst; budget K; objective f Algorithm 1 Greedy marginal-gain link placement Input: Hyperlink graph G = (V,E); source-page weights ws; Output: Set A of links that maximizes f (A) subject to A ≤ K 1: Q ← new priority queue 2: for s ∈ V do // sum of pst values of old links from s (s,t)∈E pst 3: Σ ← 0 // sum of new pst values seen so far for s 4: 5: Π ← 1 // product of new (1− pst ) values seen so far for s C ← 0 // current objective value for s 6: for t ∈ V in decreasing order of pst do 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: end for 17: A ← top K elements of Q Σ ← Σ + pst Π ← Π· (1− pst ) if f = f1 then C(cid:48) ← ws · Σ else if f = f2 then C(cid:48) ← ws · (1− Π) else if f = f3 then C(cid:48) ← ws · Σ/(Σ + ΣE ) Insert (s,t) into Q with the marginal gain C(cid:48) −C as value C ← C(cid:48) end for objectives and then describe an algorithm that builds on these ob- servations to find a globally optimal solution: 1. For a single source page s, the optimal solution is given by the top K pairs (s,t) with respect to pst. 2. Sources are 'independent': the contribution of links from s to the objective does not change when adding links to sources other than s. This follows from Eq. 4–6, by noting that only links from s appear in the expressions inside the outer sums. These observations imply that the following simple, greedy algo- rithm always produces an optimal solution1 (pseudocode is listed in Algorithm 1). The algorithm processes the data source by source. For a given source s, we first obtain the optimal solution for s alone by sorting all (s,t) with respect to pst (line 7; cf. observation 1). Next, we iterate over the sorted list and compute the marginal gains of all candidates (s,t) from s (lines 7–15). As marginal gains are computed, they are stored in a global priority queue (line 13); once computed, they need not be updated any more (cf. observation 2). Finally, we return the top K from the priority queue (line 17). 3. ESTIMATING CLICKTHROUGH RATES In our above exposition of the link placement problem, we assumed we are given a clickthrough rate pst for each link candidate (s,t). However, in practice these values are undefined before the link is introduced. Therefore, we need to estimate what the clickthrough rate for each nonexistent link would be in the hypothetical case that the link were to be inserted into the site. Here we propose four ways in which historical web server logs can be used for estimating pst for a nonexistent link (s,t). Later (Sec. 6.1.1) we evaluate the resulting predictors empirically. Method 1: Search proportion. What we require are indicators of users' need to transition from s to t before the direct link (s,t) 1For maximizing general submodular functions (Eq. 9), a greedy algorithm gives a (1− 1/e)-approximation [20]. But in our case, observation 2 makes greedy optimal: our problem is equivalent to finding a maximum-weight basis of a uniform matroid of rank K with marginal gains as weights; the greedy algorithm is guaranteed to find an optimal solution in this setting [10]. pages when the target page is t Algorithm 2 Power iteration for estimating path proportions from pairwise transitions probabilities Input: Target node t, pairwise transition matrix P with Pst = pst Output: Vector Qt of estimated path proportions for all source 1: Qt ← (0, . . . ,0)T 2: Qtt ← 1 3: Q(cid:48) t ← (0, . . . ,0)T 4: while (cid:107)Qt − Q(cid:48) Q(cid:48) t ← Qt 5: Qt ← PQt 6: Qtt ← 1 7: 8: end while // recursive case of Eq. 10 // base case of Eq. 10 // used for storing the previous value of Qt t(cid:107) > ε do st /Ns, where N∗ exists. Many websites provide a search box on every page, and thus one way of reaching t from s without taking a direct click is to 'teleport' into t by using the search box. Therefore, if many users search for t from s we may interpret this as signaling the need to go from s to t, a need that would also be met by a direct link. Based on this intuition, we estimate pst as the search proportion of (s,t), defined as the number of times t was reached from s via search, divided by the total number Ns of visits to s. Method 2: Path proportion. Besides search, another way of reaching t from s without a direct link is by navigating on an in- direct path. Thus, we may estimate pst as the path proportion of (s,t), defined as N∗ st is the observed number of navi- gation paths from s to t. In other words, path proportion measures the average number of paths to t, conditioned on first seeing s. Method 3: Path-and-search proportion. Last, we may also com- bine the above two metrics. We may interpret search queries as a special type of page view, and the paths from s to t via search may then be considered indirect paths, too. Summing search proportion and path proportion, then, gives rise to yet another predictor of pst. We refer to this joint measure as the path-and-search proportion. Method 4: Random-walk model. The measures introduced above require access to rather granular data: in order to mine keyword searches and indirect navigation paths, one needs access to com- plete server logs. Processing large log datasets may, however, be computationally difficult. Further, complete logs often contain per- sonally identifiable information, and privacy concerns may thus make it difficult for researchers and analysts to obtain unrestricted log access. For these reasons, it is desirable to develop clickthrough rate estimation methods that manage to make reasonable predic- tions based on more restricted data. For instance, although the Wikipedia log data used in this paper is not publicly available, a powerful dataset derived from it, the matrix of pairwise transition counts between all English Wikipedia articles, was recently pub- lished by the Wikimedia Foundation [34]. We now describe an algorithm for estimating path proportions solely based on the pair- wise transition counts for those links that already exist. As defined above, the path proportion measures the expected number of paths to t on a navigation trace starting from s; we de- note this quantity as Qst here. For a random walker navigating the network according to the empirically measured transitions proba- bilities, the following recursive equation holds: if s = t, otherwise. (10) The base case states that the expected number of paths to t from t itself is 1 (i.e., the random walker is assumed to terminate a path (cid:40) (cid:80) 1 Qst = u psuQut as soon as t is reached). The recursive case defines that, if the random walker has not reached t yet, he might do so later on, when continuing the walk according to the empirical clickthrough rates. Solving the random-walk equation. The random-walk equation (Eq. 10) can be solved by power iteration. Pseudocode is listed as Algorithm 2. Let Qt be the vector containing as its elements the estimates Qst for all pages s and the fixed target t. Initially, Qt has entries of zero for all pages with the exception of Qtt = 1, as per the base case of Eq. 10 (lines 1–2). We then keep multiplying Qt with the matrix of pairwise transition probabilities, as per the recursive case of Eq. 10 (line 6), resetting Qtt to 1 after every step (line 7). Since this reset step depends on the target t, the algorithm needs to be run separately for each t we are interested in. The algorithm is guaranteed to converge to a fixed point under s pst < 1 for all t (proof omitted for concise- the condition that(cid:80) ness), which is empirically the case in our data. 4. DATASETS AND LOG PROCESSING In this section we describe the structure and processing of web server logs. We also discuss the properties of the two websites we work with, Wikipedia and Simtk. 4.1 From logs to trees Log format. Web server log files contain one entry per HTTP request, specifying inter alia: timestamp, requested URL, referer URL, HTTP response status, user agent information, client IP ad- dress, and proxy server information via the HTTP X-Forwarded- For header. Since users are not uniquely identifiable by IP ad- dresses (e.g., several clients might reside behind the same proxy server, whose IP address would then be logged), we create an ap- proximate user ID by computing an MD5 digest of the concate- nation of IP address, proxy information, and user agent. Common bots and crawlers are discarded on the basis of the user agent string. From logs to trees. Our goal is to analyze the traces users take on the hyperlink network of a given website. However, the logs do not represent these traces explicitly, so we first need to reconstruct them from the raw sequence of page requests. We start by grouping requests by user ID and sorting them by time. If a page t was requested by clicking a link on another page s, the URL of s is recorded in the referer field of the request for t. The idea, then, is to reassemble the original traces from the sequence of page requests by joining requests on the URL and referer fields while preserving the temporal order. Since several clicks can be made from the same page, e.g., by opening multiple browser tabs, the navigation traces thus extracted are generally trees. While straightforward in principle, this method is unfortunately unable to reconstruct the original trees perfectly. Ambiguities arise when the page listed in the referer field of t was visited several times previously by the same user. In this situation, linking t to all its potential predecessors results in a directed acyclic graph (DAG) rather than a tree. Transforming such a DAG into a tree requires a heuristic approach. We proceed by attaching a request for t with referer s to the most recent request for s by the same user. If the referer field is empty or contains a URL from an external website, the request for t becomes the root of a new tree. Not only is this greedy strategy intuitive, since it seems more likely that the user continued from the most recent event, rather than resumed an older one; it also comes with a global optimality guarantee. More precisely, we observe that in a DAG G with edge weights w, attaching each internal node v to its minimum-weight parent argminu wuv yields a minimum spanning tree of G. We fol- (a) Tree properties (b) New-link usage Figure 2: Wikipedia dataset statistics. (a) CCDF of size and average degree of navigation trees. (b) CCDF of clickthrough rate for various source-page out-degrees. (Log–log scales.) low this approach with time differences as edge weights. Hence, the trees produced by our heuristic are the best possible trees under the objective of minimizing the sum (or mean) of all time differ- ences spanned by the referer edges. Mining search events. When counting keyword searches, we con- sider both site-internal search (e.g., from the Wikipedia search box) and site-external search from general engines such as Google, Ya- hoo, and Bing. Mining internal search is straightforward, since all search actions are usually fully represented in the logs. An external search from s for t is defined to have occurred if t has a search en- gine as referer, if s was the temporally closest previous page view by the user, and if s occurred at most 5 minutes before t. 4.2 Wikipedia data Link graph. The Wikipedia link graph is defined by nodes repre- senting articles in the main namespace, and edges representing the hyperlinks used in the bodies of articles. Furthermore, we use the English Wikipedia's publicly available full revision history (span- ning all undeleted revisions from 2001 through April 3, 2015) to determine when links were added or removed. Server logs. We have access to Wikimedia's full server logs, con- taining all HTTP requests to Wikimedia projects. We consider only requests made to the desktop version of the English Wikipedia. The log files we analyze comprise 3 months of data, from January through March 2015. For each month we extracted around 3 billion navigation trees. Fig. 2(a) summarizes structural characteristics of trees by plotting the complementary cumulative distribution func- tions (CCDF) of the tree size (number of page views) and of the average degree (number of children) of non-leaf page views per tree. We observe that trees tend to be small: 77% of trees consist of a single page view; 13%, of two page views; and 10%, of three or more page views. Average degrees also follow a heavy-tailed dis- tribution. Most trees are linear chains of all degree-one nodes, but page views with larger numbers of children are still quite frequent; e.g., 6% (44 million per month) of all trees with at least two page views have an average degree of 3 or more. 4.3 Simtk data Our second log dataset stems from Simtk.org, a website where biomedical researchers share code and information about their proj- ects. We analyze logs from June 2013 through February 2015. Contrasting Simtk and Wikipedia, we note that the Simtk dataset is orders of magnitude smaller than the Wikipedia dataset, in terms of both pages and page views, at hundreds, rather than millions, of pages, and tens of millions, rather than tens of billions, of page 12510502001e−051e−031e−01nPr(X‡n)X = tree sizeX = average degree (num. children)0.0010.0100.1001.0001e−061e−041e−021e+00Mininum pstFraction of new linksOut−deg. [1, 30)Out−deg. [30, 61)Out−deg. [61, 140)Out−deg. [140, 5601) In the multi-tab browsing model with its independence assump- tion (Sec. 2.1), we would see no competition between links; the larger the out-degree of s, the larger the expected number of clicks from s for fixed pst. In its pure form, this model seems unlikely to be true, since it would imply a reader scanning the entire page, eval- uating every link option separately, and choosing to click it with its probability pst. In a less extreme form, however, it is well conceiv- able that adding many good links to a page s might significantly increase the number of links a given user chooses to follow from s. In Sec. 5.1 we already saw that links from pages of higher out- degree tend to have lower individual clickthrough rates, which may serve as a first sign of competition, or interaction, between links. As our link placement method is allowed to propose only a limited number of links, the question of interaction between links is of cru- cial importance. Next we investigate this question more carefully. First we define the navigational degree ds of s to be the total number of transitions out of s, divided by the total number of times s was seen as an internal node of a tree, i.e., without stopping there: (cid:80) ds = t(cid:54)=∅ Nst Ns − Ns∅ . (11) In other words, the navigational degree of s is simply the average number of transitions users make out of s, given that they do not stop in s. We also define the structural degree, or out-degree, of s to be the number of pages s links to. Next, we examine the relation of the structural degree of s with (1) the probability of stopping at s and (2) the navigational degree of s, across a large and diverse set of pages s. Fig. 4(a), which has been computed from the transition counts for 300,000 articles in January 2015, shows that stopping is less likely on pages of larger structural degree, with a median stopping probability of 89% for pages with less than 10 out-links, and 76% for pages with at least 288 out-links. Additionally, given that users do not stop in s, they make more clicks on average when s offers more links to follow (median 1.00 for less than 10 out-links vs. 1.38 for 288 or more out-links; Fig. 4(b)). These effects could be explained by two hypotheses. It is possi- ble that (i) simply adding more links to a page also makes it more likely that more links are taken; or (ii) structural degree may be correlated with latent factors such as 'interestingness' or 'topical complexity': a more complex topic s will have more connections (i.e., links) to other topics that might be relevant for understanding s; this would lead to more clicks from s to those topics, but not sim- ply because more link options are present but because of inherent properties of the topic of s. To decide which hypothesis is true, we need to control for these inherent properties of s. We do so by tracking the same s through time and observing whether changes in structural degree are cor- related with changes in navigational degree for fixed s as well. In particular, we consider two snapshots of Wikipedia, one from Jan- uary 1, 2015, and the other from March 1, 2015. We take these snapshots as the approximate states of Wikipedia in the months of January and March, respectively. Then, we compute structural and navigational degrees, as well as stopping probabilities, based exclu- sively on the links present in these snapshots, obtaining two sepa- rate values for each quantity, one for January and one for March. For a fixed page s, the difference between the March and January values now captures the effect of adding or removing links from s on the stopping probability and the navigational degree of s. Fig. 4(c) and 4(d) show that this effect is minuscule, thus lending support to hypothesis ii from above: as structural degree grows or shrinks, both stopping probability (Fig. 4(c)) and navigational degree (Fig. 4(d)) vary only slightly, even for drastic changes in (a) (b) Figure 3: Clickthrough rate as function of (a) source-page out- degree and (b) relative position of link in wiki markup of source page (0 is top; 1 is bottom). Lower bin boundaries on x-axis. views. Simtk's hyperlink structure is also significantly less dense than Wikipedia's. On the one hand, this means that there is much improvement to be made by a method such as ours; on the other hand, it also means that the navigation traces mined from the logs are less rich than for Wikipedia. Therefore, instead of extracting trees, we extract sessions, defined here as sequences of page views with idle times of no more than one hour [13] between consecu- tive events. Further, to be consistent, we compute path proportions (Sec. 3) by tallying up how often s occurred before t in the same session, rather than on a path in the same tree. 5. EVALUATION: EFFECTS OF NEW LINKS The goal of this section is to investigate the effects of adding new links and assess some of the assumptions we made when formulat- ing the link placement problem (Sec. 2). In particular, we answer the following questions: First, how much click volume do new links receive? Second, are several new links placed in the same source page independent of each other, or do they compete for clicks? To answer these questions, we consider the around 800,000 links (s,t) added to the English Wikipedia in February 2015 and study all traces involving s in the months of January and March 2015. 5.1 Usage of new links In the introduction we have already alluded to the fact that new links tend to be rarely used, to the extent that 66% of the links added in February were not used even a single time in March, and only 1% were used more than 100 times (Fig. 1). While Fig. 1 plots absolute numbers, Fig. 2(b) shows the com- plementary cumulative distribution function (CCDF) of the click- through rate pst, stratified by the out-degree of the source page s. We observe that, depending on source-page out-degree, between 3% and 13% of new links achieve over 1% clickthrough, with higher values for lower-degree source pages. This finding is confirmed by Fig. 3(a), which plots the clickthrough rate pst against source-page out-degree and shows a strong negative trend. Finally, Fig. 3(b) confirms the fact that the popularity of a link is also correlated with its position in the source page [16], with links appearing close to the top of the page achieving a clickthrough rate about 1.6 times as high as that of links appearing in the center, and about 3.7 times as high as that of links appearing at the bottom. 5.2 Competition between links Traces are generally trees, not chains (Sec. 4.1). While in chains, t pst = 1, this is not necessary in trees, where several next pages may be opened from the same page s, such that, in the most extreme case (when all pst would form a distribution over t given s, i.e.,(cid:80) pst = 1),(cid:80) t pst may equal the out-degree of s. 0.0010.0040.0071172635466183114175310Source−page out−degreepst0.0020.00400.1090.2270.3540.4790.5960.70.7980.8870.954Relative link positionpst Path prop. Search prop. P&S prop. Rand. walks Mean baseln. Mean absolute err. 0.0057 (±0.0003) 0.0070 (±0.0004) 0.0057 (±0.0003) 0.0060 (±0.0004) 0.0072 (±0.0004) Pearson corr. 0.58 (±0.12) 0.49 (±0.22) 0.61 (±0.13) 0.53 (±0.13) 0.20 (±0.06) Spearman corr. 0.64 (±0.01) 0.17 (±0.02) 0.64 (±0.01) 0.59 (±0.02) 0.34 (±0.02) Table 1: Comparison of clickthrough rate estimation methods on Wikipedia, with bootstrapped 95% confidence intervals. whether a large predicted pst value indeed also means that the link is worthy of addition. Last, we investigate the behavior of our al- gorithm for link placement under budget constraints. We also developed a graphical user interface that makes it easy to add missing links to Wikipedia: users are shown our suggestions and accept or decline them with the simple click of a button [24]. 6.1.1 Estimating clickthrough rates As described in Sec. 5, we have identified 800,000 links that were added to the English Wikipedia in February 2015. Here we evaluate how well we can predict the clickthrough rates pst of these links in March 2015 from log data of January 2015, i.e., before the link was added. In particular, we compare five different methods (Sec. 3): 1. search proportion, 2. path proportion, 3. the combined path-and-search proportion, 4. random walks, and 5. a mean baseline. The mean baseline makes the same prediction for all candidates originating in the same source page s, namely the average click- through rate of all out-links of s that already exist. Table 1 evaluates the results using three different metrics: mean absolute error, Pearson correlation, and Spearman rank correlation. The table shows that across all metrics path proportion and path- and-search proportion perform best. Further, it is encouraging to see that the random-walk–based predictor, which only requires the pairwise transition matrix, is not lagging behind by much. Also, recall from Fig. 3(a) that pst is to a large part determined by source- page out-degree. This is why the mean baseline performs quite well (mean absolute error of 0.72%, vs. 0.57% achieved by the best- performing method) even though it predicts the same value for all links from the same page (but see the next section for when the baseline fails). For a graphical perspective on the relation between predicted and ground-truth values, we refer to Fig. 5(a) and 5(b). 6.1.2 Predicting link addition Our models for clickthrough prediction reason about the hypothet- ical scenario that a link (s,t) is added to the site. In the previous subsection we showed that the models manage to predict the future usage of a link fairly well for the subset of links that were actu- ally added. But, as stated above, this set is not known when the predictors are deployed in practice. Intuitively, a large predicted clickthrough rate pst should also imply that (s,t) is a useful link and should thus be added. Here we test whether this is actually the case by evaluating whether our high-ranking predictions using the January data correspond to links that were added to Wikipedia in February. For this task, we need a ground-truth set of positive and negative examples. We require a non-negligible number of positive exam- ples for which our methods can potentially predict a high pst value. Since our methods are based mainly on path and search counts, we therefore consider all links added in February with at least 10 in- direct paths or searches in January; call this set L. Since in reality (a) (c) (b) (d) Figure 4: Across different source pages, structural degree is (a) negatively correlated with stopping probability, and (b) pos- itively correlated with navigational degree. When fixing the source page, however, structural degree has only a small effect on (c) stopping probability and (d) navigational degree. The y- axes in (c) and (d) are relative with respect to the values from January. Lower bin boundaries on x-axes. Boxes show quar- tiles; whiskers show the full range without outliers. link structure; e.g., when 100 links or more are added, the median relative increase in navigational degree is still only 0.3%, and when 100 links are deleted, the median relative decrease is only 0.1%. This is not to say that adding links has no effect at all, but this effect stems from extreme, rather than typical, values, as indicated by the upward (downward) shift of interquartile ranges (Fig. 4(d)) as links are added (removed). In a nutshell, simply adding more links does not increase the overall number of clicks taken from a page. Instead, links compete with each other for user attention. This observation has important implications for user modeling and hence for budget-constrained link placement algorithms: one should avoid spending too much of one's budget on the same source page, since this will not in- crease click volume indefinitely; rather, one should spread high- clickthrough links across many different source pages. These findings justify, post hoc, the diminishing-returns proper- ties of the objective functions f2 and f3 (Sec. 2.2). 6. EVALUATION: LINK PLACEMENT Next we demonstrate the universality of our approach by evaluating it on two very different websites, Wikipedia and Simtk. 6.1 Wikipedia The analysis of results for Wikipedia is divided into three parts. First, we show that the estimation methods from Sec. 3 are suited for predicting the clickthrough rates of new links. Since the eval- uation set of added links is known only after the fact, a practically useful system must have the additional ability to identify such links on its own before they are introduced. Therefore, we then check 11017263854791151752880.40.50.60.70.80.91.0Structural degreeStopping probability11017263854791151752881.01.21.41.61.82.02.2Structural degreeNavigational degree−Inf−100−10−10110100−0.2−0.10.00.10.2Structural−degree differenceStopping−probability difference−Inf−100−10−10110100−0.2−0.10.00.10.2Structural−degree differenceNavigational−degree difference (a) (b) (c) (d) (e) (f) (g) (h) Figure 5: Wikipedia results. (a) Path proportion vs. clickthrough rate. (b) Search proportion vs. clickthrough rate (log–log; black lines correspond to gray dots kernel-smoothed on linear scales). (c) Precision at k on link prediction task (Sec. 6.1.2; logarithmic x-axis); path-and-search proportion nearly identical to path proportion and thus not shown. (d–h) Results of budget-constrained link placement for objectives of Eq. 4–6 (Sec. 6.1.3); 'prior cumulative clickthrough' refers to second term in denominator of Eq. 6. most page pairs are never linked, we also need to add a large num- ber of negative examples to the test set. We do so by including all out-links of the sources, and in-links of the targets, appearing in L. Using this approach, we obtain a set of about 38 million link can- didates, of which 9,000 are positive examples. The aforementioned threshold criterion is met by 7,000 positive, and 104,000 negative, examples. Therefore, while there is a fair number of positive exam- ples with many indirect paths and searches, they are vastly outnum- bered by negative examples with that same property; this ensures that retrieving the positive examples remains challenging for our methods (e.g., returning all links meeting the threshold criterion in random order yields a precision of only 6%). Given this labeled dataset, we evaluate the precision at k of the candidate ranking induced by the predicted pst values. The results, plotted in Fig. 5(c), indicate that our methods are well suited for predicting link addition. Precision stays high for a large set of top predictions: of the top 10,000 predictions induced by the path-pro- portion and random-walk measures, about 25% are positive exam- ples; among the top 2,000 predictions, as many as 50% are positive. As before, random walks perform nearly as well as the more data- intensive path proportion, and better than search proportion. Note that the mean baseline, which performed surprisingly well on the clickthrough rate prediction task (Sec. 6.1.1), does not ap- pear in the plot. The reason is that it fails entirely on this task, pro- ducing only two relevant links among its top 10,000 predictions. We conclude that it is easy to give a good pst estimate when it is known which links will be added. However, predicting whether a link should be added in the first place is much harder. 6.1.3 Link placement under budget constraints The above evaluations concerned the quality of predicted pst val- ues. Now we rely on those values being accurate and combine them in our budget-constrained link placement algorithm (Sec. 2.3). We use the pst values from the path-proportion method. First, we consider how similar the solutions produced by the dif- ferent objective functions are. For this purpose, Fig. 5(d)) plots the Jaccard coefficients between the solutions of f1 and f2 (orange) and between the solutions of f1 and f3 (blue) as functions of the solu- tion size K. We observe that f1 and f2 produce nearly identical so- lutions. The reason is that clickthrough rates pst are generally very small, which entails that Eq. 4 and 5 become very similar (formally, this can be shown by a Taylor expansion around 0). Objective f3, on the contrary, yields rather different solutions; it tends to favor source pages with fewer pre-existing high-clickthrough links (due to the second term in the denominator of Eq. 6; Fig. 5(e)) and at- tempts to spread links more evenly over all source pages (Fig. 5(f)). In other words, f3 offers a stronger diminishing-returns effect: the marginal value of more links decays faster when some good links have already been added to the same source page. Next, we aim to assess the impact of our suggestions on real Wi- kipedia users. Recall that we suggest links based on server logs from January 2015. We quantify the impact of our suggestions in terms of the total number of clicks they received in March 2015 (contributed by links added by editors after January). Fig. 5(g), which plots the total March click volume as a function of the so- lution size K, shows that (according to f3) the top 1,000 links re- ceived 95,000 clicks in total in March 2015, and the top 10,000 re- ceived 336,000 clicks. Recalling that two-thirds of all links added by humans receive no click at all (Fig. 1), this clearly demonstrates the importance of the links we suggest. Fig. 5(h) displays the av- erage number of clicks per suggested link as a function of K. The decreasing shape of the curves implies that higher-ranked sugges- tions received more clicks, as desired. Finally, comparing the three objectives, we observe that f3 fares best on the Wikipedia dataset: its suggestions attract most clicks (Fig. 5(g) and 5(h)), while also being spread more evenly across source pages (Fig. 5(f)). These results show that the links we suggest fill a real user need. Our system recommends useful links before they would normally 1e−051e−031e−011e−051e−031e−01Path proportionGround−truth clickthrough rate pst1e−051e−031e−011e−051e−031e−01Search proportionGround−truth clickthrough rate pst1101001000100000.00.20.40.60.81.0Rank kPrecision@kPath proportionSearch proportionRandom walks020006000100000.00.20.40.60.81.0Solution overlapSize K of solution AJaccard coefficientf1 vs. f2f1 vs. f3020006000100000.40.50.60.70.8Prior cumulative clickthroughSize K of solution AMean prior cumulative clickthroughf1f2f3020006000100001.01.52.02.53.0Solution concentrationSize K of solution ATargets per source page in Af1f2f3020006000100000100000250000Total click volumeSize K of solution ATotal number of clicksf1f2f302000600010000406080100Average click volumeSize K of solution AAverage number of clicksf1f2f3 Spearman corr. Mean absolute err. 0.020 (±0.003) 0.50 (±0.09) Path prop. 0.013 (±0.003) −0.01 (±0.11) −0.27 (±0.10) Mean baseln. Table 2: Performance of path-proportion clickthrough estima- tion on Simtk, with bootstrapped 95% confidence intervals. Pearson corr. 0.41 (±0.10) term and the numerator; with the first link added to s, the ratio in Eq. 6 becomes close to 1, and the contribution of s to f3 close to its possible maximum ws. Thereafter, the objective experiences ex- treme diminishing returns for s. Fig. 6(b) confirms that f3 starts by inserting one link into each of the around 750 pages. We conclude that with few pre-existing links, the page-centric multi-tab objective f2 might be better suited than the single-tab ob- jective f3, as it provides a more balanced trade-off between the number of links per source page and predicted clickthrough rates. (a) (b) Figure 6: Simtk results. (a) Path proportion vs. clickthrough rate (black line corresponds to gray dots kernel-smoothed on linear scales). (b) Solution concentration of budget-constrained link placement; dotted vertical line: number of distinct pages. be added by editors, and it recommends additional links that we may assume would also be clicked frequently if they were added. Table 3 illustrates our results by listing the top link suggestions. 6.2 Simtk It is important to show that our method is general, as it relies on no features specific to Wikipedia. Therefore, we conclude our evalu- ation with a brief discussion of the results obtained on the second, smaller dataset from Simtk. For evaluating our approach, we need to have a ground-truth set of new links alongside their addition dates. Unlike for Wikipe- dia, no complete revision history is available for Simtk, but we can nonetheless assemble a ground truth by exploiting a specific event in the site's history: after 6 months of log data, a sidebar with links to related pages was added to all pages. These links were deter- mined by a recommender system once and did not change for 6 months. Our task is to predict these links' clickthrough rates pst for the 6 months after, based on log data from the 6 months before. The results on the pst prediction task are summarized in Table 2; we compare path proportion to the mean baseline (cf. Sec. 6.1.1). At first glance, when considering only mean absolute error, it might seem as though the former were outperformed by the latter. But upon closer inspection, we realize that this is simply because the baseline predicts very small values throughout, which tend to be close to the ground-truth values, but cannot discriminate between good and bad candidates, as signified by the negative correlation coefficients. Path proportion, on the contrary, does reasonably well, at Pearson (Spearman) correlation coefficients of 0.41 (0.50). This correlation can be observed graphically in Fig. 6(a). Last, we analyze the solutions of our budget-constrained link placement algorithm. Our first observation is that the two multi-tab objectives f1 and f2 differ much more on Simtk than on Wikipe- dia (with Jaccard coefficients between 40% and 60%, compared to over 90%), which shows that the page-centric multi-tab objective f2 is not redundant but adds a distinct option to the repertoire. We also observe that the value of the single-tab objective f3 sat- urates after inserting around as many links as there are pages (750). The reason is that only very few links were available and clicked before the related-link sidebar was added, so the second term in the denominator of Eq. 6 is typically much smaller than the first 7. DISCUSSION AND RELATED WORK There is a rich literature on the task of link prediction and rec- ommendation, so rather than trying to be exhaustive, we refer the reader to the excellent survey by Liben-Nowell and Kleinberg [17] and to some prior methods for the specific case of Wikipedia [11, 19, 22, 32], as it is also our main evaluation dataset. The important point to make is that most prior methods base their predictions on the static structure of the network, whereas we focus on how users interact with this static structure by browsing and searching on it. Among the few link recommendation methods that take usage data into account are those by Grecu [12] and West et al. [31]. They leverage data collected through a human-computation game in which users navigate from a given start to a given target page on Wikipedia, thereby producing traces that may be used to recom- mend new 'shortcut' links from pages along the path to the target page. Although these approaches are simple and work well, they are limited by the requirement that the user's navigation target be explicitly known. Eliciting this information is practically difficult and, worse, may even be fundamentally impossible: often users do not have any target in mind, e.g., during exploratory search [18] or when browsing the Web for fun or distraction. Our approach allevi- ates this problem, as it does not rely on a known navigation target, but rather works on passively collected server logs. Further literature on human navigation includes information for- aging [4, 23, 25, 30], decentralized network search [14, 15, 29], and the analysis of click trails from search result pages [3, 9, 33]. In the present work we assume that frequent indirect paths be- tween two pages indicate that a direct link would be useful. While this is confirmed by the data (Fig. 5(a)), research has shown that users sometimes deliberately choose indirect routes [28], which may offer additional value [33]. Detecting automatically in the logs when this is the case would be an interesting research problem. Our method is universal in the sense that it uses only data logged by any commodity web server software, without requiring access to other data, such as the content of pages in the network. We demonstrate this generality by applying our method on two rather different websites without modification. While this is a strength of our approach, it would nonetheless be interesting to explore if the accuracy of our link clickthrough model could be improved by us- ing machine learning to combine our current estimators, based on path counts, search counts, and random walks, with domain-spe- cific elements such as the textual or hypertextual content of pages. Web server logs capture user needs and behavior in real time, so another clear advantage of our log-based approach is the timeliness of the results it produces. This is illustrated by Table 3, where most suggestions refer to current events, films, music, and books. Our random-walk model (Sec. 3) builds on a long tradition of Markovian web navigation models [6, 8, 27]. Among other things, Markov chains have been used to predict users' next clicks [6, 26] as well as their ultimate navigation targets [30]. Our model might be improved by using a higher-order Markov model, based on work by Chierichetti et al. [5], who found that human browsing is around 10% more predictable when considering longer contexts. 2e−042e−032e−022e−012e−042e−032e−022e−01Path proportionGround−truth clickthrough rate pst050010001500200012345Solution concentrationSize K of solution ATargets per source page in Af1f2f3 (a) Page-centric multi-tab objective f2 Source ITunes Originals – Red Hot Target Road Trippin' Through Time (b) Single-tab objective f3 Source ITunes Originals – Red Hot Target Road Trippin' Through Time * * * * Chili Peppers * Gran Hotel * * Nordend * Tithe: A Modern Faerie Tale Jacob Aaron Estes Blame It on the Night Internat. Handball Federation The Choice (novel) Payback (2014) Just Dave Van Ronk Grand Hotel (TV series) Ironside: A Modern Faery's Tale Category:Mountains of the Alps The Details (film) Blame (Calvin Harris song) 2015 World Men's Handball Champ. Benjamin Walker (actor) Royal Rumble (2015) No Dirty Names * * Chili Peppers Internat. Handball Federation Baby, It's OK! Payback (2014) * Nordend * Gran Hotel * * Edmund Ironside Jacob Aaron Estes Confed. of African Football Live Rare Remix Box 2015 World Men's Handball Champ. Olivia (singer) Royal Rumble (2015) Category:Mountains of the Alps Grand Hotel (TV series) Edward the Elder The Details (film) 2015 Africa Cup of Nations Road Trippin' Through Time Table 3: Top 10 link suggestions of Algorithm 1 using objectives f2 and f3. Clickthrough rates pst estimated via path proportion (Sec. 3). Objective f1 (not shown) yields same result as f2 but includes an additional link for source page Baby, It's OK!, demonstrating effect of diminishing returns on f2. Asterisks mark links added by editors after prediction time, independently of our predictions. A further route forward would be to extend our method to other types of networks that people navigate. For instance, citation net- works, knowledge graphs, and some online social networks could all be amenable to our approach. Finally, it would be worthwhile to explore how our methods could be extended to not only identify links inside a given website but to also links between different sites. In summary, our paper makes contributions to the rich line of work on improving the connectivity of the Web. We hope that future work will draw on our insights to increase the usability of websites as well as the Web as a whole. Acknowledgments. This research has been supported in part by NSF IIS- 1016909, IIS-1149837, IIS-1159679, CNS-1010921, NIH R01GM107340, Boeing, Facebook, Volkswagen, Yahoo, SDSI, and Wikimedia Foundation. Robert West acknowledges support by a Stanford Graduate Fellowship. 8. REFERENCES [1] L. Adamic and E. Adar. Friends and neighbors on the Web. Social Networks, 25(3):211–230, 2003. [2] E. Adar, J. Teevan, and S. T. Dumais. Large scale analysis of Web revisitation patterns. In CHI, 2008. [3] M. Bilenko and R. White. Mining the search trails of surfing crowds: Identifying relevant websites from user activity. In WWW, 2008. [4] E. H. Chi, P. Pirolli, K. Chen, and J. Pitkow. Using information scent to model user information needs and actions and the Web. In CHI, 2001. [5] F. Chierichetti, R. Kumar, P. Raghavan, and T. Sarlos. Are Web users really Markovian? In WWW, 2012. [6] B. D. Davison. Learning Web request patterns. In Web Dynamics. Springer, 2004. [7] P. Devanbu, Y.-F. Chen, E. Gansner, H. Müller, and J. Martin. Chime: Customizable hyperlink insertion and maintenance engine for software engineering environments. In ICSE, 1999. [8] D. Downey, S. Dumais, and E. Horvitz. Models of searching and browsing: Languages, studies, and application. In IJCAI, 2007. [9] D. Downey, S. Dumais, D. Liebling, and E. Horvitz. Understanding the relationship between searchers' queries and information goals. In CIKM, 2008. [10] J. Edmonds. Matroids and the greedy algorithm. Mathematical Programming, 1(1):127–136, 1971. [11] S. Fissaha Adafre and M. de Rijke. Discovering missing links in Wikipedia. In LinkKDD, 2005. [12] M. Grecu. Navigability in information networks. Master's thesis, ETH Zürich, 2014. [13] A. Halfaker, O. Keyes, D. Kluver, J. Thebault-Spieker, T. Nguyen, K. Shores, A. Uduwage, and M. Warncke-Wang. User session identification based on strong regularities in inter-activity time. In WWW, 2015. [14] D. Helic, M. Strohmaier, M. Granitzer, and R. Scherer. Models of human navigation in information networks based on decentralized search. In HT, 2013. [15] J. Kleinberg. The small-world phenomenon: An algorithmic perspective. In STOC, 2000. [16] D. Lamprecht, D. Helic, and M. Strohmaier. Quo vadis? On the effects of Wikipedia's policies on navigation. In Wiki-ICWSM, 2015. [17] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. JASIST, 58(7):1019–1031, 2007. [18] G. Marchionini. Exploratory search: From finding to understanding. Communications of the ACM, 49(4):41–46, 2006. [19] D. Milne and I. H. Witten. Learning to link with Wikipedia. In CIKM, 2008. [20] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions – I. Mathematical Programming, 14(1):265–294, 1978. [21] C. Nentwich, L. Capra, W. Emmerich, and A. Finkelstein. Xlinkit: A consistency checking and smart link generation service. TOIT, 2(2):151–185, 2002. [22] T. Noraset, C. Bhagavatula, and D. Downey. Adding high-precision links to Wikipedia. In EMNLP, 2014. [23] C. Olston and E. H. Chi. ScentTrails: Integrating browsing and searching on the Web. TCHI, 10(3):177–197, 2003. [24] A. Paranjape, R. West, and L. Zia. Project website, 2015. https://meta.wikimedia.org/wiki/Research: Improving_link_coverage (accessed Dec. 10, 2015). [25] P. Pirolli. Information foraging theory: Adaptive interaction with information. Oxford University Press, 2007. [26] R. R. Sarukkai. Link prediction and path analysis using Markov chains. Computer Networks, 33(1):377–386, 2000. [27] P. Singer, D. Helic, A. Hotho, and M. Strohmaier. HypTrails: A Bayesian approach for comparing hypotheses about human trails on the Web. In WWW, 2015. [28] J. Teevan, C. Alvarado, M. S. Ackerman, and D. R. Karger. The perfect search engine is not enough: A study of orienteering behavior in directed search. In CHI, 2004. [29] C. Trattner, D. Helic, P. Singer, and M. Strohmaier. Exploring the differences and similarities between hierarchical decentralized search and human navigation in information networks. In i-KNOW, 2012. [30] R. West and J. Leskovec. Human wayfinding in information networks. In WWW, 2012. [31] R. West, A. Paranjape, and J. Leskovec. Mining missing hyperlinks from human navigation traces: A case study of Wikipedia. In WWW, 2015. [32] R. West, D. Precup, and J. Pineau. Completing Wikipedia's hyperlink structure through dimensionality reduction. In CIKM, 2009. [33] R. White and J. Huang. Assessing the scenic route: Measuring the value of search trails in Web logs. In SIGIR, 2010. [34] E. Wulczyn and D. Taraborelli. Wikipedia Clickstream. Website, 2015. http://dx.doi.org/10.6084/m9.figshare.1305770 (accessed July 16, 2015). [35] E. Zachte. Wikipedia statistics. Website, 2015. https://stats.wikimedia.org/EN/TablesWikipediaZZ.htm (accessed July 16, 2015).
1711.11499
1
1711
2017-11-30T16:35:43
Google matrix of Bitcoin network
[ "cs.SI", "physics.soc-ph" ]
We construct and study the Google matrix of Bitcoin transactions during the time period from the very beginning in 2009 till April 2013. The Bitcoin network has up to a few millions of bitcoin users and we present its main characteristics including the PageRank and CheiRank probability distributions, the spectrum of eigenvalues of Google matrix and related eigenvectors. We find that the spectrum has an unusual circle-type structure which we attribute to existing hidden communities of nodes linked between their members. We show that the Gini coefficient of the transactions for the whole period is close to unity showing that the main part of wealth of the network is captured by a small fraction of users.
cs.SI
cs
EPJ manuscript No. (will be inserted by the editor) Google matrix of Bitcoin network Leonardo Ermann1, Klaus M. Frahm2 and Dima L. Shepelyansky2 1 Departamento de Física Teórica, GIyA, Comisión Nacional de Energía Atómica, Buenos Aires, Argentina 2 Laboratoire de Physique Théorique du CNRS, IRSAMC, Université de Toulouse, CNRS, UPS, 31062 Toulouse, France December 1, 2017 Abstract. We construct and study the Google matrix of Bitcoin transactions during the time period from the very beginning in 2009 till April 2013. The Bitcoin network has up to a few millions of bitcoin users and we present its main characteristics including the PageRank and CheiRank probability distributions, the spectrum of eigenvalues of Google matrix and related eigenvectors. We find that the spectrum has an unusual circle-type structure which we attribute to existing hidden communities of nodes linked between their members. We show that the Gini coefficient of the transactions for the whole period is close to unity showing that the main part of wealth of the network is captured by a small fraction of users. PACS. 89.75.Fb Structures and organization in complex systems – 89.75.Hc Networks and genealogical trees – 89.20.Hh World Wide Web, Internet 1 Introduction The bitcoin crypto currency was introduced by Satoshi Nakamoto in 2009 [1] and became at present an impor- tant source of direct financial exchange between private users [2]. At present this new cryptographic manner of fi- nancial exchange attracts a significant interest of society, computer scientists, economists and politicians (see e.g. [3,4,5,6,7]). The amazing feature of bitcoin transactions is that all of them are open to public at [8] that is drasti- cally different from usual bank transactions deeply hidden from the public eye. Since the data of bitcoin transaction network are open to public it is rather interesting to analyze the statistical properties of this Bitcoin network (BCN). Among the first studies of BTN we quote [9] and [10,11] where the statis- tical properties of BCN have been studied including the distribution of ingoing and outgoing transactions (links). Thus it was shown that a distribution of links is character- ized by a power law [10,11] which is typical for complex scale-free networks [12]. Due to this it is clear that the methods of complex networks, such as the World Wide Web (WWW) and Wikipedia, should find useful applica- tions for the BCN analysis. In particular, one can men- tion in this context the important PageRank algorithm [13] which is at the foundation of the Google search en- gine [14]. Applications of this and related algorithms to various directed networks and related Google matrix are discussed in [15]. Previous studies of the world trade net- work [16,17] showed that for financial transactions or re- lated trade of commodities it is useful to consider also the CheiRank probabilities for a network with inverted links [18] and we will use this approach also here. In addition we analyze the spectrum of the Google matrix of BCN using the powerful numerical approach of the Arnoldi algorithm as described in [19,20,21]. We note that a possibility to use the PageRank probabilities for BCN was briefly noted in [22]. In our studies we use the bitcoin transaction data col- lected by Ivan Brugere from the public block chain site [8] with all bitcoin transactions from the bitcoin birth in January 11th 2009 till April 2013 [23]. The paper is composed as follows: In Section 2 we describe the main properties of BCN, the Google ma- trix is constructed in Section 3, the numerical methods of its analysis are described in Section 4, the spectrum and eigenvectors of G matrix are analyzed in Sections 5 and 6, the Gini coefficient of BCN is determined in Section 7 and the discussion is given in Section 8. 2 Global BCN properties From the bitcoin transaction data [23] of the period from the very beginning in January 11th 2009 to April 10th 2013, we construct the BCN and related Google matrix. This weighted and directed network takes into account the sum of all transactions, measured in units of bitcoin, from one user to another during a given period of time. The total number of transactions in this period is Nt = 28.140.756. The minimum transaction value is 10−8 (was 10−3) bitcoin for the period after (before) march 2010. The global statistical characteristics of transactions are shown in Figs. 1, 2, 3. Thus Fig.1 shows the fre- quency histogram Nf (Na), Nf (Nb) of BCN in this pe- riod, given the dependencies for outgoing links (or sell- 7 1 0 2 v o N 0 3 ] I S . s c [ 1 v 9 9 4 1 1 . 1 1 7 1 : v i X r a 2 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network Fig. 1. (color online) Frequency histograms of BCN Nf in the period from January 11th 2009 to April 10th 2013. Left panel shows the frequency distribution Nf of number of sellers (and buyers) transactions Na (and Nb). Right panel shows the frequency of transactions with the same given partners Na,b. ers Na), ingoing links (or buyers Nb), and transactions of the same partners from a to b (Na,b). The fit of the data is in a satisfactory agreement with an algebraic de- cay Nf ∝ 1/Na β with β = 2.1 ± 0.1, β = 1.8 ± 0.1, β = 2.2 ± 0.1 respectively. β, Nf ∝ 1/Na.b β, Nf ∝ 1/Nb Top panel of Fig.2 shows the histogram of bitcoin trans- action volume vm for the whole period (2009-2013) mea- sured in bitcoin. It is visible that it has peaks in values of 10−8, 10−4 and 1. At the same time there are also transac- tions with many bitcoins and vm as large as 834352.9. The balance of each user Bu can be defined as the sum of all ingoing transactions minus the outgoing ones measured in bitcoins. This balance Bu is shown in the bottom panel of Fig.2. For a majority of users the balance is close to zero but in a few cases Bu is strongly negative or positive. There are also visible peaks at values Bu = 30, 25, 20, 10. In order to study BCN time evolution we divide the whole period of time in year quarters from 2009 to 2013 (we take only half of years in 2009 since the number of transactions is very small). Some characteristic numbers of BCN are shown in Fig.3. There is a significant growth with time for the number of transactions Nt, and the integrated number of transactions Nit (from the beginning till given quarter) and the number of nodes N (partners) for the same period of time. At the next step we describe the construction of the Google matrix from the bitcoin transactions described above. 3 Construction of Google matrix of BCN In this work we use the notation "BCYearQuarter" (e.g. BC2010Q2) for the different bitcoin networks, eventually with an additional "*" for the CheiRank case (e.g. BC2010Q2*). We consider 16 (or 32 including the CheiRank cases) networks BC2009Q2, BC2009Q4 to BC2013Q2 with network sizes N and link numbers N(cid:96) ranging from N = 142 and N(cid:96) = 117 (BC2009Q2) to N = 6297009 and N(cid:96) = 16056427 (BC2013Q2) with typical Fig. 2. (color online) Frequency histogram Nf of bitcoin trans- action volume vm measured in bitcoins on top panel (histogram is equidistant in log10 vm with a distance of 0.2). Bottom panel shows the frequency histogram Nf of user balance Bu defined as the difference between ingoing and outgoing transactions in bitcoin units. Left and right insets show zoom in vicinity of zero balance for negative (left) and positive (right) values. ratios N/N(cid:96) between 1 for the smallest networks and 2.5− 3 for the largest networks. For the whole period of all quarters we have the total G matrix size N = 6297539 with N(cid:96) = 16056427 links. The values of N, N(cid:96) and total volume for all quarters are given in Table 1. As usual we write the matrix associated to such a net- work as [15,21]: S = S0 + 1 N e dT (1) where eT = (1, . . . , N ) is the (transpose of the) uniform vector with unit entries, d is the dangling vector with unit entries dl = 1 if l corresponds to an empty column of S0 and dl = 0 for the other columns. The elements (S0)lk of the matrix S0 correspond to the value of the bitcoin trans- action from a node k to another node l normalized by the total value of transactions from the node k to all nodes. A similar construction of S0 is used for the world trade network [16]. For the CheiRank case [18] the direction of the transaction is inverted in this scheme, i.e. (S∗ 0 )lk cor- responds to the value of the bitcoin transaction from the node l to k normalized by the total value of transactions from all nodes to the node k. According to our raw data the bitcoin transactions up to 2010Q2 were done in units of 10−3 bitcoins and afterwards in units of 10−8 bitcoins. Therefore the raw transaction values and also the resulting Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 3 Fig. 3. (color online) Characteristic evolution of BCN with year quarters (halves in 2009) from 2009 to April 2013. Time evolution is shown for number of transactions Nt in a given quarter (black circles); number links Nit of integrated trans- actions from the beginning till given quarter (red squares); number of nodes given by partners N (green diamonds); and total volume of bitcoins (blue triangles). Network N N(cid:96) BC2009Q2 BC2009Q4 BC2010Q1 BC2010Q2 BC2010Q3 BC2010Q4 BC2011Q1 BC2011Q2 BC2011Q3 BC2011Q4 BC2012Q1 BC2012Q2 BC2012Q3 BC2012Q4 BC2013Q1 BC2013Q2 142 220 645 7706 37818 70987 204398 697401 1547349 1885400 2186598 2645532 3742691 4672122 5998239 6297009 117 188 632 11275 57437 111015 333268 1328505 2857232 3635927 4395611 5655802 8381654 11258315 15205087 16056427 total volume (in bitcoins) 51499 269526 681867 2.33662 × 106 9.0931 × 106 1.86444 × 107 3.44654 × 107 1.30747 × 108 2.0177 × 108 2.87714 × 108 3.2546 × 108 5.04581 × 108 1.02381 × 109 1.17078 × 109 1.29944 × 109 1.31479 × 109 Table 1. Size (N), number of links (N(cid:96)) and total volume of used networks. (column sum normalized) entries of the matrix S0 are ra- tional numbers. For computations using normal precision numbers (i.e. standard double precision with a mantissa of 52 bits) these rational numbers can simply be replaced by the closest floating point number. However, for high precision computations using the library GMP [24], the precise rational values were kept as long as possible and, only when necessary, rounded to high precision floating point values with their maximal precision. For the purpose of PageRank computations we also consider the Google matrix with damping factor α given by: G = αS + (1 − α) 1 N e eT (2) Fig. 4. (color online) PageRank and CheiRank distributions ordered by indices K and K∗ on top and bottom panel re- spectively. The bitcoin networks are taken by quarters of years (halves in the case of 2009) for 2009 (yellow), 2010 (red), 2011 (black), 2012 (blue) and 2013 (orange) with lines correspond- ing to Q1 (solid line), Q2 (dotted line), Q3 (dashed line) and Q4 (dot-dashed line). where we use α = 0.85 corresponding to its typical choice [13,14,15]. For the network with inverted direction of trans- actions, corresponding to the CheiRank case, we have G∗ = αS∗ + (1 − α) 1 N e eT . equation (cid:80) P (j) ((cid:80) The right eigenvectors ψm of G are determined by the j(cid:48) Gjj(cid:48)ψi(j(cid:48)) = λiψi(j) with eigenvalues λi. At α < 1 the largest eigenvalue is λ = 1 and the corre- sponding eigenvector has only positive component which have (for WWW networks) the meaning of probabilities j P (j) = 1) to find a random surfer on a node j [14]. We can order all nodes in the order of monotonic decrease of probability P (K) with maximal probability at the PageRank index K = 1 and then at K = 2, 3.... In a similar way for the CheiRank case of G∗ we obtain the CheiRank vector at λ = 1 with CheiRank probability P ∗(K∗) being maximal at the CheiRank index K∗ = 1 and then at K∗ = 2, 3.... The PageRank vector is effi- ciently determined by the power iteration algorithm [13, 14]. The dependencies of the PageRank P (K) and CheiRank P ∗(K∗) probabilities on their indices K, K∗ are shown in Fig. 4 for various quarters of BCN. We see that the distri- butions become stabilized at last quarters when the net- work size becomes larger reaching its steady-state regime. Thus for BC2013Q1 we find that the probability approx- imately decays in a power law with P ∝ 1/K ν, P ∗ ∝ 1/K∗ν with ν = 0.86 ± 0.06, ν = 0.73 ± 0.04 respectively (the fit is done for the range 10 < K, K∗ < 105). The value of ν is similar to the values found for other directed net- 4 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network works (see e.g. [15,16,17]) but we note that this is only an approximate description of the numerically found behav- ior (see detailed discussion of algebraic decay for WWW networks in [28]). 4 Numerical methods for BCN Google matrix diagonalization We describe here the various skillful numerical methods used for diagonalization of G and G∗. Their use had been required due to heavy numerical problems for accurate computation of the eigenvalues of these matrices and re- lated eigenvectors. First we introduce the concept of invariant isolated subsets (for more details we refer to [25]). These subsets are invariant with respect to applications of S. The re- maining nodes not belonging to an invariant subset (be- low a certain maximum size, e.g. 10% of the network size) form the wholly connected core space. The practical com- putation of these subsets can be efficiently implemented in a computer program [25], eventually merging subspaces with common members, which provides a sequence of dis- joint subspaces invariant by applications of S. Therefore we obtain a subdivision of the network nodes in Nc core space nodes and Ns subspace nodes (belonging to at least one of the invariant subsets) corresponding to the block triangular structure of the matrix S: (cid:18) Sss Ssc (cid:19) S = 0 Scc . (3) Here Sss is composed of many small diagonal blocks for each invariant subspace and whose eigenvalues can be ef- ficiently obtained by direct ("exact") numerical diagonal- ization. We have computed for the networks up to BC2011Q4 (with N = 1884918 and N(cid:96) = 3635927) (a part of) the complex eigenvalue spectrum of the matrix S (i.e. G(α) for α = 1) with eigenvalues closest to the unit circle. For this we employed basically the method of Refs. [25,26] based on (3) to compute exactly the eigenvalues associ- ated to the invariant subsets, typically a very modest num- ber. For each invariant subspace there is at least one unit eigenvalue λ = 1 which is therefore possibly degenerate (in case of several invariant subspaces). The remaining eigen- values associated to the main core space (with λ < 1) are obtained by the Arnoldi method [27,19] with Arnoldi dimensions up to nA = 16000. This requires for the net- work BC2011Q4 a machine with 256 GB (using standard double precision numbers). For the larger networks (BC2012Q1 and later) it would be necessary to increase the available memory or to reduce the value of nA. However, it turns out that the density of eigenvalues close to the unit circle is so high that a significant reduction of nA does not allow to obtain (even a small number) of reliable core space eigenvalues. This situation is quite different from other networks such as certain university networks [25] or Wikipedia [26] where it was easier to access numerically a reasonable number of the top core space spectrum of the matrix S. Furthermore for the cases up to BC2011Q4 we also computed at least 20 eigenvectors of 20 selected (core space) eigenvalues close to the unit circle such that roughly λj ≈ λj exp(i2πj/19) for j = 0, . . . , 19 and λj ≈ 1. BC2009Q4 and BC2010Q1 with N ≤ 645 the core space eigenvalue spectrum is actually easily accessible by direct diagonalization or full Arnoldi diagonalization (with some subtle effects for the small eigenvalues requiring high pre- cision computations). For the smallest bitcoin networks BC2009Q2, The four networks BC2010Q2 and BC2010Q2* (BC2010Q3 and BC2010Q3*) play a somewhat special role in our studies since on one hand they are sufficiently small with N = 7706 (or N = 37818) to allow (at least in theory) to compute all (or nearly all) non-zero eigenvalues and on the other hand they are still sufficiently large to have an interesting spectrum, comparable to the spectra of the larger networks, especially with a strong concentra- tion of the majority of (non-vanishing) eigenvalues close to the unit circle. However, it turns out that the two cases of BC2010Q2 and BC2010Q2* suffer from a serious numerical problem similar to the citation network of Physical Review [21]. Using both direct diagonalization (i.e. using Householder transformations to transform the initial matrix to Hessen- berg form and final diagonalization of the latter by the QR algorithm with implicit double shift) and full Arnoldi di- agonalization (choosing a sufficiently large value of nA and QR algorithm to diagonalize the Arnoldi matrix which is also of Hessenberg form) with normal precision floating point numbers we find that there are several "rings" of eigenvalues close to the unit circle. The outer two rings seem to contain reliable and correct eigenvalues but al- ready the third ring with λ ≈ 0.94 and all rings be- low are numerically completely unreliable since the corre- sponding eigenvalues change completely between the two methods and also different implementations of them (i.e. applying a permutation in the network nodes but keeping the same network structure, choosing different ordering in the summation when computing the scalar products for the Arnoldi method, using slightly different but mathe- matical equivalent implementations of the QR algorithm, using different runs with parallelization which amounts to different rounding errors for the sums in the scalar prod- ucts etc.). Therefore we conclude that eigenvalues with λ < 0.95 are numerically incorrect as long as we use methods based on normal precision numbers. This situation is quite similar to the (nearly) triangu- lar citation network of Physical review [21] where eigen- values with λ < 0.4 − 0.5 are numerically wrong. The reason of this behavior is due to large Jordan blocks for the highly degenerate zero eigenvalue producing numeri- cally artificial rings of incorrect eigenvalues in the complex plane with radius r ∼ ε1/d [20,21] with ε being the ma- chine precision (i.e. ε = 10−16 for simple double precision numbers or ε = 2−p for high precision numbers with p bi- nary digits) and d (cid:29) 1 being the dimension of the Jordan block. The bitcoin networks do not have the (near) trian- Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 5 gular structure, responsible for this problem in [21], but the low ratio of N(cid:96)/N ≈ 1.5, reducing considerably the number of non-zero matrix elements in S0, also creates large Jordan subspaces and here the effect is even worse as compared to Ref. [21]. To solve this problem and obtain final reliable eigen- values with precision 10−15, we implemented all steps of the numerical diagonalization methods: the computation of the Arnoldi decomposition, reduction of an arbitrary matrix to Hessenberg form using Householder transforma- tions, final diagonalization of Hessenberg matrices by the QR algorithm, with high precision floating point numbers using the GMP library [24]. (In Ref. [21] only the com- putation of the Arnoldi decomposition was implemented with the GMP library.). For the two networks BC2010Q2 and BC2010Q2* we have been able to push the direct high precision diagonal- ization (Householder transformation to Hessenberg form and QR algorithm) with different precision up to p = 4096 binary digits confirming the scaling r ≈ 2−p/d for the radius of incorrect eigenvalues induced by large Jordan blocks. For p = 4096 we find a maximal radius r ≈ 0.01 corresponding to a value of d ≈ 616 for the dimension of the corresponding Jordan block. In normal precision (with p = 52) the same value of d corresponds to a radius ≈ 0.94 confirming exactly the observations of the initial normal precision results. The direct diagonalization in high precision is however quite expensive in both computation time and memory requirement. In this context the (high precision) Arnoldi method is more efficient since it automatically breaks off when it has explored an S-invariant subspace which is detected by a vanishing or very small coupling matrix el- ement in the Arnoldi matrix at some value of nA (see Refs. [19,21] for more details on this point). If we assume that the initial vector (which we chose either uniform or random with two different realizations) contains contri- butions from all eigenvectors associated to non-vanishing core space eigenvalues the method will, at least in theory, produce the complete spectrum of these eigenvalues us- ing a considerably reduced subspace for the final (QR-) diagonalization. Here we have chosen a break off limit of  = 2−p/2 (with p being the precision number of binary digits) for the final coupling matrix element which scales to zero with increasing precision but is still much larger than the computation precision (2−p) allowing to take into account the subtle effects due to the Jordan blocks cre- ating numerical errors on a scale much larger than the computation precision. In this case we obtain a reduced dimension of about 2000-3000 (depending on the choice of random or uniform initial vectors and on both cases of BC2010Q2 or BC2010Q2*) instead of 7706. Here the Arnoldi method with a precision of p = 8192 binary digits (which is considerably less expensive than the direct diag- onalization with p = 4096) or even only p = 3072 (for the case of BC2010Q2* with uniform initial vector) allows to obtain the complete spectra of non-vanishing eigenvalues for these two networks. The remaining small rings of nu- merical incorrect Jordan block induced eigenvalues can be easily removed from the correct eigenvalues by comparing the spectra obtained by different initial vectors. We also employed (with some suitable technical mod- ifications which we omit here) the rational interpolation method which we developed in Ref. [21]. This method is also based on high precision computations to determine the zeros of a certain rational function which are the core space eigenvalues satisfying the condition dT ψ (cid:54)= 0 for the corresponding eigenvector ψ and the above introduced dangling vector d. It turns out that for the two networks BC2010Q2 and BC2010Q2* all non-vanishing core space eigenvalues satisfy this condition but for the other two net- works BC2010Q3 and BC2010Q3* there a few core space eigenvalues with dT ψ = 0 which we determined separately by a method described in Ref. [21] exploiting that they are degenerate subspace eigenvalues of the matrix S0 (which are different from the subspace eigenvalues of S which we also computed). The rational interpolation method is highly effective with very modest memory requirements and the possi- bility to use partial low-precision spectra to accelerate the computation of the zeros to obtain recursively higher precision spectra. Here we obtained for BC2010Q2 and BC2010Q2* precise and complete spectra for p = 6144 but we also performed confirmation runs up to p = 12288. The results of this method confirm exactly the numerical values (with accuracy of 10−15 for all of the final eigenval- ues) and the precise number of non-vanishing core space eigenvalues already obtained by the high precision Arnoldi method. We mention that the eigenvalues of the direct di- agonalization correspond numerically with the same accu- racy to these results (after removal of the numerically in- correct Jordan induced eigenvalues) but for p = 4096 this method misses a small number (about 3−4) of the smallest non-vanishing core space eigenvalues (with λ ∼ 5×10−3). 5 Spectrum of BCN Google matrix We present here the main results obtained for the spec- trum and some eigenvectors of G and G∗ by the numerical methods described above. For the two networks BC2010Q2 and BC2010Q2*, with a full network size of N = 7706, we find that there are ex- actly Nc = 1967 (Nc = 1984) non-vanishing core space eigenvalues and Ns = 15 (Ns = 2) non-vanishing sub- space eigenvalues (of S) for BC2010Q2 (or BC2010Q2*) with the complete and numerically accurate spectra shown in Fig. 5. The main two outer rings close to the unit circle (with λ > 0.97) contain 1626 (1621) core space eigen- values which is more than 80% of the spectrum (of non- vanishing eigenvalues). The non-vanishing subspace eigen- values λ, also shown in the same figure, and their multi- plicities m are m = 7 (λ = 1), m = 6 (λ = −1), m = 1 (λ = −0.723606797749979 and λ = −0.276393202250021) for BC2010Q2 and m = 1 (λ = ±1) for BC2010Q2*. All other eigenvalues (about ∼ 5700) are zero and correspond to Jordan subspaces with potentially rather large dimen- sions being responsible for the numerical problems when 6 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network limiting the computations to normal floating point preci- sion. close to the boundary circle. However, the rational inter- polation method still works very well due to its high effi- ciency. It turns that at a binary precision of p = 30720 using about 18400 support points (for the rational in- terpolation scheme) this method produces Nc = 9192 (Nc = 9145) non-vanishing core space eigenvalues (includ- ing 4 pairs of doubly degenerate eigenvalues in both cases). However, without going into technical details, our results indicate that these numbers may still increase very slightly when increasing the precision and also the number of sup- port points but we are confident that for both networks BC2010Q3 and BC2010Q3* there are about Nc ≈ 9200 non-vanishing core space eigenvalues which is about 25% of the full network size (a similar ratio we already found for BC2010Q2 and BC2010Q2*). The additional 1300-1400 eigenvalues with respect to the spectra obtained by the normal precision Arnoldi method fill out rather uniformly the inner part of the complex unit circle as can be seen in Fig. 6. Fig. 5. (Color online) Complex eigenvalue spectrum of the Google matrix associated to the network BC2010Q2 (BC2010Q2*) in left (right) panels. Shown are the full spec- trum in top panels or a zoomed representation for the re- gion λ ≈ 1 in bottom panels. The red dots (crosses) are core space eigenvalues obtained by high precision Arnoldi computa- tions and also the rational interpolation method and the blue thick dots (square boxes) are invariant subspace eigenvalues obtained by the normal/high precision Arnoldi method or di- rect diagonalization. The green line (if visible and not hidden by the red dots) is the unit circle. In top panels the apparent "red circle" corresponds in reality to a high density of indi- vidual red dots for the complex core space eigenvalues whose structure is better visible in the zoomed representation in bot- tom panels. The top core space eigenvalues (red crosses) which are very close to the top sub space eigenvalue at λ = 1 (blue square box) are 0.99990029706715 and 0.999678494064214 (or 0.999998157039589) for BC2010Q2 (BC2010Q2*). The 3rd top core space eigenvalue 0.995663863983884 for BC2010Q2 is al- ready clearly outside the blue square box. More details for the computation method and the subspace eigenvalues are given in the main text. For the two networks BC2010Q3 and BC2010Q3*, with a full network size of N = 37818, the numerical prob- lems due to Jordan blocks for the zero eigenvalue are less severe but still present. Here the normal precision Arnoldi method allows to compute about 7800-7900 re- liable eigenvalues within an error of 10−6 and which are rather strongly localized close to the boundary circle (if one tries larger values of nA one obtains only numeri- cal incorrect eigenvalues). Here the high precision Arnoldi method is strongly limited due to memory requirements and it is not possible to go beyond a precision of p = 512 which produces about 500-700 additional reliable eigenval- ues and the resulting spectra are still quite concentrated √ Furthermore for BC2010Q3 (BC2010Q3*) there also Ns = 56 (Ns = 2) subspace eigenvalues for S (blue dots/squares in Fig. 6). Here some eigenvalues are on the unit circle with λ = 1 and degeneracy m = 23 (m = 1) for λ = 1, m = 17 (m = 1) for λ = −1 and m = 2 (m = 0) for λ = (−1 ± i 3)/2. In both cases there also a few core space eigenvalues (given as degenerate subspace eigenval- ues of S0, green dots) which were determined by another method [21] since they are not necessarily found by the rational interpolation method. About 8000 reliable eigen- values are found by the normal precision Arnoldi method correspond to the 4-5 rings of eigenvalues close to the unit circle and visible in the center panels of Fig. 6. We mention that the high precision variants of the three methods are also useful to compute the full spec- tra for the three smaller networks (up to BC2010Q1 with N = 645) and also for the invariant subspace spectra (for nearly all bitcoin networks) since they allow to remove in a reliable way a certain number of numerical incorrect eigenvalues below 10−3 obtained by the normal precision computations. For these cases the computation times are negligible and the required precision is rather modest (typ- ically between p = 256 and p = 1024). Here the number of non-vanishing core space eigenvalues Nc and subspace eigenvalues Ns are given by Nc = 4 (6) and Ns = 2 (0) for BC2009Q2 (or BC2009Q2*) with N = 142, Nc = 13 (15) and Ns = 4 (2) for BC2009Q4 (or BC2009Q4*) with N = 220 and Nc = 26 (30) and Ns = 6 (2) for BC2010Q1 (or BC2010Q1*) with N = 645. The subspace eigenvalues are always ±1 (except for BC2009Q2* where Ns = 0 and there are no subspace eigenvalues) eventually with dou- ble (or triple) degeneracy if Ns = 4 (or Ns = 6). Clearly in all these cases the number of the non-vanishing core space and subspace eigenvalues constitutes only a small fraction of the spectrum with all other eigenvalues being zero corresponding to certain Jordan subspaces. For the larger networks (between BC2010Q4 with N = 70987 and BC2011Q4 with N = 1884918) we applied the normal precision Arnoldi method with nA = 16000. However, in view of the numerical problems visible for -1-0.500.51-1-0.500.51λBC2010Q2-1-0.500.51-1-0.500.51λBC2010Q2*-0.100.10.950.9751λBC2010Q2-0.100.10.950.9751λBC2010Q2* Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 7 Fig. 7. (Color online) Complex eigenvalue spectrum of the Google matrix associated to the network BC2011Q4 (BC2011Q4*) in left (right) panels. Shown are about 12000 "reliable" top eigenvalues obtained by the Arnoldi method in normal precision with nA = 16000 in top panels (red dots/red circle) or a zoomed representation (red crosses) for the region λ ≈ 1 in bottom panels. The blue thick dots (square boxes) are invariant subspace eigenvalues obtained by the normal/high precision Arnoldi method or direct diagonalization. The green line (if visible and not hidden by the red dots) is the unit circle. In top panels the apparent "red circle" corresponds in reality to a high density of individual red dots for the complex core space eigenvalues whose structure is better visible in the zoomed rep- resentation. There are 8 (is 1) top core space eigenvalue(s) (red cross(es)) very close to the top sub space eigenvalue at λ = 1 i.e. nearly or completely inside the blue square box and the 1st top core space eigenvalue is 0.99999999417 (0.99999996048) for BC2011Q4 (BC2011Q4*). √ ues with Ns = 332 (2) for BC2011Q4 (BC2011Q4*). The subspace spectrum of BC2011Q4 contains 242 eigenvalues on the unit circle with λ = 1 which are λ = 1 (degeneracy m = 127), λ = ±i (both with m = 1), λ = (−1 ± i 3)/2 (both with m = 3) and λ = −1 (m = 107). The remaining 90 subspace eigenvalues with 0 < λ < 1 are also visible in Fig. 7. Here only one eigenvalue at λ = −1/2 has a double degeneracy. The subspace spectrum of BC2011Q4* con- tains only the two (non-vanishing) eigenvalues λ = ±1 (both with m = 1). The convergence with the increase of the Arnoldi di- mension nA is illustrated in the top panels of Fig. 8 for BC2011Q4 showing the dependence j(γj) where γj = −2 lnλj with λj being the core space eigenvalue. For S and S∗ the comparison between the two maximal val- ues nA = 16000 and nA = 12000 indicates that about j ≈ 5000 − 6000 eigenvalues up to γ ≈ 0.01 are reliable. However, we remind that the comparison of different com- putations for nA = 16000 shows that the number of reli- able eigenvalues is actually higher ≈ 12000 corresponding Fig. 6. (Color online) Complex eigenvalue spectrum of the Google matrix associated to the network BC2010Q3 (BC2010Q3*) in left (right) panels. Shown are the full spectra in top panels and two zoomed representations for the region λ ≈ 1 in center and bottom panels. The red dots (crosses) are core space eigenvalues obtained by the rational interpo- lation method in high precision, the blue thick dots (square boxes) are invariant subspace eigenvalues obtained by the nor- mal/high precision Arnoldi method or direct diagonalization and the thick green dots in top panels correspond to degenerate subspace eigenvalues of S0 which are also core space eigenval- ues of S and not necessarily found by the rational interpolation method (see Ref. [21] for explanations). There are 2 (is 1) top core space eigenvalue(s) (red cross(es)) very close to the top sub space eigenvalue at λ = 1 i.e. nearly or completely inside the blue square box (in bottom panels) and the 1st top core space eigenvalue is 0.999968720409915 (0.99999983940032) for BC2010Q3 (BC2010Q3*). BC2010Q2/3, we performed different runs with slightly different implementations (e.g. different summation or- der for the scalar product in the Arnoldi method) lead- ing to different rounding errors and verified how many eigenvalues were numerically identical with an error be- low 10−6. For the two cases BC2011Q4 and BC2011Q4* with N = 1884918 and nA = 16000 we obtain about 12000 numerically reliable core space eigenvalues shown in Fig. 7 and which are all very close to the unit circle with λ > 0.99. Fig. 7 also shows the subspace eigenval- -1-0.5 0 0.5 1-1-0.5 0 0.5 1λBC2010Q3-1-0.5 0 0.5 1-1-0.5 0 0.5 1λBC2010Q3*-0.1 0 0.1 0.95 0.975 1λBC2010Q3-0.1 0 0.1 0.95 0.975 1λBC2010Q3*-0.02 0 0.02 0.99 0.995 1λBC2010Q3-0.02 0 0.02 0.99 0.995 1λBC2010Q3*-1-0.500.51-1-0.500.51λBC2011Q4-1-0.500.51-1-0.500.51λBC2011Q4*-0.0200.020.990.9951λBC2011Q4-0.0200.020.990.9951λBC2011Q4* 8 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network Fig. 8. (Color online) Level number j versus the decay width γj = −2 ln(λj) with λj being the j-th core space eigen- value computed by the normal precision Arnoldi method with uniform initial vector and Arnoldi dimension nA. The top left (right) panel corresponds to the network BC2011Q4 (or BC2011Q4*) for different values of nA with 2000 ≤ nA ≤ 16000. The bottom left (right) panel corresponds to the four networks BC2011Qk, (or BC2011Qk*) for k = 1, 2, 3, 4 and nA = 16000. to γ ≈ 0.015. The circle structure well visible in Fig. 7 is responsible for appearance of large steps in the depen- dence j(γ) well seen in Fig. 8. A similar dependence γj is also present for other quarters BC2011Q1, BC2011Q2, BC2011Q3 shown in bottom panels of Fig. 8. 6 Eigenstates of BCN Google matrix The decay of PageRank and CheiRank probabilities at dif- ferent quarters is presented in Fig. 4. Here we describe the properties of several eigenstates. As soon as the eigenval- ues are determined the eigenstates corresponding to the selected eigenvalues can be efficiently computed numeri- cally as described in [15,19,26]. The results for 6 eigenvectors of BC2010Q2 are shown in Fig. 9 and for BC2011Q4 in Fig. 10. The selected eigen- vectors ψ0, ψ1, ψ6, ψ10, ψ19 (additional to PageRank and CheiRank vectors) are marked by an index j correspond- ing to 20 core eigenvalues closest to the unit circle with uniformly distributed eigenphases between 0 and π. In the top panels of Fig. 9 we order all amplitudes ψj in mono- tonically descending order with their own local-Rank in- dex Kj with maximum at Kj = 1 (Kj is different from PageRank index K). The interesting feature ofs these eigen- states is the presence of large plateaus where for hundreds of nodes the amplitude ψj remains practically indepen- dent of Kj. This indicates a presence of relatively large communities of users coupled by certain links. The bot- tom panels of Fig. 9 show the amplitudes ψj as a func- tion of the global PageRank index K. For the BC2010Q2 network the nodes with largest amplitudes ψj are located at relatively large K values with K < 100. It is possible Fig. 9. (Color online) Top panels: PageRank P (or CheiRank P ∗) at damping factor α = 0.85 and modulus ψj of 5 selected eigenvectors of S for the network BC2010Q2 (or BC2010Q2*) versus the index K for PageRank P (K∗ for CheiRank P ∗) or the individual ordering index Kj for each eigenvector ψj. Bottom panels: The same as top panels but only using the PageRank (CheiRank) index K (K∗) on the x-axis for all shown vectors. Note that the given vector index values 0, 1, 6, 10, 19 do not correspond to the level number of Fig. 8 but they correspond to an index of a selected set of 20 core space eigenvalues closest to the unit circle and with uniformly distributed eigenphases between 0 and π, i.e. the selected eigenvalues are roughly λj ≈ λj exp(−i2πj/19) for j = 0, . . . , 19 and with λj ≈ 1. In particular: λ0 = 0.99990030 (0.99999816), λ1 = 0.99967849 (0.99612525 + i0.00704040), λ6 = 0.63708435 + i0.75027164 (0.63887779 + i0.75813987), λ10 = 0.00130422 + i0.98315766 (−0.00043259 + i0.99066741), and λ19 = −0.99053491 (−0.99014386) for BC2010Q2 (or BC2010Q2*). that these nodes correspond to bitcoin miners. However, a significant number of nodes with relatively large am- plitudes are located at very high values K ∼ 2000. For the Google matrix G∗ all large amplitudes are located at large values of the CheiRank index K∗ > 500. For the larger BC2011Q4 network, shown in Fig. 10 we find the presence of similar plateau structure for eigenstate ampli- tudes. Similarly to Wikipedia and other networks [15] it is convenient to present the distribution of network nodes on the CheiRank-PageRank plane (K, K∗) shown in Fig. 11 for the cases of BC2010Q2 of Fig. 9 and BC2011Q4 of Fig. 10. We see that for BC2010Q2 the density distribu- tion of N nodes on (K, K∗)-plane is still strongly fluctuat- ing, but for BC2011Q4 it starts to stabilize and becomes close to the density of our largest network of BC2013Q2 shown in Fig. 12. The important feature of the stabilized density distributions of BC2011Q4 and BC2013Q2 is the fact that the maximum of distribution is located at the diagonal K = K∗. This is similar to the situation of the world trade network [16,17] where each country (node) or user for BCN tries to keep trade balance between outgoing (export) and ingoing (import) flows. 040008000120001600000.010.02jγj = -2ln(λj)BC2011Q4nA=2000nA=4000nA=6000nA=8000nA=12000nA=16000040008000120001600000.010.02jγj = -2ln(λj)BC2011Q4*nA=2000nA=4000nA=6000nA=8000nA=12000nA=16000040008000120001600000.010.02jγj = -2ln(λj)nA=16000BC2011Q1BC2011Q2BC2011Q3BC2011Q4040008000120001600000.010.02jγj = -2ln(λj)nA=16000BC2011Q1*BC2011Q2*BC2011Q3*BC2011Q4*10-1510-1010-5100100101102103104P,ψj K, KjBC2010Q2Pψ0ψ1ψ6ψ10ψ1910-1510-1010-5100100101102103104P,ψj KBC2010Q210-1010-5100100101102103104P*,ψj K*, KjBC2010Q2*P*ψ0ψ1ψ6ψ10ψ1910-1010-5100100101102103104P*,ψj K*BC2010Q2* Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 9 Fig. 10. (Color online) PageRank P (or CheiRank P ∗) at damping factor α = 0.85 and modulus ψj of 5 se- lected eigenvectors of S for the network BC2011Q4 (or BC2011Q4*) versus the index K for PageRank P (K∗ for CheiRank P ∗) or the individual ordering index Kj for each eigenvector ψj. The given vector index is similar to Fig. 9. The eigenvalues of the shown eigenvectors are: λ0 = 0.99999999 (0.99999996), λ1 = 0.99999322 (0.99907654), λ6 = 0.64270357 + i0.76431760 (0.64271106 + i0.76429326), λ10 = −0.00116375+i0.99865094 (−0.00117162+i0.99862722), and λ19 = −0.99999317 (−0.99934321) for BC2011Q4 (or BC2010Q4*). relator [15,18,26] κ = N(cid:80)N In Fig. 11 we show by red crosses the location of top largest amplitudes ψj at j = 10 for Google matrices G (left column) and G∗ (right column). We see that only a few large amplitudes are located at leading (smallest) values of K and K∗. This shows that the vector ψ10 cor- responds to a certain rather isolated community. The proximity of the density distribution to the di- agonal K = K∗ leads to a significant correlation between PageRank and CheiRank vectors P (K(i)) and P ∗(K∗(i)). This correlation is convenient to characterized by the cor- i=1 P (K(i))P ∗(K∗(i))−1. The large values of κ corresponds to a strong correlation of PageRank and CheiRank probabilities, while κ close to zero or even slightly negative appears to uncorrelated vec- tors P and P ∗. The dependence of κ on the network size N is shown in Fig. 13 (right panel) where the correlator is becoming very large up to κ ≈ 104 for the last quarters of BCN. The frequency distribution of correlator compo- nents κi = N P (K(i))P ∗(K∗(i)) for three cases at differ- ent quarters is shown in the left panel of Fig. 13. These distribution show the presence of very active users with large κi values corresponding to their expected high ac- tivity of bitcoin outgoing and ingoing transactions. It may be rather interesting to determine the hidden identity of users with largest κi values. 7 Gini coefficient of BCN In economy the distribution of wealth of a certain pop- ulation is often characterized by the Gini coefficient pro- posed in 1912 (see e.g. [29,30,31]). The Gini coefficient is typically defined using the Lorenz curve which plots the fraction y of the total income of a fraction x of the popu- lation with the lowest income versus x. The line at y = x thus represents perfect equality of incomes. The Gini coef- ficient is the ratio of the area that lies between the line of equality and the Lorenz curve normalized by the total area the normalization condition is (cid:80) (Color online) Density of nodes W (K, K∗) on Fig. 11. PageRank-CheiRank plane (K, K∗) averaged over 100 × 100 logarithmically equidistant grids for 0 ≤ ln K, ln K∗ ≤ ln N, the density is averaged over all nodes inside each cell of the grid, K,K∗ W (K, K∗) = 1. Color varies from blue at zero value to red at maximal density value. In order to increase the visibility large density values have been reduced to (saturated at) 1/16 of the actual maximum density. At each panel the x-axis corresponds to ln K and the y-axis to ln K∗. Both top panels correspond to BC2010Q2 for K and to BC2010Q2* for K∗ and both bottom panels to BC2011Q4 for K and to BC2011Q4* for K∗. The red crosses show the top 1000 nodes of the eigenvector ψ10 used in Figs. 9 and 10 of BC2010Q2 (top left), BC2010Q2* (top right), BC2011Q4 (bottom left) and BC2011Q4* (bottom right). under the line of equality. Therefore the Gini coefficient is 0 for perfect equality and 1 for complete inequality. We can generalize this definition to PageRank and CheiRank distributions. For this let P (K) be the usual PageRank vector with K = 1 for the maximum value cor- responding to the top PageRank node. Then we define the inverted PageRank as Pinv(K(cid:48)) = P (N − K(cid:48) − 1) such that for Pinv the maximum value corresponds to K(cid:48) = N. In this way Pinv(K(cid:48)) represents in a certain way the "in- come" and its argument K(cid:48) corresponds to the network nodes ordered in increasing order by their income (with lowest "income" for K(cid:48) = 1 and maximum "income" for K(cid:48) = N). Then the cumulative income up to node K(cid:48) is given by : K(cid:48)(cid:88) N(cid:88) σ(P )K(cid:48) = Pinv( K) = P ( K). (4) K=1 K=N−K(cid:48)+1 The notation σ(P ) reminds that σ is defined with respect to a given PageRank vector (or CheiRank vector P ∗ by 10-2010-1510-1010-5100100101102103104105106107P,ψj K, KjBC2011Q4Pψ0ψ1ψ6ψ10ψ1910-1010-5100100101102103104105106107P*,ψj K*, KjBC2011Q4*P*ψ0ψ1ψ6ψ10ψ19 10 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network κ = N(cid:80)N Fig. 13. (Color online) Left panel: Histogram of frequency ap- pearance of correlator components κi = N P (K(i))P ∗(K∗(i)) for the three networks BC2013Q2 (red), BC2011Q4 (green) and BC2010Q2 (blue). For the histogram the whole interval 10−9 ≤ κi ≤ 104 is divided in 260 cells of equal size in log- arithmic scale. Right panel: The dependence of the correlator i=1 P (K(i))P ∗(K∗(i)) − 1 on the network size N for all bitcoin networks between BC2009Q4 and BC2013Q2. The three data points surrounded by a colored square box corre- spond to the three networks of the left panel with the same colors. Fig. 14. (Color online) Top panel: Gini coefficient g time evolu- tion for ingoing and outgoing bitcoin volume transfer for quar- ter of years (halves for 2009). Bottom panel: Gini coefficient g time evolution for PageRank and CheiRank of BCN for quarter of years (halves for 2009). corresponds to an enormously unequal wealth distribu- tion between users [30,31]: a small group of users controls almost all wealth. We obtain smaller values of g ≈ 0.5 for PageRank and CheiRank probabilities. We see that after 2010 the values of g from PageRank and CheiRank probabilities become comparable. This corresponds to the stabilization of the node distribution in the PageRank - CheiRank plane (see Fig. 11, Fig. 12 discussed in the previous Section). After 2010 we find g ≈ 0.5 corresponding to a rather usual value of g with an exponential wealth distribution in a society (see e.g. [31]). Also the Lorenz curve in 2013 (see Fig. 15) becomes similar to USA income distribution (see e.g. Fig.8 in [31]). However, the above values are obtained with the PageR- ank and CheiRank probabilities which are smoothing the row bitcoin flows due to the damping factor α in (2). For the row bitcoin flows for the whole available period 2009- (Color online) Density of nodes W (K, K∗) on Fig. 12. PageRank-CheiRank plane (K, K∗) for BC2013Q2 averaged over 200 × 200 logarithmically equidistant grids for 0 ≤ ln K, ln K∗ ≤ ln N, the density is averaged over all nodes (cid:80) inside each cell of the grid, the normalization condition is K,K∗ W (K, K∗) = 1. Color varies from blue at zero value to red at maximal density value. In order to increase the visi- bility large density values have been reduced to (saturated at) 1/16 of the actual maximum density. At each panel the x-axis corresponds to ln K and the y-axis to ln K∗. replacing P → P ∗ in (4)). The quantity σ(x) = σ(P )K(cid:48) with x = K(cid:48)/N corresponds to the standard Lorenz curve [30,31]. Therefore the Gini coefficient, defined as the area between σ(P ) and the line of equality normalized by the area below the line of equality [30], is given by: N(cid:88) K(cid:48)=1 g = 1 − 2 σ(P )K(cid:48)/N = 1 − 2 N(cid:88) K=1 KP (K)/N. (5) The Gini coefficient for the CheiRank P ∗ is obtained in a similar way by using σ(P ∗) and replacing P → P ∗ in (5). The above definition of g is done via the PageRank and CheiRank probabilities, i.e. where "income" corresponds to the PageRank or CheiRank values. We will compare the corresponding g values also with the standard defi- nition considering ingoing and outgoing amount of bit- coins (volume transfer) for BCN nodes (users) during a given quarter. The dependence of the different Gini coef- ficients, defined via bitcoin volume transfer or PageRank and CheiRank probabilities, on time is shown in Fig. 14. For the BCN the evolution of Gini coefficient g, de- fined by (5), is shown in the bottom panel of Fig. 14. We find that the Gini coefficient defined via volume (top panel of Fig. 14) is stabilized from 2010 and takes a very high value g ≈ 0.9. Such a large value of g for bitcoin flows 100102104106-8-6-4-2024countslog10(NP(i)P*(i))BC2013Q2BC2011Q4BC2010Q210-1100101102103104102103104105106107κN Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 11 We also characterized the wealth distribution for BCN users using the Gini coefficient g. The definition of g via PageRank and CheiRank probabilities leads to usual value g ≈ 0.5 for the time period after 2010 when the BCN is well stabilized. However, the analysis of row bitcoin flows gives g ≈ 0.92 corresponding to the situation when almost all wealth is concentrated in hands of small group of users. We argue that the damping factor of the Google matrix is responsible to a significant reduction of g value. Finally we note that the public access to all bitcoin transactions makes this system rather attractive for anal- ysis of statistical features of financial flows. However, there is also a hidden problem of this network. In fact it often happens that a user performing a transaction to another user changes him/her bitcoin code after the transaction thus effectively creating a new user even if the person be- hind the code remains the same. This feature is responsible to the fact that the BCN is characterized by a rather low ratio of number of links to number of nodes being about 2- 3 while in other networks like WWW and Wikipedia this ratio is about 10-20. This low ratio value is at the origin of the strong sensitivity of eigenvalues of G to numerical computational errors as we discussed in the paper. Thus even if the bitcoin transactions are open to public it re- mains rather difficult to establish the transactions between real persons. In this sense the situation becomes similar to the transactions between bank units: in this case the data are not public and are hard to be accessed for scientific analysis. We note that all data used in our statistical analysis of BCN are available at [33]. We thank A. D. Chepelianskii and S. Bayliss for stim- ulating discussions. This research is supported in part by the MASTODONS-2017 CNRS project APLIGOOGLE (see http://www.quantware.ups-tlse.fr/APLIGOOGLE/). This work was granted access to the HPC resources of CALMIP (Toulouse) under the allocation 2017-P0110. References 1. Satochi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, https://bitcoin.org/bitcoin.pdf (2008) (accessed 25 Oct 2017) 2. Wikipedia contributors, Bitcoin, https://en.wikipedia. org/wiki/Bitcoin_network, Wikipedia (accessed 25 Oct 2017) 3. J. Bohannon, The Bitcoin busts, Science 351, 1144 (2016) 4. A. Biryukov, D. Khovratovich I. Pustoga- and rov, Deanonymisation of in Bitcoin P2P clients network, Proc. 2014 ACM SIGSAC Conf. Comp. Comm. Security (CCS'14) ACM N.Y., p.15 (2014); arXiv:1405.7418v3[cs.CR] (2014) 5. F.R. Velde, Bitcoin: A primer, Chicago Fed Letter N.317, The Fderal Reserve Bank of Chicago, Dec. (2013). 6. S. Bayliss and L. Harriss, Financial Technology (Fin- Tech), Houses of Parliament, Parliamentary Office of Science & Technology, Postnote Number 525, May (2016); http://researchbriefings.files.parliament.uk/ documents/POST-PN-0525/POST-PN-0525.pdf 25 Oct 2017) (accessed Fig. 15. (Color online) The Lorenz curve of the bitcoin users (nodes) showing σ(P )K(cid:48) (and σ(P ∗)K∗(cid:48)) vs. K(cid:48)/N (K∗(cid:48)/N) for PageRank and CheiRank of Q1 of 2010 and Q1 of 2013 (solid and dashed lines respectively). The Lorenz curves for cumulative volume transfer are also shown for the full period 2009-2013 for out-going and in-going flow, taking into account users with a minimum amount of 0 and 1 bitcoins (dotted and dot-dashed lines respectively). The Gini coefficient values for volume transfer are g = 0.948 (in-going larger than 0), g = 0.939 (out-going larger than 0), g = 0.927 (in-going larger than 1), g = 0.925 (out-going larger than 1). The blue solid line represents the curve of perfect equality. 2013 we find g ≈ 0.92 (ingoing and outgoing g values are rather close). Such high g values correspond to very un- balanced wealth distribution in the bitcoin community. 8 Discussion We presented the results of Google matrix analysis of bit- coin transaction network from the initial start in 2009 till April 2013. From the period after 2010 the PageRank and CheiRank probability distributions are stabilized show- ing an approximate algebraic decay with the exponent β ≈ 0.9. We find that the spectrum of complex eigenvalues of matrix G has a very unusual form of circles being rather close to the unitary circle. Such a structure has never ap- peared for other real networks reported previously [15]. The only example with a similar spectral structure ap- pears for the Ulam networks generated by intermittency maps [32]. Such a circular structure corresponds to certain hidden communities coupled by a long series of transac- tions. A manifestation of such communities with about hundreds of users is also visible as a plateau structure in the eigenvectors of the Google matrix whose eigenvalues are close to the unit circle. The distribution of users in the PageRank-CheiRank plain is maximal along the diagonal corresponding to the the fact that each user tries to keep financial balance of his/her transactions. A similar situa- tion was also observed for the world trade networks [16, 17]. 12 Leonardo Ermann, Klaus M. Frahm, Dima L. Shepelyansky: Google matrix of Bitcoin network 29. C. Gini, Variabilita e mutabilita (1912), Reprinted in E. Pizetti, T. Salvemini (Eds.), Memorie di metodologica statistica, Libreria Eredi Virgilio Veschi, Rome (1955). 30. Wikipedia contributors, Gini coefficient, //en.wikipedia.org/wiki/Gini_coefficient# CITEREFGini1912, Wikipedia (accessed 25 Oct 2017). https: 31. V. M. Yakovenko and J. B. Rosser Jr., Statistical mechan- ics of money, wealth, and income, Rev. Mod. Phys. 81, 1703 (2009). 32. L. Ermann and D.L. Shepelyansky, Google matrix of Ulam networks of intermittency maps, Phys. Rev. E 81, 036221 (2010). 33. http://www.quantware.ups-tlse.fr/QWLIB/ bitcoinnet/ (accessed 3 Nov. 2017). 7. Wikipedia contributors, Cryptocurrency, https://en. wikipedia.org/wiki/Cryptocurrency, Wikipedia (ac- cessed 25 Oct 2017) 8. https://blockchain.info/ (accessed 25 Oct 2017) 9. D. Ron and A. Shamir, Quantitative analysis of the full bitcoin transaction graph, in Sadeghi AR. (eds) Financial Cryptography and Data Security, FC 2013. Lecture Notes in Computer Science, 7859, 6 (2013), Springer, Berlin 10. M. Ober, S. Katzenbeisser and K. Hamacher, Structure and anonymity of the Bitcoin transaction graph, Future Internet 5, 237 (2013) 11. S.I. Marcin, Bitcoin Live: scalable system for de- time, http: tecting bitcoin network behaviors in real //snap.stanford.edu/class/cs224w-2015/projects_ 2015/Bitcoin_Live-_Scalable_system_for_detecting_ bitcoin_network_behaviors_in_real_time.pdf, Stan- ford (2015) (accessed 25 Oct 2017) 12. S. Dorogovtsev, Lectures on complex networks, Oxford University Press, Oxford (2010). 13. S. Brin and L. Page, Computer Networks and ISDN Sys- tems 30, 107 (1998). 14. A.M. Langville and C.D. Meyer, Google's PageRank and beyond: the science of search engine rankings, Princeton University Press, Princeton (2006). 15. L. Ermann, K.M. Frahm and D.L. Shepelyansky, Google matrix analysis of directed networks, Rev. Mod. Phys. 87, 1261 (2015). 16. L. Ermann and D. L. Shepelyansky, Google matrix of the world trade network, Acta Physica Polonica A 120(6A), A158 (2011). 17. L. Ermann and D. L. Shepelyansky, Google matrix analysis of the multiproduct world trade network, Eur. Phys. J. B 88, 84 (2015). 18. A.D. Chepelianskii, Towards physical laws for software ar- chitecture, arXiv:1003.5455 [cs.SE] (2010). 19. K. M. Frahm, and D. L. Shepelyansky, Ulam method for the Chirikov standard map, Eur. Phys. J. B 76, 57 (2010). 20. K. M. Frahm, A. D. Chepelianskii, and D. L. Shepelyan- sky, PageRank of integers, J. Phys. A: Math. Theor. 45, 405101(2012). 21. K. M. Frahm, Y.-H. Eom and D. L. Shepelyansky Google matrix of the citation network of Physical Review Phys. Rev. E 89, 052814 (2014). 22. M. Fleder, M.S. Kester and S. Pillai, Bitcoin transaction graph analysis, arXiv:1502.01657[cs/CR] (2015). networks 23. I. Brugere, Bitcoin transaction tion, Bitcoin-Transaction-Network-Extraction Oct 2017). extrac- https://github.com/ivan-brugere/ (accessed (2013) 24. T. Granlund and the GMP development team, GNU MP: The GNU Multiple Precision Arithmetic Library, http://gmplib.org/ (accessed Oct 2017). 25. K.M. Frahm, B. Georgeot and D.L. Shepelyansky, Univer- sal emergence of PageRank, J. Phys. A: Math. Theor. 44, 465101 (2011). 26. L. Ermann, K.M. Frahm and D.L. Shepelyansky, Spectral properties of Google matrix of Wikipedia and other net- works, Eur. Phys. J. B 86, 193 (2013). 27. G. W. Stewart, Matrix Algorithms, Volume II: Eigensys- tems, SIAM, (2001). 28. R. Meusel, S. Vigna, O. Lehmberg and C. Bizer, The graph structure in the web - analyzed on different aggregation levels, J. Web Sci. 1, 33 (2015)
1906.02420
2
1906
2019-06-14T13:25:27
Zorro: A Model Agnostic System to Price Consumer Data
[ "cs.SI" ]
Personal data is essential in showing users targeted ads - the economic backbone of the web. Still, there are major inefficiencies in how data is transacted online: (1) users don't decide what information is released nor get paid for this privacy loss; (2) algorithmic advertisers are stuck in inefficient long-term contracts where they purchase user data without knowing the value it provides. This paper proposes a system, Zorro, which aims to rectify aforementioned two problems. As the main contribution, we provide a natural, 'absolute' definition of 'Value of Data' (VoD) - for any quantity of interest, it is the delta between an individual's value and population mean. The challenge remains how to operationalize this definition, independently of a buyer's model for VoD. We propose a model-agnostic solution, relying on matrix estimation, and use it to estimate click-through-rate (CTR), as an example. Regarding (2), Zorro empowers advertisers to measure value of user data on a query-by-query basis and based only on the increase in accuracy it provides in estimating CTR. In contrast advertisers currently engage in inefficient long-term data contracts with third party data sellers. We highlight two results on a large ad-click dataset: (i) our system has R^2=0.58, in line with best-in-class results for related problems (e.g. content recommendation). Crucially, our system is model-agnostic - we estimate CTR without accessing an advertiser's proprietary models, a required property of any such pricing system;(ii) our experiments show selling user data has incremental value ranging from 30%-69% depending on ad category. Roughly, this translates to at least USD 16 Billion loss in value for advertisers if user data is not provided. Regarding (1), in addition to allowing users to get paid for data sharing, we extend our mathematical framework to when users provide explicit intent.
cs.SI
cs
Zorro: A Model Agnostic System to Price Consumer Data Munther Dahleh Devavrat Shah Dylan Sleeper MIT Andrew Tsai MIT Anish Agarwal MIT MIT MIT Madeline Wong MIT 9 1 0 2 n u J 4 1 ] I S . s c [ 2 v 0 2 4 2 0 . 6 0 9 1 : v i X r a Abstract Personal data is a key ingredient in showing web users tar- geted ads - the economic backbone of the web. Still, there are two major inefficiencies in how such data is bought and sold online: (1) users do not decide what information is released nor do they get paid for this privacy loss; (2) algorithmic ad- vertisers are stuck in inefficient long-term contracts where they purchase user data without knowing how much value it provides. This paper proposes a system, Zorro, which aims to rectify the aforementioned two problems. As the main contribution, we provide a natural, "absolute" definition of the "Value of Data" (VoD) -- for any quantity of interest, it is the delta between an individual's value and the population mean. The challenge remains how to opera- tionalize this definition such that it is independent of a buyer's model for the VoD. We propose a model agnostic solution by relying on matrix estimation, a rapidly growing field within machine learning, and show how it can be used to estimate click-through-rate (CTR), for example. Regarding (2), Zorro (and this VoD definition) empowers advertisers to measure value of user data: (i) on a query-by- query basis; (ii) based only on increase in accuracy it provides in estimating CTR. This is in contrast with inefficient long- term contracts advertisers are engaged in now with third-party data sellers. We highlight two experimental results on a large real-world ad click dataset. (i) Our CTR estimation system has a R2 of 0.58, in line with state-of-the-art results for compa- rable problems (e.g. content recommendation). Crucially, our system is model agnostic, i.e., we estimate CTR for a given user and advertiser without accessing an advertiser's propri- etary models, a necessary property of any such pricing system. (ii) With respect to our definition of VoD, experiments show selling user data has incremental value in estimating CTR ranging from 30% to 69% depending on advertiser category. Roughly, this translates to at least a USD 16 Billion loss in value for advertisers if user data is not provided. Regarding (1), in addition to allowing users to get paid for data they share, we extend our system design for when users provide explicit intent for types of ads they want to see. 1 Introduction "Personal data is the new oil of the internet and the new currency of the digital world " - Meglena Kuneva, European Consumer Commissioner Over the past two decades, online advertising has become the economic backbone of the web. According to a study by PriceWaterhouseCoopers and the Internet Advertising Bureau (IAB), non-search 1 online advertising revenue has grown from USD 50 million in 1996 to USD 54 Billion in 2018, with a 23% year-on-year growth from 2017 to 2018 (cf. [25]). Furthermore, personal data has been one of the key resources advertisers use to show users targeted, relevant display ads. Inefficiencies in Current System. There still exist two major inefficiencies in the way such data is both bought and sold: (1) from a user's perspective, they do not get to decide what information about themselves is released nor do they get paid for this loss of privacy; (2) from an advertiser's perspective, they have to purchase user data without knowing how much value it is going to provide to them. These inefficiencies have led to a swath of societal issues in- cluding: (i) increasing ad fraud, where 20% to 30% of online ad data sold has been deemed to be fraudulent (cf. [21]); (ii) an increasing consumer backlash for loss of privacy from unsanc- tioned data sharing such as in the Facebook-Cambridge Ana- lytica case (cf. [7]); (iii) an inability to litigate against compa- nies with massive data breaches such as Equifax (cf. [5]). To have a meaningful dialogue about such issues, an im- portant and necessary first step is defining what the "Value of Data" (VoD) is. However, there does not exist a precise defini- tion of the VoD, which is independent of a buyer's model for VoD. This is why firms are engaged in inflexible long-term data contracts, instead of paying on a query-by-query basis based on the incremental value the data provides. 1Non-search includes display ads, audio & video ads, classifieds and lead generation. For simplicity, we collectively call them display ads (see [25] for details). 1 (a) (b) Figure 1: Figure 1(a) - we depict how user data flows between the various entities in the current ecosystem. Figure 1(b) - we depict the change to user data flow with Zorro in place. All entities receive (anonymized) user data and the estimated VoD. Why Data is a Unique Commodity. The challenge in de- signing data pricing systems stems from the nature of data as an asset: (i) user data is freely replicable once sold; (ii) advertisers vary widely and correspondingly, so do their mod- els for the VoD; (iii) the usefulness of user data is difficult to verify a priori before running it through a buyer's model, something buyers are not willing to do before purchasing the data. See [2] for a more complete overview. Our Focus: Click-Through-Rate Estimation. We focus our efforts on the sale of online user cookie data (e.g. a user's de- mographic data and browsing history) for display advertising and the prediction task of estimating user click-through-rate (CTR) for a given ad and user, the key quantity of interest in online display advertising. We do so because the sale of online cookie data for this setting is one of the large sources of data exchanged (and revenue generated) in modern web-scale systems and the associated network engineering infrastruc- ture is extremely performant; transactions between display advertisers and third-party data sellers normally occur in less than 100 milliseconds, the time required for a user to load a webpage and for an ad to be served (cf. [30]). Thus if one can design a feasible solution for this setting, there are many further applications. An important business- to-business example is the sale of potential consumer leads in insurance and mortgage markets using the increasingly adopted Ping-Post Architecture (cf. [19]). 1.1 Our Contribution We propose a system, Zorro (see Figure 1(a)-1(b)), which aims to address the following aforementioned problems. Our contributions are summarized below. VoD Definition. In Section 3, we give a natural definition of the VoD -- for any quantity of interest (in our case, CTR) it is the delta between an individual's value and the population mean. The key challenge we try to solve through our sys- tem design is how to operationalize such a definition in an "absolute" sense, independent of a buyer's models for the VoD. System Design. In Section 3 we give an overview of the key functionalities/modules of Zorro. (1) An inference system to operationalize our definition of the VoD. This is a challenging inference problem as we only get access to sparse, noisy click data from users. We propose to solve it by reducing CTR estimation to an instance of matrix estimation, where the rows of the induced matrix are users, columns are advertisers and entries are historical click data. Thus we can exploit the rich matrix estimation literature, and utilize data-driven, model agnostic matrix estimation algorithms that have become a workhorse in large-scale content recommendation systems. (2) A module to identify and categorize online ads in an automated fashion. (3) An interface between users, Zorro and advertisers that ensures user data is not inadvertently "leaked" to advertisers without user permission and ensures advertisers only pay for user data based on the increased in accuracy it provides to them (in particular, to estimate CTR). Experiments. In Section 4, we perform four set of experi- ments to verify the implementation of the modules described above. (1) On a large real-world advertising click dataset, we show we accurately estimate the CTR for a given user and advertiser (R2 of 0.58) independently of an advertiser's model, the crucial property we require to operationalize our definition of the VoD. (2) On the same dataset, we show that with respect to our definition of the VoD, there is large vari- ation in the value of user data depending on the advertiser's category (30% to 69% depending on category). (3) We show we can accurately classify (83% True Positive and 98% True Negative) and categorize ads (53% correct classification out of 341 categories) by testing our implementation on popular websites. (4) We show we can indeed prevent user data from being "leaked" to advertisers by counting the number of re- peats ads a user sees depending on whether Zorro is turned "on" or "off" (number of repeats drops three-fold when "on") . Forward Looking Intent. In Section 5, we show how one can generalize our model to capture forward-looking intent of users. We do so by extending the fundamental data structure of interest, the matrix of (users × advertisers), to an order-3 tensor of (user × advertisers × user-intent) and furnishing an algorithm that exploits the additional structure when estimat- ing CTR. We verify experimentally that our proposed algo- rithm does effectively exploit the additional latent structure in the (user × advertisers × user-intent) tensor by comparing against an appropriate baseline (R2 of 0.53 vs. 0.17). 2 1.2 Related Work We divide related work into the three major buckets: (1) real- time online systems to sell user data; (2) data mining to esti- mate value of user data; (3) theoretical market mechanisms to sell information. Real-Time Systems to Sell User Data. We compare with two proposed systems (cf. [24, 26]) that aim to design real- time pricing mechanisms of online user data in the context of advertising. The key difference is in Zorro, we propose a precise definition of the VoD. Without such a definition, which is agreed upon by both buyer and seller, price setting remains a challenge. In [24], they propose selling historical user data by post- ing a price each time a user loads a webpage and running an "infinite supply" auction, i.e., if an advertiser bids above the posted price, then acquire user data for that webpage load. This posted price is then constantly updated for each subse- quent webpage load by that user. Such a mechanism poten- tially has limitations. (i) Optimal online price setting for data in such systems can be infeasible using standard methods (e.g. a no-regret update mechanism). For example, no-regret up- date schemes are feasible only if user data is relatively static. However, user's browsing patterns are constantly changing and so it is not immediately clear how to adapt a no-regret update scheme to maximize revenue for such a case. (ii) Ad- vertisers either get all of the data and pay the posted price or receive none of it. This could potentially lead to a large loss in revenue. Zorro aims to circumvent these two problems by dividing the transaction into two segments: (i) an offline seg- ment, where each advertiser negotiates a contract with Zorro on how much they value a marginal increase in accuracy; (ii) an online segment, where Zorro estimates the marginal increase in accuracy without access to the advertisers mod- els. Advertisers then pay based on the real-time estimated increase in accuracy and the offline contract (see Section 3.4 for details of the implementation). Importantly, both the of- fline and online segments of the contract in Zorro are entirely auditable by a third-party leading to a more robust system. n [26], they propose a blockchain based system and advo- cate for a new cryptocurrency named Basic Attention Token (BAT), which allows user to get paid in BAT for viewing ads online. For their system to be widely adopted, it would require an overhaul of the entire, very well-established online adver- tising ecosystem (see Section 2), and need users, advertisers and publishers to all buy into this new cryptocurrency. In contrast, Zorro can be plugged into the current ad ecosystem in a straightforward manner agnostic to a buyer's model. It essentially functions as a novel third-party data seller (i.e. Data Management Platform - see Section 2), where users get paid for providing their data and for advertisers pay based on the estimated increase in accuracy they experience. Further in [26], they do not provide details on how pricing of user data is done, a crucial part of any such system. Data Mining to Estimate Value of User Data. Given how important the problem of understanding the role of user data in ad targeting, there has been a lot of empirical work in this field. We highlight a few representative works, [3, 12, 28, 31]. The focus of such work has been to mine large historical datasets to estimate the average value of user data. They do indeed find that user data can increase value ranging from 20-60%, depending on the user and advertiser type, which is line with our findings. However, these works propose highly specific approaches that require intimate knowledge of how a buyer will extract information/value from the data. In contrast, by applying matrix estimation to estimate CTR, we propose a general-purpose model agnostic method that allows advertis- ers to estimate VoD on a query-by-query basis. Theoretical Market Mechanisms to Sell Information. Some works that propose theoretical market designs to sell information include [2, 4]. We consider our work to be com- plimentary to theirs as a fundamental quantity that needs to be estimated in such works is the VoD. Zorro proposes a natural, data-driven definition of VoD that can potentially be used to operationalize such systems. Further the works listed have a single buyer and multiple data sellers (e.g. a supply-chain company buying data streams for demand forecasting). This is in contrast with Zorro which is meant for direct, repeated sales of data between multiple buyers and a single seller. 1.3 Organization of Paper The rest of the paper is organized as follows: (1) In Section 2, we give an overview of the online advertising ecosystem that matches advertisers to users and the role of third-party data sellers within it. (2) In Section 3, we precisely define the VoD and justify it. We also give a detailed conceptual overview of all of the key components of the Zorro architecture. (3) In Section 4, we rigorously test the various components of our architecture on large real-world datasets. (4) In Section 5, we show how to extend Zorro to include forward-looking intent and corroborate our proposal with experiments. (5) Lastly, in Section 6, we discuss the role of Zorro in designing a general-purpose data recommendation system. 2 Overview of Real-Time Bidding Ecosystem The Real-Time Bidding (RTB) ecosystem refers to the entire engineering infrastructure associated with buying and selling ads in real-time as users load webpages. We give a brief summary of the key players in the RTB ecosystem below. Refer to [30] for a detailed description of RTB. See Figure 1(a) for an overview of the current ecosystem. Advertisers and Demand Side Platforms (DSPs). Adver- tisers are companies that want to market their product online. Due to the engineering complexity of the RTB ecosystem, advertisers normally go through a DSP to make bids into the 3 RTB system on their behalf. Thus DSPs essentially serve as algorithmic online advertising agencies. For our purposes it is not necessary to differentiate between advertisers and DSPs, and we call the collective entity "adver- tisers" for simplicity. Publishers and Supply Side Platforms (SSPs). Websites that users visit (e.g. Nytimes, ESPN) are called publishers. When a user loads a publisher webpage, the publisher sends a request out into the RTB system to serve the user ads. Anal- ogous to advertisers, publishers go through SSPs to make requests in the RTB system on their behalf. Ad Exchanges (ADX). ADX serve as the interface between DSPs and SSPs by matching ad requests from SSPs to bids made by DSPs. They do so by using a combination of first- price and second-price auctions. Data Exchanges a.k.a Data Management Platforms (DMPs). DMPs serve DSPs, SSPs and ADXs historical user data (usually in real-time) to feed into their models to allow for better, more targeted matchings between users and ads. Our Focus is Advertiser-DMP Interface. The majority of demand (and source of revenue) for historical user data is from advertisers. User data is crucial to them as their models require such data to make more accurate bids by evaluating CTR. That is why we focus the discussion of this paper to solve inefficiencies between how Users -- DMPs -- Advertis- ers interface (see Section 1 for an overview of the current market inefficiencies) . However none of our system design is specific to the transaction between DSPs and DMPs, and can be extended to include SSPs and ADXs as well (see Section 3). See Figure 1(b) for an overview of the proposed change to ecosystem with Zorro. 3 Zorro System Overview As mentioned in Section 1.1, we focus our system design on the following functionalities that are required for Zorro to be feasible in practice: 1. VoD Definition. We provide a natural, "absolute" def- inition of the VoD that captures the incremental value that data provides in estimating CTR. Importantly, our definition is independent of the models of the buyer. 2. VoD Computation. To operationalize our definition of the VoD, the key requirement is that for a given adver- tiser, we need to estimate the value of a user's data inde- pendently of an advertiser's models. We show how one can achieve this using matrix estimation to accurately estimate the CTR in a model agnostic manner. 3. Ad Identification & Categorization. A necessary step to do CTR estimation, is to accurately identify when users have clicked on an ad. Further to effectively group advertisers, we need to categorize advertisers in a mean- ingful and automated way. We show how to do both ad identification and categorization by tying together existing open source software packages. 4. User -- Zorro -- Advertiser Interface. We propose an interface/dynamic that ensures advertisers pay for user data based only on the increase in accuracy it brings. And correspondingly, ensures user data is not inadvertently "leaked" to advertisers without them paying for it. In Sections 3.1 - 3.4, we explain how Zorro performs the above four functions respectively. Our focus will be on "VoD Definition", "VoD Computation" and the "User - Zorro - DSP Interface" as that is where the most significant conceptual contributions are. "Ad Identification & Categorization" is a necessary component to make Zorro work and so we will describe how to implement it briefly. Our proposed system design will be corroborated with experiments in Section 4. 3.1 Defining the Value of Data 3.1.1 Problem Setup - CTR Estimation We consider the case where there are m users and n adver- tisers2. For a given User i and Advertiser j, we define the probability of an ad click as CTRi j. We represent these m× n CTR quantities for each user, advertiser pair through the (un- observed) matrix M ∈ [0,1]m×n where M(i, j) = CTRi j. The challenge is that we do not observe the matrix M. Rather, we observe a sparse, noisy observations of its entries. This is because in reality, most users only see a small percent- age of all advertisers; further, for advertisers they do see, they get exposed to their ads only a few times, most likely once. We denote our observation matrix as X ∈ {[0,1]∪{?}}m×n. If X i j =?, then user i has not been exposed to advertiser j. If X i j ∈ [0,1], then X i j indicates the empirical average of the number of times a user has clicked a particular ad. The aim is to infer the CTR for any User i and Advertiser j (i.e., M(i, j)), given only sparse, noisy observations (i.e., X). 3.1.2 Latent Variable Model For any model to effectively learn the underlying CTR given sparse, noisy data, some structure on the matrix M must be assumed. A general, flexible way of capturing the underlying structure in social data (e.g. Netflix challenge, product rec- ommendation) is assuming a latent variable model (LVM), arguably the canonical modeling choice from the lens of non- parametric statistics (see cf. [18] and references therein). Specifically for our case, we assume that the CTR for a given user and advertiser is described by the following latent variable model, M(i, j) = f (θi,ω j) where f : Rd1 × Rd2 → 2A "user" can also refer to a group of users. Similarly, an "advertiser" can refer to a category of advertisers. 4 [0,1], θi ∈ Rd1 and ω j ∈ Rd2. Here θi,ω j refer to multi- dimensional variables that denote latent factors associated with user i and advertiser j. f is a latent function that maps θi and ω j to a value between 0 and 1 denoting the underlying CTR for that user, advertiser pair. Note that f ,θi,ω j are all unobserved (i.e., latent). Instead, recalling Section 3.1.1, we observe X where we model X(i, j) as a (independent) random variable such that E[X(i, j)] = M(i, j). From this sparse, noisy X, we need to estimate M, which we explain how to do in Section 3.2. 3.1.3 Definition of Value of Data Given the LVM described above, we can now provide a defi- nition of the VoD. Definition 3.1 (Value of Data) For i ∈ [m] and j ∈ [n], the value of User i's data to Advertiser j is given by, VoD(User i, Advertiser j) = f (θi,ω j)− Eθ[ f (θ,ω j)] where Eθ[ f (θ,ω j)] = 1 k=1 f (θk,ω j) m ∑m (1) In words, this definition states that the value of User i's data to an Advertiser j is the absolute difference between the average CTR for the advertiser across all users (given by Eθ[ f (θ,ω j)]) and the CTR for user i (given by f (θi,ω j)). Though seemingly natural, we consider the definition above as arguably the most important conceptual contribution of this paper and we now make a few remarks regarding it. Model Agnostic VoD Definition. Note that our definition of VoD is not dependent on any advertiser specific model, but rather just on the prediction task itself (in this case CTR estimation), which is what renders it model agnostic. Further, it is worth noting that we can easily replace CTR with any other quantity of interest in a two-sided market (e.g. likelihood of lead conversion in an auto-insurance marketplace, estimated average spend in a retail marketplace). Translation of VoD to a Dollar Amount. To convert this quantity to a dollar amount, we need to multiply VoD(User i, Advertiser j) by how much Advertiser j values a marginal increase in accuracy in estimating CTR. For exam- ple, it could be be the case that an online healthcare advertiser selling medical drugs values a unit increase in accuracy sig- nificantly more than an advertiser selling sports equipment. Hence, the quantity VoD(User i, Advertiser j) will need to be scaled to capture this heterogeneity. In Section 3.4, we show in detail how such advertiser specific adjustments can be made. 3.2 Computing the Value of Data 3.2.1 CTR Estimation via Matrix Estimation To make our definition of VoD operational in practice, we need an inference method to estimate CTR without relying 5 on the models of the advertisers, but instead using only ob- servations in terms of historical clicks. Specifically, given X, estimate M. This is why we choose matrix estimation, the de facto, non-parametric method to learn the underlying mean of a matrix from sparse, noisy observations. Moreover, it comes with strong theoretical guarantees when a LVM structure is as- sumed on the underlying mean matrix (cf. [18]). Importantly, matrix estimation remains an actively researched area within machine learning with a variety of scalable, production-grade implementations (some standard libraries include [1, 23]). Matrix Estimation Overview. Matrix estimation is the prob- lem of recovering a data matrix from an incomplete and noisy sampling of its entries. Specifically, there exists an under- lying m× n matrix, M, of interest. We denote the observa- tion matrix as X, whose entries are noisy versions of M, i.e., M(i, j) = E[X(i, j)]. In addition to the observations being noisy, it is further assumed that we only observe a small sub- set of the entries, i.e., each entry X(i, j) is observed with probability ρ ∈ [0,1]. This setup has become of great interest due to its connec- tion to recommendation systems, social network analysis, and graph learning (graphon estimation). The key realization of this rich literature is that one can estimate the true underlying matrix from noisy, partial observations by simply taking a low-rank approximation of the observed data. We refer an interested reader to [10] for a broad overview and references therein. Definition 3.2 (Matrix Estimation) A matrix estimation al- gorithm, denoted as ME : [0,1]m×n → Rm×n, takes as input a noisy matrix X and outputs an estimator (cid:98)M. CTR estimation via Matrix Estimation. CTR estimation can be viewed as a special case of matrix estimation. Specif- ically, X i j can be modeled as the empirical average of a Bernoulli random variable with parameter f (θi,ω j). Thus E[X i j] = f (θi,ω j) = Mi j (recall ρ is the frac- we have that 1 ρ tion of entries observed). This is exactly the setting in which matrix estimation applies. Thus by applying a standard matrix estimation algorithm, such as Singular Value Thresholding (SVT)or Alternating Least Squares (ALS) (cf. [8, 14]), we can reliably infer the underlying CTRi j, simply from sparse, noisy observations (i.e., the small number of click or no click data we have). Recall again that to carry out this procedure, we do not need access to the advertiser's ML model, simply the click data of any user using the Zorro system. In Section 4.1 we show on a large real-world online adver- tising datasets, matrix estimation (using ALS) does reliably infer the underlying CTR from partial, noisy click data (after appropriate aggregation of user and advertiser data). We have out-of-sample performance of R2 = 0.58, which is in line with state-of-the-art performance for matrix estimation. Estimated Value of Data Definition. Analogous to Defini- tion 3.1, we define a notion of VoD that can be empirically measured. We recall certain quantities. Let X denote the set of sparse noisy observations of user, advertiser data. Let (cid:98)M = ME(X) be the estimated underlying CTR after applying denote (cid:98)f (θi,ω j) := (cid:98)Mi j. matrix estimation on the sparse, noisy observations X. We Definition 3.3 (Estimated Value of Data) For i ∈ [m] and j ∈ [n], the estimated value of User i's data to Advertiser (2) j is given by,(cid:100)VoD(User i, Advertiser j) = (cid:98)f (θi,ω j)− Eθ[(cid:98)f (θ,ω j)] where Eθ[(cid:98)f (θ,ω j)] = 1 k=1(cid:98)f (θk,ω j) m ∑m In Section 4.2, we show on a large real-world online ad click dataset, user's personal data has value (with respect to Definition 3.3) ranging from 30% to 69% depending on advertiser category. Importantly, Zorro allows advertiser's to estimate the VoD for each user and hence purchase data on a query-by-query basis, rather than through inefficient long- term contracts as is done now (details in Section 3.4). It is also worth highlighting that Definition 3.3 can be op- erationalized using matrix estimation simply using historical user ad clicks. Thus any DMP (or more generally third party data seller) can perform this function if they collect such data. 3.3 Ad Identification & Categorization 3.3.1 Ad Identification Recall that the focus of this work is display ads rather than search ads (see Section 1). Definition of Ad. Below we describe a straightforward two- level filter system to identify display ads when a user clicks on a link on a website. 1. Filter Level 1. We filter for hyperlinks on a website that redirect to a url external to the website itself. 2. Filter Level 2. We parse the redirect url to check for substrings that are almost always present when the ex- ternal link redirects to ads hosted by third-party servers (e.g. AdChoices, Outbrain). We do this by filtering the redirect url using the industry standard Easylist filter list, which is a set of rules designed by AdBlock (cf. [13]) to identify ads. In Section 4.3, we show that this simple system effectively identifies whether an external hyperlink is an ad (True Positive and True Negative rate of 83% and 97% respectively). Generalization to Non-Traditional Ads. It is worth men- tioning that companies not traditionally considered advertisers do purchase user data to personalize their website experience for each user (cf. [11]). For example, an online marketplace company might purchase user browsing data to decide what 6 products to recommend to that user if he or she comes to their homepage. Again users do not get to choose whether this per- sonal data about them is allowed to be sold nor do they derive income from it. We leave it as future work to generalize our definition of ads (with the necessary adjustments made to the entire Zorro system) to just Filter Level 1. 3.3.2 Ad Categorization Interactive Advertising Bureau (IAB) Overview. Ad cate- gorization is an important pre-processing step in grouping advertisers together before performing matrix estimation to compute the VoD. Otherwise, the matrix of users and adver- tisers (i.e., X) is too sparse and we cannot effectively infer the underlying CTR for a user, advertiser pair. We rely on a widely adopted online advertising taxonomy 3 published by the IAB (cf. [6]), which advertisers use to serve more rele- vant content to users. This context taxonomy has four tiers of classification (e.g. "Style & Fashion" → Women's Fash- ion → Women's Clothing → Women's Business Wear). We focus our categorization system on the top two tiers of IAB categories of where there are 28 and 341 respectively. Implementing IAB's Categorization. Given a website, clas- sifying which category it belongs is a challenging task due to the large number of Tier 1 and 2 categories. To automate the process of classifying websites into IAB categories, we input the text within the body of a webpage into a natural language processing software, called uClassify (cf. [16]), to classify it to an IAB category. In Section 4.3, we show this natural language processing system effectively classifies Wikipedia webpages into the cor- rect IAB category, with an average Tier 1 and Tier 2 accuracy of 67% and 53% respectively. Note that a random guess Tier 1 and Tier 2 guess would have an accuracy of approximately 3.6% and 0.3% respectively. 3.4 User -- Zorro -- Advertiser Interface In this section, we explain from the advertisers' perspective, how precisely they will interface with Zorro and gain value from it. Recall this part of the system serves two purposes: (1) ensure advertisers pay for user data based only on the increase in accuracy it brings; (2) ensure user data is not inadvertently "leaked" to advertisers without them paying for it. Our ap- proach consists of two steps: (1) an offline step where adver- tisers negotiate a contract of how much a marginal increase in accuracy is worth; (2) an online step where advertisers query Zorro for user data, and pay for it based on the estimated increase in accuracy they will receive from purchasing it. Offline Contract. Recall from Section 3.1.3 that each adver- tiser can have a very different value for an increase in accuracy (consider an online advertiser selling medical drugs vs. sports 3"IAB Tech Lab Content Taxonomy Version 2.0" equipment - how much each values an unit increase CTR can by vastly varying). Thus the estimated VoD (given by Defini- tion 3.3) needs to be scaled accordingly. Doing this scaling is precisely the purpose of the offline contract between a DSP and Zorro. We describe the contract below. Recall from Section 3.3.2 that before doing matrix esti- mation, we group advertisers together by IAB category (e.g. "Disease and Conditions", "Sports Equipment"). Since we es- timate the VoD per advertising category, it follows that this offline contract must be defined per IAB category as well. Let there be C such categories. Then for advertiser j ∈ [M] and category c ∈ [C], we define a function pc j : [0,1] → R+. This function, pc j summarizes how much advertiser j values an increase in accuracy for estimating CTR for category c. j : for c ∈ [C]} For example, a sports equipment advertiser might value a 10% increase in accuracy in the category "Sports Equipment" to be worth $0.1 while may value a 20% increase in the category "Disease and Conditions" to only be worth $0.001. The functions pc j capture this heterogeneity. Thus a negotiated contract between Zorro and an advertiser j will be the set Pj := {pc Real-Time Interface. In the example below, let there be K advertisers denoted {AD1, . . . ,ADK} that have negotiated an offline contract with Zorro. We describe the proposed se- quence of interactions that will occur between advertisers and Zorro, each time a user on Zorro loads a publisher's webpage. Whenever a user sends a webpage request, it is routed through a Zorro proxy server and is anonymized by replacing the User ID (i.e. user cookies) by a random ID (i.e. random cookie). Advertiser's that have signed a contract with Zorro can query the system to ask for user data before deciding what bid to make. They then pay for this data based on the estimated VoD and the offline contract. A key point to highlight is that a new random ID is generated each time a user loads a webpage, which is what anonymizes the user request. Below is the pseudocode for this procedure. Refer to Figure 2 for a step-by-step overview of how RTB would work with and without Zorro (adapted from [32]). 1. A random Zorro ID cookie is generated and linked with User i's actual ID cookie. 6. If User i's ID cookie belongs to Zorro, then following two actions occur (a) Zorro applies matrix estimation and sends {AD1, . . . ,ADK} following two signals: (i) for each ADk, the estimated VoD of User i's data; (ii) User i's actual personal data (e.g. demographic, interest segments, browsing history). (b) {AD1, . . . ,ADK} pays Zorro based on offline con- tract defined above. Specifically AD j pays, (cid:18) (cid:17)(cid:19) (cid:16)(cid:100)VoD(User i, Advertiser j) . max c∈[C] pc j 7. A new random Zorro ID cookie is generated and linked with User i's actual ID cookie. Why User Data is Not "Leaked"? By refreshing a new ran- dom Zorro ID cookie every time a user loads a webpage, we ensure that to an advertiser who has not negotiated a contract with Zorro, it seems like a random user is loading the web- page. A crucial benefit of this architecture is that user data is never permanently "leaked" as the random Zorro ID cookie is constantly refreshed. Thus if a user who has installed Zorro decides to go incognito at some point and no longer receive money for providing their personal data, they easily can. 3.4.1 Model Agnostic Data Contracts The problem of companies not wanting to share their models or their data before a transaction has happened clearly extends far beyond online advertising. This is why so many firms are stuck in inefficient data contracts, where they purchase data based on a long-term agreement or a coarse metric such as the number of API calls they make to a data seller. That is why we believe our proposed approach to designing data contracts can serve as a general-purpose, empirically auditable system for companies to reason about the VoD when sourcing from external vendors. In essence, Zorro can serve as a base to allow data buyers to pay based only on the estimated increase in accuracy for a clearly defined prediction task, when purchasing a new dataset from third-parties. 2. User i's with Zorro extension has their webpage request routed through a Zorro proxy server. 4 Experiments 3. User i's loads a webpage. The experiments are organized to answer four set of questions: 4. The publisher pings a RTB exchange for ad requests and the RTB forwards the requests to advertisers. 5. {AD1, . . . ,ADK} query Zorro to check if User i's ID cookie belongs to Zorro 4 4The random Zorro ID cookie could contain a Zorro specific numeric signature to signify that user has the Zorro extension installed 1. Matrix Estimation. How accurately matrix estimation is able to estimate the underlying CTR? 2. VoD. How much variation in VoD for user data is there depending on an advertiser's category? 3. Ad Data Collection. How accurately can we identify and categorize ads? 7 Figure 2: Figure 2(a) - how RTB works with current DMPs. Figure 2(b) - how we propose RTB work with Zorro. (a) (b) 4. User Data Protection. Can we reliably prevent user data from being "leaked" to advertisers? 4.1 Matrix Estimation Experiments Matrix Estimation Algorithms Applied. We focus on two well-studied matrix estimation algorithms, Alternating Least Squares (ALS) and Singular Value Thresholding (SVT). See [8, 14] for a detailed description of these algorithms and the- oretical guarantees of convergence and quality of the final estimate. For ALS, we rely on a standard PySpark implemen- tation (cf. [23]) and for SVT, we use the NumPy package (cf. [29]) to perform the singular value decomposition. Lastly, we implement a hybrid two-step algorithm that first does SVT on the observation matrix and uses the outputted matrix as a "warm start" for ALS. Metric Used to Measure Accuracy. We measure quality of performance using R2 5. 4.1.1 Avito Dataset Description of Dataset Used. We test our system on the Avito Context Ad Clicks dataset. To the best of our knowledge, it is the largest and most comprehensive publicly available ad click dataset. It can be found on Kaggle (cf. [15]). Avito is the largest online marketplace in Russia with 70 million unique monthly visitors. Another reason we use this dataset is that its focus is contextual ads (i.e. banner ads), which is also the focus of our work. There are 190,157,735 context ad views in the dataset, out of which 1,146,289 led to clicks. For each view, the dataset includes metadata about the user (e.g. geographic location, parameters of the search) and the ad itself (e.g. category of the ad, historical CTR), along with whether the view led to a click or not. Grouping Users & Advertisers. We group users by their geographical location (there are 3431 unique location IDs) and ads by their category (there are 31 unique category IDs). We choose location as it is a standard feature used in CTR 5For a set of values {y1, . . . ,yn} and estimates { y1, . . . , yn}, R2 = 1 − , where SSVar = ∑n i=1(yi − ¯y)2, SSRes = ∑n SSVar SSRes i=1( yi − ¯y)2, and ¯y = 1 n yi estimation, and related tasks. However, many other user fea- tures can and should be incorporated in practice. Indeed, our experiments are meant to showcase accurate CTR estimation is possible by simple groupings of users. Similarly, in practice advertisers are commonly grouped by category (see Section 3.3.2) and hence we do so as well. Data Preprocessing. In Figure 3(a), we plot a histogram of empirical CTR for each user in the Avito dataset (on a log scale). We see a large number of user CTRs that are unreason- ably high (e.g. there is a spike at 1.0). Indeed, a known issue in such datasets is "click-bots" which are programs that automat- ically click on ads to increase revenue in a fraudulent manner. That is why we filter out all users beyond a certain threshold, specifically 0.02. We do so because according to historical Google AdWords data, "human" CTR for different advertiser categories ranges between 0.0035 and 0.02. (cf. [20]). This choice of threshold is justified empirically through Fig- ure 3(b). We create a matrix of users and advertisers (grouped according to location and category respectively), take its sin- gular value decomposition, and then plot the singular values of this matrix for different thresholds. If we don't threshold (i.e. keep the threshold at 1.0), then the spectrum decays very gradually. However, as we decrease the threshold, the spec- trum decays progressively quicker, and the low-rank structure we expect to see emerges (see Section 3.2). The optimal threshold is approximately at 0.02, and at this threshold, we still retain 81% of the original data. Figure 3(b) is encouraging as it gives credence to the theo- retical model laid out in Section 3.1.2. A LVM suggests that the underlying matrix, M ought to be approximately low-rank. And indeed, Figure 3(b) shows that the underlying data is approximately rank 2! This justifies the LVM and provides a structural reason for the success of the matrix estimation. 4.1.2 Matrix Estimation Results Hyper-parameter Selection. For both ALS and SVT, there is one major hyper-parameter to choose, the number of singular values to keep. From Figure 3(b), we see that the top two singular values contain most of the "signal" and hence we choose to keep two singular values. This is further justified through cross-validation. In PySpark's implementation of 8 (a) (b) Figure 3: In Figure 3(a), we plot the histogram of CTR for different users. In Figure 3(b), we plot singular values at different CTR thresholds and percentage of data retained. (a) (b) (c) Figure 4: R2 vs. % Matrix Filled for SVT, ALS and SVT + ALS. In-Sample and Out-of-Sample performance plotted. (a) (b) (c) Figure 5: R2 vs. # Data Points used for SVT, ALS and SVT + ALS. In-Sample and Out-of-Sample performance plotted. Figure 6: Figures 6(a)-6(b) - Plot of difference in empirical mean and variance per category pre- and post-ME respectively. (c) (a) Figure 6(c) - % Difference in µ and (cid:99)var per category plotted on log scale. (b) 9 ALS, a regularization parameter must also be chosen, which we set to be 0.01, again using cross-validation. CTR Estimation via Matrix Estimation Experiments. Fig- ures 4(a)-5(c) show how the quality of matrix estimation changes as we vary: (1) the percentage of entries observed; (2) the number of data points used. For Figures 4(a)-5(c), we keep the percentage of data with- held for out-of-sample testing to be fixed at 20%. We see that R2 performance of the various algorithms improves steadily as the fraction of data observed and the number of data points increases (with ALS outperforming SVT). However, this im- provement levels off after approximately 40% of the data is observed and 50 million data points are used. This indicates two takeaways with regards to accurate CTR estimation: (1) some amount of grouping of users and advertisers is an im- portant pre-processing to ensure the resulting matrix is not too sparse; (2) our system needs to collect approximately on the order of tens of millions of user data to apply matrix estimation effectively. Signal vs. Noise Thresholding via Matrix Estimation. From Section 3.2, we know that matrix estimation should help uncover the underlying mean of the CTR matrix, M, while re- ducing the noise as long as the underlying matrix is low-rank (which we verified through Figure 3(b)). In particular for the Avito dataset, we expect that the average CTR per advertiser category should remain approximately the same both before and after applying matrix estimation 6. However, the variance in CTR per advertiser category should drop significantly. We recall the notation used in Section 3.2. Let µ j pre := 1 # observed m ∑ i=1 X i j 1(X i j (cid:54)=?), µ j post := 1 m (cid:98)Mi j. m ∑ i=1 pre, µ j In words, µ j post are the pre-ME and post-ME empirical average CTRs for each advertiser category j in the Avito dataset. Let, (X i j 1(X i j (cid:54)=?)− µ j pre)2, m 1 ∑ ((cid:98)Mi j − µ j # observed 1 m i=1 m pre := (cid:99)var j (cid:99)var j In words, (cid:99)var j post := i=1 ∑ pre,(cid:99)var j post)2. post are the pre-ME and post-ME empir- ical variance in CTR for each advertiser category j in the Avito dataset. In Figures 6(a)-6(c), we plot the normalized differences in 6There are a large number of user location id's (3434 of them). Thus the pre-ME estimate of CTR per advertiser category should be relatively stable. 10 µdiff := 1 µ j pre mean and variance per advertiser category 7, µ j pre− µ j 1 (µ j pre)2 post, (cid:99)vardiff := (cid:99)var j pre−(cid:99)var j post. while (cid:99)vardiff is of the order 200%− 1550%. Thus as desired, smaller than (cid:99)vardiff, indicating that matrix estimation does We see from Figure 6(c) that µdiff is of the order 0.2%− 73%, µdiff is on average approximately three orders of magnitude indeed effectively retain signal and threshold out noise. Summary. In summary, ALS outperforms SVT (the two-step procedure of applying SVT and then ALS gives comparable performance). The best R2 achieved is 0.58; This is in-line with or better than state-of-the-art R2 performance for well- studied datasets such as Movielens, which have performance in the range of 0.3− 0.4 (cf. [17]). Further, our experiments show that matrix estimation does effectively retain signal and threshold out noise. Thus matrix estimation (specifically, ALS) can be used as an accurate, model-agnostic method to do CTR estimation as long as Zorro has access to sufficient amount of user data, and careful grouping of users and advertiser is done. 4.2 Value of Data Experiments An important question to ask is if with respect to Definition 3.3 of VoD, whether an advertiser finds value in a user's per- sonal data? Intuitively, if the CTR distribution for a particular advertiser category is tightly concentrated around its mean, then acquiring user data is not as important for that adver- tiser (as there is not much variation in CTR across users). In contrast, if the CTR distribution for an advertiser category is diffuse, then advertisers are incentivized to acquire per- sonal user data as it helps them identify which segment of the distribution a user lies in. Large Variation in VoD Across Advertiser Categories. We plot the distribution of CTR per category using a Box-and- Whisker's plot in Figure 7(a), and see instances of both cases above. For example, advertisers in Category 18 have relatively lower VoD as the CTR distribution is tightly concentrated, while advertisers in Category 4 have quite a large VoD as the CTR distribution is quite diffuse. Thus we can visually tell that advertiser's do indeed have a different VoD depending on their category, giving credence to Definition 3.3. We can summarize these visual findings through the fol- lowing quantity, (cid:100)VoDnorm j := 1 µ j pre (cid:18) 1 m m ∑ i=1 (cid:19) (cid:100)VoD(User i, Advertiser j) . 7We normalize by µ j pre to ensure µdiff can be appropriately compared between categories. For example, a 0.1 difference is significant if the un- derlying average CTR is 0.01, but not as much if it is 0.5. Same reasoning applies for (cid:99)vardiff. j j In words, (cid:100)VoDnorm riences per user 8. In Figure 7(b), we plot (cid:100)VoDnorm various Avito categories. We see that (cid:100)VoDnorm is the average VoD Advertiser j expe- for the j ranges from 30% to 69% depending on advertiser category, indicating that there is large variation in VoD depending on which category an advertiser belongs to. Query-by-Query Estimation of VoD. It is important to high- light that in our proposed system, Advertiser j can com- pute the VoD on a query-by-query basis. In other words, each time User i loads a webpage, Advertiser j can compute (cid:100)VoD(User i, Advertiser j). This is contrast with how adver- tiser's and third-party data providers engage currently, where advertisers pay based on long-term contracts or a coarse met- ric such as number of API calls made. Estimating Dollar Value of VoD. Ideally we would like to translate the estimated VoD to a dollar amount per advertiser category. Unfortunately, the Avito advertiser categories are anonymized and so instead, we give a conservative estimate. From Section 1, the size of the (rapidly growing) display advertising market is USD 54 Billion. Since the minimum is estimated to be 30% (in line with previous work, see Section 1.2), it follows that if Zorro prevents advertisers from getting user data without paying for it, the minimum loss of value for advertisers is on the order of USD 16 Billion. (cid:100)VoDnorm j 4.3 Online Ad Experiments In this section, we test how well we identify and categorize online ads by tying together open source software packages. 4.3.1 Online Ad Identification Overview of Ad Identification Module. Recall from Sec- tion 3.3.1 that the main filter we use on the redirect url is EasyList, the same filter set used by AdBlock. In addition, we manually add keywords such as "doubleclick" and "criteo" that commonly occur when a user has clicked on an ad. Overview of Ad Identification Experiment. To evaluate this simple system, we conducted a crowdsourced experiment. The experiment consisted of iterating through Alexa's top 500 global sites (cf. [27]) and clicking ten unique ads on the first 30 valid sites (websites that were not in English or had no ads were skipped). If there were not ten unique ads on the websites landing page, then ads on different webpages under the some domain were searched for. Additionally, hyperlinks that were not ads were also clicked to test whether our system could also identify non-ads accurately. Result of Ad Identification Experiment. The result of the above crowdsourced experiment are shown below. 8Again, like in Section 4.1.2, we normalize by µ j pre to ensure we can appropriately compare between categories. (a) (b) Figure 7: Figure 7(a) - Box and Whisker's plot of CTR distri- bution per category. Figure 7(b) - Plot of normalized average (cid:100)VoD per category. Classified Ad Classified Not Ad True Ad 239 (83%) 2 (97%) Not Ad 49 (17%) 68 (3%) We have a True Positive rate of 83% and a True Negative Rate of 97%, indicating that our system can reliably identify whether a hyperlink on a webpage is an ad or not. Additionally, a large portion of the ads we could not identify were because they did not go through an ad exchange (i.e. have a redirect url that spawned a tab in a browser). If we do not include such ads, then our True Positive rates goes up to 88%. Such ads are the result of direct negotiations between a website and advertisers. Thus they are not of relevance to our system as they do not go through the RTB ecosystem, and third-party data is not purchased by advertisers in such instances. 4.3.2 Online Ad Categorization Overview of Ad Categorization Module. Recall from Sec- tion 3.3.2 (and verified in Section 4.1.2) that ad categorization is an important pre-processing step to group advertiser's to- gether to get good out-of-sample performance in CTR estima- tion. As detailed in Section 3.3.2, we use the industry standard IAB taxonomy to categorize advertisers. To do so, we use the 11 open-source natural language processing software uClassify to predict a webpage's IAB category based on the text in the webpage's body. We focus on the top two Tiers of the IAB taxonomy as the categorization is sufficiently detailed. It is straightforward to extend to the bottom two tiers if required. Overview of Ad Categorization Experiment. Unfortu- nately, there do not exist good online datasets with IAB cate- gorizations of websites that we can use to test the accuracy of our system. Thus we designed a proxy experiment using Wikipedia webpages as follows. Wikipedia provides a de- tailed hierarchal categorization of its own webpages. Thus for each IAB Tier 1 category (28 in total), we randomly sample two Tier 2 categories within it and then define a mapping from these IAB Tier 2 category to a near identical Wikipedia category. For example, the IAB category "Travel Type" was mapped to the Wikipedia category "Types of Travel". If a close Wikipedia category was not found, we resample an IAB Tier 2 category such that a matching Wikipedia is found. Considering these relatively benign sources of error, and the large number of Tier 1 and Tier 2 categories, our system reliably categorizes an advertiser to a relevant IAB category, based on the advertiser's webpage. 4.4 User Data Protection Experiments Recall from Section 3.4 that for our system, it is essential that personally identifiable information (PII) of a user on the Zorro For each Wikipedia category selected, we chose up to 100 articles under that category. If there were not 100 articles for a given category (for many there were not), we iterated through the subcategories of that category, and randomly sampled articles from subcategories until we reached a 100. We then ran our classifier on the text from those articles. Result of Ad Categorization Experiment. The results of the above experiment are shown in Figures 8(a) and 8(b). For Tier 1 categories, the classification accuracy was 67.36% and for Tier 2 categories, the classification accuracy was 52.75%. This is consistent as correctly classifying a Tier 1 category is a necessary requirement to correctly classify a Tier 2 category. It is worth noting that these results are far better than if we random selected a category. Recall that there are 28 IAB Tier 1categories and 341 Tier 2 categories and so a random classi- fication would give 3.6% and 0.3% accuracy respectively. Furthermore, it is likely that our system performs better than our tests indicate for the following two reasons. (1) It was often that case that articles from subcategories of the selected Wikipedia category were somewhat unrelated the further down in the Wikipedia hierarchy the subcategory was. For example, the category "Environment" was mapped to a Wikipedia subcategory "Underground Laboratories". In such mappings, correct classification is not possible. (2) If an out- putted IAB category was incorrect, it was still often strongly related to the correct one. For example, articles on children's films would be classified as family or fantasy films. (a) (b) Figure 8: Average uClassify classifier accuracy on IAB Tier 1 and Tier 2 categories is 67.36% and 52.75% respectively. system, is not inadvertently "leaked" to advertisers. We begin by giving a brief overview of how advertisers track users across the web and then describe an experiment to verify that user data is indeed not leaked to an advertiser. Tracking Techniques. As users surf the web, advertisers track users through three main methods (cf. [22]). (1) Third Party Cookies: Primary method of tracking. Cook- ies on a user's browser not placed there by the primary website he/she is visiting 9. Meant solely for tracking users across web. Hence we identify and remove such cookies by checking that they are unrelated to the primary website. (2) Cache: Images and other website-specific information are stored on the browser as cookies. Meant for more efficient page loads as website information need not be retrieved from the server. However, websites can encode information in such cookies to identify and track users. Easily easily solved by clearing the cache periodically. However from the experimen- tal results, this is not currently necessary as websites do not tend to forward this information on to advertisers. (3) Flash Cookies: Cookies stored in flash player plug- ins (e.g. Adobe Flash Player). Flash cookies are harder to clear without leading to a significantly poorer user experience; 9First-party cookies are placed on a user's browser by the primary website. Used to store site specific settings such as login information. 12 specifically, clearing flash cookies would require clearing data from every plugin a user has installed. Again as with (2), from experimental results, this is not currently necessary as a mini- mal number of advertisers go through such a mechanism. Overview of User Data Protection Experiment. We design a simple test to verify whether our system prevents inadvertent "leakage" of user data to advertisers. We do so by clicking on an ad on an initial website, and counting the number of times that ad is repeated on subsequent websites. We do this experiment with: (1) clearing no cookies; (2) blocking only third-party cookie blocking; (3) blocking all types of cookies listed above. We automate this experiment by using software packages Selenium and Pyautogui to automatically click on ads on the top 500 websites listed by Alexa (cf. [27]). On each website, our software clicks every "iframe" element and uses our ad identification module to classify if is is an ad or not. Result of User Data Protection Experiment. See Table 4.4 for results of the above experiment. As desired, we see that when we simply block third-party cookies, we reduce the per- centage of repeat ads show from 29% to 9% as compared to if there was no blocking. By blocking all cookies listed above, it does not affect the number of repeat ads seen, indicating that blocking Cache and Flash cookies is currently less important. Total Ads Clicks # Repeat Ads Zorro Off 3rd Party 103 30 (29%) 107 10 (9%) All 107 10 (9%) 5 Forward Looking Intent Explicit User Intent in Display Advertising. A large loss of value in the current ecosystem is that user intent is not captured. For example, it is common in online advertising that once a user has made a retail purchase, ads for the purchased item are repeatedly shown to the user after the fact. This is clearly a source of large loss of revenue for advertisers and a great irritant to users. In a future iteration of Zorro, we intend to provide an API to users that let them indicate forward-looking intent for the category of ads they would like to see. Below we extend the LVM described in Section 3.1.2 to incorporate user intent. Further, we describe an algorithm to estimate CTR that ex- ploits the additional structure when users provide intent. We then verify that our proposed algorithm does indeed exploit the additional structure when estimating CTR CTR Estimation with Intent. Let the set of categories a user can provide intent for be indexed by [k] :={1, . . . ,k}. Then we can model user intent by generalizing M to an order-3 tensor, T ∈ [0,1]m×n×k. Here the l-th, m×n "slice" of T is a matrix of users and advertisers (appropriately grouped) conditioned on user intent being l ∈ [k]. As before, we get noisy, sparse obser- vations from T , which we denote as W ∈ {[0,1]∪{?}}m×n×k. Analogous to the matrix case, if W (i, j,l) =?, then User i has not been exposed to Advertiser j, while providing intent l. And if W (i, j,l) ∈ [0,1], then W i j indicates the empirical av- erage of the number of times a user has clicked a particular ad while providing a specific intent. The aim is estimating T from sparse, noisy observations in W . LVM for CTR estimation with Intent. Recall from Section 3.1.2 that we impose a LVM on the underlying mean matrix M ∈ [0,1]m×n, where M(i, j) = f (θi,ω j). We extend the LVM by assuming that W (i, j,l) = f (θi,ω j,ψl), where f : Rd1 × Rd2 × Rd3 → [0,1], θi ∈ Rd1, ω j ∈ Rd2 and ψl ∈ Rd3. f , θ and ω are defined identically to that in Section 3.1.2. The extension we make to the model now is that ψ is a latent factor that captures the effect of user intent in CTR estimation. Algorithm for Tensor Based CTR Estimation. We know from an extension of the arguments made in [9] that if T follows a LVM, then it is "approximately" low-rank. Thus we postulate that the flattened tensor, i.e. T flat ∈ [0,1]m×(n×k) is also "approximately low-rank". Here T flat is the matrix constructed by appending together the l different "slices" of T . Thus we propose the following simple algorithm: (1) Construct W flat ∈ [0,1]m×(n×k) from W identically to how T flat is defined; (2) Let T flat = ME(W flat); (3) Declare T (i, j,l) = T flat(i, (l − 1)m + j) Experimental Verification of Algorithm. In the Avito dataset, fortunately for our purposes, there is user intent data provided (called "SearchCategoryID"). There are 40 user search category IDs present in the dataset. Analogous to Section 4.1.1, where we create a 3434× 31 matrix of user locations and ad category, we create an order-3 tensor of di- mension 3434 × 31 × 40, by incorporating user intent. We now present two experimental results. In Figure 9(a), the rank of the flattened user-advertiser- intent matrix (i.e. W flat) induced from the tensor (i.e. W ) is approximately 3! This justifies the generalized LVM above. In Figure 9(b), we compare our proposed algorithm against a natural baseline; in the baseline, we run matrix estimation (using ALS) for each of the 40 "slices" separately. By doing so, we do not exploit any of the additional (latent) structure across the user intent dimension. We plot the R2 for the al- gorithms as a function of the percentage of the tensor that is filled. As desired, we see that the out-of-sample R2 for our algorithm (0.53) is significantly improved over the baseline (0.17), indicating that our algorithm does effectively exploit the latent structure across all three dimensions. 6 Conclusion In conclusion, we provide an "absolute" definition of the VoD, which is independent of a buyer's model for VoD. We operationalize our proposed definition by relying on matrix estimation, and our experiments show that it faithfully (us- ing out-of-sample performance) recovers the VoD. As future work, we intend to open-source and release a Zorro Chrome 13 [4] Dirk Bergemann, Alessandro Bonatti, and Alex Smolin. The design and price of information. American Eco- nomic Review, 108(1):1 -- 48, January 2018. [5] Hal Berghel. Equifax and the latest round of identity theft roulette. Computer, 50(12):72 -- 76, 2017. [6] Internet Advertising Bureau. Iab tech lab content tax- https://www.iab.com/guidelines/iab-quality- onomy. assurance-guidelines-qag-taxonomy/, 2018. [7] Carole Cadwalladr and Emma Graham-Harrison. Re- vealed: 50 million facebook profiles harvested for cam- bridge analytica in major data breach. The Guardian, 17, 2018. [8] Jian-Feng Cai, Emmanuel J Candès, and Zuowei Shen. A singular value thresholding algorithm for matrix com- pletion. SIAM Journal on Optimization, 20(4):1956 -- 1982, 2010. [9] Sourav Chatterjee et al. Matrix estimation by universal singular value thresholding. The Annals of Statistics, 43(1):177 -- 214, 2015. [10] Mark A Davenport and Justin Romberg. An overview of low-rank matrix recovery from incomplete observations. IEEE Journal of Selected Topics in Signal Processing, 10(4):608 -- 622, 2016. [11] Magdalini Eirinaki and Michalis Vazirgiannis. Web mining for web personalization. ACM Trans. Internet Technol., 3(1):1 -- 27, February 2003. [12] Phillipa Gill, Vijay Erramilli, Augustin Chaintreau, Bal- achander Krishnamurthy, Konstantina Papagiannaki, and Pablo Rodriguez. Follow the money: understanding economics of online aggregation and advertising. In Proceedings of the 2013 conference on Internet mea- surement conference, pages 141 -- 148. ACM, 2013. [13] Umar Iqbal, Zubair Shafiq, and Zhiyun Qian. The ad wars: Retrospective measurement and analysis of anti- adblock filter lists. In Proceedings of the 2017 Inter- net Measurement Conference, IMC '17, pages 171 -- 183, New York, NY, USA, 2017. ACM. [14] Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. Low-rank matrix completion using alternating minimiza- tion. In Proceedings of the forty-fifth annual ACM sym- posium on Theory of computing, pages 665 -- 674. ACM, 2013. [15] Kaggle. context ad clicks. Kaggle avito https://www.kaggle.com/c/avito-context-ad-clicks/, 2015. (a) (b) Figure 9: Figure 9(a) - singular values of flattened tensor for different CTR thresholds & % of data retained. Figure 9(b) - R2 vs. % entries filled for our proposed algorithm vs. baseline. extension for public use. Lastly, we note that our proposed architecture, where we estimate the VoD in a model agnostic manner, can serve as base to build a general-purpose data rec- ommendation system, i.e., instead of buyers querying Zorro, Zorro recommends data to buyers if estimated VoD is high. References [1] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, San- jay Ghemawat, Geoffrey Irving, Michael Isard, et al. Tensorflow: A system for large-scale machine learning. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pages 265 -- 283, 2016. [2] Anish Agarwal, Munther A. Dahleh, and Tuhin Sarkar. A marketplace for data: An algorithmic solution. CoRR, abs/1805.08125, 2018. [3] Howard Beales. The value of behavioral targeting. Net- work Advertising Initiative, 1, 2010. [16] J Kågström, R Karlsson, and E Kågström. uclassify web service. 2013. 14 [17] Yashodhan Karandikar. Cse 255 assignment 1: Movie rating prediction using the movielens dataset. [25] David Silverman. Iab internet advertising revenue report. Interactive Advertising Bureau. New York, 2018. [26] Brave Software. Basic attention token (bat) white paper- blockchain based digital advertising. https://basicattentiontoken.org, 2018. [27] Alexa Top. 500 global sites, 2018. [28] Janice Y Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. The effect of online privacy infor- mation on purchasing behavior: An experimental study. Information Systems Research, 22(2):254 -- 268, 2011. [29] Stefan Van Der Walt, S Chris Colbert, and Gael Varo- quaux. The numpy array: a structure for efficient numer- ical computation. Computing in Science & Engineering, 13(2):22, 2011. [30] Jun Wang, Weinan Zhang, Shuai Yuan, et al. Display advertising with real-time bidding (rtb) and behavioural targeting. Foundations and Trends R(cid:13) in Information Retrieval, 11(4-5):297 -- 435, 2017. [31] Jun Yan, Ning Liu, Gang Wang, Wen Zhang, Yun Jiang, and Zheng Chen. How much can behavioral targeting help online advertising? In Proceedings of the 18th international conference on World wide web, pages 261 -- 270. ACM, 2009. [32] Weinan Zhang, Shuai Yuan, Jun Wang, and Xuehua Shen. Real-time bidding benchmarking with ipinyou dataset. arXiv preprint arXiv:1407.7073, 2014. [18] Christina Lee, Yihua Li, Devavrat Shah, and Dogyoon Song. Blind regression: Nonparametric regression for latent variable models via collaborative filtering. In Advances in Neural Information Processing Systems, pages 2155 -- 2163, 2016. [19] Boberdoo LLC. Ping post software -- the basics. https://www.boberdoo.com/ping-post-ping-tree, 2019. LLC. [20] Wordstream ads benchmarks industry. https://www.wordstream.com/blog/ws/2016/02/29/google- adwords-industry-benchmarks, 2016. Google for your [21] Charles Mann. How click fraud could swallow the inter- net. Wired Magazine, 14(1), 2006. [22] Jonathan R Mayer and John C Mitchell. Third-party In 2012 IEEE web tracking: Policy and technology. Symposium on Security and Privacy, pages 413 -- 427. IEEE, 2012. [23] Xiangrui Meng, Joseph Bradley, Burak Yavuz, Evan Sparks, Shivaram Venkataraman, Davies Liu, Jeremy Freeman, DB Tsai, Manish Amde, Sean Owen, et al. Mllib: Machine learning in apache spark. The Journal of Machine Learning Research, 17(1):1235 -- 1241, 2016. [24] Christopher Riederer, Vijay Erramilli, Augustin Chain- treau, Balachander Krishnamurthy, and Pablo Rodriguez. For sale: your data: by: you. In Proceedings of the 10th ACM WORKSHOP on Hot Topics in Networks, page 13. ACM, 2011. 15
1506.00572
2
1506
2015-06-13T14:37:25
How much is said in a microblog? A multilingual inquiry based on Weibo and Twitter
[ "cs.SI", "cs.CL", "cs.CY" ]
This paper presents a multilingual study on, per single post of microblog text, (a) how much can be said, (b) how much is written in terms of characters and bytes, and (c) how much is said in terms of information content in posts by different organizations in different languages. Focusing on three different languages (English, Chinese, and Japanese), this research analyses Weibo and Twitter accounts of major embassies and news agencies. We first establish our criterion for quantifying "how much can be said" in a digital text based on the openly available Universal Declaration of Human Rights and the translated subtitles from TED talks. These parallel corpora allow us to determine the number of characters and bits needed to represent the same content in different languages and character encodings. We then derive the amount of information that is actually contained in microblog posts authored by selected accounts on Weibo and Twitter. Our results confirm that languages with larger character sets such as Chinese and Japanese contain more information per character than English, but the actual information content contained within a microblog text varies depending on both the type of organization and the language of the post. We conclude with a discussion on the design implications of microblog text limits for different languages.
cs.SI
cs
How much is said in a microblog? A multilingual inquiry based on Weibo and Twitter Han-Teng Liao Oxford Internet Institute University of Oxford [email protected] King-wa Fu Journalism and Media Studies Centre University of Hong Kong [email protected] Scott A. Hale Oxford Internet Institute University of Oxford [email protected] 5 1 0 2 n u J 3 1 ] I S . s c [ 2 v 2 7 5 0 0 . 6 0 5 1 : v i X r a ABSTRACT This paper presents a multilingual study on, per single post of microblog text, (a) how much can be said, (b) how much is written in terms of characters and bytes, and (c) how much is said in terms of information content in posts by different organizations in different languages. Focusing on three different languages (English, Chinese, and Japanese), this research analyses Weibo and Twitter accounts of major embassies and news agencies. We first establish our crite- rion for quantifying “how much can be said” in a digital text based on the openly available Universal Declaration of Hu- man Rights and the translated subtitles from TED talks. These parallel corpora allow us to determine the number of characters and bits needed to represent the same content in different languages and character encodings. We then de- rive the amount of information that is actually contained in microblog posts authored by selected accounts on Weibo and Twitter. Our results confirm that languages with larger character sets such as Chinese and Japanese contain more information per character than English, but the actual in- formation content contained within a microblog text varies depending on both the type of organization and the language of the post. We conclude with a discussion on the design im- plications of microblog text limits for different languages. Categories and Subject Descriptors H.5.3 [Information Interfaces and Presentation (e.g., HCI)]: Group and Organization Interfaces—Web-based in- teraction; H.5.4 [Information Interfaces and Presenta- tion (e.g., HCI)]: Hypertext/Hypermedia General Terms Human Factors; Measurement Keywords Microblogs; Language; Design; Social Networking c(cid:13) Liao, H.T., Fu, K.W., Hale, S.A. 2015. This is the authors’ ver- It is posted here for your personal use. Not for sion of the work. redistribution. The definitive version was published in WebSci ’15, http://dx.doi.org/10.1145/2786451.2786486. 1. ARBITRARY CHARACTER LIMITS? Microblogging platforms are distinguished from traditional blogging platforms by having a limit on the length of posts. Such length limitations are reported to lower the time and thought required to create new content and allow for faster and more timely exchange of information [6, 16]. Most studies considering the effects of length limitations on the user experience of microblogging have examined English- language content, but there is ample reason to believe that universal length limitation have different effects on people writing content in different languages. It has been reported by major media such as BBC [13] and the Atlantic [29] that one can express much more content in languages other than English within a given character limit, most notably the 140- character limit of Twitter and the 140-byte limit of Short Message Service (SMS, or text messages). Chinese [2] and Japanese [33] are often cited as examples of “more expres- sive” languages within such space limits. However, a definitive answer using systematic and quan- tifiable methods is yet to be provided to the question of how much more expressive a given language is within such length limitations. Neubig and Duh [26] provide the only academic work on this subject and use an information-theoretic ap- proach. They find that Chinese and Japanese are the most expressive languages per character, but do not use parallel corpora (i.e., the same information in multiple languages) in their work. Apart from academic scholarship, the issue of language expressiveness has received much attention in the popular press with the BBC reporting that 140 Chinese characters amounts to 70 to 80 English words [13]. Blog- gers have also weighed in on the debate with one blogger writing that 140 Chinese characters could contain five times more content than the same number of English characters [30] and another blogger claiming that “140 Chinese char- acters is more like 500 characters on Twitter.com” [5]. By machine translating foreign-language content from Twitter from “a few users,” IT Consultant Ben Summers reported on his blog that Japanese tweets could contain information that would take up to 260 English characters to express [33]. These differing estimates and the lack of academic scholar- ship on this topic motivate our paper. The imposition of length constraints has profound effects on how platforms are used and hence the user experience of these platforms. The effects of length constraints on users are not new or unique to microblogging platforms. The user experience of SMS has received much attention, and scholars have found that the limitations resulted in specific language practices including specific abbreviations (e.g., b4, 2day) as well as more contractions in comparison to instant messaging [21]. It is difficult to disentangle length and in- put device limitations when comparing instant messaging and SMS [21], but one study found SMS messages sent via Internet-connected PCs were longer than those sent directly from mobile (feature) phones [10]. Finally, Grinter et al. [10] found that the length limitations of SMS allowed teenagers to forego conversational conventions and reduce the overall time spent on interactions. In this paper, we attempt to answer the general questions of how space/length restrictions affect (a) how much can be said, (b) how much space is used, and therefore (c) how much is actually said within imposed space limitations and how these factors differ across languages. These basic ques- tions are central to any cross-lingual assessment of the im- pact of length limitations on microblog posts and hence the user experience of people on such services and have impor- tant ramifications for designers of microblogging platforms as well as people using such platforms. 1.1 Reasons for length limitations Early character limits were often imposed as a result of technical limitations. For example, the character limit of text messages (SMS) was the result of an engineering choice to send SMS messages via the existing signaling channels of the GSM system (but with a lower priority than other signaling messages) [14]. After including header informa- tion, the existing channel left 140 octets (bytes) available for the text of an SMS message. Using 7-bit character en- coding, 160 Latin characters were made to fit in this space [1]. Hillebrand, an early pioneer of SMS, reasoned that 160 characters would be sufficient through an examination of the number of characters (including spaces and punctuation marks) for random short paragraphs [9, 34]. Although we cannot be certain which language he used for this exercise, it is likely to have been English or German. If another lan- guage (particularly a language with a non-Roman alphabet such as Japanese or Chinese) had been used, Hillebrand may have reached a different conclusion about the feasibility of using the existing signaling channels of the GSM system and ultimately developed SMS in a different manner with a dif- ferent character limit. The continuation of character limits on modern microblog- ging platforms is less a case of technical limitations and more often a design choice aiming to cultivate a certain user ex- perience. Best practices published by Twitter in 2013 men- tioned the 140-character limit and stated that “creativity loves constraints and simplicity is at our core.” [36]. Char- acter limitations may have very different effects in differ- ent languages as cross-platform and cross-lingual analysis of microblogs suggests language is an important factor for researchers to consider [e.g., 7, 11, 12, 15, 19]. When Twitter launched, it set a limit of 140 characters for posts so that a Twitter post would fit within a single SMS message and leave 20 characters for usernames and other commands [9, 23]. It should be noted, however, that only for 140 English characters would this have ever been the case as SMS itself has a hard limit of 140-bytes within a single message as previously stated. Thus, a single SMS message can only accommodate 70 Chinese or Japanese characters. The limits imposed on Twitter, however, are character limits and not byte limits [37], and thus, it is possible to send a tweet with 140 Chinese characters even though such a tweet would never have fit within one SMS message. Now that most Twitter traffic comes from native apps on smartphones, which have no technical limitation on the length of messages, the continued imposition of the 140-character limit is due less to technical reasons and more to user-experience design choices. When Sina Weibo launched in mainland China it also im- posed a limit on the length of posts. This limit is often reported to also be 140 characters [e.g., 5], but the data we collected in this study revealed several posts with more than 140 characters. Our experimentation with the Sina Weibo interface indicates that Sina Weibo likely imposes a byte limit and not a character limit. We found that posts on Sina Weibo can be up 140 Chinese characters or 280 English/Latin characters.1 In other words, Sina Weibo im- poses a varying limit on the number characters a message may contain depending on the number of bytes required to store each character. In practice, this means that messages in English on the platform could be twice as long as mes- sages in Chinese, with most other languages having maxi- mum lengths somewhere between these endpoints depending on the frequency of accented and other special characters in the language. Apart from the question of the actual limits imposed on different communication platforms, marketers and other users of microblogging platforms have asked what the “ideal” mes- sage length is for driving strong engagement, with different numbers reported for different platforms including Twitter, Facebook and Google Plus [17]. For example, it is reported and recommended by various industry research organiza- tions that the ideal length of a tweet is either 100 or 71–100 characters [17, 35]. It is also reported that the ideal Face- book post be around 40 characters while the Google Plus posts should be around 60 characters [35], despite these plat- forms allowing much longer posts in practice [3]. However, despite the marketing and industry interest in the factor of microblog post length for engagement optimization, there is little research on length across different languages and/or different platforms. In other words, we need to fill the gap in both research and design with cross-cultural considerations [34] regarding both the limits and actual practices regarding the length of posts. 1.2 A parallel corpora approach Corpus linguists have partially addressed the question on how much can be said in different languages using parallel corpora. Before Twitter came into existence, the Director of Linguistic Data Consortium (a major linguistic research data keeper) conducted a well-designed comparison of Chi- nese and English using the LDC parallel Chinese/English corpora, producing ratio results ranging from 1.96 to 2.27 for texts and 1.19 to 1.24 for compressed (gzipped) files [20]. The underlying idea behind Liberman’s research design was straightforward. By comparing the actual storage space of texts of the same content in different languages, one can see how much “space” is required to store/convey the same content. This idea is expressed by the equation below: SlangA × IClangA = SlangB × IClangB (1) 1This suggests Sina Weibo imposes a byte limit with a char- acter encoding such as GBK that uses one byte to store most English/Latin characters and two bytes to store other characters including most Chinese characters. Slang denotes the “space” units required to store the con- tent in language lang. IClang denotes the amount of “in- formation content” per space unit in language lang. The equation holds only for parallel corpora, which by definition contain the same content in each language (i.e., where langA and langB contain the same information written in different languages). While Liberman’s research is systematic and addresses the computational questions of information storage, it is of lim- ited application to modern social media data for two rea- sons. First, the amount of storage space required to store information in different languages depends on the character encoding used. Liberman’s work used the Chinese national standard GB-2312 and not the international Unicode en- codings, which have become more common for multilingual websites and applications. Second, the data Liberman used was formal and legalistic in nature. The ratios between such formal text may not apply to the more conversational and informal text commonly found on modern social media plat- forms. 2. METHODS AND DATA SELECTION We propose a systematic step-wise approach that can be extended to cover more platforms, languages, and types of microblogs, with the aim to answer our three main research questions. We choose to focus on news and diplomacy orga- nization accounts because we expect the length of messages would be integral to the overall communication strategies, including in potential cross-lingual or cross-cultural scenar- ios. The data selection in this paper is limited to two plat- forms, three languages, and the most recent posts of 54 microblogs. However, as the first multiplatform and mul- tilingual study its contributions are important and lay the foundation for future work with additional account types, languages, and platforms. The following sections describe the three steps of the re- search process, each of which answers one of our research questions concerning (a) how much can be said, (b) how much is typed and posted, and (c) how much is said in differ- ent languages by different organizations. First, we calculate the cross-lingual ratios of information content. 2.1 Calculating the cross-lingual ratios of in- formation content based on UDHR and TED talks Following the approach of Liberman’s corpus linguistic study [20], we propose a generic research design to measure the ratios of “information content” in different languages. The ratio of information content per space for language B to language A can be derived from Equation 1 to produce the ratio given in Equation 2. This is the inverse ratio of “space” required to store the same content when a parallel corpus is used. In other words, if more space is required to store the same content for language B than language A, the ratio value will be less than one, indicating the information content per space unit of language B is smaller than that of language A. ratio(langB, langA) = IClangB IClangA = SlangA SlangB (2) The potential of using Web content as a parallel corpus for research has been proposed [28] and executed [18]. We use a parallel corpus formed from human-translated user- generated content for several reasons. First, the content is open and freely available providing for easier replication in comparison to conventional parallel linguistic corpora, which often require license fees to use. Second, the human transla- tion of the content usually provides better quality text than corpora formed with machine translation of open content. Third, most user-generated content is generally more up-to- date and contemporary than that of conventional corpora and is closer in style to the text used on microblogging plat- forms and thereby provides a more suitable basis for the research on microblogging. We analyze two corpora to understand how corpus se- lection influences our results. The first corpus we use is the UDHR in Unicode Project, which provides translations of the Universal Declaration of Human Rights (UDHR) to demonstrate the use of Unicode for multilingual environ- ments. Because of the normative, universal and semile- gal status of UDHR, the Unicode translation project is the “most translated text” [38]. Thus, the project can provide parallel corpora that cover the most languages in the world for comparison. Our second parallel corpus is formed from the TED Open Translation Project. This project is led by a well-known, Internet-friendly organization and uses professional human translation service to kick-start the crowd-sourced transla- tion of video subtitles. The translated video subtitles form a multilingual corpora that is comparatively closer in style to informal, online communication. Of course speeches on TED.com are still different from online expressions such as microblog posts, but they are closer to online expressions when compared to legal or governmental data that is com- monly used in corpus linguistics because of its institutional availability. To calculate the ratios of information content across lan- guages, we downloaded the texts from the UDHR in Unicode Project and subtitles for all of the 1,847 TED talks available from TED.com (a complete sample of all videos available as of March 16, 2015). We have downloaded the available tran- scripts of four language versions: English, Japanese, simpli- fied Chinese, and traditional Chinese. Our full analysis of the TED talks include 1,522 videos from all the videos avail- able because 209 videos did not have transcripts available in all four languages and a further 116 videos had extremely short lengths (these were mostly performance videos). The texts were parsed and the number of characters in each video in each language was determined. For the UDHR datasets, we use each paragraph as a unit to calculate the respective ratios across languages and then produce basic descriptive statistics. For the TED datasets, we use each speech (i.e., all the subtitles for one video) as a unit. 2.2 Measuring the text lengths of posts from selected accounts from Twitter and Weibo To measure the text lengths of microblog posts, we exam- ine the posts by 54 news and embassy organizations. For Twitter, we selected 36 accounts that post either in English, Japanese, or Chinese. The most recent 200 tweets for each account were collected through the Twitter REST API on 22 January 2015. For Weibo, we collected sam- ples from a data intermediary called Weiboscope [7, 8] that provided uncensored and randomly sampled datasets from Weibo. The data was first collected by making SQL requests to the database for messages posted between 1 January and 22 January 2015. To ensure the number of posts per ac- count was large enough, we only considered accounts having more than 50 posts. Two Weibo accounts that are owned by the World Bank and the Economist (with respective screen names “世界银行” and “经济学人集团”) were thus excluded, leaving us with 18 accounts for analysis. The first column of Table 1 lists the screen names of the Twitter and Weibo accounts analyzed. With the help of human readers and our own language identification algorithms, we found that almost all accounts used one language. We coded each account accordingly with their respective language codes. We found that two Twitter accounts posted content in both English and Japanese (“UK- inJapan” and “usembassytokyo”). We collected 100 posts in each language for each of these accounts, and analyze the content in each language separately. Each of these accounts is marked with an asterisk (*) in Table 1. We coded each organization account as either embassy or news (the type column of Table 1). A small amount of gray area exists between these two categories. For example, news organizations such as China’s People’s Daily (“people cn”) may also be media organs of state governments. Other orga- nizations, such as the UN and World Bank, are not strictly embassies. Nevertheless, these international organizations have their political significance in diplomacy and in some ways their use of microblogs will be similar to the use of microblogs by embassies. At the very least, these embassy and embassy-like organizations provide a contrast in type to news organizations. The selected accounts in Table 1 thus contain a mixture of microblogs written in different languages and belonging to different types of organizations. Although the selection of accounts and posts is not ran- dom, the selected accounts cover major news and embassy organizations across three major languages on two major microblogging platforms. To measure the text lengths, we first remove all hyperlinks in the microblog posts and calculate the number of Unicode characters per post.2 Based on this measurement we derive the average length in characters (i.e., the mean value of char- acters per post) for each account (we ignore the differences between single-byte and multi-byte characters as Twitter does in enforcing its character limit [37]). With the aver- age length values across different platforms, languages, and types of organizations, we should find out whether and how such character lengths vary, thereby answering the question of how much is typed and posted. 2.3 Estimating the relative information con- tent in a microblog post for cross-lingual comparison 2We remove URLs from posts before making our length com- parison. Hong et al. [15] found that tweets in different lan- guages included URLs at different frequencies, but within our restricted set of embassies and news organizations, we find that URLs are included within tweets at a similar rate between the three languages we analyze. The majority of tweets we analyze in each language contained exactly one URL (67% of the Chinese tweets, 69% of the English tweets, and 72% of the Japanese tweets that we analyze had exactly one URL). The analysis presented here strips URLs from all tweets and compares the results, but repeating the analy- sis with only tweets that contained exactly one URL yields nearly identical findings. Twitter Screen name ft ftchina KyodoNewsENG wsj xinhuanetnews 47news asahi bbcjapan mainichiJapaneseews nikkei peopledailyjp sankei news WSJJapan asahi shinsen bbcchinese china kyodonews chinesewsj djy cn dw chinese people cn voachina UKinJapan* UN usembassytokyo* worldbank ChnEmbassy jp Embassy ItalyJP IcelandEmbTokyo IsraelinJapan koreanemb japan NLinJapan UKinJapan* UKRinJPN usembassytokyo* worldbanktokyo france in china UNRadioChinese usa china talk Weibo Language English English English English English Japanese Japanese Japanese Japanese Japanese Japanese Japanese Japanese Simplified Chinese Simplified Chinese Simplified Chinese Simplified Chinese Simplified Chinese Simplified Chinese Simplified Chinese Simplified Chinese English English English English Japanese Japanese Japanese Japanese Japanese Japanese Japanese Japanese Japanese Japanese Simplified Chinese Simplified Chinese Simplified Chinese Language Screen name 人民网 Simplified Chinese 日本共同社 Simplified Chinese 韩国中央日报 Simplified Chinese 半岛电视台AlJazeera Simplified Chinese ETtoday新聞雲 Simplified Chinese FT中文网 Simplified Chinese 华尔街日报中文网 Simplified Chinese 福布斯中文网 Simplified Chinese 路透中文网Reuters Simplified Chinese 联合国 Simplified Chinese 美国驻华大使馆 Simplified Chinese 加拿大大使馆官方微博 Simplified Chinese 韩国驻华大使馆 Simplified Chinese 以色列驻华使馆 Simplified Chinese 俄罗斯驻华大使馆 Simplified Chinese 韩国驻华大使馆 Simplified Chinese 以色列驻华使馆 Simplified Chinese 俄罗斯驻华大使馆 Simplified Chinese Type news news news news news news news news news news news news news news news news news news news news news embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy embassy Type news news news news news news news news news embassy embassy embassy embassy embassy embassy embassy embassy embassy Table 1: Twitter and Weibo accounts analyzed in this study characters. Using Chinese written with traditional charac- ters as the baseline, the set of box plots to the left shows for the same paragraph content of UDHR that it takes on average nearly four times as many characters in English to express the same content (the mean value of 3.95 is shown by the red rectangular box in the eng column). Similarly, it takes only about 1.6 as many characters to express the same content in Japanese. There is no significant difference in the number of traditional or simplified characters needed to write the same content in Chinese. If the type of language used in the UDHR was typical of the language used in mi- croblog posts, these findings would indicate that a tweet (or a Sina Weibo post) of 140 Chinese characters could convey nearly four times as much information as an English mes- sage of the same character length and 1.6 times as much information as a Japanese message of the same character length. In order to understand the impact of the specific parallel corpus used on these calculations, we repeat the same anal- ysis using the speech content of TED talks and show the results in the right set of box plots in the same figure (Fig- ure 1). This analysis yields slightly lower numbers, showing that it takes on average about 3.2 times the number the characters to express the same content in English in com- parison to Chinese. Similarly, it takes about 1.3 times as many characters to express the same content in Japanese in comparison to Chinese. Once again, there is no significant difference between the number of simplified or traditional characters needed to express the same content in Chinese. Relating these findings to microblogs, we can calculate the equivalent number of characters in each of our languages compared to 140 characters in English. These results are shown by the scale on the right y-axis for each set of box plots where the mean for English is set to 140 characters. Based on the UDHR outcomes, we find that 140-character worth of English content can be expressed in 35.53 Chinese characters or 55.71 Japanese characters. Similarly 140 char- acters worth of English content of a TED talk can be ex- pressed in 43.61 Chinese characters or 56.70 Japanese char- acters. The differences between our two corpora are likely due to the nature of the content of each corpus, as the lan- guage used in the UDHR is much more formal and legalistic in comparison to the transcripts of TED talks.3 Beyond character measurements, we can also measure space more traditionally using the number of binary digits (or bits, eight of which form a byte) needed to store the same infor- mation content in different languages. The number of bits needed to store a character depends on the encoding scheme used. The most popular multilingual encoding scheme in use today is UTF-8, which uses a variable number of bytes to store a character. Almost all the characters used in En- glish along with common punctuation marks require 8-bits (one byte) to store, while most characters used in Japanese and Chinese require 24-bits (three bytes) to store. Results from both our corpora (Figure 2) show that information in 3One limitation of using TED talks is that the vast majority of talks are given in English and other language transcripts are translations of this English source. There may be dif- ferences in how closely transcripts in each language follow the spoken dialogue, but we find that filler words (e.g., uh, er, and um) are rarely transcribed in any language, includ- ing English. Future work may consider developing a more balanced corpus by using movie subtitles with a variety of source languages. Figure 1: Relative ratio of characters in English (eng), Japanese (jpn), and Chinese using simplified characters (cmn hans) required to express the same content compared to Chinese using traditional char- acters (cmn hant) as the baseline. After we calculate the ratios of information content and the lengths, we can then derive an estimation of relative information content (RIC) as given in Equation 3. RIClangA = SlangB ratio(langB, langA) = S (cid:48) langA (3) The main purpose of the Equation 3 is to allow for cross- lingual comparisons on an equal basis. Using language A as the baseline, the relative information content can be derived by dividing the value of the number of space units (SlangB ) used when the content is expressed in language B with the ratio of information content (ratio(langB, langA)). The for- mula produces the equivalent space that would be required to expressed the same content in language A (S(cid:48) langA ). We present results where space is measured either as characters or as UTF-8 bytes. 3. FINDINGS The findings are presented in three subsections, each an- swering one of our three main research questions. The find- ings of the first subsection confirm that Chinese and Japanese contain more information per character. The findings of the second subsection show a mixed picture on the length of microblog posts by different organizations in different lan- guages. Combining the results from the first two subsec- tions, the third and final subsection presents the derived measurement of the relative information content expressed in microblog posts by different organizations in different lan- guages. 3.1 How much can be said: UDHR and TED talks Figure 1 shows the outcomes of the research on the UDHR texts and the TED talks respectively using box plots. Both sets of box plots show that indeed, per Unicode character, the Chinese language can express the same idea with fewer engjpncmn_hantcmn_hans0123456UDHRengjpncmn_hantcmn_hans0.00.51.01.52.02.53.03.54.0TED Talks0.035.470.9106.3141.8177.2212.7021.843.665.487.2109.0130.8152.6174.4 Figure 2: Relative ratio of bits (when the UTF-8 encoding scheme is used) required to express the same content when compared to Traditional Chinese (cmn hant). Figure 3: Length of microblog posts in characters (excluding URLs) in English (eng), Japanese (jpn) and Simplified Chinese (cmn hans). all our languages can be stored in similar amounts of space using UTF-8 encoding. While text in English requires more characters, the number of bits in UTF-8 required to store those characters is similar to the number of bits needed to store the same content in Chinese or Japanese. We next turn to the questions of how much is typed and how much is said in microblog posts of different languages by different types of organizations. In answering these ques- tions, we use the character calculations from the TED talk corpus. The number of characters used in a more univer- sal measure that is directly apparent to the user with a larger effect upon the user experience.4 Character limits are also the type of limits most users of microblogging plat- forms are familiar with since Twitter’s limit is set this way. We use the measures calculated from the TED talk corpus rather than the UDHR corpus as a more conservative es- timate of the differences between languages. Furthermore, the type of language used in microblog posts is likely closer to the language used in the TED talks than to the language used in the UDHR. Using Chinese with simplified characters (cmn hans) as the baseline, we have the following ratios: ratio(eng, cmn hans) = 3.21 (4) ratio(jpn, cmn hans) = 1.30 (5) 3.2 How much is typed and posted: Organi- zations in action We find that different organizations on Weibo and Twit- ter platforms post messages of slightly different character lengths in different languages. 4In contrast, the number of bits needed to store text depends on the character encoding used. Even within UTF-8, there are multiple ways to store accented characters and other characters such that two pieces of text that appear identical to the user could actually require a different number of bytes to be stored in UTF-8. Figure 3 summarizes the overall outcomes of the microblog post length (in characters) with box plots. The left subplots show the results for Twitter, and the right subplots show the results for Weibo. The top subplots show the results for embassies, and the bottom subplots show the results for news organizations. The average lengths of posts by English-language Twit- ter accounts (105 characters with URLs; 81 without URLs) are close to the “ideal length” of a tweet reported by mar- keting/engagement companies of 100 or 71–100 characters [17, 35]. For English, the embassy-type accounts on average have longer posts than the news-type accounts. The average lengths of Japanese-language Twitter accounts show a large variance, particularly within embassy-type or- ganizations. Although this observation should not be taken as conclusive because of the limited number of Japanese- language embassy accounts (N = 18), it is nonetheless in- dicative to see the relatively wide variation among the embassy- type accounts. In addition, within the news-type accounts, some Japanese-language tweets are shorter than both En- glish and Chinese. The average lengths of posts by Chinese-language Twitter accounts tend to be shorter than English-language posts for embassy-type organizations, whereas they tend to be longer than both English and Japanese posts for news-type orga- nizations. The shortest average length of all the accounts in our dataset belongs to a Chinese-language Twitter account used by Falun Gong (screen name “djy cn”) to broadcast news in mainland China. Comparing Twitter and Weibo in Chinese, we find that the average lengths of posts by Chinese-language Weibo accounts tend to be longer than their Twitter counterparts. 3.3 How much is said: Comparing languages and organizations Combining the two sets of findings above, this final sub- section derives the amount of information content in posts in different languages by different types of organizations. Similar to Figure 3 in layout, Figure 4 shows the estimated information content using the Chinese language (with sim- engjpncmn_hantcmn_hans0123456UDHRengjpncmn_hantcmn_hans0.00.51.01.52.02.53.03.54.0TED Talks53.1106.2159.4212.5265.6318.7063.2126.3189.5252.6315.8020406080100120140Average Lengthplatform = Twitterplatform = Weiboengjpncmn_hansLanguage020406080100120140Average Lengthengjpncmn_hansLanguagetype = embassytype = news amination it appears that Sina Weibo enforces a byte-length limit using a variable-length character encoding such as GBK. We found that on Sina Weibo that we were able to post messages using up to 140 Chinese characters or 280 English characters. This difference in characters available to users is an important distinction and one that our data show many Weibo users make use of as the inclusion of URLs and other English/Latin characters leaves more space for more text (of any language) on Weibo in comparison to Twitter. 4. DISCUSSIONS AND CONCLUSIONS Based on a corpus linguistic approach with open, crowd- sourced translation data, we have updated the cross-lingual ratios of information content between English, Chinese, and Japanese. Then we have applied the results to measure em- pirically how much can be said and how much is actually said in microblog posts of different languages on Twitter and Sina Weibo. The construction of relative information content measures allows researchers to move beyond length-based comparisons for microblogging to consider other content. Wikipedia, for instance, maintains a list of the one thousand most impor- tant articles and compares their lengths across language edi- tions using “language weights” (relative to English) [22]. Our findings analyzing both the UDHR and TED talks show the impact of corpus selection for determining such weights, and calculating accurate weights will require a parallel corpus with a high degree of similarity to the type of text com- monly found in Wikipedia. We find differences in microblogging activity most strongly by platform and language, but also by organization type. In general, English-language posts use more characters than ei- ther Japanese- or Chinese-language posts on Twitter. How- ever, once the information content per character of each lan- guage is taken into account, the relative information con- tent per post shows that English-language posts actually contain less information per post than either Japanese- or Chinese-language posts. As a consequence, the very def- inition of what constitutes “micro” on each platform dif- fers by language, and this suggests that the user experi- ence of microblogging platforms may differ greatly between languages. We further find that information content differs between Twitter and Weibo, with posts on Weibo generally containing more information than posts on Twitter. This platform difference is likely a consequence of how the plat- forms enforce their length limits. Twitter enforces a limit of 140 characters without regard to the storage requirements of the characters, while Weibo enforces a byte-limit. Our work thus adds to the existing scholarship [e.g., 15, 24, 27] showing how the user experience of the same plat- form differs for users writing content in different languages. While character or byte limits impose a superficially simi- lar measure of length across languages, we find considerable difference in the actual amount of information content avail- able and commonly included within microblog posts written in different languages. Hence such a superficial measure of length actually results in wide user-experience differences. These user-experience differences impact both content con- sumption and content creation as demonstrated by the liter- ature on the impact of length restrictions on SMS messages [e.g., 10, 21]. Our findings have important ramifications for efforts to translate content across languages: content that fits within one Japanese- or Chinese-language post may not Figure 4: Relative information content (RIC) of mi- croblog posts in English (eng), Japanese (jpn) and Simplified Chinese (cmn hans). RIC is shown here as the equivalent number of Simplified Chinese char- acters (RICcmn hans). plified characters) as the baseline. Effectively, what distinguishes Figure 4 from Figure 3 is that the number of characters in English and Japanese posts have been divided by the information content ratios found using the TED talk corpus (Equation 4 and Equation 5 re- spectively). In contrast to the average length in characters, the com- parisons of information content show a clear pattern. Most Chinese language microblog posts contain more information than either posts in Japanese or English. Furthermore, posts on Sina Weibo often contain even more content than posts on Twitter. We see a larger variation among new organizations in com- parison to embassies. Reflecting the variance in character lengths, the variance in information content per post among Japanese news organizations is quite large. By manually inspecting the data, we found that the shorter posts often included only a news headline while the longer posts often contained a short summary of the news story. Across the three languages, the findings suggest a general pattern where Chinese-language posts contain more infor- mation per post than either Japanese-language or English- language posts. This difference is strongest for embassies (the top two subplots in Figure 4). For the news organiza- tions, a higher degree of overlap exists. For example, there are Chinese-language Twitter accounts such as Falun Gong (shown as an outlier dot in the figure) posting short mes- sages. The variation in Japanese-language accounts means that some Japanese-language accounts post messages with more information content than some Chinese-language ac- counts, but other Japanese-language accounts post messages with an amount of information content that is similar to many English-language accounts. Chinese-language posts are generally longer and contain more information on Weibo than Chinese-language posts on Twitter. Confusingly, we found that some Weibo posts con- tained more than 140 characters whereas no Twitter posts did. As explained previously, based on further manual ex- 020406080100120140platform = Twitterplatform = Weiboengjpncmn_hansLanguage020406080100120140RIC cmn_hansengjpncmn_hansLanguagetype = embassytype = newsRIC cmn_hans fit within one English-language post when character limits are imposed. Our findings also suggest that if the “ideal” length to maximize engagement sought after by marketing companies does exist, it is almost certainly language depen- dent. The reliance on certain language-dependent properties of information content is bound to raise a fundamental ques- tion about how such design parameters can be uncritically applied to other languages and platforms. It also challenges the perceived wisdom such as the “ideal length” of tweets on the grounds that these previous findings cannot be general- ized straightforwardly to other languages and/or platforms. Our findings show clear differences between the information content commonly contained in Japanese-, Chinese-, and English-language posts. From the perspective of multilingual Internet or Inter- net linguistics, digital support for the main East Asian lan- guages is an important milestone for the internationalization of the Internet. As put by Nakayama Shigeru, a major East Asian Science Technology and Society scholar [31]: East Asians are accustomed to dealing with a multi-byte system, in contrast to Western mono- byte reductionist culture. It may be that in the future our multi-byte culture will prove advanta- geous for dealing with complex systems (p. 12). Although one does not have to agree with Shigeru’s criti- cism of “Western mono-byte reductionist culture,” the find- ings here do suggest that platform designers and researchers need to carefully analyze what settings and assumptions may be language-specific. By using open and freely available user-generated transla- tion data as parallel corpora and by collecting both Twitter and Weibo posts in three languages, this research has inves- tigated the language-specific effects of character limits on microblogging. It is expected that more systematic mea- surement and more linguistically diverse data sets will help both researchers and designers reexamine some of the de- signs and practices that are in reality language-dependent and/or language-biased and thereby find ways to account for them and develop better designs and research that are language-aware and/or language-neutral. Further research is necessary in this area to expand our knowledge of inter- nationalization in Web Science and Internet research as well as cross-cultural Human-Computer Interaction (HCI). Our work has been the first to investigate character lengths, byte lengths, and information content across two major mi- croblogging platforms. Future work will build upon the work presented here to increase sample sizes, language coverage, and the types of users included. The use of less formal, more natural parallel corpora (i.e., TED talks) rather than formal legalistic prose for understanding informal conversation on Twitter and Weibo is also an important contribution. As the efforts to build parallel corpora from Twitter and other user- generated content platforms [e.g., 4, 25, 32] and from the Web more generally [e.g., 18, 28] improve and organizations such as Meedan and Global Voices continue facilitating the human translation of user-generated content, we will have additional tools and corpora through which to examine the impact of length and other constraints on Internet-mediated communication. Acknowledgments This research was supported in part by the University of Oxford’s ESRC Impact Acceleration Account and Higher Education Innovation Fund (HEIF) allocation. The authors would like to thank our anonymous reviewers for their help- ful comments. 5. REFERENCES [1] 3rd Generation Partnership Project (3GPP). Digital cellular telecommunications system (phase 2+); universal mobile telecommunications system (umts); technical realization of the short message service (sms) (3gpp ts 23.040 version 12.2.0 release 12). Technical report, 2014. http: //www.etsi.org/deliver/etsi_ts/123000_123099/ 123040/12.02.00_60/ts_123040v120200p.pdf. [2] Y. Chan. Microblogs reshape news in China. China Media Project, Oct. 2010. http://cmp.hku.hk/2010/10/12/8021/. [3] J. Constine. Facebook ups character limit to 60,000, Google+’s is still bigger. 2011. http://techcrunch.com/2011/11/30/status- update-character-limit/. [4] J. Dalton. Useful data from “pointless babble”: Discovering sentence-aligned parallel texts from Twitter streams. Master’s thesis, Department of Computer Science, University of Oxford, 2012. [5] L. Dugan. 140 Characters On Chinese Twitter Is More Like 500 Characters On Twitter.com. AllTwitter, July 2011. http://www.mediabistro.com/alltwitter/140- characters-on-chinese-twitter-is-more-like- 500-characters-on-twitter-com_b11951. [6] M. Ebner and M. Schiefner. Microblogging - more than fun. In Proceedings of the IADIS International Conference on Mobile Learning, pages 155–159. IADIS, 2008. [7] K.-w. Fu, C.-h. Chan, and M. Chau. Assessing censorship on microblogs in China: Discriminatory keyword analysis and impact evaluation of the “Real Name Registration” Policy. IEEE Internet Computing, 17(3):42–50, 2013. [8] K.-w. Fu and M. Chau. Reality check for the Chinese microblog space: A random sampling approach. PLOS ONE, 8(3):e58356, 2013. [9] C. Gayomali. The text message turns 20: A brief history of SMS, Dec. 2012. http://theweek.com/articles/469869/text- message-turns-20-brief-history-sms. [10] R. E. Grinter and M. A. Eldridge. y do tngrs luv 2 txt msg? In Proceedings of the Seventh European Conference on Computer-Supported Cooperative Work, ECSCW 2001, pages 219–238. Springer Netherlands, 2001. [11] S. A. Hale. Impact of platform design on cross-language information exchange. In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems Extended Abstracts, CHI EA ’12, pages 1363–1368, New York, NY, USA, 2012. ACM. [12] S. A. Hale. Global connectivity and multilinguals in the Twitter network. In Proceedings of the SIGCHI [27] U. Pfeil, P. Zaphiris, and C. S. Ang. Cultural differences in collaborative authoring of Wikipedia. Journal of Computer-Mediated Communication, 12(1):88–113, 2006. [28] P. Resnik and N. A. Smith. The Web as a parallel corpus. Comput. Linguist., 29(3):349–380, Sept. 2003. [29] R. J. Rosen. How much can you say in 140 characters? A lot, if you speak Japanese. The Atlantic, Sept. 2011. http://www.theatlantic.com/technology/archive/ 2011/09/how-much-can-you-say-in-140- characters-a-lot-if-you-speak- japanese/245199/. [30] B. Ruby. Twitter versus Weibo: What You Need To Know. The Fearless Group, Nov. 2012. http://thefearlessgroup.com/twitter-versus- weibo-what-you-need-to-know/. [31] N. C. Shigeru. The digital revolution and East Asian science. In A. K. L. Chan, G. K. Clancey, and H.-C. Loy, editors, Historical Perspectives on East Asian Science, Technology, and Medicine. World Scientific, Singapore, 2001. [32] J. R. Smith, C. Quirk, and K. Toutanova. Extracting parallel sentences from comparable corpora using document level alignment. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, HLT ’10, pages 403–411, Stroudsburg, PA, USA, 2010. Association for Computational Linguistics. [33] B. Summers. What’s the equivalent of Twitter’s 140 character limit for non-Latin character sets?, Feb. 2010. http://bens.me.uk/2010/twitter-charset- experiment. [34] H. Sun. Cross-Cultural Technology Design: Creating Culture-Sensitive Technology for Local Users. Oxford University Press, Oxford, Mar. 2012. [35] Track Social. Track social blog: Optimizing Twitter engagement – part 3: Tweet length, Oct. 2012. http: //tracksocial.com/blog/2012/10/optimizing- twitter-engagement-part-3-tweet-length/. [36] Twitter. Best practices: Be the best at what, when and how you tweet. https://web.archive.org/web/20131020033342/ https://business.twitter.com/best-practices. [37] Twitter. Character counting. https://dev.twitter.com/overview/api/counting- characters. [38] United Nations. The World’s Most Translated Document. Human Rights Day, Dec. 2007. http://www.un.org/en/events/humanrightsday/ 2007/worldtransdoc.shtml. Conference on Human Factors in Computing Systems, CHI ’14, pages 833–842, New York, NY, USA, 2014. ACM. [13] D. Hewitt. Has Weibo really changed China? BBC, July 2012. http://www.bbc.co.uk/news/magazine-18887804. [14] F. Hillebrand. Short message and data services, 2002. [15] L. Hong, G. Convertino, and E. Chi. Language matters in Twitter: A large scale study. In International AAAI Conference on Weblogs and Social Media, pages 518–521, 2011. [16] A. Java, X. Song, T. Finin, and B. Tseng. Why we Twitter: Understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, WebKDD/SNA-KDD ’07, pages 56–65, New York, NY, USA, 2007. ACM. [17] K. Lee. The proven ideal length of every tweet, Facebook post, and headline online. Fast Company, Apr. 2014. http://www.fastcompany.com/3028656/work- smart/the-proven-ideal-length-of-every-tweet- facebook-post-and-headline-online. [18] B. Li and J. Liu. Mining Chinese-English parallel corpora from the Web. In In Proceedings of the 3rd International Joint Conference on Natural Language Processing (IJCNLP), pages 847–852, Hyderabad, India, 2008. Citeseer. [19] H.-T. Liao. What do Chinese-language microblog users do with Baidu Baike and Chinese Wikipedia? a case study of information engagement. In Proceedings of The International Symposium on Open Collaboration, OpenSym ’14, pages 23:1–23:10, New York, NY, USA, 2014. ACM. [20] M. Liberman. Language Log: One world, how many bytes? Language Log, Aug. 2005. http://itre.cis.upenn.edu/~myl/languagelog/ archives/002379.html. [21] R. Ling and N. S. Baron. Text messaging and IM linguistic comparison of American college data. Journal of Language and Social Psychology, 26(3):291–298, Sept. 2007. [22] Meta-Wiki. List of Wikipedias by sample of articles, 2015. http://meta.wikimedia.org/wiki/List_of_ Wikipedias_by_sample_of_articles. [23] M. Milian. Why text messages are limited to 160 characters. LA Times Blogs, May 2009. http://latimesblogs.latimes.com/technology/ 2009/05/invented-text-messaging.html. [24] A. X. Mina. Batman, pandaman and the blind man: A case study in social change memes and Internet censorship in China. Journal of Visual Culture, 13(3):359–375, 2014. [25] M. Mohammadi and N. GhasemAghaee. Building bilingual parallel corpora based on Wikipedia. In Computer Engineering and Applications (ICCEA), 2010 Second International Conference on, volume 2, pages 264–268, March 2010. [26] G. Neubig and K. Duh. How much is said in a tweet? A multilingual, information-theoretic perspective. In AAAI Spring Symposium on Analyzing Microtext, 2013.
1801.04642
1
1801
2018-01-15T02:22:56
Stable and Efficient Structures for the Content Production and Consumption in Information Communities
[ "cs.SI", "physics.soc-ph" ]
Real-world information communities exhibit inherent structures that characterize a system that is stable and efficient for content production and consumption. In this paper, we study such structures through mathematical modelling and analysis. We formulate a generic model of a community in which each member decides how they allocate their time between content production and consumption with the objective of maximizing their individual reward. We define the community system as "stable and efficient" when a Nash equilibrium is reached while the social welfare of the community is maximized. We investigate the conditions for forming a stable and efficient community under two variations of the model representing different internal relational structures of the community. Our analysis results show that the structure with "a small core of celebrity producers" is the optimally stable and efficient for a community. These analysis results provide possible explanations to the sociological observations such as "the Law of the Few" and also provide insights into how to effectively build and maintain the structure of information communities.
cs.SI
cs
Stable and Efficient Structures for the Content Production and Consumption in Information Communities Larry Yueli Zhang1 and Peter Marbach2 1 University of Toronto [email protected] 2 University of Toronto [email protected] Abstract. Real-world information communities exhibit inherent struc- tures that characterize a system that is stable and efficient for content production and consumption. In this paper, we study such structures through mathematical modelling and analysis. We formulate a generic model of a community in which each member decides how they allo- cate their time between content production and consumption with the objective of maximizing their individual reward. We define the commu- nity system as "stable and efficient" when a Nash equilibrium is reached while the social welfare of the community is maximized. We investigate the conditions for forming a stable and efficient community under two variations of the model representing different internal relational struc- tures of the community. Our analysis results show that the structure with "a small core of celebrity producers" is the optimally stable and efficient for a community. These analysis results provide possible expla- nations to the sociological observations such as "the Law of the Few" and also provide insights into how to effectively build and maintain the structure of information communities. Key words: modelling and analysis, communities, social networks 1 Introduction Communities are an important structure that widely exists in real-world online and offline social networks. A common type of community is the information community in which the members of the community produce content and con- sume the content produced by other members, with the most popular example being Reddit [11] where each "subreddit" is essentially an information commu- nity with a specific topic of interest. Real-world communities often exhibit inher- ent structures such as the high density of interactions within the community and the existence of a core set of active members who would contribute the majority of the content in the community ("the Law of the Few") [4, 14]. There have been a large body of research work on community detection algorithms based on such structures. However, there is still a lack of the formal understanding of 2 Zhang et al. why these structures would consistently and naturally emerge during the forma- tion process of real-world communities. Understanding the formation process of these natural structures is important as it provides us a microscopic view of the working mechanisms of communities and would enable us to utilize communities more efficiently. Our overall hypothesis is the following: real-world social network structures have been going through an evolutionary process, and as a result of that only the optimal structure (in terms of stability and efficiency) can survive, sustain therefore exist widely in real-world social networks. In other words, if we observe a widely existing structure in real-world social networks, then this structure must be optimal in the sense that it has stable user behaviours and it is efficient for the purpose of the network. In the case of information communities, each member in the community is an agent who can choose to spend certain portions of their time in producing content items or in consuming content produced by other members. In order for the community to be stable, all members' time allocation strategies should collectively form a Nash equilibrium, i.e., each member would get penalized by deviating from the equilibrium strategy. A member in the community can be rewarded by either production or consumption. For consumption, the rewarded is from the consumed content itself; for production, a member is rewarded when the content she produces is consumed by other members of the community (the reputation effect). A community structure is called "efficient" when it can pro- vide its members the highest possible amount of reward. If we use a mathe- matical model to formulate the above behaviours and efficiency measures, we will then be able to formally analyze the condition under which the community structure is optimally stable and efficient, therefore obtain a mathematical de- scription of the "surviving and sustaining" community structure. The validity of the model would be verified if the result of the analysis happens to agree with the widely-existing structures observed in real-world communities. Compared to the empirical observations, the formal analytical results would provide us more refined understanding of the microscopic working mechanisms of the real-world communities. In this paper, we formulate a model that captures the production and con- sumption behaviours inside an information community. Our analysis results show that the structure with a small set of "celebrity producers" is the optimally sta- ble and efficient structure. These analysis results provide possible explanations to the sociological observations such as "the Law of the Few" and also provide insights into how to effectively build and maintain the structure of information communities. 2 Related Works Social network analysis has been one of the fastest growing research fields in the 21st century. We refer readers to Scott et al. [12] for a comprehensive cov- erage of the development of the subject, rather than listing the large collection Stable and Efficient Structures 3 of references in this paper. Experimental works observed interesting properties of real-world complex networks such as the power-law degree distribution, the small-world phenomena and the community structure. These observations lead to modelling works that tried to explain why the observed properties would emerge, such models include the preferential attachment models, the copying model and the forest fire model. However, most of these works were studying macroscopic structural properties rather than looking into the internal microscopic structures of the network. The community structure has been an interesting topic for researcher in the field of social network analysis. A large body of work has been devoted to modelling and detecting community structures in large scale social networks (e.g., [2, 8, 10, 6, 5]). The networks are often represented by graphs in which the vertices represent underlying social entities and the edges represent some sort of social tie or interaction between pairs of vertices. Our model differs in the sense that it also considers the user behaviours on top of the network connections. In [1], the efficiency of a network in terms of information diffusion is studied, a mathematical analysis is perform to investigate the optimal network structure to achieve the best efficiency for information diffusion (high precision, high recall and low diameter), and the result shows that a Kronecker-graph [6] would satisfy such conditions. The approach taken in [1] is similar to the approach we take in this paper except that we are more focussed on the community related aspects. The work in [3] used a game-theoretic model to study the emergence of the "Law of the Few" but it is also in the context of information diffusion rather than about communities. The work in [7] is the closest to the interest of this paper. In [7], a game theoretic model is formulated to analyze the community structures in terms of content production and consumption. Each member's strategy involves choosing a particular interest to produce or consume content on. The result shows that in the Nash equilibrium of the model the members' choices form community structures. The difference of our work from [7] is that we focus on the internal structure of a single community rather than on the scale of multiple communities, and besides the Nash equilibrium, we also take the social welfare into consideration. 3 Model We will first describe the general configuration of the model and the pay- off/reward functions, then in Section 3.2 and Section 3.3, we introduce two variations of modelling the internal relations between the community members. Both models will be analyzed and the results will be compared in Section 4. 3.1 General Configuration We have a single community with n members indexed by 1 ≤ i ≤ n. Each mem- ber is capable of both producing and consuming content items. The produced 4 Zhang et al. content items could be chosen by all members or a subset of the members of the community for consumption. Each member has a limited total amount of time which could be allocated to either production or consumption, and each mem- ber make a decision about how much of their time to allocate to production and consumption. A member is rewarded if their products are consumed by members of the community (the production reward), or if the member consumes an item that is produced by a member of the community (the consumption reward). Each member's objective is to maximize their total individual reward from both production and consumption. The time slot: In our model, we investigate everything that happens within a unit time. The assumption is that the long term behaviour of a member is the repetition of their behaviour within a unit time. Rates of content production and consumption: We define Np ≥ 0 to be the number of content items that a member can produce if they were to spend 100% of their unit time on production; and we let Nc ≥ 0 be the number of items that a member can consume within a unit time slot if they were to spend 100% of their time on consumption. We assume that all members share the same values of Np and Nc, and we assume the following inequality: 0 ≤ Nc nNp ≤ 1 (1) This assumption is reasonable because nNp is the largest possible number of content items that can be produced, an Nc value that is larger than nNp would be unrealistic. A member's time allocation strategy: Let αi (0 ≤ α ≤ 1) be the portion of the unit time that member i allocates to production (therefore 1 − α is allocated to consumption). Each member chooses their own αi, we will investigate if a set of choices of αi would lead to a Nash equilibrium. Within the unit time, a member can consume at most (1 − αi) · Nc items. If the number of available items is less than or equal to this number, then each member would consume all the available items without any choice; if the total number of available items is greater than this number, then the member would choose a subset (of size (1 − αi) · Nc) of the available items to consume, uniformly at random. The production reward models the "reputation effect" in social networks, i.e., having content products consumed by other people is rewarding for the producer of the content. The reward for each item that a member produces is proportional to the number of members who consume the item, with a constant factor rp, i.e., if an item is consumed by m members, then the reward for this item is rp · m. The total production reward for a member is the sum of the rewards of all items that the member produces. The constant factor rp is the same for all members. The consumption reward of a given item is a constant rc. The total consumption reward of a member is rc multiplied by the number of items consumed by the member. The total individual reward of a member in the community is the sum of their production reward and consumption reward. The sum of the total individual rewards of all members in the community is the social Stable and Efficient Structures 5 welfare. While each member tries to maximize their own individual reward, the overall efficiency of the community is measured by its social welfare. The following two subsections will define two variations of the internal rela- tional structure of the community. 3.2 The Celebrity-Follower Community Structure Under the celebrity-follower relational structure, a subset of the members of the community are "celebrities" that are followed by everyone in the community, i.e., the content items produced by a celebrity member can be seen by all members of the community. A non-celebrity member has zero followers, i.e., an item produced by a non-celebrity member cannot be seen or consumed by any member. Let η be the portion of celebrity members, i.e., the number of celebrity mem- bers is ηn. When η = 1, all members are connected via a complete graph. When η is small, we have a small core of celebrities that would be responsible for pro- ducing all content items in the community. If visualized as a directed graph, the structure would have η · n2 edges in total. Note that we are assuming a member can be a follower of themselves so the graph can have self-pointing edges. This would lead to cleaner analysis results. Note that we are not making any assumptions about how large the value of η is, and it is interesting to see whether the efficiency of the community system can be different with η's value being in different ranges. In real-world communities, we often observe patterns that are similar to the celebrity-follower structure, i.e., a small subset of "elite contributors" would produce most of the content items that are consumed by all members of the community, and a community typically has a significant portion of "lurkers". We will be able to provide a theoretical explanation to this real-world phenomenon. 3.3 The Uniform Community Structure In contrast to the celebrity-follower structure where the members play unequal roles in the community, the uniform relational structure has all members with the equal role, i.e., every member has the same number of followers and follows the same number of other members. In terms of a graph, it is a regular graph where every vertex has the same in-degrees and out-degrees. To make this structure comparable with the celebrity-follower structure, we let it have the same number of edges as the celebrity-follower graph. The celebrity-follower graph discussed in the previous section has η · n2 edges, there- fore, in the uniform graph, we let each vertex have in-degree η · n as well as out-degree η · n. 3.4 Summary of the model Overall, our model is a game-theoretic model where each agent (member of the community) chooses a strategy (αi) with the objective of optimizing their 6 Zhang et al. individual reward. The efficiency of the whole community is measured by the social welfare (total reward of all members). The stability of the community is indicated by whether the strategies of all members collectively form a Nash equilibrium. 4 Analysis Our hypothesis is that, in order to exist and sustain in the real world, a social structure must be stable and efficient. For an information community, this means that the members' strategies form a Nash equilibrium while the social welfare of the community is maximized. Therefore, our analysis will take the following approach: we first derive the set of members' strategies that would maximize the social welfare of the community, then we investigate the condition for this set of strategies to form a Nash equilibrium. In Section 4.1 and Section 4.2, we perform the analyses for the celebrity- follower and uniform structures, respectively, then we will compare and discuss the analysis results. 4.1 Analysis of the Celebrity-Follower Structure The following theorem summarizes the analysis results for communities with the celebrity-follower structure. Theorem 1. For a community with the celebrity-follower structure where there are η ·n celebrity members, the maximum social welfare and the Nash equilibrium are described in the following cases. Case 1: if η < min( Nc nNp , 1− Nc nNp , 1− Ncrc nNprp ), then the maximum social welfare is reached when a member i of the community takes the following strategy: αi =(1 0 if member i is a celebrity otherwise The maximum social welfare Gmax is the following: Gmax = η(1 − η)n2Np(rp + rc) This set of strategies always form a Nash equilibrium under this case. (2) (3) Case 2: if 1 2 < Nc nNp , then the maximum social welfare is reached when a member i of the community follows the following strategy. ≤ 1 and 1 − Nc nNp ≤ η ≤ Nc nNp αi =( Nc Nc+ηnNp 0 if member i is a celebrity otherwise (4) The maximum social welfare Gmax is the following: Stable and Efficient Structures 7 Gmax = ηn2NcNp(rp + rc) Nc + ηnNp (5) Case 3: if 0 ≤ Nc nNp However, this set of strategies never forms a Nash equilibrium under this case. , then the maximum social welfare is reached when a member i of the community follows the following strategy. ≤ η ≤ 1 − Nc nNp 2 and Nc ≤ 1 nNp αi =( Nc ηnNp 0 if member i is a celebrity otherwise The maximum social welfare under this strategy is Gmax = Nc(cid:18)n − Nc Np(cid:19) (rp + rc) (6) (7) This set of strategies never forms a Nash equilibrium under this case. Case 4: η > max( Nc nNp , 1 − Nc nNp ), the social welfare is maximized when a member i of the community follows the following strategy. αi =( Nc Nc+ηnNp 0 if member i is a celebrity otherwise The maximum social welfare under this strategy is Gmax = ηn2NcNp(rp + rc) Nc + ηnNp This set of strategies never forms a Nash equilibrium under this case. (8) (9) The detailed proof of Theorem 1 can be found in the appendix. This theorem shows that Case 1 is the only case where the members' strategies reach a Nash equilibrium while the social welfare is maximized. In other words, in order for the community to be optimally stable and efficient, the portion of celebrity members must be small enough, i.e., η < min( Nc nNp , 1 − Ncrc nNprp , 1 − Nc nNp ). 4.2 Analysis of the Uniform Structure The following theorem summarizes the analysis results for communities with the celebrity-follower structure. Theorem 2. For a community with the uniform structure where each member has ηn followers and follows ηn members, the maximum social welfare is reached when the following set of strategies is applied. αi = Nc Nc + ηnNp ∀1 ≤ i ≤ n (10) The maximum social welfare Gmax is the following: 8 Zhang et al. Gmax = ηn2NpNc(rc + rp) Nc + ηnNp (11) The above set of strategies forms a Nash equilibrium if and only if the following condition is true. (12) η ≤(cid:18) Ncrc nNprp + 1 n(cid:19) The detailed proof of Theorem 2 can be found in the appendix. This result shows that, assuming the uniform community structure, there exist a simple set of strategies that is stable while the social welfare is maximized. What we are interested in is how the optimal efficiency of the uniform structure compares with that of a community with the celebrity-follower structure. The following theorem provides us a formal result. Theorem 3. Let Gmax -celebrity be the maximum social welfare with a Nash equi- librium for the celebrity-follower community structure (Eq (3)) and Gmax -uniform be the maximum social welfare with a Nash equilibrium for the uniform commu- nity structure (Eq (11)). The following is always true: Gmax -celebrity ≥ Gmax -uniform (13) The detailed proof of Theorem 3 can be found in the appendix. This theorem provides a simple and clear result: given being in its optimally stable and efficient state, a community with the celebrity-follower structure always has a better optimal social welfare than a community with the uniform structure. 5 Discussions The combination of the analysis results in Section 4.1 and 4.2 provide us two dif- ferent angles of explaining the common "law-of-the-few" structural patterns that widely exist in real-life information communities. A given community structure, in order to exist and sustain, must be both stable and efficient, meaning that the community can stably stay at the state with the maximum social welfare. Theorem 1 tells us that the community can only be stable and efficient if there is a small enough "core" of celebrity members who will actively contribute all the content to be consumed by all members of the community, while the majority of the community members would simply consume the content produced by the core members. A community structure that does not satisfy this condition would not be stable therefore would not commonly exist in reality. Moreover, among the different possible structure that are both stable and efficient, some structures are more efficient than others. Theorem 3 shows that the small-core celebrity-follower structure is not only stable and efficient, but also it is more efficient than other stable structures such as the uniform structure. With the above two factors taken into account, the celebrity-follower struc- ture with a small set of celebrities becomes the winner, therefore becomes the commonly existing structure in real-world information communities. Stable and Efficient Structures 9 In the equilibrium state, the strategies of the celebrity and non-celebrity members are clearly differentiated: the celebrity members should dedicate all of their time in production whereas the non-celebrity members should spend all of their time on consumption. These specialized producing and consuming behaviours also coincide with real-world observations: in a web service such as Reddit, the visitors of a typical subreddit would often separate into two different roles, i.e., the "active contributors" who frequently post content in the subreddit and the "lurkers" who would always just consume content silently. The analysis results also provide insights into how to effectively build and maintain information communities. The most important takeaway from our anal- ysis results is that there should be mechanisms that encourage the formation of a small-core celebrity-follower structure inside the community. For example, many online social network applications use features such as "thumb-up" or "upvote" to promote and reward high quality content that are liked by many community members. Besides providing effective content filtering (ranking by votes), this voting mechanism also encourages the optimally stable and efficient community structure: since the production reward is only earned when a post is upvoted, the members who would produce low-quality content would not be rewarded and would essentially become the non-celebrity members in the celebrity-follower structure. The members who produce high-quality content would be rewarded by the upvotes and becomes the celebrities in the community. The size of the core of celebrities will tend to be small if the display of the content in the community is ranked by popularity: most members will only consume a small portion of the top-ranked content items therefore only a small set of high quality producers would actually be rewarded and become the real core of the community. This analysis would lead to an interesting and counter-intuitive hypothesis: if the con- tent display of the community is such that different members would see a diverse range of different items, then this would cause the formation of a larger-sized celebrity core or a uniform-like structure in the community which would make the community structure less stable. It would be interesting to empirically verify if this hypothesis is true in practice. Another interesting insight is that, in the optimal community structure, the number of celebrity members in the core, i.e., η n, must satisfy that η·n < Nc/Np. This means that the size of the of celebrities core does not increase as the size of the community n increases. This could be a possible reason of why we have communities in the first place: having a large number of people communicating in a single giant community is inefficient in terms of the total amount of production because it only allows a small number of core members to contribute in content production. Larger total production rate can be achieved by dividing people into different smaller communities each of which has its own core members, since the total number of people who will contribute in content production would be multiplied by the number of communities. 10 Zhang et al. 6 Conclusions This paper attempts to obtain a formal understanding of the natural structural patterns of real-world information communities. We formulate a mathematical model that describes the generic content production and consumption behaviours in a community. The analysis result shows that the small-core celebrity-follower structure is the optimal structure that would lead to the optimally efficient and stable community. These analytical results agree with the sociological ob- servations on real-world information communities. Besides providing a refined microscopic view of the working mechanisms of information communities, the analysis results also provide useful insights into how to better build and main- tain the structure of information communities. Designing efficient mechanisms that encourage the formation of stable and efficient communities would be an interesting topic for future works. References 1. Bosagh Zadeh, Reza, et al. "On the precision of social and information networks." Proceedings of the first ACM conference on Online social networks. ACM, 2013. 2. Fortunato, Santo, and Darko Hric. Community detection in networks: A user guide. Physics Reports 659: 1-44 (2016) 3. Galeotti, Andrea, and Sanjeev Goyal. The law of the few. The American Economic Review 100.4: 1468-1492 (2010) 4. Gladwell, Malcolm. The tipping point: How little things can make a big difference. Little, Brown (2006) 5. Kumar, Ravi, Jasmine Novak, and Andrew Tomkins. Structure and evolution of online social networks. Link mining: models, algorithms, and applications. Springer New York, 337-357 (2010) 6. Leskovec, Jure, et al. Kronecker graphs: An approach to modeling networks. Journal of Machine Learning Research 11.Feb (2010): 985-1042. 7. Marbach, Peter. The structure of communities in information networks. Information Theory and Applications Workshop (ITA) (2016) 8. Massouli, Laurent. Community detection thresholds and the weak Ramanujan prop- erty. Proceedings of the forty-sixth annual ACM symposium on Theory of comput- ing. ACM (2014) 9. Mislove, Alan, et al. Measurement and analysis of online social networks. Proceed- ings of the 7th ACM SIGCOMM conference on Internet measurement. ACM (2007) 10. Newman, M. E. J. Community detection in networks: Modularity optimization and maximum likelihood are equivalent. arXiv preprint arXiv:1606.02319 (2016) 11. Reddit: http://www.reddit.com (2017) 12. Scott, John. Social network analysis. Sage (2017) 13. Wenger, Etienne. Communities of practice: A brief introduction (2011) 14. Zhang, Jun, Mark S. Ackerman, and Lada Adamic. Expertise networks in online communities: structure and algorithms. Proceedings of the 16th international con- ference on World Wide Web. ACM (2007) Stable and Efficient Structures 11 Appendices A Proof of Theorem 1 In the following two subsections we will prove the two cases separately. A.1 Proof of Case 1 and 2 We will first analyze the strategies for maximizing the social welfare and then investigate the Nash equilibriums of the such strategies. Maximum Social Welfare for Case 1 and Case 2 In this case, η < Nc ⇒ ηnNp < Nc, i.e., the celebrity members are not able sat- nNp isfy everyone's consumption demand even if they are producing at full capacity. First, we present the following lemma. Lemma 1. The optimal maximum social welfare is reached only if all non- celebrity members have αi = 0. Proof. This result is easy to see since a product of a non-celebrity member never gets consumed by others, a non-celebrity member's optimal strategy is always to spend 100% of their time on consumption. Lemma 2. When the social welfare is maximized, all celebrity members must choose the same αi value. Proof. The proof is very similar to part of the proof of Theorem 2 in Appendix B, therefore is omitted for succinctness. The idea is to compare an arbitrary con- figuration of αi values with the configuration where everyone choose the same value. Now let's investigate the αi value that would maximize the social welfare for Case 1 and Case 2. There are two cases that are possible when calculating the social welfare of the community: whether the celebrity members are under- supplied or over-supplied. For the celebrity members to be over-supplied, we need the following to hold: (1 − αi)Nc ≤ αiηnNp ⇔ αi ≥ Nc Nc + ηnNp (14) (15) Otherwise, the celebrity members are under-supplied. When the celebrity members are over-supplied, the social welfare is calculated as the following: 12 Zhang et al. G = αiηnNp(cid:20)(1 − η)n + (1 − αi)Nc αiηnNp · ηn(cid:21) (rp + rc) = ηn(rp + rc) [αi ((1 − η)nNp − Nc) + Nc] (16) (17) When the celebrity members are under-supplied, the social welfare is calcu- lated as the following: G = αiηn2Np (18) Combining Eq (16) and (18), the social welfare for Case 1 and Case 2 is the following. G =(αiηn2Np ηn(rp + rc) [αi ((1 − η)nNp − Nc) + Nc] if 0 ≤ αi < if Nc+ηnNp Nc Nc Nc+ηnNp ≤ αi ≤ 1 (19) When the celebrity members are under-supplied, G is always an increasing func- tion of αi. When the celebrity members are over-supplied, G could be either an increase or decreasing function of αi depending on whether the coefficient ((1 − η)nNp − Nc) is positive or negative. Note that (1 − η)nNp − Nc > 0 ⇔ η < 1 − Nc nNp (20) Therefore, for Case 1 where η < 1 − Nc nNp αi = 1, and the maximum social welfare is , the social welfare G is maximized when Gmax = η(1 − η)n2Np(rp + rc) (21) Therefore, for Case 2 where η ≥ 1 − Nc nNp αi = , and the maximum social welfare is Nc Nc+ηnNp , the social welfare G is maximized when Gmax = ηn2NcNp(rp + rc) Nc + ηnNp (22) Nash Equilibrium for Case 1 Now consider the Nash equilibrium for Case 1. For a non-celebrity member, αi = 0 is clearly the best strategy since there is no additional reward if they spent any time in production. For a celebrity member, consider the small deviation from the equilibrium strategy, i.e., rather than choosing αi = 1, it chooses αi = 1 − δ for some δ > 0. This member's product reward is decreased by δNp(1 − η)nrp. This member's consumption reward is increased by up to δNcrc. We want to show that the change of the member's individual reward to be negative, i.e., ∆R ≤ δNcrc − δNp(1 − η)nrp < 0 ⇔ η < 1 − Ncrc nNprp (23) (24) which is true according to the assumption of Case 1. Therefore, the Nash equi- librium of Case 1 is proven. Stable and Efficient Structures 13 Nash Equilibrium for Case 2 Consider a celebrity member who would change their αi to αi + δ and αi − δ for some δ > 0. In order for a Nash equilibrium to be formed, it is necessary that both ways of changing result in a smaller individual reward. If the strategy is changed to αi + δ, then the gain of production reward is up to δNpnrp and the loss of consumption reward is δNcrc. In order for the individual reward to decrease, we need: ∆R ≤ δNpnrp − δNcrc < 0 Ncrc nNprp > 1 ⇔ (25) (26) If the strategy is changed to αi − δ, then the loss of production reward is δNpnrp and the gain of consumption reward is up to δNcrc. In order for the individual reward to decrease, we need: ∆R ≤ δNcrc − δNpnrp < 0 Ncrc nNprp < 1 ⇔ (27) (28) A Nash equilibrium requires that both (26) and (28) to be true, which is impossible, therefore the Nash equilibrium cannot exist. The Nash equilibrium of Case 1 is proven, which completes all proofs for Case 1 and Case 2. A.2 Proof of Case 3 and Case 4 Case 3 and Case 4 are the cases where the celebrity members are capable of supplying any member in community, i.e., ηnNp ≥ Nc. First of all, Lemma 1 and Lemma 2 both apply to this part of the proof. And we have the following additional lemma. Lemma 3. When the social welfare is maximized, a non-celebrity member must not be over-supplied, and a celebrity member must not be under-supplied. Proof. Suppose the non-celebrity members were over-supplied, then the high- quality members must also be over-supplied. Reducing production time will in- crease the total number of consumptions for sure, therefore the global welfare would be increased. Similarly, suppose the celebrity members were under-supplied, then the non- celebrity members must also be under-supplied. Increasing production time will increase the total number of consumptions for sure, therefore the global welfare would be increased. 14 Zhang et al. Maximum Social Welfare for Case 3 We now write down the expression of the social welfare. Because of Lemma 2, we let αh be the common αi value of all celebrity members, then the total number of produced items is αhηnNp. For each item, the expected number of consumptions from the non-celebrity members is (1−η)n since each non-celebrity member is not over-supplied; the expected number of consumptions from the celebrity members is the following (because they are not under-supplied): (1 − αh)Nc αhNpηn · ηn = Nc Np (cid:18) 1 αh − 1(cid:19) (29) Therefore, total reward is the (rp + rc) multiplied by the total number of con- sumptions, which is − 1(cid:19)(cid:21) R = (rp + rc) · αhNpηn ·(cid:20)(1 − η)n + = (rp + rc) ·(cid:2)αh(cid:2)Npη(1 − η)n2) − Ncηn(cid:3) + Ncηn(cid:3) Np (cid:18) 1 Nc αh (30) (31) The expression in (31) could be an increasing or decreasing function of αh. It depends the sign of coefficient of αh. Therefore, we need to divide into two sub-cases, which are exactly Case 3 and Case 4. Case 3: The coefficient is non-negative, i.e., (cid:2)Npη(1 − η)n2 − Ncηn(cid:3) ≥ 0 ⇔ η ≤ 1 − Nc Np (32) (33) In this case, to maximize the global welfare, αh should be as large as possible, i.e., αh should be the largest possible value that keeps the non-celebrity members non-oversupplied. It is the value that generates exactly Nc items, which is αh = Nc ηnNp Plug the above value into Eq. (31), the maximum social welfare is Gmax = (rp + rc)Nc(cid:18)n − Nc Np(cid:19) (34) (35) Nash Equilibrium for Case 3 Now investigate the Nash equilibrium for Case 3 by consider the following two types of changes (let δ > 0 denote the change amount):a celebrity member increasing from αi to αh + δ; and a celebrity member decreasing from αh to αh − δ. Stable and Efficient Structures 15 If the strategy is changed to αh + δ, then the gain of production reward is δNp((1 − ηn)n + ηn(1 − αh))rp and the loss of consumption reward is δNcrc. In order for the individual reward to decrease, we need: ∆R = δNp((1 − ηn)n + ηn(1 − αh))rp − δNcrc < 0 ⇔ Ncrc (nNp − Nc)rp > 1 (36) (37) If the strategy is changed to αh + δ, then the loss of production reward is δNp((1 − ηn)n + ηn(1 − αh))rp and the gain of consumption reward is δNcrc. In order for the individual reward to decrease, we need: ∆R = δNcrcδNp((1 − ηn)n + ηn(1 − αh))rp < 0 ⇔ Ncrc (nNp − Nc)rp < 1 (38) (39) A Nash equilibrium requires that both (37) and (39) to be true, which is impossible, therefore the Nash equilibrium cannot exist. The Nash equilibrium of Case 3 is proven. Maximum Social Welfare for Case 4 Case 4: The coefficient in (31) is negative, i.e., (cid:2)Npη(1 − η)n2 − Ncηn(cid:3) < 0 ⇔ η > 1 − Nc nNp (40) (41) In this case, to maximize the social welfare, αh should be as small as possible, i.e., αh should be the smallest possible value that keeps the celebrity members non-under-supplied. The number of produced items should be exactly (1−αh)Nc items, i.e., αhNpηn = (1 − αh)Nc ⇔ αh = Nc Nc + ηnNp Plug the above value into Eq. (31), the maximum global welfare is Gmax = ηn2NcNp(rp + rc) Nc + ηnNp (42) (43) (44) Note that, Case 4's optimal state for social welfare is in fact exactly the same as that of Case 2. Therefore, the Nash equilibrium of Case 4 follows the same configuration as that of Case 2, which means this set of strategy cannot form a Nash equilibrium. Hence, we have completed the proof for Theorem 1. 16 Zhang et al. B Proof of Theorem 2 n Xi=1 n Xi=1 The claim is that the maximum social welfare is reached when (1) all members have the same αi value and (2) the number of produced items is just enough every member's consumption. We consider three cases when calculating the social welfare of the community: everyone is over-supplied, everyone is under-supplied and some people are over-supplied while others are under-supplied. Let s = Pn i=1 αi denote the sum of everyone's αi value. Case 1: Everyone is over-supplied with content. The consumption reward a member i is simply (1 − αi)Ncrc, therefore the global total consumption reward is (1 − αi)Ncrc = Ncrc(n − αi) = Ncrc(n − s) (45) The global total production reward is equal to the total number of consumption multiplied by rp, which is rp · n (1 − αi)Nc = Ncrp n − Xi=1 n Xi=1 αi! = Ncrp(n − s) (46) Therefore the total global welfare for Case 1 is the sum of (45) and (46) which is G(α) = Ncrc(n − s) + Ncrp(n − s) = Nc(rp + rc) n − αi! n Xi=1 (47) We can see that, in the case of everyone being over-supplied, the social welfare would decrease if anybody increases their αi; the optimal value for this case is reached when everyone reduces their αi as much as possible as long as everyone is still over-supplied. Now we want to show that the global welfare for this case is no greater than the maximum global welfare shown in in Equation (11) of Theorem 2, i.e., we want to show the following αi! ≤ ηn2NpNc(rc + rp) Nc + ηnNp n Xi=1 = n ·(cid:18)1 − Nc Nc + ηnNp(cid:19) n Nc(rp + rc) n − αi! ≤ n − Xi=1 αi! ≥ n · n Xi=1 ηn2Np Nc + ηnNp Nc Nc + ηnNp ⇔ ⇔ (48) (49) (50) Note that Nc/(Nc + ηnNp) is the optimal αi value which make the number of produced items exactly the same as the number needed by every member. The inequality in (50) must be true because if it were not true, it would cause Stable and Efficient Structures 17 a member to be under-supplied, which violates the assumption for this case. Completing the proof for Case 1. Case 2: Everyone is under-supplied with content. In this case, each mem- ber consumes all content items that are available for them, therefore the total consumption reward is ηnNprc n Xi=1 αi = ηnNprcs (51) The total production reward is again the total number of consumptions mul- tiplied by rp. Each of the produced items is consumed ηn times, thus we have the total production reward as follows: ηnrp n Xi=1 αiNp = ηNprpns (52) Summing up the total consumption reward and the total production rewards, the total global welfare for Case 2 is G(α) = ηNp(rp + rc)ns = ηNp(rp + rc)n n Xi=1 αi! (53) We can see that, in the case of everyone being under-supplied, the social welfare would decrease if anybody decreases their αi; the optimal value for this case is reached when everyone increase their αi as much as possible as long as everyone is still under-supplied. Again, we want to show that the global welfare for this case is no greater than the maximum global welfare shown in in Equation (11) of Theorem 2, i.e., we want to show the following αi! ≤ ηn2NpNc(rc + rp) Nc + ηnNp ηNp(rp + rc)n n Xi=1 Xi=1 αi ≤ n · n ⇔ Nc Nc + ηnNp (54) (55) Again, since Nc/(Nc + ηnNp) is the αi value that makes the number of produced items exactly the same as the number needed by every member. The inequality in (55) must be true because if it were not true, it would cause a member to be over-supplied, which violates the assumption for this case. Completing the proof for Case 2. Case 3 is in between Case 1 and Case 2, i.e., we assume that a portion of the members in the community are over-supplied while others are under-supplied. Let ¯α = Pn i=1 αi/n be the average value of all members αi values. We will compare an arbitrary configuration in Case 3 with the one where everyone choose the same αi = ¯α. Note that, if everyone choose the same αi, it is either Case 18 Zhang et al. 1 or Case 2, i.e., either everyone is over-supplied or everyone is under-supplied. We want to show that any configuration in Case 3 has smaller social welfare than the configuration where everyone has the same αi = ¯α. We call this two configurations the "original configuration" and the "average configuration". Because of the choice of the value of ¯α, the sum of everyone's αi value stay the same, therefore the total number of produced items is the same between the two configurations. We will compare the social welfares of the two configurations in two cases. Case 3.1: Everyone is over-supplied in the average configuration. Then every- one consumes exactly Nc(1 − ¯α) items in the average configuration. Therefore, the consumption reward for each member is Ncrc(1 − ¯α). In the original con- figuration, some members have greater αi values than ¯α and some others have smaller αi values than ¯α. Consider a pair of members of which member A has αi = ¯α + δ and member B has αi = ¯α − δ. For member A, since she becomes even more over-supplied and spends less time on consumption, her consumption re- ward decreases by exactly δNcrc. On the other hand, member B's consumption reward increases by at most δNcrc, depending on whether B becomes under- supplied after decreasing her αi value from ¯α. Therefore, the all-members total consumption reward of the original configuration is no greater that of the average configuration. In terms of the total production reward, recall that it is the total num- ber of consumptions multiplied by rp. Let K denote the total number of items produced. In the average configuration, for each item, the expected number of consumptions contributed by each member is (1 − ¯αNc)/K. In the original configuration, consider again member A with αi = ¯α + δ and member B with αi = ¯α −δ. Member A's contribution decreases by exactly δNc/K, while member B's contribution increases by at most δNc/K. Therefore, the all-members total production reward of the original configuration is no greater that of the average configuration. Thus, we can conclude for Case 3.1 that the global welfare of the original configuration is no greater than that of the average configuration. eryone consumes exactly K = ηNpPn Case 3.2: Everyone is under-supplied in the average configuration. Then ev- i=1 αi items in the average configuration. Therefore, the total consumption reward is nKrc. Now consider the original con- figuration with member A having αi = ¯α + δ and member B having αi = ¯α − δ. For member B, she is still under-supplied and her consumption reward stays the same since the total number of items stays the same. For member A, her con- sumption reward stays the same of she is still under-supplied and it decreases if she becomes over-supplied and consumes less than K items. Therefore, the all-members total consumption reward of the original configuration is no greater that of the average configuration. In terms of the total production reward, the average configuration has a total production reward of nKrp, whereas the original configuration can have the same total production rewards, or less if anyone becomes over-supplied by having a larger αi and consumes less K items. Therefore, the all-members total production reward of the original configuration is no greater that of the average Stable and Efficient Structures 19 configuration. Thus, we can conclude for Case 3.2 that the social welfare of the original configuration is no greater than that of the average configuration. Since the average configuration belongs to either Case 1 or Case 2, both of which are proven to have no greater global welfare than the maximum we claimed in (11). Hence, the global welfare in (11) is the maximum possible global welfare of the community. Nash Equilibrium for the Uniform Structure When every member chooses αi = Nc/(Nc + ηnNp), the consumption reward of a member is Rc(cid:18)αi = Nc Nc + ηnNp(cid:19) = (1 − αi)Ncrc = ηnNpNcrc Nc + ηnNp The production reward of a member is Rp(cid:18)αi = Nc Nc + nNp(cid:19) = αiNprpηn = ηnNpNcrp Nc + ηnNp The total reward is the sum of the above two which is R(cid:18)αi = Nc Nc + ηnNp(cid:19) = ηnNpNc(rc + rp) Nc + ηnNp (56) (57) (58) Now we calculate the reward for member i when she changes her strategy is changed to αi + δ. We divide the analysis into two cases: δ > 0 and δ < 0. Case 1: δ > 0, i.e., member i increases αi. This will make some members over-supplied. For member i, the consumption reward decreases because of the reduced amount of consumption time, i.e., ∆Rc = −δNcrc (59) The total number of available items for the followers is now ηαinNp + δNp, the probability of an item being chosen is ηαinNp ηαinNp + δNp = ηαin ηαin + δ The production reward for member i becomes (αi + δ)ηn · ηαin ηαin + δ · Nprp (60) (61) Therefore, the change in member i's total reward is ∆R = (αi + δ)ηn · ηαin ηαin + δ · Nprp − ηαinNprp − δNcrc (62) We want to check the condition for ∆R < 0. In the following derivation, we let K = Nprp/Ncrc. 20 Zhang et al. ∆R = (αi + δ)ηn · ηαin ηαin + δ · Nprp − ηαinNprp − δNcrc < 0 (63) ⇒ K(cid:18) αiη2n2(αi + δ) αiηn + δ Kαiηnδ(ηn − 1) − αiηn(cid:19) < δ < δ ⇒ ⇒ αiηn + δ Kαiηn(ηn − 1) αiηn + δ < 1 # δ > 0 ⇒ δ > αiηn(Kηn − K − 1) To make sure (67) is satisfied, we must have αiηn(Kηn − K − 1) ≤ 0 ⇒ (Kηn − K − 1) ≤ 0 ⇒ K ≤ ⇒ Nprp Ncrc 1 ηn − 1 1 ≤ ηn − 1 ⇒ η ≤(cid:18) Ncrc nNprp + 1 n(cid:19) (64) (65) (66) (67) (68) (69) (70) (71) (72) Summary of Case 1: If (72) is true, then the total reward for member i decreases if she increases her αi to αi + δ (δ > 0). Case 2: δ < 0, i.e., member i decreases her αi, then everyone in the community become under-supplied. For member i, the production reward is reduced simply because of the reduced value of αi, i.e., ∆Rp = δηnNprp (73) The consumption reward for member i is also reduced because of the reduced number of items available for consumption (even though member i tries to spend more time on consumption). ∆Rc = δNprc Therefore the change in the total reward for member i is ∆R = δ · Np(ηnrp + rc) < 0 # δ < 0 (74) (75) Case 2 done. Combining Case 1 and Case 2, if and only if (72) is true, the change of αi will result in a decrease of member i's total reward, therefore the strategy of choosing the original αi results in a Nash equilibrium. Completing the proof for Theorem 2. Stable and Efficient Structures 21 C Proof of Theorem 3 Proof. The Gmax -celebrity in Eq (3) is greater than or equal to the Gmax -uniform in Eq (11) if and only if the following is true. η(1 − η)n2Np(rp + rc) ≥ ηn2NpNc(rc + rp) Nc + ηnNp ⇔ 1 − η ≥ Nc Nc + ηnNp ⇔ (1 − η)(Nc + ηnNp) ≥ Nc ⇔ η(nNp − Nc + nηNp) ≥ 0 ⇔ nNp − Nc + nηNp ≥ 0 ⇔ η ≥ Nc − nNp nNp (76) (77) (78) (79) (80) (81) According to the modelling assumption in Eq (1), Nc − nNp ≤ 0, and since η ≥ 0, the condition is (81) is always true. Completing the proof of Theorem 3.
1701.02864
1
1701
2017-01-11T06:40:03
Graph Equivalence Classes for Spectral Projector-Based Graph Fourier Transforms
[ "cs.SI" ]
We define and discuss the utility of two equivalence graph classes over which a spectral projector-based graph Fourier transform is equivalent: isomorphic equivalence classes and Jordan equivalence classes. Isomorphic equivalence classes show that the transform is equivalent up to a permutation on the node labels. Jordan equivalence classes permit identical transforms over graphs of nonidentical topologies and allow a basis-invariant characterization of total variation orderings of the spectral components. Methods to exploit these classes to reduce computation time of the transform as well as limitations are discussed.
cs.SI
cs
Graph Equivalence Classes for Spectral Projector-Based Graph Fourier Transforms Joya A. Deri, Member, IEEE, and José M. F. Moura, Fellow, IEEE 1 7 1 0 2 n a J 1 1 ] I S . s c [ 1 v 4 6 8 2 0 . 1 0 7 1 : v i X r a Abstract -- We define and discuss the utility of two equiv- alence graph classes over which a spectral projector-based graph Fourier transform is equivalent: isomorphic equiv- alence classes and Jordan equivalence classes. Isomorphic equivalence classes show that the transform is equivalent up to a permutation on the node labels. Jordan equivalence classes permit identical transforms over graphs of noniden- tical topologies and allow a basis-invariant characterization of total variation orderings of the spectral components. Methods to exploit these classes to reduce computation time of the transform as well as limitations are discussed. Index Terms -- Jordan generalized eigenspaces, directed graphs, graph equivalence classes, graph isomorphism, signal processing on graphs, networks decomposition, I. INTRODUCTION Graph signal processing [1], [2] permits applications of digital signal processing concepts to increasingly larger networks. It is based on defining a shift filter, for example, the adjacency matrix in [1], [3], [4] to analyze undirected and directed graphs, or the graph Laplacian [2] that applies to undirected graph struc- tures. The graph Fourier transform is defined through the eigendecomposition of this shift operator, see these references. Further developments have been considered in [5], [6], [7]. In particular, filter design [1], [5], [8] and sampling [9], [10], [11] can be applied to reduce the computational complexity of graph Fourier transforms. With the objective of simplifying graph Fourier trans- forms for large network applications, this paper explores methods based on graph equivalence classes to reduce the computation time of the subspace projector-based graph Fourier transform proposed in [12]. This transform extends the graph signal processing framework proposed by [1], [3], [4] to consider spectral analysis over directed graphs with potentially non-diagonalizable (defective) adjacency matrices. The graph signal processing frame- work of [12] allows for a unique, unambiguous signal representation over defective adjacency matrices. This work was partially supported by NSF grants CCF-1011903 and CCF-1513936 and an SYS-CMU grant. The authors are with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 USA (email: jderi,[email protected]) Consider a graph 𝒢 = 𝐺(𝐴) with adjacency matrix 𝐴 ∈ C𝑁×𝑁 with 𝑘 ≤ 𝑁 distinct eigenvalues and Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1. The associated Jordan subspaces of 𝐴 are J𝑖𝑗, 𝑖 = 1, . . . 𝑘, 𝑗 = 1, . . . , 𝑔𝑖, where 𝑔𝑖 is the geometric multiplicity of eigenvalue 𝜆𝑖, or the dimension of the kernel of 𝐴 − 𝜆𝑖𝐼. The signal space 𝒮 can be uniquely decomposed by the Jordan subspaces (see [13], [14] and Section II). For a graph signal 𝑠 ∈ 𝒮, the graph Fourier transform (GFT) of [12] is defined as 𝑔𝑖⨁︁ ℱ : 𝒮 → 𝑘⨁︁ 𝑠 → (︀𝑠11, . . . ,︀𝑠1𝑔1, . . . ,︀𝑠𝑘1, . . . ,︀𝑠𝑘𝑔𝑘 ) , J𝑖𝑗 𝑖=1 𝑗=1 (1) where 𝑠𝑖𝑗 is the (oblique) projection of 𝑠 onto the Jordan subspace 𝐽𝑖𝑗 parallel to 𝒮∖J𝑖𝑗. That is, the Fourier transform of 𝑠, is the unique decomposition 𝑘∑︁ 𝑔𝑖∑︁ ︀𝑠𝑖𝑗, 𝑠 = ︀𝑠𝑖𝑗 ∈ J𝑖𝑗. (2) 𝑖=1 𝑗=1 The spectral components are the Jordan subspaces of the adjacency matrix with this formulation. the transform (1) is invariant This paper presents graph equivalence classes where equal GFT projections by (1) are the equivalence re- lation. First, to node permutations, which we formalize with the concept of isomorphic equivalence classes. Furthermore, the GFT permits degrees of freedom in graph topologies, which we formalize by defining Jordan equivalence classes, a concept that allows graph Fourier transform computa- tions over graphs of simpler topologies. A frequency- like ordering based on total variation of the spectral components is also presented to motivate low-pass, high- pass, and pass-band graph signals. Section II provides the graph signal processing and linear algebra background for the graph Fourier trans- form (1). Isomorphic equivalence classes are defined in Section III, and Jordan equivalence classes are defined in Section IV. The Jordan equivalence classes influence the definition of total variation-based orderings of the Jordan subspaces, which is discussed in detail in Section V. Section VI illustrates Jordan equivalence classes and total variation orderings. Limitations of the method are discussed in Section VII. II. BACKGROUND This section reviews the concepts of graph signal processing and the GFT (1). Background on graphs signal processing, including definitions of graph signals and the graph shift, is described in greater detail in [1], [3], [4], [12]. For background on eigendecompositions, the reader is directed to in [13], [15], [16]. A. Eigendecomposition Consider matrix 𝐴 ∈ C𝑁×𝑁 with 𝑘 distinct eigen- values 𝜆1, . . . , 𝜆𝑘, 𝑘 ≤ 𝑁. The algebraic multiplic- ity 𝑎𝑖 of 𝜆𝑖 represents the corresponding exponent of the characteristic polynomial of 𝐴. Denote by Ker(𝐴) the kernel or null space of matrix 𝐴. The geometric multiplicity 𝑔𝑖 of eigenvalue 𝜆𝑖 equals the dimension of Ker (𝐴 − 𝜆𝑖𝐼), which is the eigenspace of 𝜆𝑖 where 𝐼 is the 𝑁 × 𝑁 identity matrix. The generalized eigenspaces G𝑖, 𝑖 = 1, . . . , 𝑘, of 𝐴 are defined as G𝑖 = Ker(𝐴 − 𝜆𝑖𝐼)𝑚𝑖, (3) where 𝑚𝑖 is the index of eigenvalue 𝜆𝑖. The generalized eigenspaces uniquely decompose C𝑁 as the direct sum C𝑁 = G𝑖. (4) 𝑖=1 Jordan chains. Let 𝑣1 ∈ Ker(𝐴 − 𝜆𝑖𝐼), 𝑣1 = 0, be a proper eigenvector of 𝐴 that generates generalized eigenvectors by the recursion 𝐴𝑣𝑝 = 𝜆𝑖𝑣𝑝 + 𝑣𝑝−1, 𝑝 = 2, . . . , 𝑟 (5) where 𝑟 is the minimal positive integer such that (𝐴 − 𝜆𝑖𝐼)𝑟 𝑣𝑟 = 0 and (𝐴 − 𝜆𝑖𝐼)𝑟−1 𝑣𝑟 = 0. A se- quence of vectors (𝑣1, . . . , 𝑣𝑟) that satisfy (5) is a Jordan chain of length 𝑟 [13]. The vectors in a Jordan chain are linearly independent and generate the Jordan subspace J = span (𝑣1, 𝑣2, . . . , 𝑣𝑟) . (6) Denote by J𝑖𝑗 the 𝑗th Jordan subspace of 𝜆𝑖 with dimension 𝑟𝑖𝑗, 𝑖 = 1, . . . , 𝑘, 𝑗 = 1, . . . , 𝑔𝑖. The Jordan spaces are disjoint and uniquely decompose the general- ized eigenspace G𝑖 (3) of 𝜆𝑖 as 𝑘⨁︁ G𝑖 = J𝑖𝑗. (7) 𝑔𝑖⨁︁ 𝑗=1 𝑘⨁︁ 𝑔𝑖⨁︁ 𝑖=1 𝑗=1 C𝑁 = Jordan decomposition. Let 𝑉𝑖𝑗 denote the 𝑁 × 𝑟𝑖𝑗 matrix whose columns form a Jordan chain of eigen- that spans Jordan subspace J𝑖𝑗. Then the value 𝜆𝑖 eigenvector matrix 𝑉 of 𝐴 is ··· 𝑉𝑘1 ··· 𝑉𝑘𝑔𝑘 (9) where 𝑘 is the number of distinct eigenvalues. The columns of 𝑉 are a Jordan basis of C𝑁 . Then 𝐴 has block-diagonal Jordan normal form 𝐽 consisting of Jordan blocks 𝑉 =[︀𝑉11 ··· 𝑉1𝑔1 ⎡⎢⎢⎢⎢⎣ 𝐽(𝜆) = 𝜆 1 𝜆 ... ... ]︀ , ⎤⎥⎥⎥⎥⎦ . 1 𝜆 (10) of size 𝑟𝑖𝑗. The Jordan normal form 𝐽 of 𝐴 is unique up to a permutation of the Jordan blocks. The Jordan decomposition of 𝐴 is 𝐴 = 𝑉 𝐽𝑉 −1. B. Spectral Components the Fourier The spectral components of trans- form (1) are expressed in terms of the eigenvector basis 𝑣1, . . . , 𝑣𝑁 and its dual basis 𝑤1, . . . , 𝑤𝑁 since the Jordan basis may not be orthogonal. Denote the basis and dual basis matrices by 𝑉 = [𝑣1 ··· 𝑣𝑁 ] and 𝑊 = [𝑤1 ··· , 𝑤𝑁 ]. The dual basis matrix is the inverse Hermitian 𝑊 = 𝑉 −𝐻 [14], [17]. Consider the 𝑗th spectral component of 𝜆𝑖 J𝑖𝑗 = span(𝑣1,··· 𝑣𝑟𝑖𝑗 ). (11) The projection matrix onto J𝑖𝑗 parallel to C𝑁∖J𝑖𝑗 is (12) 𝑃𝑖𝑗 = 𝑉𝑖𝑗𝑊 𝐻 𝑖𝑗 , where 𝑉𝑖𝑗 = [𝑣1 ··· 𝑣𝑟𝑖𝑗 ] (13) 𝑖𝑗 ∈ C𝑟𝑖𝑗×𝑁 is the corresponding submatrix of 𝑉 and 𝑊 𝐻 is the corresponding submatrix of 𝑊 partitioned as 𝑊 = [··· 𝑊 𝐻 𝑖1 ··· 𝑊 𝐻 (14) As shown in [12], the projection of signal 𝑠 ∈ C𝑁 𝑖𝑔𝑖 ··· ]𝑇 . onto Jordan subspace J𝑖𝑗 can be written as ︀𝑠𝑖𝑗 =︀𝑠1𝑣1 + ··· +︀𝑠𝑟𝑖𝑗 𝑣𝑟𝑖𝑗 (15) (16) = 𝑉𝑖𝑗𝑊 𝐻 𝑖𝑗 𝑠. The next sections show that invariance of the graph Fourier transform (1) is a useful equivalence relation on a set of graphs. Equivalence classes with respect to the GFT are explored in Sections III and IV. The space C𝑁 can be expressed as the unique decom- position of Jordan spaces J𝑖𝑗. III. ISOMORPHIC EQUIVALENCE CLASSES (8) This section demonstrates that the graph Fourier trans- form (1) is invariant up to a permutation of node labels 2 and establishes sets of isomorphic graphs as equivalence classes with respect to invariance of the GFT (1). Two graphs 𝒢(𝐴) and 𝒢(𝐵) are isomorphic if their adja- cency matrices are similar with respect to a permutation matrix 𝑇 , or 𝐵 = 𝑇 𝐴𝑇 −1 [18]. The graphs have the same Jordan normal form and the same spectra. Also, if 𝑉𝐴 and 𝑉𝐵 are eigenvector matrices of 𝐴 and 𝐵, respectively, then 𝑉𝐵 = 𝑇 𝑉𝐴. We prove that 𝐴 of all graphs that are isomorphic to 𝒢(𝐴) is the set G𝐼 an equivalence class over which the GFT is preserved. The next theorem shows that an appropriate permutation can be imposed on the graph signal and GFT to ensure invariance of the GFT over all graphs 𝒢 ∈ G𝐼 𝐴. Theorem 1. The graph Fourier transform of a signal 𝑠 is invariant to the choice of graph 𝒢 ∈ G𝐼 𝐴 up to a permutation on the graph signal and inverse permutation on the graph Fourier transform. Proof: For 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼 𝐴, there exists a permu- tation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1. For eigenvector matrices 𝑉𝐴 and 𝑉𝐵 of 𝐴 and 𝐵, respectively, let 𝑉𝐴,𝑖𝑗 and 𝑉𝐵,𝑖𝑗 denote the 𝑁 × 𝑟𝑖𝑗 submatrices of 𝑉𝐴 and 𝑉𝐵 whose columns span the 𝑗th Jordan subspaces J𝐴,𝑖𝑗 and J𝐵,𝑖𝑗 of the 𝑖th eigenvalue of 𝐴 and 𝐵, respectively. Let 𝑊𝐴 = 𝑉 −𝐻 denote the matrices whose columns form dual bases of 𝑉𝐴 and 𝑉𝐵. Since 𝑉𝐵 = 𝑇 𝑉𝐴, and 𝑊𝐵 = 𝑉 −𝐻 𝐵 𝐴 𝑊𝐵 = (𝑇 𝑉𝐴)−𝐻 (17) (18) (19) (20) where 𝑇 −𝐻 = 𝑇 since 𝑇 is a permutation matrix. Thus, (21) = (𝑉 −1 𝐴 𝑇 −1)𝐻 = 𝑇 −𝐻 𝑉 −𝐻 = 𝑇 𝑊𝐴, 𝐴 𝑇 𝐻 = 𝑊 𝐻 𝐴 𝑇 −1. 𝑊 𝐻 𝐵 = 𝑊 𝐻 𝐴 Consider graph signal 𝑠. By (16), the signal projection onto J𝐴,𝑖𝑗 is Permit a permutation 𝑠 = 𝑇 𝑠 on the graph signal. Then the projection of 𝑠 onto J𝐵,𝑖𝑗 is ︀𝑠𝐴,𝑖𝑗 = 𝑉𝐴,𝑖𝑗𝑊 𝐻 ︀𝑠𝐵,𝑖𝑗 = 𝑇 𝑉𝐴,𝑖𝑗𝑊 𝐻 = 𝑇 𝑉𝐴,𝑖𝑗𝑊 𝐻 = 𝑇︀𝑠𝐴,𝑖𝑗 𝐴,𝑖𝑗𝑠. 𝐴,𝑖𝑗𝑇 −1𝑇 𝑠 𝐴,𝑖𝑗𝑠 (22) (23) (24) (25) by (22). Therefore, the graph Fourier transform (1) is invariant to a choice among isomorphic graphs up to a permutation on the graph signal and inverse permutation on the Fourier transform. Theorem 2. Consider 𝐴 ∈ C𝑁×𝑁 . Then the set G𝐼 of graphs isomorphic to 𝒢(𝐴) is an equivalence class 𝐴 3 with respect to the invariance of the GFT (1) up to a permutation of the graph signal and inverse permutation of the graph Fourier transform. Theorem 1 establishes an invariance of the GFT over graphs that only differ up to a node labeling, and Theorem 2 follows. The isomorphic equivalence of graphs is important since it signifies that the rows and columns of an adja- cency matrix can be permuted to accelerate the eigende- composition. For example, permutations of highly sparse adjacency matrices can convert an arbitrary matrix to nearly diagonal forms, such as with the Cuthill-McKee algorithm [19]. Optimizations for such matrices in this form are discussed in [16] and [20], for example. In the next section, the degrees of freedom in graph topology are explored to define another GFT equivalence class. IV. JORDAN EQUIVALENCE CLASSES Since the Jordan subspaces of defective adjacency matrices are nontrivial (i.e., they have dimension larger than one), a degree of freedom exists on the graph structure so that the graph Fourier transform of a signal is equal over multiple graphs of different topologies. This section defines Jordan equivalence classes of graph structures over which the GFT (1) is equal for a given graph signal. The section proves important properties of this equivalence class that are used to explore inexact methods and real-world applications in [21]. The intuition behind Jordan equivalence is presented in Section IV-A, and properties of Jordan equivalence are described in Section IV-B. Section IV-C com- pares isomorphic and Jordan equivalent graphs. Sec- tions IV-D, IV-E, IV-F, and IV-G prove properties for Jordan equivalence classes when adjacency matrices have particular Jordan block structures. A. Intuition Consider Figure 1, which shows a basis {𝑉 } = {𝑣1, 𝑣2, 𝑣3} of R3 such that 𝑣2 and 𝑣3 span a two- dimensional Jordan space J of adjacency matrix 𝐴 with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1. The resulting projection of a signal 𝑠 ∈ R𝑁 as in (16) is unique. a new basis ︀𝑉 . Note that ︀𝐴 = ︀𝑉 𝐽︀𝑉 −1 does not equal Note that the definition of the two-dimensional Jordan subspace J in Figure 1 is not basis-dependent because any spanning set {𝑤2, 𝑤3} could be chosen to define J . This can be visualized by rotating 𝑣2 and 𝑣3 on the two- dimensional plane. Any choice {𝑤2, 𝑤3} corresponds to 𝐴 = 𝑉 𝐽𝑉 −1 for all choices of {𝑤2, 𝑤3}; the underlying graph topologies may be different, or the edge weights may be different. Nevertheless, their spectral components (the Jordan subspaces) are identical, and, consequently, 𝑠 (shown in black) onto a nontrivial Jordan subspace (span of 𝑣1 and 𝑣2) and the span of 𝑣3, respectively, in R3. The projection onto the nontrivial subspace is invariant to basis Fig. 1: Projections ︀𝑠1 and ︀𝑠2 (shown in red) of a signal choices {𝑣1, 𝑣2} (in blue) or {︀𝑣1,︀𝑣2} (in green). graphs 𝒢(𝐴) and 𝒢(︀𝐴). This observation leads to the the spectral projections of a signal onto these compo- nents are identical; i.e., the GFT (1) is equivalent over definition of Jordan equivalence classes which preserve the GFT (1) as well as the underlying structure captured by the Jordan normal form 𝐽 of 𝐴. These classes are formally defined in the next section. B. Definition and Properties This section defines the Jordan equivalence class of graphs, over which the graph Fourier transform (1) is invariant. We will show that certain Jordan equivalence classes allow the GFT computation to be simplified. Consider graph 𝒢(𝐴) where 𝐴 has a Jordan chain that spans Jordan subspace J𝑖𝑗 of dimension 𝑟𝑖𝑗 > 1. Then (15), and consequently, (16), would hold for a non- Jordan basis of J𝑖𝑗; that is, a basis could be chosen to find spectral component ︀𝑠𝑖𝑗 such that the basis vectors do not form a Jordan chain of 𝐴. This highlights that the Fourier transform (1) is characterized not by the Jordan basis of 𝐴 but by the set J𝐴 = {J𝑖𝑗}𝑖𝑗 of Jordan subspaces spanned by the Jordan chains of 𝐴. Thus, graphs with topologies yielding the same Jordan subspace decomposition of the signal space have the same spectral components. Such graphs are termed Jor- dan equivalent with the following formal definition. Definition 3 (Jordan Equivalent Graphs). Consider graphs 𝒢(𝐴) and 𝒢(𝐵) with adjacency matrices 𝐴, 𝐵 ∈ C𝑁×𝑁 . Then 𝒢(𝐴) and 𝒢(𝐵) are Jordan equivalent graphs if all of the following are true: 1) J𝐴 = J𝐵; and 2) 𝐽𝐴 = 𝐽𝐵 (with respect to a fixed permutation of Jordan blocks). Let G𝐽 𝐴 denote the set of graphs that are Jordan equivalent to 𝒢(𝐴). Definition 3 and (1) establish that G𝐽 𝐴 is an equivalence class. Theorem 4. For 𝐴 ∈ C𝑁×𝑁 , the set G𝐽 𝐴 of all graphs that are Jordan equivalent to 𝒢(𝐴) is an equivalence class with respect to invariance of the GFT (1). Jordan equivalent graphs have adjacency matrices with identical Jordan subspaces and identical Jordan normal forms. This implies equivalence of graph spectra, proven in Theorem 5 below. Theorem 5. Denote by Λ𝐴 and Λ𝐵 the sets of eigen- values of 𝐴 and 𝐵, respectively. Let 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽 𝐴. Then Λ𝐴 = Λ𝐵; that is, 𝒢(𝐴) and 𝒢(𝐵) are cospectral. Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are Jordan equivalent, their Jordan forms are equal, so their spectra (the unique elements on the diagonal of the Jordan form) are equal. Once a Jordan decomposition for an adjacency matrix is found, it is useful to characterize other graphs in the same Jordan equivalence class. To this end, Theo- rem 6 presents a transformation that preserves the Jordan equivalence class of a graph. Theorem 6. Consider 𝐴, 𝐵 ∈ C𝑁×𝑁 with Jordan decompositions 𝐴 = 𝑉 𝐽𝑉 −1 and 𝐵 = 𝑋𝐽𝑋−1 and eigenvector matrices 𝑉 = [𝑉𝑖𝑗] and 𝑋 = [𝑋𝑖𝑗], respec- tively. Then, 𝒢(𝐵) ∈ G𝐽 𝐴 if and only if 𝐵 has eigenvector matrix 𝑋 = 𝑉 𝑌 for block diagonal 𝑌 with invertible submatrices 𝑌𝑖𝑗 ∈ C𝑟𝑖𝑗×𝑟𝑖𝑗 , 𝑖 = 1, . . . , 𝑘, 𝑗 = 1, . . . , 𝑔𝑖. Proof: The Jordan normal forms of 𝐴 and 𝐵 are equal. By Definition 3, it remains to show J𝐴 = J𝐵 so that 𝒢(𝐵) ∈ G𝐽 𝐴. The identity J𝐴 = J𝐵 must be true when span{𝑉𝑖𝑗} = span{𝑋𝑖𝑗} = J𝑖𝑗, which implies that 𝑋𝑖𝑗 represents an invertible linear transformation of the columns of 𝑉𝑖𝑗. Thus, 𝑋𝑖𝑗 = 𝑉𝑖𝑗𝑌𝑖𝑗, where 𝑌𝑖𝑗 is invertible. Defining 𝑌 = diag(𝑌11, . . . , 𝑌𝑖𝑗, . . . , 𝑌𝑘,𝑔𝑘 ) yields 𝑋 = 𝑉 𝑌 . C. Jordan Equivalent Graphs vs. Isomorphic Graphs This section shows that isomorphic graphs do not imply Jordan equivalence, and vice versa. First it is shown that isomorphic graphs have isomorphic Jordan subspaces. Lemma 7. Consider graphs 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼 𝐴 so that 𝐵 = 𝑇 𝐴𝑇 −1 for a permutation matrix 𝑇 . Denote by J𝐴 and J𝐵 the sets of Jordan subspaces for 𝐴 and 𝐵, respectively. If {𝑣1, . . . , 𝑣𝑟} is a basis of J𝐴 ∈ J𝐴, then there exists J𝐵 ∈ J𝐵 with basis {𝑥1, . . . , 𝑥𝑟} such that [𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟]; i.e., 𝐴 and 𝐵 have isomorphic Jordan subspaces. Proof: Consider 𝐴 with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1. Since 𝐵 = 𝑇 𝐴𝑇 −1, it follows that 𝐵 = 𝑇 𝑉 𝐽𝑉 −1𝑇 −1 (26) 4 = 𝑋𝐽𝑋−1 (27) where 𝑋 = 𝑇 𝑉 represents an eigenvector matrix of 𝐵 that is a permutation of the rows of 𝑉 . (It is clear that the Jordan forms of 𝐴 and 𝐵 are equivalent.) Let columns 𝑣1, . . . , 𝑣𝑟 of 𝑉 denote a Jordan chain of 𝐴 that spans Jordan subspace J𝐴. The corresponding columns in 𝑋 are 𝑥1, . . . , 𝑥𝑟 and span(𝑥1, . . . , 𝑥𝑟) = J𝐵. Since [𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟], J𝐴 and J𝐵 are isomorphic subspaces [13]. Theorem 8. A graph isomorphism does not imply Jordan equivalence. Proof: Consider 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼 𝐴 and 𝐵 = 𝑇 𝐴𝑇 −1 for permutation matrix 𝑇 . By (27), 𝐽𝐴 = 𝐽𝐵. To show 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽 𝐴, it remains to check whether J𝐴 = J𝐵. By Lemma 7, for any J𝐴 ∈ J𝐴, there exists J𝐵 ∈ J𝐵 that is isomorphic to J𝐴. That is, if 𝑣1, . . . , 𝑣𝑟 and 𝑥1, . . . , 𝑥𝑟 are bases of J𝐴 and J𝐵, respectively, then [𝑥1 ··· 𝑥𝑟] = 𝑇 [𝑣1 ··· 𝑣𝑟]. Checking J𝐴 = J𝐵 is equivalent to checking 𝛼1𝑣1 + ··· + 𝛼𝑟𝑣𝑟 = 𝛽1𝑥1 + ··· + 𝛽𝑟𝑥𝑟 = 𝛽1𝑇 𝑣1 + ··· + 𝛽𝑟𝑇 𝑣𝑟 (28) (29) for some coefficients 𝛼𝑖 and 𝛽𝑖, 𝑖 = 1, . . . , 𝑟. How- ever, (29) does not always hold. Consider matrices 𝐴 and 𝐵 [︃ 1 −1 −1 0 2 0 , 𝐵 = . (30) [︃2 𝐴 = 0 0 0 2 0 ]︃ −1 −1 1 [︃1 ]︃ 0 0 0 1 0 ]︃ 0 0 2 ]︃ Fig. 2: Jordan equivalent graph structures with unicellular adjacency matrices. Proof: A counterexample is provided. The top two graphs in Figure 2 correspond to 0/1 adjacency matrices with a single Jordan subspace J = C𝑁 and eigen- value 0; therefore, they are Jordan equivalent. On the other hand, they are not isomorphic since the graph on the right has more edges then the graph on the left. Theorem 8 shows that changing the graph node labels may change the Jordan subspaces and the Jordan equiv- alence class of the graph, while Theorem 9 shows that a Jordan equivalence class may include graphs with dif- ferent topologies. Thus, graph isomorphism and Jordan equivalence are not identical concepts. Nevertheless, the isomorphic and Jordan equivalence classes both imply invariance of the graph Fourier transform with respect to equivalence relations as stated in Theorems 1 and 4. The next theorem establishes an isomorphism between Jordan equivalence classes. Theorem 10. If 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐴) and 𝒢(𝐵) then their respective Jordan equiva- are isomorphic, 𝐵 are isomorphic; i.e., any 𝐴 and G𝐽 lence classes G𝐽 𝐴 is isomorphic to a graph 𝒢(𝐵′) ∈ graph 𝒢(𝐴′) ∈ G𝐽 𝐵. G𝐽 Proof: Let 𝒢(𝐴) and 𝒢(𝐵) be isomorphic by per- mutation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1. Consider 𝒢(𝐴′) ∈ G𝐽 𝐴, which implies that Jordan normal forms 𝐽𝐴′ = 𝐽𝐴 and sets of Jordan subspaces J𝐴′ = J𝐴 by Definition 3. Denote by 𝐴′ = 𝑉𝐴′𝐽𝐴′𝑉𝐴′ the Jordan decomposition of 𝐴′. Define 𝐵′ = 𝑇 𝐴′𝑇 −1. It suffices to show 𝒢(𝐵′) ∈ G𝐽 𝐵. First simplify: = 𝑇 𝑉𝐴′𝐽𝐴′𝑉 −1 = 𝑇 𝑉𝐴′𝐽𝐴𝑉 −1 = 𝑇 𝑉𝐴′𝐽𝐵𝑉 −1 𝐴′ 𝑇 −1 𝐴′ 𝑇 −1 𝐴′ 𝑇 −1 (since 𝒢(𝐴′) ∈ G𝐽 𝐴) (since 𝒢(𝐴) ∈ G𝐼 𝐵). (33) (34) (35) (36) From (36), it follows that 𝐽𝐵′ = 𝐽𝐵. It remains to show that J𝐵′ = J𝐵. Choose arbitrary Jordan sub- space J𝐴,𝑖𝑗 = span{𝑉𝐴,𝑖𝑗} of 𝐴. Then J𝐴′,𝑖𝑗 = span{𝑉𝐴′,𝑖𝑗} = J𝐴,𝑖𝑗 since 𝒢(𝐴′) ∈ G𝐽 𝐴. Then the 𝑗th Jordan subspace of eigenvalue 𝜆𝑖 for 𝐵 is J𝐵,𝑖𝑗 = span{𝑇 𝑉𝐴,𝑖𝑗} = 𝑇 span{𝑉𝐴,𝑖𝑗}. (37) (38) These matrices are similar with respect to a permutation matrix and thus correspond to isomorphic graphs. Their Jordan normal forms are both 0 2 0 ]︃ (31) 𝐽 = 0 0 2 with possible eigenvector matrices 𝑉𝐴 and 𝑉𝐵 given by [︃1 1 1 1 0 0 [︃1 1 1 𝑉𝐴 = , 𝑉𝐵 = 0 1 0 0 0 1 . (32) 𝐵′ = 𝑇 𝐴′𝑇 −1 Equation (32) shows that 𝐴 and 𝐵 both have Jordan subspaces J1 = span([1 1 1]𝑇 ) for 𝜆1 = 1 and J21 = span([0 1 0]𝑇 ) for one Jordan subspace of 𝜆2 = 2. However, the remaining Jordan subspace is span([1 0 0]𝑇 ) for 𝐴 but span([0 0 1]𝑇 ) for 𝐵, so (29) fails. Thus, 𝒢(𝐴) and 𝒢(𝐵) are not Jordan equivalent. The next theorem shows that Jordan equivalent graphs may not be isomorphic. Theorem 9. Jordan equivalence does not existence of a graph isomorphism. imply the 5 For the 𝑗th Jordan subspace of eigenvalue 𝜆𝑖 for 𝐵′, it follows from (36) that J𝐵′,𝑖𝑗 = span{𝑇 𝑉𝐴′,𝑖𝑗} = 𝑇 span{𝑉𝐴′,𝑖𝑗} = 𝑇 span{𝑉𝐴,𝑖𝑗} (39) (40) (since 𝒢(𝐴′) ∈ G𝐽 𝐴) (41) (42) (by (38)) = J𝐵,𝑖𝑗. Since (42) holds for all 𝑖 and 𝑗, the sets of Jordan subspaces J𝐵′ = J𝐵. Therefore, 𝒢(𝐵′) and 𝒢(𝐵) are Jordan equivalent, which proves the theorem. Theorem 10 shows that the Jordan equivalence classes of two isomorphic graphs are also isomorphic. This result permits an frequency ordering on the spectral components of a matrix 𝐴 that is invariant to both the choice of graph in G𝐽 𝐴 and the choice of node labels, as demonstrated in Section V. Relation to matrices with the same set of invariant subspaces. Let GInv 𝐴 denote the set of all matrices i.e., with the same set of invariant subspaces of 𝐴; 𝒢(𝐵) ∈ GInv 𝐴 if and only if Inv(𝐴) = Inv(𝐵). The 𝐴 is a proper subset of the next theorem shows that GInv Jordan equivalence class G𝐽 𝐴 of 𝐴. Theorem 11. For 𝐴 ∈ C𝑁×𝑁 , GInv 𝐴 ⊂ G𝐽 𝐴. Proof: If 𝒢(𝐵) ∈ GInv subspaces are equal, or J𝐴 = J𝐵. 𝐴 , then the set of Jordan Theorem 11 sets the results of this chapter apart from analyses such as those in Chapter 10 of [15], which describes structures for matrices with the same invariant spaces, and [22], which describes the eigen- decomposition of the discrete Fourier transform matrix in terms of projections onto invariant spaces. The Jor- dan equivalence class relaxes the assumption that all invariant subspaces of two adjacency matrices must be equal. This translates to more degrees of freedom in the graph topology. The following sections present results for adjacency matrices with diagonal Jordan forms, one Jordan block, and multiple Jordan blocks. D. Diagonalizable Matrices If the canonical Jordan form 𝐽 of 𝐴 is diagonal (𝐴 is diagonalizable), then there are no Jordan chains and the set of Jordan subspaces J𝐴 = {J𝑝}𝑁 𝑝=1 where J𝑝 = span(𝑣𝑝) and 𝑣𝑝 is the 𝑝th eigenvector of 𝐴. Graphs with diagonalizable adjacency matrices include undirected graphs, directed cycles, and other digraphs with normal adjacency matrices such as normally regular digraphs [23]. A graph with a diagonalizable adjacency matrix is Jordan equivalent only to itself, as proven next. Theorem 12. A graph 𝒢(𝐴) with diagonalizable adja- cency matrix 𝐴 ∈ C𝑁×𝑁 belongs to a Jordan equiva- lence class of size one. Proof: Since the Jordan subspaces of a diagonal- izable matrix are one-dimensional, the possible choices of Jordan basis are limited to nonzero scalar multiples of the eigenvectors. Then, given eigenvector matrix 𝑉 of 𝐴, all possible eigenvector matrices of 𝐴 are given by 𝑋 = 𝑉 𝑈, where 𝑈 is a diagonal matrix with nonzero diagonal entries. Let 𝐵 = 𝑋𝐽𝑋−1, where 𝐽 is the diagonal canonical Jordan form of 𝐴. Since 𝑈 and 𝐽 are both diagonal, they commute, yielding 𝐵 = 𝑋𝐽𝑋−1 = 𝑉 𝑈 𝐽𝑈−1𝑉 −1 = 𝑉 𝐽𝑈 𝑈−1𝑉 −1 = 𝑉 𝐽𝑉 −1 = 𝐴. (43) (44) (45) (46) (47) Thus, a graph with a diagonalizable adjacency matrix is the one and only element in its Jordan equivalence class. When a matrix has nondefective but repeated eigen- values, there are infinitely many choices of eigenvec- tors [16]. An illustrative example is the identity matrix, which has a single eigenvalue but is diagonalizable. Since it has infinitely many choices of eigenvectors, the identity matrix corresponds to infinitely many Jordan equivalence classes. By Theorem 12, each of these equiv- alence classes have size one. This observation highlights that the definition of a Jordan equivalence class requires a choice of basis. E. One Jordan Block Consider matrix 𝐴 with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1 where 𝐽 is a single Jordan block and 𝑉 = [𝑣1 ··· 𝑣𝑁 ] is an eigenvector matrix. Then 𝐴 is a repre- sentation of a unicellular transformation 𝑇 : C𝑁 → C𝑁 with respect to Jordan basis 𝑣1, . . . 𝑣𝑁 (see [15, Sec- tion 2.5]). In this case the set of Jordan subspaces has one element J = C𝑁 . Properties of unicellular Jordan equivalence classes are demonstrated next. Theorem 13. Let 𝒢(𝐴) be an element of the unicellular 𝐴. Then all graph filters 𝐻 ∈ Jordan equivalence class G𝐽 G𝐽 over graph 𝒢(𝐴), and let ︀𝑠 represent the coordinate Proof: Since 𝐴 is unicellular, it has a single Jordan chain 𝑣1, . . . , 𝑣𝑁 of length 𝑁. Consider a graph signal 𝑠 vector of 𝑠 in terms of the basis {𝑣𝑖}𝑁 spectral decomposition of signal 𝑠 is given by 𝐴 are all-pass. 𝑖=1. Then the 𝑠 =︀𝑠1𝑣1 + ···︀𝑠𝑁 𝑣𝑁 =︀𝑠; (48) is, that the unique projection of 𝑠 onto the spectral component J = C𝑁 is itself. Therefore, 𝒢(𝐴) acts as an all-pass filter. Moreover, (48) holds for all graphs in Jordan equivalence class G𝐽 𝐴. 6 In addition to the all-pass property of unicellular graph filters, unicellular isomorphic graphs are also Jordan equivalent, as proven next. Theorem 14. Let 𝒢(𝐴),𝒢(𝐵) ∈ G𝐼 unicellular matrix. Then 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽 𝐴. 𝐴 where 𝐴 is a Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, Jor- dan normal forms 𝐽𝐴 = 𝐽𝐵. Therefore, 𝐵 is also unicellular, so J𝐴 = J𝐵 = {C𝑁}. By Definition 3, 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽 𝐴. The dual basis of 𝑉 can also be used to construct graphs in the Jordan equivalence class of unicellular 𝐴. Theorem 15. Denote by 𝑉 an eigenvector matrix of unicellular 𝐴 ∈ C𝑁×𝑁 and 𝑊 = 𝑉 −𝐻 is the dual basis. Consider decompositions 𝐴 = 𝑉 𝐽𝑉 −1 and 𝐴𝑊 = 𝑊 𝐽𝑊 −1. Then 𝒢(𝐴𝑊 ) ∈ G𝐽 𝐴. Proof: Matrices 𝐴 and 𝐴𝑊 have the same Jordan normal form by definition. Since there is only one Jordan block, both matrices have a single Jordan subspace C𝑁 . By Definition 3, 𝒢(𝐴𝑊 ) and 𝒢(𝐴) are Jordan equivalent. The next theorem characterizes the special case of graphs in the Jordan equivalence class that contains 𝒢(𝐽) with adjacency matrix equal to Jordan block 𝐽 = 𝐽(𝜆). Theorem 16. Denote by 𝐽 = 𝐽(𝜆) is the 𝑁 × 𝑁 Jordan block (10) for eigenvalue 𝜆. Then 𝒢(𝐴) ∈ G𝐽 𝐽 if 𝐴 ∈ C𝑁×𝑁 is upper triangular with diagonal entries 𝜆 and nonzero entries on the first off-diagonal. Proof: Consider upper triangular matrix 𝐴 = [𝑎𝑖𝑗] with diagonal entries 𝑎11 = ··· = 𝑎𝑁 𝑁 and nonzero elements on the first off-diagonal. By [15, Example 10.2.1], 𝐴 has the same invariant subspaces as 𝐽 = 𝐽(𝜆), which implies J𝐽 = J𝐴 = {C𝑁}. Therefore, the Jordan normal form of 𝐴 is the Jordan block 𝐽𝐴 = 𝐽(𝑎11). Restrict the diagonal entries of 𝐴 to 𝜆 so 𝐽𝐴 = 𝐽. Then, 𝒢(𝐽),𝒢(𝐴) ∈ G𝐽 𝐽 by Definition (3). 𝐽 Figure 2 shows graph structures that are in the same unicellular Jordan equivalence class by Theorem 16. In addition, the theorem implies that it is sufficient to deter- mine the GFT of unicellular 𝐴 by replacing 𝒢(𝐴) ∈ G𝐽 with 𝒢(𝐽), where 𝐽 is a single 𝑁×𝑁 Jordan block. That is, without loss of generality, 𝒢(𝐴) can be replaced with a directed chain graph with possible self-edges and the eigenvector matrix 𝑉 = 𝐼 chosen to compute the GFT of a graph signal. Remark on invariant spaces. Example 10.2.1 of [15] shows that a matrix 𝐴 ∈ C𝑁×𝑁 having upper triangular entries with constant diagonal entries 𝑎 and nonzero entries on the first off-diagonal is both necessary and sufficient for 𝐴 to have the same invariant subspaces as 𝑁 × 𝑁 Jordan block 𝐽 = 𝐽(𝜆) (i.e., Inv(𝐽) = Inv(𝐴), where Inv(·) represents the set of invariant spaces of a matrix). If 𝑎 = 𝜆, Definition 3 can be applied, which yields 𝒢(𝐴) ∈ G𝐽 𝐽. On the other hand, consider a unicellular matrix 𝐵 such that its eigenvector is not in the span of a canonical vector, e.g., ⎡⎢⎢⎢⎣ 𝐵 = 1 2 1 2 0 0 2 − 1 − 1 2 0 0 1 2 − 1 2 1 2 1 2 1 2 2 − 1 − 1 − 1 2 2 ⎤⎥⎥⎥⎦ (49) with Jordan normal form 𝐽(0). Since the span of the eigenvectors of 𝐽(0) and 𝐵 are not identical, Inv(𝐽(0)) = Inv(𝐵). However, by Definition 3, 𝒢(𝐵) is in the same class of unicellular Jordan equivalent graphs as those of Figure 2, i.e., 𝒢(𝐵) ∈ G𝐽 𝐽. In other words, for matrices 𝐴 and 𝐵 with the same Jordan normal forms (𝐽𝐴 = 𝐽𝐵), Jordan equivalence, i.e., J𝐴 = J𝐵, is a more general condition than Inv(𝐴) = Inv(𝐵). This illustrates that graphs having adjacency matrices with equal Jordan normal forms and the same sets of invariant spaces form a proper subset of a Jordan equivalence class, as shown above in Theorem 11. Remark on topology. Note that replacing each nonzero element of (49) with a unit entry results in a matrix that is not unicellular. Therefore, its correspond- ing graph is not in a unicellular Jordan equivalence class. This observation demonstrates that topology may not determine the Jordan equivalence class of a graph. F. Two Jordan Blocks ⏞ ︀𝑠1 ⏞ ︀𝑠2 Consider 𝑁 × 𝑁 matrix 𝐴 with Jordan normal two Jordan subspaces J1 = form consisting of span(𝑣1, . . . , 𝑣𝑟1) and J2 = span(𝑣𝑟1+1, . . . , 𝑣𝑟2) of dimensions 𝑟1 > 1 and 𝑟2 = 𝑁 − 𝑟1 and corresponding eigenvalues 𝜆1 and 𝜆2, respectively. The spectral decom- position of signal 𝑠 over 𝒢(𝐴) yields 𝑠 =︀𝑠1𝑣1 + ··· +︀𝑠𝑟1𝑣𝑟1 +︀𝑠𝑟1+1𝑣𝑟1+1 + ··· +︀𝑠𝑁 𝑣𝑁 ⏟ ⏟ =︀𝑠1 +︀𝑠2. Spectral components ︀𝑠1 and ︀𝑠2 are the unique pro- jections of 𝑠 onto the respective Jordan subspaces. By Example 6.5.4 in [13], a Jordan basis matrix 𝑋 can be chosen for 𝐴 = 𝑉 𝐽𝑉 −1 such that 𝑋 = 𝑉 𝑈, where 𝑈 commutes with 𝐽 and has a particular form as follows. then 𝑈 = diag(𝑈1, 𝑈2), where 𝑈𝑖, 𝑖 = 1, 2, is an 𝑟𝑖 × 𝑟𝑖 upper triangular Toeplitz matrix; otherwise, 𝑈 has form If 𝜆1 = 𝜆2, (50) (51) [︃ 0 𝑈21 ]︃ 𝑈12 0 (52) 𝑈 = diag(𝑈1, 𝑈2) + 7 where 𝑈𝑖 is an 𝑟𝑖 × 𝑟𝑖 upper triangular Toeplitz matrix and 𝑈12 and 𝑈21 are extended upper triangular Toeplitz matrices as in Theorem 12.4.1 in [13]. Thus, all Jordan bases of 𝐴 can be obtained by transforming eigenvector matrix 𝑉 as 𝑋 = 𝑉 𝑈. A corresponding theorem to Theorem 16 is presented to characterize Jordan equivalent classes when the Jordan form consists of two Jordan blocks. The reader is di- rected to Sections 10.2 and 10.3 in [15] for more details. The following definitions are needed. Denote 𝑝×𝑝 upper triangular Toeplitz matrices 𝑇𝑟2 (𝑏1, . . . , 𝑏𝑟2) of form ⎡⎢⎢⎢⎢⎢⎢⎢⎣ 𝑏1 0 ... 0 0 ··· ... ... ··· ··· 𝑏2 𝑏1 ... 0 0 𝑏𝑝−1 𝑏𝑝−2 ... 𝑏1 0 𝑏𝑝 𝑏𝑝−1 ... 𝑏2 𝑏1 𝑇𝑝 (𝑏1, . . . , 𝑏𝑝) = ⎡⎢⎢⎢⎢⎢⎢⎢⎢⎢⎣ 0 0 ... 0 0 0 0 ... 0 0 ··· ··· and define 𝑞×𝑞 upper triangular matrix for some 𝑞 > 𝑝 𝑅𝑞 (𝑏1, . . . , 𝑏𝑝; 𝐹 ) = 𝑏1 ··· 𝑏1 0 ... ... 𝑏𝑝 𝑓11 𝑓12 ··· 𝑓1,𝑞−𝑝−1 ··· 𝑏𝑝 𝑓22 ··· 𝑓2,𝑞−𝑝−1 ... 𝑓1,𝑞−𝑝 𝑓2,𝑞−𝑝 ... ··· ··· ... 0 0 ... 𝑏𝑝 𝑏𝑝−1 ... 𝑏1 0 𝑓𝑞−𝑝,𝑞−𝑝 ... 𝑏𝑝 ... 𝑏2 𝑏1 where 𝐹 = [𝑓𝑖𝑗] is a (𝑞 − 𝑝) × (𝑞 − 𝑝) upper triangular matrix and 𝑏𝑖 ∈ C, 𝑖 = 1, . . . , 𝑝. The theorems are presented below. Theorem 17. Consider 𝐴 = diag(𝐴1, 𝐴2) where each matrix 𝐴𝑖, 𝑖 = 1, 2, is upper triangular with diag- onal elements 𝜆𝑖 and nonzero elements on the first = 𝜆2. Then 𝒢(𝐴) is Jordan off-diagonal. Let 𝜆1 equivalent to the graph with adjacency matrix 𝐽 = diag(𝐽𝑟1(𝜆1), 𝐽𝑟2 (𝜆2)) where 𝐽𝑟𝑖(𝜆𝑖) is the 𝑟𝑖 × 𝑟𝑖 Jordan block for eigenvalue 𝜆𝑖. Proof: By Theorem 16, 𝒢(𝐴𝑖) and 𝒢(𝐽𝑟𝑖(𝜆𝑖)) are Jordan equivalent for 𝑖 = 1, 2 and 𝐴𝑖 upper triangular with nonzero elements on the first off-diagonal. There- fore, the Jordan normal forms of 𝐽 and 𝐴 are the same. Moreover, the set of irreducible subspaces of 𝐽 is the union of the irreducible subspaces of [𝐽1 0]𝑇 and [0 𝐽2]𝑇 , which are the same as the irreducible subspaces of [𝐴1 0]𝑇 and [0 𝐴2]𝑇 , respectively. Therefore, J𝐴 = J𝐽, so 𝒢(𝐴) and 𝒢(𝐽) are Jordan equivalent. Theorem 18. Consider 𝐴 = diag(𝐴1, 𝐴2) where 𝐴1 = 𝑈𝑟1 (𝜆, 𝑏1, . . . , 𝑏𝑟2 , 𝐹 ) and 𝐴2 = 𝑇𝑟2(𝜆, 𝑏1, . . . , 𝑏𝑟2), 𝑟1 ≥ 𝑟2. Then 𝒢(𝐴) is Jordan equivalent to the graph with adjacency matrix 𝐽 = diag(𝐽𝑟1 (𝜆), 𝐽𝑟2 (𝜆)) where ⎤⎥⎥⎥⎥⎥⎥⎥⎦ , (53) ⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦ (54) 𝐽𝑟𝑖(𝜆) is the 𝑟𝑖 × 𝑟𝑖 Jordan block for eigenvalue 𝜆. Proof: By Lemma 10.3.3 in [15], 𝐴 with structure as described in the theorem have the same invariant subspaces as 𝐽 = diag(𝐽𝑟1(𝜆), 𝐽𝑟2(𝜆)). Therefore, 𝐴 and 𝐽 have the same Jordan normal form and Jordan subspaces and so are Jordan equivalent. Theorems 17 and 18 demonstrate two types of Jordan equivalences that arise from block diagonal matrices with submatrices of form (53) and (54). These theo- rems imply that computing the GFT (1) over the block diagonal matrices can be simplified to computing the transform over the adjacency matrix of a union of directed chain graphs. That is, the canonical basis can be chosen for 𝑉 without loss of generality. As for the case of unicellular transformations, it is possible to pick bases of J1 and J2 that do not form a Jordan basis of 𝐴. Any two such choices of bases are related by Theorem 6. Concretely, if 𝑉 is the eigenvector matrix of 𝐴 and 𝑋 is the matrix corresponding to another choice of basis, then Theorem 6 states that a transfor- mation matrix 𝑌 can be found such that 𝑋 = 𝑉 𝑌 , where 𝑌 is partitioned as 𝑌 = diag(𝑌1, 𝑌2) with full- rank submatrices 𝑌𝑖 ∈ C𝑟𝑖×𝑟𝑖, 𝑖 = 1, 2. G. Multiple Jordan Blocks This section briefly describes a special case of Jordan equivalence classes whose graphs have adjacency matri- ces 𝐴 ∈ C𝑁×𝑁 with 𝑝 Jordan blocks, 1 < 𝑝 < 𝑁. Consider matrix 𝐴 with Jordan normal form 𝐽 com- prised of 𝑝 Jordan blocks and eigenvalues 𝜆1, . . . , 𝜆𝑘. By Theorem 10.2.1 in [15], there exists an upper tri- angular 𝐴 with Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1 such that 𝒢(𝐴) ∈ G𝐽 𝐽. Note that the elements in the 𝐽 of 𝒢(𝐽) are useful since Jordan equivalence class G𝐽 signals over a graph in this class can be computed with respect to the canonical basis with eigenvector matrix 𝑉 = 𝐼. Theorem 19 characterizes the possible eigenvector matrices 𝑉 such that 𝐴 = 𝑉 𝐽𝑉 −1 allows 𝒢(𝐴) ∈ G𝐽 𝐽. Theorem 19. Let 𝐴 = 𝑉 𝐽𝑉 −1 be the Jordan decom- position of 𝐴 ∈ C𝑁×𝑁 and 𝒢(𝐴) ∈ G𝐽 𝐽. Then 𝑉 must be an invertible block diagonal matrix. Proof: Consider 𝒢(𝐽) with eigenvector matrix 𝐼. By Theorem 6, 𝒢(𝐴) ∈ G𝐽 𝐽 implies 𝑉 = 𝐼𝑌 = 𝑌 (55) where 𝑌 is an invertible block diagonal matrix. The structure of 𝑉 given in Theorem 19 allows a char- acterization of graphs in the Jordan equivalence class G𝐽 𝐽 with the dual basis of 𝑉 as proved in Theorem 20. 8 Theorem 20. Let 𝒢(𝐴) ∈ G𝐽 𝐽, where 𝐴 has Jordan decomposition 𝐴 = 𝑉 𝐽𝑉 −1 and 𝑊 = 𝑉 −𝐻 is the dual basis of 𝑉 . If 𝐴𝑊 = 𝑊 𝐽𝑊 −1, then 𝒢(𝐴𝑊 ) ∈ G𝐽 𝐽. 𝑖 Proof: By Theorem 19, 𝑉 is block diagonal with invertible submatrices 𝑉𝑖. Thus, 𝑊 = 𝑉 −𝐻 is block diagonal with submatrices 𝑊𝑖 = 𝑉 −𝐻 . By Theorem 6, 𝑊 is an appropriate eigenvector matrix such that, for 𝐴𝑊 = 𝑊 𝐽𝑊 −1, 𝒢(𝐴𝑊 ) ∈ G𝐽 𝐽. Relation to graph topology. Certain types of ma- trices have Jordan forms that can be deduced from their graph structure. For example, [24] and [25] relate the Jordan blocks of certain adjacency matrices to a decomposition of their graph structures into unions of cycles and chains. Applications where such graphs are in use would allow a practitioner to determine the Jordan equivalence classes (assuming the eigenvalues can be computed) and potentially choose a different matrix in the class for which the GFT can be computed more easily. Sections IV-E and IV-G show that working with unicellular matrices and matrices in Jordan normal form permits the choice of the canonical basis. In this way, for matrices with Jordan blocks of size greater than one, finding a spanning set for each Jordan subspace may be more efficient than attempting to compute the Jordan chains. Nevertheless, relying on graph topology is not always possible. Such an example was presented in Section IV-E with adjacency matrix (49). Relation to algebraic signal processing. The emer- gence of Jordan equivalence from the graph Fourier transform (1) is related to algebraic signal processing and the signal model (𝒜,ℳ, Φ), where 𝒜 is a signal algebra corresponding to the filter space, ℳ is a module of 𝒜 corresponding to the signal space, and Φ : 𝑉 → ℳ is a bijective linear mapping that generalizes the 𝑧- transform [26], [27]. We emphasize that the GFT (1) is tied to a basis. This is most readily seen by considering diagonal adjacency matrix 𝐴 = 𝜆𝐼, where any basis that spans C𝑁 defines the eigenvectors (the Jordan subspaces and spectral components) of a graph signal; is, a matrix, even a diagonalizable matrix, may not have distinct spectral components. Similarly, the signal model (𝒜,ℳ, Φ) requires a choice of basis for module (signal space) ℳ in order to define the frequency response (irreducible representation) of a signal [26]. On the other hand, this section demonstrated the equivalence of the GFT (1) over graphs in Jordan equivalence classes, which implies an equivalence of certain bases. This observation suggests the concept of equivalent signal models in the algebraic signal processing framework. Just as working with graphs that are Jordan equivalent to those with adjacency matrices in Jordan normal form simplifies GFT computation, we expect similar classes of equivalent signal models for which the canonical basis that 9 can be chosen without loss of generality. Jordan equivalence classes show that the GFT (1) permits degrees of freedom in graph topologies. This has ramifications for total variation-based orderings of the spectral components, as discussed in the next section. V. FREQUENCY ORDERING OF SPECTRAL COMPONENTS This section defines a mapping of spectral components to the real line to achieve an ordering of the spectral components. This ordering can be used to distinguish generalized low and high frequencies as in [4]. An upper bound for a total-variation based mapping of a spectral component (Jordan subspace) is derived and generalized to Jordan equivalence classes. The graph total variation of a graph signal 𝑠 ∈ C𝑁 is defined as [4] TV𝐺 (𝑠) = ‖𝑠 − 𝐴𝑠‖1 . (56) Matrix 𝐴 can be replaced by 𝐴norm = 1𝜆max 𝐴 when the maximum eigenvalue satisfies 𝜆max > 0. Equation (56) can be generalized to define the total variation of the Jordan subspaces of the graph shift 𝐴 as described in [12]. Choose a Jordan basis of 𝐴 so that 𝑉 is the eigenvector matrix of 𝐴, i.e., 𝐴 = 𝑉 𝐽𝑉 −1, where 𝐽 is the Jordan form of 𝐴. Partition 𝑉 into 𝑁 × 𝑟𝑖𝑗 submatrices 𝑉𝑖𝑗 whose columns are a Jordan chain of (and thus span) the 𝑗th Jordan subspace J𝑖𝑗 of eigenvalue 𝜆𝑖, 𝑖 = 1, . . . , 𝑘 ≤ 𝑁, 𝑗 = 1, . . . , 𝑔𝑖. Then the (graph) total variation of 𝑉𝑖𝑗 is defined as [12] TV𝐺 (𝑉𝑖𝑗) = ‖𝑉𝑖𝑗 − 𝐴𝑉𝑖𝑗‖1 , (57) where ‖·‖1 represents the induced L1 matrix norm (equal to the maximum absolute column sum). is invariant is, Theorem 21 shows that the graph total variation of to a relabeling of a spectral component the graph nodes; the total variations of the that spectral components for graphs in the same isomorphic equivalence class as defined in Section III are equal. Theorem 21. Let 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐵) ∈ G𝐼 𝐴, i.e., 𝒢(𝐵) is isomorphic to 𝒢(𝐴). Let 𝑉𝐴,𝑖𝑗 ∈ C𝑁×𝑟𝑖𝑗 be a Jordan chain of matrix 𝐴 and 𝑉𝐵,𝑖𝑗 ∈ C𝑁×𝑟𝑖𝑗 the corresponding Jordan chain of 𝐵. Then TV𝐺(𝑉𝐴,𝑖𝑗) = TV𝐺(𝑉𝐵,𝑖𝑗). (58) Proof: Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, there exists a permutation matrix 𝑇 such that 𝐵 = 𝑇 𝐴𝑇 −1 and the eigenvector matrices 𝑉𝐴 and 𝑉𝐵 of 𝐴 and 𝐵, respectively, are related by 𝑉𝐵 = 𝑇 𝑉𝐴. Thus, the Jordan chains are related by 𝑉𝐵,𝑖𝑗 = 𝑇 𝑉𝐴,𝑖𝑗. By (57), TV (𝑉𝐵) = ‖𝑉𝐵,𝑖𝑗 − 𝐵𝑉𝐵,𝑖𝑗‖1 =⃦⃦𝑇 𝑉𝐴,𝑖𝑗 −(︀𝑇 𝐴𝑇 −1)︀ 𝑇 𝑉𝐴,𝑖𝑗 ⃦⃦1 (59) (60) = ‖𝑇 𝑉𝐴,𝑖𝑗 − 𝑇 𝐴𝑉𝐴,𝑖𝑗‖1 = ‖𝑇 (𝑉𝐴,𝑖𝑗 − 𝐴𝑉𝐴,𝑖𝑗)‖1 = ‖𝑉𝐴,𝑖𝑗 − 𝐴𝑉𝐴,𝑖𝑗‖1 = TV (𝑉𝐴) , (61) (62) (63) (64) where (63) holds because the maximum absolute column sum of a matrix is invariant to a permutation on its rows. Theorem 21 shows that the graph total variation is invariant to a node relabeling, which implies that an ordering of the total variations of the frequency com- ponents is also invariant. Reference [12] demonstrates that each eigenvector submatrix corresponding to a Jordan chain can be nor- malized. This is stated as a property below: Property 22. The eigenvector matrix 𝑉 of adjacency matrix 𝐴 ∈ C𝑁×𝑁 can be chosen so that each Jordan chain represented by the eigenvector submatrix 𝑉𝑖𝑗 ∈ C𝑁×𝑟𝑖𝑗 satisfies ‖𝑉𝑖𝑗‖1 = 1; i.e., ‖𝑉 ‖1 = 1 without loss of generality. )︀⃦⃦1 It is assumed that the eigenvector matrices are normal- ized as in Property 22 for the remainder of the section. Furthermore, [12] shows that (57) can be written as TV𝐺 (𝑉𝑖𝑗) =⃦⃦𝑉𝑖𝑗 (︀𝐼𝑟𝑖𝑗 − 𝐽𝑖𝑗 𝑖=2,...,𝑟𝑖𝑗 = max (65) {1 − 𝜆‖𝑣1‖1 ,‖(1 − 𝜆) 𝑣𝑖 − 𝑣𝑖−1‖1} . (66) and establishes the upper bound for the total variation of spectral components as TV𝐺(𝑉𝑖𝑗) ≤ 1 − 𝜆𝑖 + 1. (67) Equations (65), (66), and (67) characterize the (graph) total variation of a Jordan chain by quantifying the change in a set of vectors that spans the Jordan sub- space J𝑖𝑗 when they are transformed by the graph shift 𝐴. These equations, however, are dependent on a particular choice of Jordan basis. As seen in Sec- tions IV-E, IV-F, and IV-G, defective graph shift matrices belong to Jordan equivalence classes that contain more than one element, and the GFT of a signal is the same over any graph in a given Jordan equivalence class. Furthermore, for any two graphs 𝒢(𝐴),𝒢(𝐵) ∈ G𝐽 𝐴, 𝐴 and 𝐵 have Jordan bases for the same Jordan subspaces, but the respective total variations of the spanning Jordan chains as computed by (65) may be different. Since it is desirable to be able to order spectral components in a manner that is invariant to the choice of Jordan basis, we derive here a definition of the total variation of a spectral component of 𝐴 in relation to the Jordan equivalence class G𝐽 𝐴. Class total variation. Let 𝒢(𝐵) be an element in 𝐴 where 𝐵 has Jordan de- Jordan equivalence class G𝐽 10 composition 𝐵 = 𝑉 𝐽𝑉 −1. Let the columns of eigen- vector submatrix 𝑉𝑖𝑗 span the Jordan subspace J𝑖𝑗 of 𝐴. Then the class total variation of spectral component J𝑖𝑗 is defined as the supremum of the graph total variation of 𝑉𝑖𝑗 over the Jordan equivalence class (for all 𝒢(𝐵) ∈ G𝐽 𝐴): TVG𝐽 𝐴 (J𝑖𝑗) = TV𝐺 (𝑉𝑖𝑗) . (68) sup 𝐴 𝒢(𝐵)∈G𝐽 𝐵=𝑉 𝐽𝑉 −1 ‖𝑉𝑖𝑗‖1=1 span{𝑉𝑖𝑗}=J𝑖𝑗 Theorem 23. Let 𝐴, 𝐵 ∈ C𝑁×𝑁 and 𝒢(𝐵) ∈ G𝐼 𝐴. Let 𝑉𝐴 and 𝑉𝐵 be the respective eigenvector matrices with Jordan subspaces J𝐴,𝑖𝑗 = span{𝑉𝐴,𝑖𝑗} and J𝐵,𝑖𝑗 = span{𝑉𝐵,𝑖𝑗} spanned by the 𝑗th Jordan chain of eigen- value 𝜆𝑖. Then TVG𝐽 (J𝐴,𝑖𝑗) = TVG𝐽 (J𝐵,𝑖𝑗). Proof: Let 𝑉 * sponding to 𝒢(𝐴*) ∈ G𝐽 variation of Jordan subspace J𝐴,𝑖𝑗; i.e., 𝐴 denote the eigenvector matrix corre- 𝐴 that maximizes the class total 𝐵 𝐴 𝐴 (J𝐴,𝑖𝑗) = TV𝐺 TVG𝐽 Similarly, let 𝑉 * sponding to 𝒢(𝐵*) ∈ G𝐽 variation of Jordan subspace J𝐵,𝑖𝑗, or (69) 𝐵 denote the eigenvector matrix corre- 𝐵 that maximizes the class total 𝐴,𝑖𝑗 (︀𝑉 * (︀𝑉 * )︀ . )︀ . 𝐵 𝐵,𝑖𝑗 TVG𝐽 (J𝐵,𝑖𝑗) = TV𝐺 (70) Since 𝒢(𝐴) and 𝒢(𝐵) are isomorphic, Theorem 10 implies that there exists 𝒢(𝐵′) ∈ G𝐽 𝐵 such that 𝐵′ = 𝑇 𝐴*𝑇 −1; i.e., 𝑉𝐵′ = 𝑇 𝑉 * 𝐴 where 𝑉𝐵′ is an eigenvector matrix of 𝐵′. By the class total variation definition (68), TV𝐺(𝑉𝐵′,𝑖𝑗) ≤ TV𝐺(𝑉 * 𝐵,𝑖𝑗). Applying Theorem 21 to isomorphic graphs 𝒢(𝐴*) and 𝒢(𝐵′) yields )︀ = TV𝐺 (𝑉𝐵′,𝑖𝑗) ≤ TV𝐺 (︀𝑉 * 𝐴,𝑖𝑗 (71) TV𝐺 Similarly, by Theorem 10, there exists 𝒢(𝐴′) ∈ G𝐽 such that 𝐵* = 𝑇 𝐴′𝑇 −1, or 𝑉 * 𝐵 = 𝑇 𝑉𝐴′ where 𝑉𝐴′ is an eigenvector matrix of 𝐴′. Apply (68) and Theorem 21 again to obtain 𝐵,𝑖𝑗 (︀𝑉 * )︀ . 𝐴 (︀𝑉 * (︀𝑉 * 𝐵,𝑖𝑗 )︀ ≥ TV𝐺 (𝑉𝐴′,𝑖𝑗) = TV𝐺 )︀, or Equations (71) and (72) imply that TV𝐺 TV𝐺 TV𝐺 𝐴,𝑖𝑗 (︀𝑉 * )︀ . (︀𝑉 * 𝐵,𝑖𝑗 𝐴,𝑖𝑗 (72) )︀ = TVG𝐽 𝐴 (J𝐴,𝑖𝑗) = TVG𝐽 𝐵 (J𝐵,𝑖𝑗) . (73) Theorem 23 shows that the class total variation of a spectral component to a relabeling of the nodes. This is significant because it means that an ordering of the spectral components by their class total variations is invariant to node labels. is invariant Next, the significance of the class total variation (68) is illustrated for adjacency matrices with diagonal Jordan form, one Jordan block, and multiple Jordan blocks. Diagonal Jordan Form. Section IV-D shows that a graph shift 𝐴 with diagonal Jordan form is the single element of its Jordan equivalence class G𝐽 𝐴. This yields the following result. Theorem 24. Let 𝒢(𝐴) have diagonalizable adjacency matrix 𝐴 with eigenvectors 𝑣1, . . . , 𝑣𝑁 . Then the class the spectral component J𝑖, 𝑖 = total variation of 1, . . . , 𝑁, of 𝐴 satisfies (for ‖𝑣𝑖‖ = 1) (J𝑖) = 1 − 𝜆𝑖 . (74) TVG𝐽 𝐴 Proof: Each spectral component J𝑖 of 𝐴 is the span of eigenvector 𝑣𝑖 corresponding to eigenvalue 𝜆𝑖. The class total variation of J𝑖 is then TVG𝐽 𝐴 (J𝑖) = sup TV𝐺 (𝑣𝑖) 𝐴 𝒢(𝐵)∈G𝐽 𝐵=𝑉 𝐽𝑉 −1 span{𝑣𝑖}=J𝑖 ‖𝑣𝑖‖1=1 = TV𝐺 (𝑣𝑖) = ‖𝑣𝑖 − 𝐵𝑣𝑖‖1 = ‖𝑣𝑖 − 𝜆𝑖𝑣𝑖‖1 = 1 − 𝜆𝑖‖𝑣𝑖‖1 = 1 − 𝜆𝑖 . (75) (76) (77) (78) (79) (80) (by (57)) Theorem 24 is consistent with the total variation result for diagonalizable graph shifts in [4]. Next, the class total variation for defective graph shifts is characterized. One Jordan block. Consider the graph shift 𝐴 with a single spectral component J = C𝑁 and Jordan form 𝐽 = 𝐽(𝜆). The next theorem proves that the total variation of J attains the upper bound (67). Theorem 25. Consider unicellular 𝐴 ∈ C𝑁×𝑁 with Jordan normal form 𝐽 = 𝐽(𝜆). Then the class total variation of G𝐽 𝐴 is 1 − 𝜆 + 1. Proof: Graph 𝒢(𝐴) is Jordan equivalent to 𝒢(𝐽) since 𝐴 is unicellular. Therefore, the GFT of a graph signal can be computed over 𝒢(𝐽) by choosing the the canonical vectors (𝑉 = 𝐼) as the Jordan basis, as shown in (48). By (66), the maximum of 1 − 𝜆‖𝑣1‖1 and ‖1 − 𝜆 𝑣𝑖 − 𝑣𝑖−1‖1 for 𝑖 = 2, . . . , 𝑁 needs to be computed. The former term equals 1 − 𝜆 since 𝑣1 is the first canonical vector. The latter term has form ‖ 1 − 𝜆 𝑣𝑖 − 𝑣𝑖−1‖1 = (81) (82) Since 1 − 𝜆 + 1 > 1 − 𝜆, TV𝐺(𝐼) = 1 + 1 − 𝜆. Therefore, (67) holds with equality, so the class total = 1 + 1 − 𝜆 , ⃦⃦⃦⃦⃦⃦ ⎡⎣ 0−1 0 1 − 𝜆 ⎤⎦⃦⃦⃦⃦⃦⃦1 variation of J = C𝑁 satisfies TVG𝐽 𝐴 (J𝑖) = sup 𝐴 𝒢(𝐵)∈G𝐽 𝐵=𝑉 𝐽𝑉 −1 ‖𝑉 ‖1=1 span{𝑉 }=J =C𝑁 TV𝐺 (𝑉 ) (83) = TV𝐺 (𝐼) = 1 − 𝜆 + 1. (84) (85) Multiple Jordan blocks. Theorem 26 proves that 𝐽 where 𝐽 is graphs in the Jordan equivalence class G𝐽 in Jordan normal form attains the bound (67). Theorem 26. Let 𝒢(𝐴) ∈ G𝐽 𝐽 where 𝐽 is the Jordan normal form of 𝐴 and J𝐴 = {J𝑖𝑗}𝑖𝑗 for 𝑖 = 1, . . . , 𝑘, 𝑗 = 1, . . . , 𝑔𝑖. Then the class total variation of J𝑖𝑗 is 1 − 𝜆𝑖 + 1. Proof: Since 𝒢(𝐴) ∈ G𝐽 𝐽, the GFT can be com- puted over 𝒢(𝐽) with eigenvector matrix 𝑉 = 𝐼. Then each 𝑉𝑖𝑗 = 𝐼𝑟𝑖𝑗 that spans J𝑖𝑗 has total variation TV𝐺 (𝐼𝑖𝑗) =⃦⃦𝐼𝑟𝑖𝑗 − 𝐽𝑖𝑗 ⃦⃦1 = 1 − 𝜆𝑖 + 1 Therefore, TVG𝐽 𝐽 (J𝑖) = sup span{𝑉𝑖𝑗}=J𝑖𝑗 𝐴 𝒢(𝐵)∈G𝐽 𝐵=𝑉 𝐽𝑉 −1 ‖𝑉𝑖𝑗‖1=1 (︀𝐼𝑟𝑖𝑗 )︀ = TV𝐺 = 1 − 𝜆𝑖 + 1. (by (67)). (86) (87) TV𝐺 (𝑉𝑖𝑗) (88) (89) (90) Although the total variation upper bound may not be attained for a general graph shift 𝐴, choosing this bound as the ordering function provides a useful standard for comparing spectral components for all graphs in a Jordan equivalence class. The ordering proceeds as follows: 1) Order the eigenvalues 𝜆1, . . . , 𝜆𝑘 of 𝐴 by increasing 1 − 𝜆𝑖 + 1 (from low to high total variation). 2) Permute submatrices 𝑉𝑖𝑗 of eigenvector matrix 𝑉 to respect the total variation ordering. Since the ordering is based on the class total vari- ation (68), it is invariant to the particular choice of Jordan basis for each nontrivial Jordan subspace. Such an ordering can be used to study low frequency and high frequency behaviors of graph signals; see also [4]. VI. EXAMPLE This section illustrates the Jordan equivalence classes of Section IV and total variation ordering of Section V 11 These results show that the degrees of freedom in the Jordan chain recurrence (5) can lead to fluctuating total variations of the spectral components. We compare these results to the upper bound (67), which is 𝜆 − 1 + 1 = 2 for 𝜆 = 0. Our results show that this upper bound is achieved with 𝑉3 (95). In this way, the class total variation (68) of the Jordan subspace J2(0) = span{𝑉3} corresponding to Jordan block 𝐽2(0) is TVG𝐽 𝐴 (J2(0)) = 2. (99) This example shows that using the class total variation or the upper bound (67) as a method of ranking the spectral components by (57) removes the dependency on the choice of generalized eigenvector. We modify 𝑉3 (95) by varying the sixth component 𝑣6 (and fourth component 𝑣4 as 𝑣4 = 1 − 1.5𝑣6) of the generalized eigenvector in the second column. It can be verified by (5) that such vectors are valid generalized eigenvectors. The results are shown in Figure 3 with the total variation plotted versus the value of 𝑣6. The data point at 𝑣6 = 0 corresponds to the total variation of 𝑉1 (93). The figure illustrates that the total variation 15. has a global maximum at 𝑣6 = 59 Jordan equivalence. It can be shown that the images of the projection matrices (12) corresponding to 𝑉1(93), 𝑉2 (94), and 𝑉3 (95) are nonidentical; is, each choice of Jordan basis corresponds to a different Jordan equivalence class. Consider an alternate basis for J2(0) = span{𝑉3} that provided by the columns of matrix . 3 (100) 0 1 2 0 0 0 2 1 0 0 1 5 0 0 0 −1 1 does not equal 𝐴. Nevertheless, the oblique projection of 𝑉 that do not correspond to J2(0) in addition to the If ︀𝑉 is defined as the matrix consisting of the columns columns of ︀𝑉1 (100), it can be shown that ︀𝐴 = ︀𝑉 𝐽︀𝑉 −1 matrices (12) corresponding to ︀𝑉1 (100) and 𝑉3 (95) and graphs 𝒢(𝐴) and 𝒢(︀𝐴) are in the same Jordan The total variation of ︀𝑉1 with respect to ︀𝐴 is Thus, ︀𝑉1 does not achieve the class total variation (99). onto the Jordan subspaces are identical; the GFT (1) is equivalent for both eigenvector matrices, equivalence class corresponding to J2(0) = span{𝑉3}. ⃦⃦⃦︀𝑉1 − ︀𝐴︀𝑉1 TV𝐺(︀𝑉1) = ⃦⃦⃦1 = 1.452. (101) that is, [︂1 0 0 3 ︀𝑉1 = ]︂𝑇 VII. LIMITATIONS The Jordan equivalence classes discussed in Sec- tion IV show that there are degrees of freedom over graph topologies with defective adjacency matrices that Fig. 3: Total variation of the spectral component of 𝐽2(0) for the example in Section VI with respect to generalized eigenvector component 𝑣6. The data points (gray squares) show total variation 1.181 when 𝑣6 = 0 and 2 when 𝑣6 = 59 15 . on the 10 × 10 matrix example ⎡⎢⎢⎢⎢⎢⎢⎢⎢⎣ 𝐴 = 0 0 0 −2 0 −3 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 2 0 0 0 5 0 0 0 6 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 −2 0 0 0 0 0 0 0 0 0 0 0 0 0 3 0 0 0 0 0 0 0 4 0 0 0 1 0 0 0 0 0 0 0 0 0 0 −1 0 0 0 0 0 0 0 ⎤⎥⎥⎥⎥⎥⎥⎥⎥⎦ . (91) 𝐽 = diag(︀4, 3 The Jordan normal form of 𝐴 is √−6𝜔, 3 √−6𝜔2, 3 √−6, 𝐽4(0), 𝐽2(0))︀ , (92) where 𝜔 = exp(2𝜋𝑗/3) and 𝐽4(0) and 𝐽2(0) are 4 × 4 and 2 × 2 Jordan blocks corresponding to eigenvalue zero, respectively. Total variation. Possible Jordan chains for the Jordan block 𝐽2(0) and their respective total variations (57) are computed. By applying the recurrence equation (5) with 𝜆 = 0, the following eigenvector submatrices with columns that span potential Jordan subspaces corre- sponding to 𝐽2(0) in (92) are obtained: 0 0 0 1 1 2 [︃−2 0 0 3 0 −2 5 0 0 0 [︃−2 0 0 [︃−2 0 0 0 0 0 1 5 3 0 −2 5 0 0 0 1 0 0 1 5 3 0 −2 5 0 0 0 15 0 0 1 5 3 0 0 0 − 49 3 0 0 0 − 1 ]︃𝑇 ]︃𝑇 ]︃𝑇 1 2 1 2 59 10 2 3 , 𝑉1 = 𝑉2 = 𝑉3 = (93) (94) . (95) , Normalizing these matrices by their L1 norm as spec- ified by Property 22 in Section V, the resulting total variations (57) are TV𝐺(𝑉1) = 1.181 TV𝐺(𝑉2) = 1.389 TV𝐺(𝑉3) = 2. (96) (97) (98) 12 v602468101214161820Total Variation1.21.41.61.82X: 3.933Y: 2X: 0Y: 1.181 enable the GFT to be equivalent over multiple graph structures. It may be sufficient to find these classes by traversing the graph once (with total time complexity 𝑂(𝑉 + 𝐸)) and then determining the Jordan normal form of the underlying graph because of the acyclic and cyclic structures within the graph; see [24], [25] and more details in Section IV. On the other hand, not all graphs have structures that readily reveal their Jordan equivalence classes. For example, arbitrary directed, sparse matrices such as road networks or social networks may have complex substructures that require a full eigendecomposition be- fore determining the corresponding Jordan equivalence class. Inexact eigendecomposition methods are useful to approximate the GFT in this case. In particular, the authors explore such a method in [21]. VIII. CONCLUSION This paper characterizes two equivalence classes of graph structures that arise from the spectral projector- based GFT formulation of [12]. Firstly, isomorphic equivalence classes ensure that the GFT is equivalent with respect to a given node ordering. This allows the exploitation of banded matrix structures that permit efficient eigendecomposition methods. Secondly, Jordan equivalence classes show that the GFT can be identical over graphs of different topologies. Certain types of graphs have Jordan equivalence classes that can be determined by a single traversal over the graph structure, which means that the eigenvector matrix can potentially be chosen for a simpler matrix topology. For more general graphs for which the equivalence class cannot be easily determined, inexact methods such as those proposed in [21] provide a means to computing the spectral projector-based GFT. Lastly, a total variation-based ordering of the Jordan subspaces is proposed. Since the total variation is depen- dent on the particular choice of Jordan basis, we propose a class variation-based ordering that is defined by the Jordan equivalence class of the graph. REFERENCES [1] A. Sandryhaila and J.M.F. Moura, "Discrete signal processing on graphs," IEEE Transactions on Signal Processing, vol. 61, no. 7, pp. 1644 -- 1656, Apr. 2013. [2] D. Shuman, S.K. Narang, P. Frossard, A. Ortega, and P. Van- dergheynst, "The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains," IEEE Signal Processing Magazine, vol. 30, no. 3, pp. 83 -- 98, Apr. 2013. [3] A. Sandryhaila and J.M.F. Moura, "Big data analysis with signal processing on graphs: Representation and processing of massive IEEE Signal Processing data sets with irregular structure," Magazine, vol. 31, no. 5, pp. 80 -- 90, Aug. 2014. [4] A. Sandryhaila and J.M.F. Moura, "Discrete signal processing on graphs: Frequency analysis," IEEE Transactions on Signal Processing, vol. 62, no. 12, pp. 3042 -- 3054, Jun. 2014. 13 [5] O. Teke and P.P. Vaidyanathan, "Extending classical multirate signal processing theory to graphs -- Part I: Fundamentals," IEEE Transactions on Signal Processing, vol. 65, no. 2, pp. 409 -- 422, Jan. 2017. [6] X. Zhu and M. Rabbat, "Approximating signals supported on graphs," in Proceedings of the 37th IEEE International Con- ference on Acoustics, Speech, and Signal Processing (ICASSP), Mar. 2012, pp. 3921 -- 3924. [7] S.K. Narang and A. Ortega, "Perfect reconstruction two-channel wavelet filter banks for graph structured data," IEEE Transactions on Signal Processing, vol. 60, no. 6, pp. 2786 -- 2799, Jun. 2012. [8] O. Teke and P.P. Vaidyanathan, "Extending classical multirate signal processing theory to graphs -- Part II: M-channel filter banks," IEEE Transactions on Signal Processing, vol. 65, no. 2, pp. 423 -- 437, Jan. 2017. [9] A.G. Marques, S. Segarra, G. Leus, and A. Ribeiro, "Sampling IEEE of graph signals with successive local aggregations," Transactions on Signal Processing, vol. 64, no. 7, pp. 1832 -- 1843, Apr. 2016. [10] S. Segarra, A. Marques, G. Leus, and A. Ribeiro, "Reconstruction of graph signals through percolation from seeding nodes," IEEE Transactions on Signal Processing, vol. 64, no. 16, pp. 4363 -- 4378, Aug. 2016. [11] S. Chen, A. Sandryhaila, J.M.F. Moura, and J. Kovacevi´c, "Signal recovery on graphs: Variation minimization," IEEE Transactions on Signal Processing, vol. 63, no. 17, pp. 4609 -- 4624, 2015. [12] J.A. Deri and J.M.F. Moura, "Spectral projector-based graph Fourier transforms," submitted, Nov. 2016. [13] P. Lancaster and M. Tismenetsky, The Theory of Matrices, New York, NY, USA: Academic, 2nd edition, 1985. [14] R.A. Horn and C.R. Johnson, Matrix Analysis, Cambridge, U.K.: Cambridge Univ. Press, 2012. [15] I. Gohberg, P. Lancaster, and L. Rodman, Invariant Subspaces of Matrices with Applications, vol. 51, Philadelphia, PA, USA: SIAM, 2006. [16] G.H. Golub and C.F. Van Loan, Matrix Computations, Baltimore, MD, USA: JHU Press, 4 edition, 2013. [17] M. Vetterli, J. Kovacevi´c, and V.K. Goyal, Foundations of Signal Processing, Cambridge, U.K.: Cambridge Univ. Press, 2014. [18] D.M. Cvetkovi´c, M. Doob, I. Gutman, and A. Torgašev, Recent results in the theory of graph spectra, vol. 36 of Annals of Discrete Mathematics, North-Holland, 1988. [19] E. Cuthill and J. McKee, "Reducing the bandwidth of sparse symmetric matrices," in Proceedings of the 1969 24th National Conference, New York, NY, USA, 1969, ACM '69, pp. 157 -- 172. [20] Hwansoo Han and Chau-Wen Tseng, "A comparison of locality transformations for irregular codes," in International Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers. Springer, 2000, pp. 70 -- 84. [22] C. Candan, [21] J.A. Deri and J.M.F. Moura, "Agile inexact methods for spectral projector-based graph Fourier transforms," submitted, Nov. 2016. "On the eigenstructure of DFT matrices [DSP education]," IEEE Signal Processing Magazine, vol. 28, no. 2, pp. 105 -- 108, 2011. [23] L.K. Jørgensen, "On normally regular digraphs," Tech. Rep. R 94-2023, Univ. of Aalborg, Institute for Electronic Systems, Dept. of Mathematics and Computer Science, 1994. [24] D.A. Cardon and B. Tuckfield, "The Jordan canonical form for a class of zero -- one matrices," Linear Algebra and its Applications, vol. 435, no. 11, pp. 2942 -- 2954, 2011. [25] H. Nina, R.L. Soto, and D.M. Cardoso, "The Jordan canonical form for a class of weighted directed graphs," Linear Algebra and its Applications, vol. 438, no. 1, pp. 261 -- 268, 2013. [26] M. Püschel and J.M.F. Moura, "Algebraic signal processing theory: Foundation and 1-D time," IEEE Transactions on Signal Processing, vol. 56, no. 8, pp. 3572 -- 3585, Aug. 2008. [27] M. Püschel and J.M.F. Moura, "Algebraic signal processing theory: 1-D space," IEEE Transactions on Signal Processing, vol. 56, no. 8, pp. 3586 -- 3599, Aug. 2008.
1510.08505
2
1510
2015-11-12T03:23:41
Ghost Cities Analysis Based on Positioning Data in China
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Real estate projects are developed excessively in China in this decade. Many new housing districts are built, but they far exceed the actual demand in some cities. These cities with a high housing vacancy rate are called ghost cities. The real situation of vacant housing areas in China has not been studied in previous research. This study, using Baidu positioning data, presents the spatial distribution of the vacant housing areas in China and classifies cities with a large vacant housing area as cities or tourism sites. To the best of our knowledge, it is the first time that we detected and analyzed the ghost cities in China at such fine scale. To understand the human dynamic in ghost cities, we select one city and one tourism sites as cases to analyze the features of human dynamics. This study illustrates the capability of big data in sensing our cities objectively and comprehensively.
cs.SI
cs
“Ghost  Cities”  Analysis  Based  on  Positioning  Data  in  China   Guanghua  Chia,  b,  Yu  Liub,  Zhengwei  Wua,  Haishan  Wua*   a  Big  Data  Lab,  Baidu  Research,  Baidu  Inc.,  Beijing  100085,  China   b   Institute   of   Remote   Sensing   and   Geographic   Information   Systems,   Peking   University,   Beijing  100871,  China     Abstract:  Real  estate  projects  are  developed  excessively  in  China  in  this  decade.  Many  new   housing  districts  are  built,  but  they  far  exceed  the  actual  demand  in  some  cities.  These  cities   with   a   high   housing   vacancy   rate   are   called   "ghost   cities.”   The   real   situation   of   vacant   housing  areas  in  China  has  not  been  studied  in  previous  research.  This  study,  using  Baidu   positioning  data,  presents  the  spatial  distribution  of  the  vacant  housing  areas  in  China  and   classifies  cities  with  a  large  vacant  housing  area  as  cities  or  tourism  sites.  To  the  best  of  our   knowledge,  it  is  the  first  time  that  we  detected  and  analyzed  the  “ghost  cities”  in  China  at   such  fine  scale.  To  understand  the  human  dynamic  in  “ghost  cities”,  we  select  one  city  and   one  tourism  sites  as  cases  to  analyze  the  features  of  human  dynamics.  This  study  illustrates   the  capability  of  big  data  in  sensing  our  cities  objectively  and  comprehensively.     Keywords:  Ghost  City,  Real  Estate,  Big  Data,  Vacant  Housing  Area     Introduction   China  has  experienced  fast  development  during  the  past  decade.  From  1984  to  2010,  the   urban   built-­‐up   area   has   increased   from   8,842   km2   to   41,768   km2  (Nie   &   Liu,   2013).   The   urbanization  speed  is  unprecedented  in  human  history  with  so  many  buildings  constructed   in  such  a  short  time  (Xue  &  Tsai,  2013).  The  amount  of  concrete  used  in  China  in  the  three   years  (2011-­‐2013)  is  more  than  that  used  in  U.S.  in  the  20th  century  (McCarthy,  2014).  The   fast  urbanization  of  China  has  contributed  to  the  high  housing  vacancy  rate  in  some  cities.   Many  new  housing  districts  are  built,  but  they  far  exceed  the  actual  demand.  In  these  cities,   the  population  density  is  very  low,  and  the  residential  districts  are  dark  with  few  lights  at   night.   Therefore,   they   are   called   “ghost   cities.”   In   Shepard’s   book   “Ghost   Cities   of   China”   (Shepard,  2015),  he  defined  “ghost  city”  as  “a  new  development  that  is  running  at  severe   undercapacity,  a  place  with  drastically  fewer  people  and  businesses  than  there  is  available   space  for.”     The  “Ghost  city”  phenomenon  has  attracted  much  attention  in  recent  years.  Shepard  (2015)   said   that   “China   is   the   world's   most   populated   country   without   a   doubt   has   the   world's   largest   number   of   empty   homes.”   Chinese   Premier   Keqiang   Li   warned   the   risk   of   rapid   urbanization   and   said   that   “Urbanization  is  not  about  building  big,  sprawling   cities.   We   should  aim  to  avoid  the  typical  urban  malady  where  skyscrapers  coexist  with  shanty  towns”   (Ryan,  2013).  Zuoji  Dong,  head  of  the  Ministry  of  Land  and  Resources  planning  bureau,  said   "new   guidance   issued   by   the   ministry   would   allow   for   strict   controls   on   new   urban   development.  Unless  a  city's  population  is  too  dense  or  expansion  is  deemed  necessary  to   cope  with  natural  disasters,  new  urban  districts  will  not  be  permitted"  (Rafagopalan,  2014).     Media   have   reported   many   cities   in   China   with   a   large   vacant   housing   area.   However,   sometimes   their   opinions   on   a   “ghost   city”   are   completely   opposite.   For   example,   media   * Corresponding  author.   E-­‐mail  address:  [email protected]  (G.  Chi),  [email protected]  (Y.  Liu),     [email protected]  (Z.  Wu),  [email protected]  (H.  Wu). have  covered  the  serious  situation  of  high  vacant  housing  areas  in  Rushan  City,  while  other   media  have  reported  that  Rushan  City  has  added  residents  and  already  expelled  the  term  of   “ghost.”  These  reports,  obtained  by  taking  pictures  or  counting  the  number  of  homes  with   lights  at  night,  have  been  criticized  for  their  low  credibility.  Moreover,  the  internal  causes  of   "ghost  cities"  may  differ  a  lot  despite  the  same  outward  appearance.  Tourism  in  China  has   developed  quickly  recently.  To  satisfy  the  demand  of  tourists,  cities  with  attractive  tourism   resources  have  built  many  houses  for  vacation.  During  the  popular  tourism  seasons,  many   people  will  live  in  the  vacant  housing  areas.  While  in  other  seasons,  the  population  is  small.   Therefore,  it  is  unfair  to  treat  tourism  sites  and  cities  as  equal.  This  raised  the  question:  what   is  the  real  situation  of  “ghost  cities”  in  China?     The  vacant  housing  rate  is  one  of  the  most  important  indicators  to  evaluate  the  health  of   real  estate  in  each  city.  This  indicator  can  also  be  used  to  discover  the  “ghost  cities.”  The   Chinese   government   has   not   published   any   data   related   to   the   vacant   housing   rate.   The   National   Bureau   of   Statistics   of   China   mentioned   that   the   difficulty   of   calculating   vacant   housing  rates  lies  in  the  difficulty  to  define  a  standard  of  the  status  of  vacant  houses  and   length   of   vacancy   (House   China,   2015).   Besides   using   the   vacant   housing   rate   to   define   a   ghost   city,   there   are   two   other   definitions.   The   Ministry   of   Housing   and   Urban-­‐Rural   Development  of  China  gives  a  standard  that  1  km2  area  holds  10  thousand  people.  Based  on   this  standard,  the  rank  of  “ghost  cities”  in  2014  defines  that  cities  with  people  smaller  than   half  of  the  standard  are  “ghost  cities”  (Su,  2014).  The  first  three  rank  cities  based  on  this   indicator  are  Erenhot,  Qinzhou  and  Lahsa.  Chen  (2014)  proposed  an  alternative  equation  to   calculate  the  indicator  of  “ghost  cities”:  (S-­‐D)  /  n,  where  S  is  the  supply  of  new  houses  in  the   following   five   years.   D   is   the   demand   of   new   houses   in   the   following   five   years.   n   is   the   number  of  houses  at  present.  This  equation  reflects  the  proportion  of  current  houses  that   should  be  removed  to  satisfy  the  balance  between  supply  and  demand.  The  first  three  rank   cities  based  on  this  indicator  are  Ordos,  Yingkou  and  Ulanqab.     It  is  difficult  to  obtain  real  estate  data  and  population  data  with  high  spatial  resolution.  This   impedes   the   understanding   of   “ghost   cities.”   Su   and   Chen’s   studies   cannot   pinpoint   the   exact  location  of  vacant  housing  areas  and  can  only  reflect  the  average  level  of  “ghost”  in   each  city,  not  to  mention  finding  out  the  reasons  behind  “ghost  cities.”  These  results  would   be  questionable  since  they  are  aggregated  results.  Fortunately,  the  emergence  of  big  data   brings  opportunities  to  objectively  understand  the  status  of  or  even  reasons  behind  "ghost   cities.”   Widely-­‐applied   location-­‐aware   devices   (LAD),   such   as   mobile   phones   and   GPS   receivers,  generate  large  volumes  of  individual  trajectory  data  with  long  time  scale  and  high   resolution.  These  features  make  it  suitable  for  population  analysis.  For  example,  Kang  et  al.   (2012)  used  mobile  phone  data  to  estimate  the  population  distribution  in  China.  It  provides   a   mean   for   observing   urban   dynamics   from   a   micro   perspective,   including   the   human   migration   and   interaction   between   regions.   According   to   the   social   sensing   concept   proposed  by  Liu  et  al.  (2015),  we  can  use  the  data  generated  by  each  individual  to  sense  our   living  environment.     Whether  the  so  called  “ghost  cities”  have  a  high  housing  vacancy  has  always  been  disputed   for  the  lack  of  data  to  verify.  In  this  study,  we  use  the  location  data  of  mobile  APPs  and  point   of  interest  data  of  residential  area  of  Baidu,  the  largest  search  engine  company  in  China.  The   basic  idea  of  discovering  vacant  housing  areas  is  that  only  a  small  population  lives  in  these   areas.  To  the  best  of  our  knowledge,  it  is  the  first  time  that  we  detected  and  analyzed  the   “ghost  cities”  in  China  at  such  fine  scale.  We  should  note  that  we  do  not  attempt  to  give  the   rank   of   which   areas   have   the   most   “ghost   cities.”   Instead,   we   want   to   find   out   the   exact   location  of  vacant  housing  areas  at  the  moment.  Even  if  the  vacant  housing  area  is  very  large   in  a  city,  it  does  not  mean  that  this  city  will  still  have  a  high  vacant  ratio  in  the  future.  Like   the   Zhengdong   new   district,   it   has   been   developing   quickly   in   the   past   few   years   and   attracted  a  large  number  of  people.     Methodology   Data  Description   This   study   uses   two   types   of   datasets,   including   Baidu   positioning   data   and   points   of   interests  (POI).  The  attributes  of  Baidu  positioning  data  cover  anonymized  user  id,  latitude,   longitude,  and  time.  There  are  several  billions  of  positioning  points  each  day.  The  time  span   is   from   9/8/2014   to   4/22/2015.   Its   features   of   national   spatial   scale,   long   temporal   scale,   and  high  precision  make  our  study  of  “ghost  cities”  representative  and  reliable.  We  admit   that   this   dataset   is   biased.   It   cannot   represent   all   the   demography   of   a   city,   such   as   very   young  and  very  old  people,  or  those  who  do  not  use  smart  mobile  phones.  However,  it  can   represent  the  situation  of  the  population  density,  which  is  the  focus  of  our  study.  The  POI   data  include  POI  name,  latitude,  longitude,  and  category.  The  specific  processing  of  POI  data   would  be  discussed  in  the  next  section.     Discovering  and  Classifying  Vacant  Housing  Area   The  basic  idea  of  discovering  vacant  housing  areas  is  that  only  a  small  population  lives  in  a   residential   area.   Therefore,   we   should   calculate   two   variables   based   on   our   data:   users’   home   location   and   location   of   residential   areas.   We   first   adopted   DBSCAN   algorithm   to   calculate  the  home  location  of  each  user  based  on  their  positioning  points  from  9:00  am  to   6:00   pm.   DBSCAN   is   a   widely   used   density   based   clustering   algorithm   and   is   more   computationally  efficient  than  other  methods  like  MeanShift  (Ester  et  al.,  1996).  It  stands  for   density-­‐based  spatial  clustering  of  applications  with  noise.  It  is  based  on  the  idea  of  density   reachability:  many  points  that  are  closely  located  will  be  grouped  together  as  clusters,  while   points   that   are   located   in   low-­‐density   regions   are   considered   as   noise.   This   algorithm   requires   two   parameters:   the   minimum   distance  ε  to   decide   whether   two   points   are   reachable   and   the   minimum   number   of   points  minPts  to   form   a   cluster.   A   point  P1  is   reachable   to   point  Pn  if   there   are   a   sequence   of   points  P1,  P2,   …,     Pn    where   each  Pi  is   within  ε    to  Pi-­‐1.   After   experimenting   with   different   values   of   these   two   parameters,   we   set  ε  as   200   meters   and  minPts  as   2.   We   choose   the   center   of   the   cluster   with   largest   number  of  points  as  the  user's  location.  Cases  exist  where  users  move  their  houses  during   the  period  of  our  data.  But  they  only  cover  a  low  proportion  and  will  not  affect  our  results.   We  keep  both  locations  of  these  users  in  our  study.     Our  study  attempts  to  discover  the  spatial  distribution  of  vacant  housing  areas.  Therefore,  it   is  crucial  to  know  exactly  the  location  of  residential  areas.  We  use  POI  data  from  Baidu  Map,   which  has  high  reliability  and  quality.    We  select  POIs  whose  categories  are  residential  areas   and  villas.  We  delete  the  residential  area  POIs  that  are  within  one  kilometer  of  villas  since   population  density  near  villas  is  very  low.  Moreover,  it  is  possible  that  the  residential  area  is   built   recently   and   few   people   live   there.   We   will   remove   these   situations   based   on   the   population  living  there  and  the  detail  will  be  discussed  blow.     The  difficulties  of  discovering  vacant  housing  areas  based  on  positioning  points  and  POI  lie  in   two  aspects.  First,  the  residential  area  POI  is  a  point,  while  residential  district  is  an  area.  The   residential  area  POI  is  not  always  located  in  the  center  of  the  residential  area.  Second,  the   areas  of  residential  districts  are  not  the  same.  In  other  words,  they  have  different  length  and   width.   If   we   have   the   data   of   residential   area   polygons   instead   of   points,   we   can   directly   count   the   exact   population   in   each   residential   area.   Such   data   may   be   available   in   some   residential  areas  of  few  big  cities.  But  the  vacant  housing  area  is  usually  small  in  these  big   cities.  While  for  those  cities  with  a  large  vacant  housing  area,  we  do  not  have  such  data.  To   solve  this  problem,  we  use  100  m  *  100  m  grids  as  the  analysis  units  in  this  study.  As  shown   in  Figure  1,  for  each  residential  area  POI  (Point  A),  we  select  5  *  5  grids  with  the  residential   area  POI  in  the  center  grid.  We  select  the  top  six  most  populated  grids.  If  the  sum  is  less  than   300,  we  define  this  residential  area  as  the  vacant  housing  area.  The  reason  why  we  choose   the  threshold  as  300  will  be  explained  blow.  We  also  set  the  sum  more  than  60  to  exclude   those  recently  built  residential  areas  where  few  people  live.     Fig   1.   Illustration   of   the   study   area   based   on   residential   area   POIs   (This   figure   shows   the   study  area  generated  based  on  residential  area  POI  A.  Residential  area  points  B  and  C  will  be   discussed  blow.  Each  grid  is  100m  *  100m.  )     The  edge  length  of  a  residential  area  is  between  300  meter  and  500  meter  on  average.  The   location  of  a  residential  area  POI  is  not  always  located  in  the  center  of  a  residential  area.  It   may  be  located  at  the  edge  of  a  residential  area  (Point  B  in  Fig.  1).  At  the  extreme  situation,   it  may  be  located  at  the  vertex  of  a  residential  area  (Point  C  in  Fig.  1).  In  this  extreme  case,   only  a  fourth  part  of  the  500  m  *  500  m  grids  would  cover  the  residential  area.  The  other   three  fourths  part  of  the  area  may  be  covered  with  non-­‐residential  area.  If  we  summarize  all   the  population  in  the  500  m  *  500  m  grids,  results  in  cases  like  point  B  and  C  in  Figure  1   would  be  distorted.  This  is  the  reason  why  we  only  select  the  first  six  grids  with  the  most   population.     The   average   floor   area  ratio   is   1   (An,   2015)   and   the   average   living   area   is   30   m2   in   China   (Ruan,  2010).  Thus  a  100  m  *  100  m  grid  can  hold  333  people.  The  dataset  we  used  in  this   study  contains  770  million  users.  China  has  a  population  of  1.36  billion.  Thus  on  average  a   100  m  *  100  m  grid  can  hold  188  Baidu  users.  We  define  that  a  grid  with  people  smaller  than   one  fourth  of  the  standard  is  a  vacant  housing  area.  If  the  six  grids  with  most  population   holds  people  smaller  than  300,  this  area  is  defined  as  the  vacant  housing  area.     We  should  note  that  the  first  six  grids  with  most  population  may  be  located  in  the  nearby   residential  area  of  the  study  residential  area  rather  than  itself.  We  admit  that  our  results  fail   to   discover   some   vacant   housing   areas.   However,   the   vacant   housing   areas   are   normally   located  spatially  aggregated.  Even  though  one  residential  area  is  lost,  its  nearby  residential   areas  will  be  discovered.  Therefore,  this  special  case  will  not  cause  too  many  noises  to  the   final  result.     To  classify  those  tourism  sites  with  a  large  vacant  housing  area,  we  use  the  positioning  data   in   China’s   National   Day   (9/29/2014   and   10/2/2014),   New   Year’s   Day   (12/30/2014   and   1/2/2015),  and  International  Workers’  Day  (4/29/2015  and  5/2/2015)  in  the  vacant  housing   areas.  By  comparing  the  change  of  population  before  and  after  the  holiday,  we  can  judge   whether  the  vacant  housing  area  is  for  tourism.  If  the  population  in  a  vacant  housing  area   increases  at  the  holiday,  it  is  defined  as  a  tourism  area.     Results   We  count  the  total  number  of  all  vacant  housing  areas  POI  in  each  county.  We  also  count   the  area  of  all  vacant  housing  areas  and  find  that  the  result  is  similar.    We  select  20  cities   with   a   large   vacant   housing   area.   The   result   is   shown   in   Figure   2,   which   can   be   browsed   interactively   on   the   website   (http://bdl.baidu.com/ghostcity/).   This   study   presents   the   spatial  distribution  of  vacant  housing  areas.  We  should  note  that  the  rank  of  these  20  cities   is  not  the  real  rank  of  our  result,  but  they  all  rank  at  the  top  of  50.  The  reason  why  we  did   not  show  the  real  rank  is  that  the  rank  is  very  sensitive  and  it  may  affect  the  sale  of  real   estate.     Fig.  2  20  cities  with  a  large  vacant  housing  area     From  a  macro  view,  cities  with  a  large  vacant  housing  area  are  mostly  second-­‐tier  and  third-­‐ tier   cities.   The   tiers   of   cities   in   China   are   determined   by   their   income,   education,   transportation,   technology   and   other   indicators.   East   provinces   have   more   proportion   of   cities   with   vacant   housing   areas.   From   the   micro   view,   vacant   housing   areas   are   mostly   distributed  in  the  city’s  periphery  or  new  towns  of  cities.  As  shown  in  Figure  3A,  the  500  m  *   500  m  grid  covers  the  residential  area.  Even  though  it  does  not  cover  the  other  part  of  the   residential  area,  the  result  has  already  shown  that  the  residential  area  is  a  vacant  housing     area.  Figure  3B  shows  two  residential  areas  of  vacant  housing  area.  The  location  of  the  left-­‐ bottom  residential  area  in  Figure  3B  is  similar  with  the  point  C  in  Figure  1.  Our  algorithm   exactly  finds  this  area.     We   present   the   spatial   distribution   of   the   first   8   cities   plus   Dongling   district   (Liaoning   Province)  with  a  large  vacant  housing  area  in  Figure  4.  All  these  9  cities  have  been  reported   by   media   for   their   large   vacant   housing   area.   In   figure   4A,   the   vacant   housing   areas   distribute  tightly  and  are  close  to  the  sea  in  Rushan.  Media  has  reported  that  Rushan  built   too  many  see-­‐view  houses  for  vacation.  The  vacant  housing  rate  is  high  except  in  summer.   Figure  4B  and  C  show  the  spatial  distribution  of  vacant  housing  area  in  Ordos,  which  is  well   known  as  “ghost  city.”  The  vacant  housing  areas  mostly  are  located  in  the  city’s  periphery.   Figure  4H  is  located  near  the  figure  4C  and  has  the  similar  situation  of  vacant  housing  rate.   Figure  4D  is  Binhai  New  Area,  which  was  called  “the  third  increasing  point  of  economy  in   China”  ever.  However,  this  new  area  exists  many  half-­‐baked  buildings.  For  Rugao,  Dongying,   and  Xinghua  (Fig.  4E,  F,  G),  we  can  find  the  support  from  the  Internet  or  media  that  these   cities  contain  a  large  vacant  housing  area.  Media  reported  that  Shenyang  National  Games   Village  has  become  “ghost  town”  (Miller  &  Chow,  2015).  Our  result  confirmed  this  report   and  showed  the  real  spatial  distribution  of  vacant  housing  areas  (Fig.  4I).     We  also  detect  whether  these  cities  are  tourism  sites.  We  find  that  many  tourism  sites  are   located   near   the   sea,   such   as   Rushan   (Shandong   Province),   Rugao   (Jiangsu   Province),   Xinghua   (Jiangsu   Province),   Wenchang   (Hainan   Province),   Donggang   (Shandong   province),   and   Qionghai   (Hainan   Province).   The   other   two   cities   like   Zhuji   (Zhejiang   Province)   and   Xiaoshan  (Zhejiang  Province)  also  have  popular  tourism  resource.                                                                                          A                                                                                                                                                                      B   Fig.   3   Illustration   of   residential   areas   of   vacant   housing   area   we   discovered.   (A.   One   residential  area  B.  Two  residential  areas)         Fig.   4   The   vacant   housing   areas   in   9   cities.   (Regions   overlaid   by   red   grids   are   inferred   as   vacant  housing  areas.  A.  Rushan  B.  Dongsheng  C.  Ordos  D.  Binhai  E.  Rugao  F.  Dongying  G.   Xinghua  H.  Yijinhuoluoqi  I.  Dongling)       Case  Study   To   find   out   the   real   situation   of   cities   with   a   large   vacant   housing   area   and   discover   the   reason  why  they  are  called  “ghost  cities”,  we  select  Rushan  (a  tourist  site)  and  Kangbashi  (a   city)   as   cases   to   analyze   the   population   change,   home-­‐work   separation,   and   human   migration.  These  two  cities  are  well-­‐known  for  their  large  vacant  housing  area.  Kangbashi  is   a   new   district,   which   once   belonged   to   Dongsheng.   The   Ordos   government   moved   from   Dongsheng   to   Kangbashi   in   2006   to   increase   its   development   speed.   Kangbashi   contains   abundant  coal  and  other  natural  resources,  which  boosts  its  economic  development  quickly.   As  it  became  richer,  the  government  ambitiously  starts  building  a  new  city.  Much  capital  was   invested  in  residential  real  estate,  which  became  an  investment  instead  of  living  demand.   The  housing  vacancy  ratio  is  very  high.  For  more  information,  please  refer  to  (Woodworth,   2015).     Rushan  is  located  in  Shandong  province.  It  has  a  21  kilometer  coastline  with  a  beautiful  sea   view,  which  is  called  Rushan  Yintan,  meaning  silver  beach.  Most  of  the  residential  real  estate   are  seasonal  houses.  Many  people  bought  a  house  there  for  vacation.  Every  summer  a  large   number   of   tourists   will   visit   there,   while   after   the   summer   the   population   will   decrease   dramatically.   For   these   two   different   types   of   cities   with   a   large   vacant   housing   area,   we   attempt  to  find  out  the  features  of  human  dynamic.   Population  Dynamics   We   count   the   population   in   these   two   cities   each   day   and   show   the   result   in   Figure   5.   Because  the  number  of  Baidu  users  is  increasing,  we  should  remove  this  effect  to  show  the   real  population  change  in  each  city.  In  this  study,  we  use  the  population  in  each  city  divided   by  the  total  number  of  people  in  China  as  the  indicator  of  population.  Then  we  normalize   the  value  of  these  two  cities.  Kangbashi  has  a  clear  weekly  cycle  of  population  change,  while   Rushan   is   not.   This   is   related   to   their   functional   difference.   Rushan   is   a   tourist   site   and   people   there   do   not   have   a   work   related   cycle.   In   National   Day,   Rushan   has   the   largest   population  and  the  number  is  much  more  than  other  days  in  whole  year.  The  population  in   Kangbashi   decreases,   while   in   Rushan   the   number   increase.   In   China’s   Spring   New   Year,   Kangbashi   has   the   fewest   number   of   people.   The   population   in   Rushan   is   fewest   at   the   beginning  of  February  instead  of  Chinese  Spring  New  Year.  In  New  Year,  the  population  in   Rushan   does   not   increase   significantly   because   the   weather   is   cold   and   few   people   visit   there  for  vacation.  In  Qingming  Festival  (2015/4/5),  the  population  in  Kangbashi  decreases   significantly,   while   the   number   in   Rushan   increases   slightly.   Rushan   is   a   tourist   site   while   Kangbashi   is   not,   which   leads   to   the   difference   of   population   change   in   Rushan   and   Kangbashi.   From   September   in   2014   to   April   in   2015,   the   number   of   people   in   these   two   large   vacant   housing   area   did   not   increase,   showing   no   trend   of   attracting   more   people.   However,  we  should  note  that  Rome  wasn’t  built  in  a  day;  neither  are  new  cities  in  China.   Constructing   a   new   city   is   easy,   while   making   it   functional   needs   a   long-­‐term   endeavor   (Shepard,  2015).   Fig.  5  Population  change  of  Kangbashi  and  Rushan     Figure   6   shows   the   population   change   in   each   hour   of   one   week   from   2015/3/23   to   2015/3/29.   Similar   to   the   results   from   mobile   phone   data   (Kang   et   al.,   2012),   the   largest   population  appears  at  12:00pm  and  20:00pm.  The  two  peaks  are  almost  similar  in  Kangbashi,   while  in  Rushan  the  peak  in  20:00pm  is  higher.  In  weekends,  the  population  in  Kangbashi   decreases,  while  the  number  in  Rushan  keeps  stable.   Fig.  6  Population  change  in  each  hour  of  a  week   Home-­‐work  Analysis   Home-­‐work   separation   is   a   normal   phenomenon   in   modern   city   life,   which   means   that   a   considerable  distance  exists  between  a  person’s  home  and  work  place  (Poston,  1972).    This   study   attempts   to   understand   the   home-­‐work   separation   situation   in   “ghost   cities.”   The   results  can  help  government  learn  about  the  real  situation  and  make  reasonable  planning.   We   used   DBSCAN   algorithm   to   calculate   the   work   place   based   on   a   person’s   positioning   points  from  9:00am  to  6:00pm.   We  adopted  the  algorithm  designed  by  Eric  Fischer  (Fischer,  2013)  to  visualize  the  spatial   distribution  of  people’s  home  and  work  places.  This  algorithm  assigns  lightness  value  to  each   pixel  based  on  the  number  of  points  in  the  pixel.  As  shown  in  Figure  7a,  most  of  work  places   are  located  closely  to  Kangbashi  government  seats.  In  Rushan  Yintan,  the  number  of  home   and  work  places  is  really  small  compared  with  Rushan  downtown  since  it  is  a  tourist  area  (Fig.   7b).  Rushan  government  realized  the  situation  of  few  work  opportunities  in  Rushan  Yintan   and  began  to  attract  companies  to  increase  the  employment.     We   statistic   the   proportion   of   people   who   live   or   work   in   Kangbashi   and   Rushan   Yintan   (Table  1).  It  is  a  common  sense  that  the  proportion  of  people  who  work  and  live  in  the  same   city  contains  most  part  (Shi  et  al.,  2015).  Administrative  boundaries  effectively  impact  the   human  migration  across  the  territory  (Chi  et  al.,  2014).  The  number  of  people  who  live  in   Dongsheng  and  work  in  Kangbashi  is  twice  as  many  as  that  who  live  in  Kangbashi  and  work   in  Dongsheng.  Dongsheng  has  a  perfect  infrastructure.  People  prefer  to  live  in  Dongsheng   and   work   job   opportunities  and  improve  its  infrastructure.  A  new  city  being  beautiful  and  modern  cannot   attract  people  migrate  there.  Jobs,  industry,  entertainment,  health  and  education  systems   should  be  functioning  before  many  people  migrate  to  a  new  city  (Shepard,  2015).  These  two   cases  reflect  that  vacant  housing  areas  usually  contain  limited  job  opportunities,  and  basic   infrastructure  should  be  improved  to  satisfy  people’s  need.     illustrates   that   Kangbashi   should   in   Kangbashi.   This   increase   more     a.  Kangbashi     b.  Rushan  (The  white  polygon  is  Rushan  Yintan  where  sea  view  houses  are  located.)   Fig.  7  The  spatial  distribution  of  home  and  work  place  (Red  points  denote  home.  Blue  points   are  work  places.)           Table.  1  Home  and  work  place  distribution  in  Rushan  and  Kangbashi   Home   Kangbashi   Work  place   Kangbashi   Kangbashi   Proportion (%)   24.9     Kangbashi   Dongsheng   8.2     Home   Rushan   Yintan   Rushan   Yintan   Rushan   Work  place   Proportion (%)   Rushan  Yintan   33.5     Rushan   downtown   8.1     Kangbashi   Other   24.7     Dongsheng   Kangbashi   17.6     Other   Kangbashi   24.5     Rushan   Yintan   Rushan   downtown   Other   Other   18.3     Rushan  Yintan   16.6     Rushan  Yintan   23.5       Human  Migration   Human  migration  reflects  the  urban  vitality.  The  tempo-­‐spatial  trajectory  is  composed  of  a   person’s  positioning  points  ordered  by  time.  In  this  section,  we  attempt  to  discover  the  city   interaction  caused  by  human  migration.  If  a  user  moves  from  city  a  to  city  b,  we  suppose   that  city  a  and  b  has  an  interaction.  When  calculating  human  migration,  it  is  unreasonable  to   define   that   a   user   has   a   migration   between   two   cities   as   long   as   he/she   exposed   in   two   different   cities   because   he/she   may   pass   by   cities   between   the   origin   city   and   the   destination  city  in  space.  For  example,  as  shown  in  table  2,  a  person  moves  from  Guangzhou   to  Shanghai  at  Nov.  1st,  2014.  He/she  passed  by  Changsha,  Nanchang,  and  Hangzhou  before   arriving   at   Shanghai.   It   is   wrong   to   suppose   that   Guangzhou   and   Changshan   has   an   interaction.  In  calculating  migration,  the  difficult  part  is  how  to  remove  pass-­‐by  cities.  The   frequency  of  positioning  points  exposed  by  people  is  not  stable.  The  number  of  positioning   points   exposed   in   pass-­‐by   cities   may   be   larger   than   that   exposed   in   destinations.   These   situations   make   the   calculation   of   human   migration   more   difficult.   Meanwhile,   the   large   amount  of  our  dataset  requires  that  the  algorithm  has  a  high  efficiency.     This  study  supposes  that  the  migration  will  last  for  more  than  one  day.  We  ignore  the  cases   that  people  return  back  in  one  day.  We  define  a  person’s  trajectory  as  {t1,  city1},{t2,  city2}, {t3,  city3},…,{tn,    cityn}.  tn  is  the  time  of  the  nth  positioning  point.  cityn  is  the  city  of  the  nth   positioning  point.  We  first  select  the  city  of  the  first  positioning  point  each  day  as  people’s   location.  If  cityn  is  same  to  cityn-­‐1,  then  we  merge  these  two  records.  Otherwise,  we  suppose   that  the  person  migrates  from  cityn-­‐1  to  cityn.     Table  2  A  sample  of  a  person’s  trajectory   Province   Guangdong   Hunan   Jiangxi   Zhejiang   Shanghai   Shanghai   Shanghai   City   Guangzhou   Changsha   Nanchang   Hangzhou   Shanghai   Shanghai   Shanghai   Time   2014/11/1  10:30:01   2014/11/1  12:50:01   2014/11/1  14:52:01   2014/11/1  18:30:01   2014/11/1  19:31:01   2014/11/2  09:21:01   2014/11/3  08:13:01     Figure  8  shows  the  result  of  human  migration  in  these  two  cities.  It  makes  sense  that  the   number   of   people   inflow   or   outflow   increases   during   holidays.   The   migration   population   increases  as  the  number  of  Baidu  users  increases.  Compared  to  Kangbashi  in  National  Day,  a   peak  of  population  inflow  appears  firstly  in  Rushan,  then  followed  by  a  peak  of  population   outflow.  While  in  Kangbashi,  the  peak  of  population  inflow  and  outflow  appears  almost  at   the   same   time.   In   these   two   “ghost   cities”,   we   did   not   discover   the   increase   of   net   population   flow,   meaning   that   they   did   not   attract   more   people   live   there.   Besides   the   change  of  migration  population,  we  also  know  the  interaction  intensity  between  two  cities.   In   other   words,   we   know   the   proportion   of   migration   people   from/to   each   city.   Figure   9   shows  the  location  and  proportion  of  migration  population  in  National  Day.  The  source  and   sink  with  largest  flow  in  Kangbashi  and  Rushan  are  Yulin  and  Weihai,  respectively.       a.  Kangbashi   b.  Rushan   Fig.  8  Population  change  of  migration                                                            a.  Kangbashi                                                                                                                                              b.  Rushan   Fig.  9  Human  migration  in  National  Day     Conclusion         The  fast  urbanization  of  China  has  contributed  so  many  housing  built  that  has  outstripped   the   actual   demand.   Whether   the   so   called   “ghost   cities”   reported   by   media   have   a   high   housing  vacancy  has  always  been  disputed  for  the  lack  of  data  to  verify.  As  far  as  we  are   concerned,  we  use  big  data  to  analyze  the  real  situation  of  “ghost  cities”  in  China  for  the  first   time.  The  features  of  national  spatial  scale,  long  temporal  scale,  and  high  precision  of  Baidu   big  data  make  the  study  of  “ghost  cities”  representative  and  reliable.  Instead  of  just  counting   the  number  of  homes  with  light  at  night  in  certain  residential  areas  as  the  indicator  of  “ghost   city”,  Baidu  big  data  can  count  the  population  precisely,  in  real  time,  and  in  national  scale.  A   limitation  of  the  data  is  that  it  cannot  represent  the  real  demography  of  a  city  because  not   all  people  are  Baidu  users.  However,  with  the  ubiquity  of  smart  mobile  phones,  Baidu  users   occupy  the  most  proportion  of  the  whole  population.  Moreover,  the  quality  of  residential   area  POIs  will  affect  our  results.  We  make  a  series  of  processing  to  make  sure  that  the  POIs   are  reliable.  Baidu  big  data  bring  opportunities  to  objectively  understand  the  status  or  even   reasons  of  "ghost  cities.”       Based  on  the  Baidu  positioning  data  and  residential  area  POI  data,  we  design  an  algorithm  to   discover   the   vacant   housing   areas.   The   results   discovered   the   specific   location   of   vacant   housing   areas,   which   can   help   government   make   smarter   and   more   reasonable   decisions.   Our  results  provide  the  real  situation  of  the  so  called  “ghost  cities”  in  China.  Cities  with  a   large  vacant  housing  area  are  mostly  second-­‐tier  and  third-­‐tier  cities.  The  tiers  of  cities  in   China   are   determined   by   their   income,   education,   transportation,   technology   and   other   indicators.  East  provinces  have  more  proportion  of  cities  with  vacant  housing  areas.  We  also   distinguish   the   tourism   sites   and   cities.   Based   on   Baidu   positioning   data,   we   discover   the   human   dynamic   in   cities   with   a   large   vacant   housing   area   to   help   better   understand   the   situation  in  “ghost  cities.”     Acknowledgements   The   authors   would   like   to   thank   their   colleagues   in   Big   Data   Lab   Zhengxue   Li   for   his   data   visualization  in  web  design,  Wei  Jia  for  his  help  in  pre-­‐processing  the  data,  and  Geography   Librarian  Amanda  Hornby  at  University  of  Washington  for  her  insightful  comments.     References   X.   Rank   of   ghost   12.   cities   in   2014.   (2014).   October   An,   B.   (2015).   Thinking   rationally   about   the   management   of   vacant   housing   rate.   May   9.   <http://comments.caijing.com.cn/20150506/3876126.shtml>.   Chen,   Q.   (2014).   Will   the   number   of   ghost   cities   continue   increasing?   November   10.   <http://www.zhihu.com/question/26193868/answer/33116107>.   Chen,   Y.   (2015).   Chasing   ghosts:   Where   is   China's   next   wave   of   empty's   new   towns?   February  13.  <  http://multimedia.scmp.com/china-­‐ghost-­‐towns/>.     Chi,  G.,  Thill,  J.  C.,  Tong,  D.,  Shi,  L.,  &  Liu,  Y.  (2014).  Uncovering  regional  characteristics  from   mobile  phone  data:  A  network  science  approach.  Papers  in  Regional  Science.   Su,   <http://house.ifeng.com/detail/2014_10_12/50060123_0.shtml>.   Ester,  M.,  Kriegel,  H.  P.,  Sander,  J.,  &  Xu,  X.  (1996).  A  density-­‐based  algorithm  for  discovering   clusters  in  large  spatial  databases  with  noise.  Kdd,  96(34),  226-­‐231.     Fischer,   E.   (2013).   Mapping   Millions   of   Dots.   <https://www.mapbox.com/blog/mapping-­‐ millions-­‐of-­‐dots/>.   House  China.  (2015).  China's  vacant  housing  rate  is  20%.  12  "ghost  cities"  appeared  last  year.   May  4.  <http://house.china.com.cn/wuxi/view/783741-­‐all.htm>.   Kang,  C.,  Liu,  Y.,  Ma,  X.,  &  Wu,  L.  (2012).  Towards  estimating  urban  population  distributions   from  mobile  call  data.  Journal  of  Urban  Technology,  19(4),  3-­‐21.   Liu,  Y.,  et  al.  (2015).  "Social  Sensing:  A  New  Approach  to  Understanding  Our  Socioeconomic   Environments."  Annals  of  the  Association  of  American  Geographers  ahead-­‐of-­‐print:  1-­‐19.   MacCarthy,  N.  (2014).  China  Used  More  Concrete  In  3  Years  Than  The  U.S.  Used  In  The  Entire   20th  Century    December  5.  <http://www.forbes.com/sites/niallmccarthy/2014/12/05/china-­‐ used-­‐more-­‐concrete-­‐in-­‐3-­‐years-­‐than-­‐the-­‐u-­‐s-­‐used-­‐in-­‐the-­‐entire-­‐20th-­‐century-­‐infographic/>   Miller,  D.  &  Chow,  E.  (2015).  Inside  China's  latest  'ghost  town':  Huge  urban  centre  built  to   hold  the  National  Games  for  13  DAYS  now  looks  like  the  set  of  a  zombie  horror  film.  June  17.   <http://www.dailymail.co.uk/news/peoplesdaily/article-­‐3128561/China-­‐s-­‐ghost-­‐city-­‐Huge-­‐ urban-­‐centre-­‐built-­‐hold-­‐National-­‐Games-­‐looks-­‐like-­‐set-­‐zombie-­‐horror-­‐film.html>.   Nie,   X.,   &   Liu,   X.   (2013).   Types   of   "Ghost   Towns"   in   the   process   of   urbanization   and   countermeasures.  Journal  of  Nantong  University  (Social  Sciences  Edition),  29(4),  111-­‐117.   Poston,  D.  L.  (1972).  Socioeconomic  status  and  work-­‐residence  separation  in  metropolitan   America.  Pacific  Sociological  Review,  367-­‐380.   Rajagopalan,  M.  (2014).  China  to  restrict  expansion  of  cities  in  move  to  curb  'ghost  towns'.   September  26.  < http://www.reuters.com/article/2014/09/26/us-­‐china-­‐cities-­‐idUSKCN0HL1   CB20140926>   Ruan,  Y.  (2010).  Ministry  of  Housing  and  Urban-­‐Rural  Development  of  the  People's  Republic   of   China:   in   China.   December   30.   <http://finance.people.com.cn/GB/13618045.html>.   Ryan,  V.  (2013).  Li  Keqiang  warns  of  urbanisation  risks  in  first  speech  as  premier.  March  18.   <http://www.scmp.com/news/china/article/1193244/li-­‐keqiang-­‐warns-­‐urbanisation-­‐risks-­‐ first-­‐speech-­‐premier>   Shepard,  W.  (2015).  Ghost  Cities  of  China.  Zed  Books.   Shi,  L.,  Chi,  G.,  Liu,  X.,  &  Liu,  Y.  (2015).  Human  mobility  patterns  in  different  communities:  a   mobile  phone  data-­‐based  social  network  approach.  Annals  of  GIS,  21(1),  15-­‐26.   Woodworth,   D.   (2015).   Ordos   Municipality:   A   Market-­‐Era   Resource   Boomtown.   Cities   43   (March):  115–32.   Xue,   C.   Q.,   Wang,   Y.,   &   Tsai,   L.   (2013).   Building   new   towns   in   China–A   case   study   of   Zhengdong  New  District.  Cities,  30,  223-­‐232.     is   30   m2   The   average   living   area  
1706.07405
1
1706
2017-06-22T17:18:08
Characterizing information importance and the effect on the spread in various graph topologies
[ "cs.SI", "physics.soc-ph" ]
In this paper we present a thorough analysis of the nature of news in different mediums across the ages, introducing a unique mathematical model to fit the characteristics of information spread. This model enhances the information diffusion model to account for conflicting information and the topical distribution of news in terms of popularity for a given era. We translate this information to a separate graphical node model to determine the spread of a news item given a certain category and relevance factor. The two models are used as a base for a simulation of information dissemination for varying graph topoligies. The simulation is stress-tested and compared against real-world data to prove its relevancy. We are then able to use these simulations to deduce some conclusive statements about the optimization of information spread.
cs.SI
cs
Characterizing information importance and the effect on the spread in various graph topologies James Flamino∗1, Alexander Norman†2, and Madison Wyatt‡2 1Department of Physics, Applied Physics, and Astrophysics, Rensselaer Polytechnic 2Department of Mathematical Sciences, Rensselaer Polytechnic Institute, 110 8th St, Troy, Institute, 110 8th St, Troy, NY 12180, USA NY 12180, USA April 25, 2016 Abstract In this paper we present a thorough analysis of the nature of news in different mediums across the ages, introducing a unique mathematical model to fit the characteristics of information spread. This model enhances the information diffusion model to account for conflicting information and the topical distribution of news in terms of popularity for a given era. We translate this information to a separate graphical node model to determine the spread of a news item given a certain category and relevance factor. The two models are used as a base for a simulation of information dissemina- tion for varying graph topoligies. The simulation is stress-tested and compared against real-world data to prove its relevancy. We are then able to use these simulations to deduce some conclusive statements about the optimization of information spread. Original paper written for COMAP's 2016 ICM competition. 7 1 0 2 n u J 2 2 ] I S . s c [ 1 v 5 0 4 7 0 . 6 0 7 1 : v i X r a ∗ † ‡ [email protected] [email protected] [email protected] 1 2 of 19 1 Introduction 1.1 Context and Motivation Over time, the methods we use to communicate have evolved and grown from small networks of groups with limiting connections to the massive array of transmission associated with the internet. In any sense, one thing has remained constant -- the inherent practice of seeking and sharing news. Communication Theory suggests this is for a few fundamental reasons: to persuade, to give or provide information, to seek information, and to express emotions. These basic desires drive the ways in which we build our networks and determine the importance of each interaction. We seek to develop a mathematical model of social networks to analyze communication at its core. To do this, we need to understand the modes by which people communicate, the information people convey and accept, the science of implanting news and the effects these all have on the resulting spread of the news. 1.2 Assumptions A few assumptions are taken in order to allow the model to run smoothly. • We assume topical distribution trends are uniform throughout a given era. • We assume noteworthy news has overcome the threshold of noise and disregard static traffic of information. • We assume a discretized time variable, updating the status of an information string in each node at regular intervals. • We assume that the probability of someone registering and paying attention to some string of data, or indeed sharing this piece of data, along mediums of communication is also random. • Finally, we assume that when a node decides to share data, it shares it with all of its neighbors. Additional small assumptions specific to pieces of the model will be outlined at appropriate times. 2 Data Analysis 2.1 Trends of News Sources The reach of information has exploded over the past 150 years. In today's society, information from nearly anywhere can propogate into the mainstream media. These connections and spreads can bring about amazing consequences and this phenomenon is seen across time. By compiling data from census reports, statistical assessments and available databases, we determine the trends of four information transfer mediums: newspaper, radio, television, and the internet. The industrial revolution brought a massive increase in newspaper production so that the number of newspapers and subsequent circulation increased dramatically. In the 20th century, radio and TV began to replace newspapers as major sources of information, and in more recent history, the internet has massively expanded the spread of information, working to replace outdated media outlets as a 3 of 19 (a) (b) (c) Figure 1: a) Newspaper circulation trends over time. b) Percentage of TVs in US households over time. c) Number of internet users over time. Currently, 40.6% of the world is connected to the internet. primary source. Newspaper circulation skyrocketed from 1880 to 1940, until radio broadcasting began to gain influence. In 1920, only about 3 million homes had a radio set, but that number reached nearly 30 million by the end of the 1930s. By 1945, 80% of homes had a radio set and that number continued to grow into today, in which radios are in virtually every car and every home. The introduction of TV saw an even greater increase with only 0.4% of households having a set in 1948, to 55.7% four years later. The trend only continued from there. Finally, the age of the internet has exceeded the trends of the previous mediums and seen unparalleled rapid expansion. These trends can be seen in Figure 1(a-c) depicting the true data found. The introduction of each new medium contributed to an eventual downfall of the others. Al- though there may not be an extinction of any one as they serve to compliment each other, it is shown that the increased usage of a novel medium brings a decrease in relevance of the current and past types. However, innovative sources like the internet combine the functions of newspapers, radio, and television with eNews, internet podcasts and instant streaming, respectively. This could serve to make outdated methods irrelevant and, consequently, obsolete. 2.2 What is news? Ultimately, the question at hand is, what makes a news story? How does one piece of infor- mation gain relevance over another? For the purpose of this paper, we define "news" as a piece of information that overcomes two thresholds: the threshold of penetration and the threshold of retention. We are concerned with the information that has the potential to have a wide spread and/or lasting impression. The threshold of penetration is the minimum number of mentions across various sources for a piece of information to catch wind. The threshold of retention is the minimum amount of time a piece of information is relevant enough to be shared. Essentially, in everyday news there is a level of noise of information that the story must overcome to be considered. In order to enforce what qualifies as news, we look at major news stories throughout the past 150 years to get an accurate idea. To compare with actual data, we tracked the volume change of phrases mentioned over periods of time in a database of over 10 million archived newspapers from 1836-1922, in the Washington Post from 1960-1963, and in data compiled from internet use of today. To begin, a phrase was chosen in terms of its relevance to the time period. The volume of mentions of the phrase per day was tracked over a time interval and recorded. We introduce two similar pieces of news and explore their ability to break above the thresholds. First, we examine the volume over time of mentions of the word "Lincoln" in newspapers from 1864-1866. As seen, there is a consistent level of noise until April 15, 1865, corresponding to the assassination of President Lincoln. 4 of 19 Figure 2: Mentions of "Lincoln" over time in US newspapers from 1864-1866. After a time period, the volume of mentions returns to the threshold, even delving below as the phrase becomes less relevant over time. This is also seen in a current, but similar scenario from 2012. There is an equal distribution of mentions of "Osama Bin Laden" and "Moammar Gaddafi" until a single source released mention of Osama Bin Laden's death into a communication network, signal- ing a spike in his mentions. This is clearly a piece of information that reflects our definition of news. Figure 3: Mentions of the phrase "Osama Bin Laden" over time. The plot of "Moammar Gaddafi" is included as an equivalence reference. Across the board, this shape and trend is seen for differing types of news in all eras, topics, and importance to the period. 2.3 Trends of Topical Distribution Finally, we examine the change over time of topical distribution in news sources. In spreading news, we categorize the highest ranking stories as falling into categories of consumption, politics, and entertainment. That is, the majority of news stories are most relevant in the realm of the aforementioned categories. Again compiling data from census reports on the circulation of different types of newspapers over the years, statistical data on radio and TV broadcast breakdown, and finally examining the top ten news sources with the highest internet traffic for information type, 5 of 19 (a) (b) (c) (d) (e) Figure 4: a) Mentions of "Inaugural Ball" in newspapers from 1864-1866. Peak corresponds to Lincoln's 2nd Inaugural Ball. b) Mentions of "World Series" in the early 1920s. Peak corresponds to a Cleveland victory. c) Mentions of "Suffrage" in the early 1920s. Peak corresponds to the ratification of the 19th Amendment. Notice the dip below threshold after the release as the phrase held less relevance. d) Mentions of "Marilyn Monroe" from 1960-1962. The peak corresponds to her deadly overdose in 1962. e) Mentions of "Berlin" from 1960-1962. The peak shows the date of erection of the Berlin Wall. Notice the retention of the news. we arrive at a topical distribution for the type of information being spread over time. There is a clear trend away from political news towards entertainment which is reinforced by the comparison of phrase volume distributions within eras. (a) Circulation proportion of newspaper type in 1880. (b) News type by user vol- ume of the top ten visited websites in 2015. Figure 6: Comparison of a political news story and entertainment piece of 1865 (a) and 1920 (b). (a) (b) 6 of 19 3 Models 3.1 How Information Spreads In order to understand the nature of any piece of information and its spread throughout a network, we first note the ways in which information can travel. Hence forth, we will consider that communication is either active or passive. Active communication requires focus on the part of both the sharer and receiver of information. A notable example would be newspapers, the journalists and editors of a newspaper must certainly pay attention as they place stories in the next day's run, and those that consume newspapers have to focus on consuming the text presented. Conversely, some mediums are passive in nature. Examples such as radio and at times television, only require the focus of one of the participants, the one sharing the information. The person receiving may instead focus on such things as, say, driving a car or tasks around the home. A note here should be made about the internet. The internet is distinctly upload-oriented which has often been used as one of its major selling points; the freedom of people to express themselves universally. In addition, the internet is at times both passive and active. There are articles one can read and interactive games, but at the same time streaming services such as Netflix, Spotify, and podcasts. While the internet has not yet branched out largely to those areas traditionally held by passive media, steps are being taken, such as the listening to podcasts in the car rather than radio. 3.2 Previous models and limitations The comparison to diffusion is largely seen in modeling information spread. The model has a basic form of dA(t) dt = i (t)[P − A(t)] In this sense, A(t) are the individuals that have received the information, P is the total popula- tion, and i (t) is a diffusion coefficient. The diffusion coefficient can be expanded to include an addition factor independent of the number of current individuals pertanent to the information, a multiplicative factor accounting for internal effect of imitation on the spread of the knowledge, or a combination of the two. These models are outlined below.  α i (t) = βA(t) α + βA(t) These coefficients can be implemented in the above equation and can be solved to determine the volume of people prevalent to information at given times. This model effectively maps the increased spread of diffusion given internal and external influ- ence qualities. However, it lacks in versatility and does not account for other factors which will enhance or inhibit the spread of information. In modeling the spread of information in a graph, previous work can most often be categorized by two distinct model types. The Threshold model is defined by a system wherein people begin to adopt a position if a certain ratio of their neighbors adopt it. Newer solutions falling under the Cascade model suggest an alternative explanation for how information spreads in social networks. In this model type, each node infected with information has a certain probability to infect each of its neighbors. In this manner, one node can actually begin an information cascade, simply by spreading something that is infectious, which is analogous to viral media. 7 of 19 (a) (b) Figure 7: Basic representation of (a) threshold and (b) cascade models. 3.3 Diffusion Model with Multiple Sources We herein introduce an enhanced model of information diffusion that accounts for the factors lost in the previous model. In order for our model to accurately describe the adoption of a story into mainstream news and track the resulting spread, we take into consideration the following factors: • The topical distribution of newsworthy items has changed over time and is not, nor has ever been, equal among topics. In a community oriented towards one subject, an item of that subject will spread quicker than one from a different subject. The topic of the item will affect the spread among a population and is an internal factor. • Different items have varying levels of importance to a community as a whole. Some items with high importance, like the assassination of a President, will span the gaps of interest distribution in a population. The importance of a item will affect the spatial spread of the information as well as the speed with which it accomplishes this spread and is an external factor. The importance of an item is determined by a number of characteristics: -- Novelty or Shock (ability to spark interest without back story) -- Accessibility (ability of any individual to understand) -- Attractiveness (impact of news on individual) -- Compatibility (alignment with societal values and/or acceptable notions) These considerations combine to give a total Relevance Factor which we will model scaled from 1 to 10. This relevance factor will determine the rate of spread of the information to the con- nected nodes of the network. An item with a high relevance factor will have high probability of penetration, velocity, and retention. We remind the reader that an item run through our model has already been categorized as "news" and therefore exceeds the respective thresholds. Thus, we herein assume an item will propagate to some extent and model the subsequent spread of the item with respect to its relevance factor. Let y(t) denote the number of individuals who are pertanent to a piece of information. In order to accurately model the topical distribution for a given time, we designate a certain percentage of individuals to be "interested" in each topic based on compiled data of the time. For example, for a model of 1880, 89% of the individuals will be politically oriented and 7% will be entertainment. 8 of 19 We are not insinuating that real individuals have single-minded interests, but simply that the percentages of interest of a community will change given the relative distribution of the time, modeled by designating percentages of nodes, or individuals. This will in turn account for the respective effect of item topic on the spread. If a news piece is topically relevant to one community, it will naturally spread between individuals within that community, but also has the potential to leak to individuals of other communities. Essentially, an entertainment individual will still hear and share news of a high profile political story, and vice versa. The key in this cross-community sharing lies in the relevance of the information itself. A low relevance political story will spread slowly in an entertainment network, and a high relevance political story will still spread quickly in a consumption network despite the conflicting interest. This concept can be modeled in the following way. ∆y = R(t){[β1y1(t) + η12y2(t)] (N1 − y1(t)) + [β2y2(t) + η21y1(t)] (N2 − y2(t))}∆t Or generally, ∆y = R(t){ n(cid:88) n(cid:88) [βiyi(t) + ηijyj(t)] (Ni − yi(t))}∆t i=1 j=1 j(cid:54)=i Each i represents the components of a different topical community. For example, N1 denotes the community interested in entertainment, N2 in politics, etc.. β1 represents the rate at which an in- dividual in community 1 will spread an information piece relevant to his community. η12 represents the rate at which he will spread the information to someone who does not know the information in a different community. β2 and η21 are equivalent variables for an individual in community 2. For a piece of information relevant to one community, it will spread quickest between nodes of this community, slower between those nodes and conflicting nodes, and slowest through two nodes of conflicting interest to the story. Generally, when information i is released βj < ηji < ηij < βi where i and j range from 1 to the number of categories and i (cid:54)= j. In determining the final number of individuals prevalent to the information in a given time, the function is multiplied by an external relevance factor, R(t). This accounts for information that spans the gaps in community interest. Although as a community we value some news pieces more than others, there are certain viral news stories that bridge these differences. As a people, we are affected by major political changes, influenced by mass entertainment, and impacted by new innovations. Although we are trending away from political news towards technological and entertainment oriented news as a constant influx of information, spikes of important stories will make their way to the individuals of all communities. R(t) can be dynamic in time and allows for consideration of the characteristics described above. In general, items rise and decay exponentially at a speed proportional to their relevance. For exam- ple, an item that is novel but not necessarily impactful will have a quick ascent in volume followed by a quick decay. Whereas an item that is novel, impactful, and accessible will have a quick ascent and slow decay corresponding to high penetration and retention. This property is reinforced in volume data collected from real event spread. 9 of 19 (a) (b) Figure 8: An exponential function is fit to the decay of mentions over time. Figure 9: The R-Squared values of fits for the aforementioned news stories. An exponential decay function in our model is clearly physically reasonable. The accuracy of the fit is shown in the above table. Thus far we have shown that the spread of a piece of information is dependent on various internal and external influence factors contributing to a combined relevance factor that varies with time. We have also shown the ability to model and predict the nature of R(t) given the characteristics of the incident information. 3.4 Network Model To further our model, we base it in graph theory, with the goal being to observe the flow of in- formation in a population of people connected by different means of communication, or different types of edges. In considering the nature of avenues of news, a few considerations are readily apparent. Some forms of communication are distinctly consumption-oriented in nature where one merely receives information from these mediums, such as newspapers, radio, and television. This is represented on a digraph as a directed edge. Conversely, forms of communication that are upload- oriented in nature include telegraphs, the internet, and talking have an opposite that represents itself as merely an edge. Take a node, 0, at time t, (going into an internal state, I0,t) with inward connections to nodes { 1, 2, ..., j } and outward state (the state the node is transmitting to its neighbors) represented at time t by ni,t. We represent the absorption of information by: j(cid:89) (I0,t,k = nk,t−1 · PN0) (T0,t = (1 − I0,t,k)) (I0,t = −T 2 k=1 0,t + 1) Given that any ni,t has a value of 0 or 1, this calculation multiplies 1 or 0 by another 0 or 1, determined by PN0, a function that semi-randomly decides whether to share something or not. 10 of 19 Then, in the next step, we subtract this number from 1, meaning that if 0 notices the information shared by a specific node, it zeroes out the entire equation, if not, it stays at 1. From then, we modify our final result so 1 switched to 0 and vice versa. Now, while this is a method to update the internal belief of a node, it does not necessarily signal to other nearby nodes this information. We update their external beliefs, what they share to the public, after a gestation period, G, from time t0, in the following manner, where PS0 denotes a 0 or 1 in the same sense as PN0, but for sharing rather than noticing: n0,t = δt,t0+G · PS0 · I0,t Now, one may note that this is only ever 1 at a single time slice, as it uses the Kronecker delta to denote the time when this is put out into the open, as it is a pulse of information, not a sustained signal. In reference to previous literature, this very much resembles a modified Independent Cascade model for social networks or an SIR epidemic model but with increased intricacy. 3.5 Network Versatility While our model as it stands is already quite versatile and can represent a number of scenarios, a few important problems stand out immediately. While there is a "gestation" period for vertices, the model lacks any means of transmitting data from two connected points over a timescale longer than 1 step. To that end, we bifurcate our vertices into two subcategories, real nodes and ghost nodes. A real node is simply a node described above, it represents a person, and is where information may or may not reside. A ghost node, on the other hand, is mathematically equivalent to a real node, except that PS0 = PN0 = 1. In addition to this specialized nature of it noticing and transmitting data, a ghost node between (0, n) also only has two directed connections, one inward from 0, and one outward towards n. To expand even further on this model, if the speed of a connection between two nodes is v, the time it takes to transfer between them as v steps (equivalent to things such as newspapers moving on trains), this ghost node would have a gestation period of v − 1. Finally, to account for the real world scenario of an individual forgetting a piece of news, the internal state of node 0, that has "believed" something at time t0, at times after t0, is represented by: (I0,t = I0,t0 · PV0,t) Note here that PV0,t is 0 or 1, based on a weighted number generator, however, it changes over time. As t − t0 increases, PV0,t will tend towards 1, as people become more forgetful of information over time. Now, instead of the model simply reflecting people retain information, it has people receiving information, forgetting it, then receiving it again from another source. Much like how people hear news from an initial source, like the newspaper or Facebook, go about their day and forget it, then hear about it again from someone in the home. 4 Simulations The parameters mentioned above were placed in a simulation with a few additional modifications. As mentioned in Section 3.3, we categorize news as falling into one of three functions: politics, entertainment, and consumption. The nodes follow the proportional topical distribution of each time era. We only allow data to originate from one source and the nodes themselves can only hold one string at a time until another piece of data overrides it. We run the simulations on two networks representing the cultures of the 1880 and 2015. The differences include the topical proportions, and spread layouts. These correspond to the media categories and sources of the times. Finally, the simulation allows for a random generation of information input (order, type, relevance) or a controlled news input. A few simulations are represented below. 11 of 19 (a) (b) Figure 10: Randomly generated news simulated in the 1880 (a) and 2015 (b) model. Notice the differences in community proportions and graph connections. 4.1 Validity of Simulation For the validity of the model, we simulate news of varying topic and relevance and compare it with real world data collected. Figure 11: The volume of mentions in time of an entertainment item of relevance 9 and the data compiled around Marilyn Monroe's death. As seen, the components of the real data are accurately reflected in the model. This news was highly relevant with high novelty, attractiveness, and accessibility. The death of Marilyn Monroe would have clearly had a high relevance factor in the time and that is reflected in the model. In a similar sense, our model for current spread and distribution reflects the news of Alan Rickman's death in January 2016 when compared with volume data from Google Trends. 12 of 19 (a) Model simulation of entertain- ment news (8) in the 2015 model. (b) Real world trend of mentions of "Alan Rickman" over a given time. From these comparisons, we validate our model. 4.2 Robust Nature of Simulation To test the robust nature of our model, we evaluate the predicted propagation of current news in past networks and vice versa. Take, for example, the announcement of Osama Bin Laden's capture and death. This would be considered political news of relevance 10. Also, consider the announcement of Kim Kardashian's pregnancy, an entertainment relevance of 6. We then test this information in our 1880 network to model its spread. The results are shown below. Figure 13: Simulation run on 1880 network with news of political relevance 10 and entertainment relevance 6. To get a sense of the accuracy of the data found, notice the similarities between real volume data of Abraham Lincoln's assassination and news of the inaugural ball. The maximum height of mentions is significantly lower for the entertainment news as well as the retention period. We confidently state that the model well reflects real scenario data across time periods. Figure 14: The volume spread of Lincoln's assassination and his earlier inaugural ball. The inaugural ball data has been shifted linearly in time to see direct comparison. 13 of 19 5 The Future of Communication In looking to the future, we first note on the source changes over time. As mentioned, there are active and passive news sources as well as upload and consumption based sources. Upload-oriented networks, in and of themselves, are capable of doing all the things a consumption-oriented network can and more, and will dominate when the resources needed to sustain both are present. However, as those modes of communication fight with each other for relevance, active and passive media act differently, complimenting each other. While there is indeed a significant amount of area in our media consumption space that the two will vie for, active media has a higher volume of communica- tion in a given period of time, while passive media has occupancy space advantages. For example, passive media can be consumed while driving or completing other tasks where active cannot. In this sense, the two complement each other and neither can dominate entirely. As it stands, the internet is immune to competition as it encompasses qualities of all the abovementioned. A new source of media must either improve an existing feature or remove flaws that inhibit information spread of the future. A common occurrence in science fiction is the idea of a neural uplink, transmission of informa- tion between minds directly. It is inherently faster than the internet, as it drastically shortens the gestation period. Additionally, it combines all types of communication expertly, effectively layering the models of interaction. The components of face-to-face conversation can be enhanced by the speed of internet connection. A model of this mode would include multi-faceted edges that would behave in compounding fashion. As it trends, we would expect the nodes to further represent entertainment as news, but with this new wave of technology, it is impossible to predict if individ- uals will lose community sense and begin to function on a personal premise given the immediate availability and personal nature of media associated with a neural uplink. 6 Sensitivity Analysis Our base model has a few fixed parameters in simulating the spread of information throughout a network. We address the impact of these parameters by varying them in the following ways. 6.1 Competing Sources To study the propagation of news, we limited the number of source nodes to one. In this way we effectively tracked the singular path of this item. We have altered our simulation to include two competing sources of news in an interconnected system. When two sources of information of the same type are released simultaneously into the network, we follow the subsequent spread. 6.1.1 Varying Levels of Importance We assume that there is a 50/50 chance for dominance when the two pieces of data meet at a node. Upon setting up this model, two simulations were run, one where the two pieces of information are equally believable, and one where one is much more believable than the other, or having higher relevance. The results are just as one would expect, with the first splitting the graph equally and the second being overrun by the more popular belief. In this sense, we can see how misinformation that suits our preconceived notions spreads, it is more believable to us and thus blots out real information in the network. 14 of 19 (a) Equal value. (b) Unequal value. Figure 15: The spread of information of higher value spreads quicker and further than that of a lower value. This is amplified if the competition is increasingly uneven. 6.1.2 Varying Initial Connectivity For two sources of equal believability, the placement of the initial prevalent nodes hold increasing importance. This is akin to equal news beginning in a rural village as opposed to a large city. We find that the item beginning in a more connected node reaches a larger amount of subsequent nodes in a shorter time. This notion is physically reasonable in that less people will be prevalent to and, thus, willing to accept, town gossip over city news. (a) Intial sources. (b) Spread after time. Figure 16: It is clear to see the respective spreads of red and blue information items and how their initial position or connections influenced this. 15 of 19 Figure 17: Red and Blue information pieces with equal relevance factors of 10 were released simultaneously. Blue was released in a more connected hub. Recall the internet volume data surrounding the news of Osama Bin Laden's capture and death (Figure 3). The distribution closely resembles the spread of competing information (Figure 17). As "Osama Bin Laden" became a more relevant phrase, its volume and spread overtook that of a similarly oriented phrase "Moammar Gaddafi". We further prove the validity of our model through this comparison. 6.1.3 Varying Connection Distances Finally, we alter the model to vary the distance between connections, making it so it takes longer to move across certain edges than others. There are now groupings of connectivity that vary in size and spread which allows simulations of differing topologies in both of our graph and the physical world. For example, an interconnected island shares a network with the mainland. It takes a fair amount of time to move information between them by boat, but the said information propogates much faster both on the island and the mainland themselves. This differs from the previous simulation in that the connective speeds as well as the connectivity volume are varied. As before we consider two items that are equally relevant or believable. We find that the infor- mation originating on the island remains isolated to that island, whereas the mainland information dominates the mainland. Next, we also consider news beginning with a higher relevance or believ- ability, this time on the less connected island, and news with a lower value, now beginning on the mainland. The two views establish an equilibrium with roughly the same adopting nodes. 16 of 19 (a) (b) Figure 18: The resulting spread of two pieces of information beginning in an isolated (blue) and connected (red) community, respectively. (a) represents equal relevance information simultaneously spread and (b) higher relevant information (blue) released in the isolated community. Finally, we note that if the data from the mainland is more relevant, the data on the island dies out quite quickly, and becomes a footnote in history. In these ways we can explicitly determine that physical isolation, much like social, is detrimental to the spread of information. If news starts out isolated by the topology of our social networks, it must make up for it in other ways simply to remain relevant. Figure 19: Higher relevance information (red) is initiated in a connected community simultaneously with information (blue) initiated in an isolated community. 6.2 Optimization of Spread From these simulations we can also make statements about an optimaztion of spread strategy. This information is useful for individuals or groups interested in conveying information to a maximum number of people. This analysis furthers the expected belief that in order to maximize spread, the information needs to have high relevance, topical importance, and a carefully selected initial source. A node with many edges is not necessarilly more connected if the surrounding nodes are weak. Ideally, a piece of information needs to be novel, accessible, attractive, and compatible. It needs to, in some way, be able to be characterized with the dominant topic of the time. Finally 17 of 19 it needs to be initiated in a carefully selected initial place with the highest connectivity -- both in personal node connections and global community connections. In these ways, the spread of an information piece an be optimized. 7 Conclusion Throughout the development of our model, one thing is clear: there is a definite relationship be- tween the importance of a piece of information and its resulting spread. However, this importance is a combination of many factors separately intrinsic to the item and the community. We have extensively shown that our model can account for changes in these factors and accurately reflect the penetration, spread, and retention of the information. Although all news items will spike and decay in varying levels, they follow a consistent model. Thus, by examining the spread of an item, we can extrapolate the underlying factors that contribute to its relevance. Conversely, by knowing the characteristics of an information piece, we can predict the resulting spread. Fi- nally, we can use this knowledge to strategically spread an information item to the furthest bounds. 7.1 Strengths and Weaknesses in the Models In total, our model is extremely multifaceted and inclusive. The diffusion model allows for varying levels of importance to be directly seen in the resulting volume of mentions. It is easily translated for an increasing number of interest categories or types of news and models the interac- tions of a news piece between the categories. The graph model excels in versatility: spatial distance can be represented based on assigning velocities to edges, different mediums can be assigned for the propagation of information based on velocities and direction of edges. For the model as a whole, the immense versatility allows us to see clear relationships between information with different levels of importance based on a number of inherent characteristics and the respective spread of that item. However, our model is not without weakness. We are unable to model true preferences of indi- viduals, only the preferences of the network as a whole. The connections are generated randomly so the more realistic scenario of having more connections with like-minded people within certain communities is lost, even if the overarching preference of the community is preserved. The model relies on discrete time values and some elements of weighted randomness in deciding how informa- tion is noticed and shared. In addition, our model involves a static graph in that no nodes appear or disappear and no edges change. 7.2 Supplements and Future Work Although this model and the analysis of communication is far-reaching, further work on this topic may be done to move closer and closer to real world simulation. First and foremost, one could fully account for the changing nature of human interactions over time. It would further the model to include the proportional array of ways an individual communicates and how that has changed over time. Although individuals and their relationships are discrete, synthesizing it with continuous time would improve this model. Finally, a way to accurately vary learning a news item from a mass media source versus a personal connection in order to map the resulting internal effect on the spread of that item by the individual would serve to further the model. 18 of 19 8 References Baughman, James. "Television Comes to America, 1947-57." Television Comes to America, 1947- 57. Illinois State Library, n.d. Web. 31 Jan. 2016. Beckford, Martin, and Graeme Paton. "Royal Wedding Facts and Figures." The Telegraph. Tele- graph Media Group, 29 Apr. 2011. Web. 31 Jan. 2016. "Chronicling America." News about Chronicling America RSS. Library of Congress, n.d. Web. 31 Jan. 2016. Bell, Allan. The Language of News Media. Oxford, UK: Blackwell, 1991. 1-23. Print. Deutschmann, P. J., and W. A. Danielson. "Diffusion of Knowledge of the Major News Story." Journalism and Mass Communication Quarterly 37.3 (1960): 345-55. Web. Edmonds, Rick. "State of the News Media 2015 A New Ranking of Digital Sites." Poynter Insti- tute, 29 Apr. 2015. Web. 31 Jan. 2016. "Feature Radio In The 1930s." PBS. PBS, n.d. Web. 31 Jan. 2016. Geroski, P.a. "Models of Technology Diffusion." Research Policy 29.4-5 (2000): 603-25. Web. 29 Jan. 2016. "Google Trends - Web Search Interest - Worldwide, 2004 - Present." Google Trends. Google, n.d. Web. 31 Jan. 2016. Granovetter, Mark. "Threshold Models of Collective Behavior." American Journal of Sociology 83.6 (1978): 1420-443. Web. 31 Jan. 2016. Graph Representing Social Network. N.d. Independent Cascade Model of Information Diffusion. Web. 1 Feb. 2016. "Internet Users." Number of (2015). Internet Live Stats, n.d. Web. 01 Feb. 2016. Kempe, David, Jon Kleinberg, and va Tardos. "Influential Nodes in a Diffusion Model for Social Networks." Automata, Languages and Programming Lecture Notes in Computer Science (2005): 1127-138. Web. 31 Jan. 2016. Kempe, David, Jon Kleinberg, and va Tardos. "Maximizing the Spread of Influence through a Social Network." Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '03 (2003): n. pag. Web. 31 Jan. 2016. Lotan, Gilad. "Breaking Bin Laden: Visualizing the Power of a Single Tweet - SocialFlow." So- cialFlow Atom. N.p., 06 May 2011. Web. 31 Jan. 2016. Printed. Statistics on Radio and Television, 1950-1960; Statistical Reports and Studies 23 (1963): n. pag. Print. Saito, Kazumi, Ryohei Nakano, and Masahiro Kimura. "Prediction of Information Diffusion Prob- abilities for Independent Cascade Model." Lecture Notes in Computer Science Knowledge-Based 19 of 19 Intelligent Information and Engineering Systems (n.d.): 67-75. Web. 31 Jan. 2016. Schelling, Thomas C. "Dynamic Models of Segregation." The Journal of Mathematical Sociology 1.2 (1971): 143-86. Web. 31 Jan. 2016. United States. Census Bureau. Statistics of Newspapers and Periodicals in the United States. N.p.: n.p., n.d. Web. 30 Jan. 2016. The Washington Post n.d.: n. pag. Historical Archive. Web. 30 Jan. 2016. Threshold Model of Disease. N.d. Hawaii Genetics Program. Web. 01 Feb. 2016. Yang, Jaewon, and Jure Leskovec. "Modeling Information Diffusion in Implicit Networks." 2010 IEEE International Conference on Data Mining (2010): n. pag. Web. 30 Jan. 2016. "The Year 1960 From The People History." What Happened in 1962 Inc. Pop Culture, Prices and Events. N.p., Sept. 2004. Web. 31 Jan. 2016. Zafarani, Reza, Mohammad Ali Abbasi, and Huan Liu. "Information Diffusion in Social Media." Social Media Mining: An Introduction. N.p.: Cambridge UP, 2014. N. pag. Web.
1806.10904
1
1806
2018-06-28T12:05:46
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks
[ "cs.SI", "physics.soc-ph" ]
Uncovering latent community structure in complex networks is a field that has received an enormous amount of attention. Unfortunately, whilst potentially very powerful, unsupervised methods for uncovering labels based on topology alone has been shown to suffer from several difficulties. For example, the search space for many module extraction approaches, such as the modularity maximisation algorithm, appears to be extremely glassy, with many high valued solutions that lack any real similarity to one another. However, in this paper we argue that this is not a flaw with the modularity maximisation algorithm but, rather, information that can be used to aid the context specific classification of functional relationships between vertices. Formally, we present an approach for generating a high value modularity consensus space for a network, based on the ensemble space of locally optimal modular partitions. We then use this approach to uncover latent relationships, given small query sets. The methods developed in this paper are applied to biological and social datasets with ground-truth label data, using a small number of examples used as seed sets to uncover relationships. When tested on both real and synthetic datasets our method is shown to achieve high levels of classification accuracy in a context specific manner, with results comparable to random walk with restart methods.
cs.SI
cs
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks James P Gilbert Synthetic Biology Research Centre University of NoŠingham NoŠingham, United Kingdom NG7 2RD james.gilbert@noŠingham.ac.uk Jamie Twycross School of Computer Science University of NoŠingham NoŠingham, United Kingdom NG8 1BB jamie.twycross@noŠingham.ac.uk 8 1 0 2 n u J 8 2 ] I S . s c [ 1 v 4 0 9 0 1 . 6 0 8 1 : v i X r a ABSTRACT Uncovering latent community structure in complex networks is a field that has received an enormous amount of aŠention. Unfor- tunately, whilst potentially very powerful, unsupervised methods for uncovering labels based on topology alone has been shown to suffer from several difficulties. For example, the search space for many module extraction approaches, such as the modularity max- imisation algorithm, appears to be extremely glassy, with many high valued solutions that lack any real similarity to one another. However, in this paper we argue that this is not a flaw with the modularity maximisation algorithm but, rather, information that can be used to aid the context specific classification of functional relationships between vertices. Formally, we present an approach for generating a high value modularity consensus space for a net- work, based on the ensemble space of locally optimal modular par- titions. We then use this approach to uncover latent relationships, given small query sets. OEe methods developed in this paper are ap- plied to biological and social datasets with ground-truth label data, using a small number of examples used as seed sets to uncover re- lationships. When tested on both real and synthetic datasets our method is shown to achieve high levels of classification accuracy in a context specific manner, with results comparable to random walk with restart methods. 1 INTRODUCTION A fundamental issue at the heart of machine learning methods applied to large scale datasets is the ability to correctly identify classes of related objects in an unsupervised manner. In network science, this methodology is o‰en referred to as community detec- tion [13]. Many algorithms exist to solve this problem [13], yet initial starting conditions or different optimisation strategies may result in conflicting results even when the same objective function is being maximised [17]. In this paper, we develop an intuitive method to use the uncertainty amongst a high number of near op- timal solutions to measure context sensitive relationships between small sets of labelled vertices. OEis approach can be based on labels that are not first order neighbours to find other potentially related vertices. OEe use of community detection is widespread. For example, a core goal in systems biology is to characterise the function and functional relationships between genes, proteins or metabolites within a larger network [15]. In many situations, only the role of a small number of genes is known, with much of the annotation for a given organism being computed through naive homology informa- tion that ignores the role of a gene within a wider context. OEe ad- vent of high throughput experimental datasets has allowed the con- struction of proteome scale networks, leading to the observation of non-trivial topological properties such as densely connected clus- ters [11]. OEese densely connected clusters are widely believed to be associated with specific function, such as multi-protein com- plexes or biochemical pathways. As a form of unsupervised machine learning, module extrac- tion methods largely focus on optimising some objective function with the goal of finding meaningful clusterings. Perhaps the most popular of these methods is that of modularity maximisation [29], which seeks to find the most unexpected partition of a graph with respect to a given null model. Overlapping methods have recently been applied to this problem in both crisp [1, 24] and fuzzy [19] based algorithms which have been widely used to uncover latent relationships without labelling schemes. In previous work, we found that most of these methods have significant disagreement when evaluated in a practical context [14]. OEe number and size of communities is, generally, not known a priori, and the problem has been shown to be NP-hard [4]. OEe work of Good et al. [17] recently highlighted that the popular mod- ularity maximisation algorithm has a highly "glassy" search space. In essence, for real, heterogeneous networks there are many lo- cally optimal partitions that bear liŠle resemblance to each other by measure of mutual information. OEis allows greedy optimisa- tion algorithms [3] to trivially find solutions that score extremely high values of modularity. In order to solve this issue, certain ap- proaches use a consensus based approach to clustering, combining many high value partitions into a given median partition [22]. However, in this paper, we do not seek to find a single "best" partition, whether overlapping or not and our objective is not to uncover labels but to use limited and small sets of labels to give the notion of a membership score to some grouping. Instead, we use the large number of highly modular solutions to form the index for a search query system. In essence, this is a method of semi- supervised learning that aŠempts to find items related given la- belled sets of vertices using topology alone. Each high value parti- tion can be treated as information about the relationships between vertices. OEat is to say, there is not a single, correct view of the underlying community structure to a network, but rather, many different context dependent definitions. As the objective of com- munity detection approaches is to relate information, it is assumed that some labelled meta-data can be used to find unlabelled, poten- tially related vertices. Many representations of modular structure Select Query Nodes Create global relatedness ranking Figure 1: Modularity search space of an E. coli metabolic net- work. Distance between partitions is calculated using vari- ation of information [27] and dimensionality reduction is performed using curvilinear component analysis [10]. ‡e inset (top) demonstrates the landscape of the high modular- ity partitions. Figure generated with the so…ware of Good et al. [17]. More formally, the problem tackled in this paper can be formu- lated as follows: Given a graph made up of vertices and edges G = (V , E), and a query set S ⊂ V , we ask the question; How well is a given vertex, i < S related to S? We propose an algorithm that pre-computes an index of clus- terings for a given complex network, based on the fast greedy Lou- vain algorithm [3], used in a distributed manner. OEe detected clus- ters then form the basis of a search algorithm that allows one to compute the relatedness of nodes to a given query set. OEe query- ing method is a polynomial time algorithm that could be trivially adapted to form the basis of many user facing applications. OEis approach is then applied to synthetic benchmark networks with known, ground-truth labels as well as social and protein-protein interaction networks with high quality ground truth label sets. 2 EXPLOITING THE MODULARITY QUERY SPACE To characterise latent community structure, one of the most pop- ular approaches is to use modularity maximisation given by the equation [29] Q = 1 2m i , j (cid:20)Ai j − kikj 2m (cid:21) δ (ci , cj ), (1) Figure 2: Outline of the proposed approach to querying net- works by using multiple, high quality representations of modular networks. is the Kronecker delta such that δ (ci , cj ) = 1 if ci = cj and 0 oth- erwise. As a combinatorial optimisation problem, there are many different algorithmic approaches to finding high values of Q. OEe work by [17] forms the basis of the motivation of the ap- proach taken here. In this study, the authors discovered that the modularity search space for many real-world networks contains a huge number of high value solutions. Each of these solution parti- tions are extremely close to the global maxima, making it both dif- ficult to find the optimal value of Q and difficult to argue that the highest scoring partition is the "true" community structure. OEis fact is visually demonstrated with the so‰ware from [17] in Figure 1, which shows the modularity search space of an E. coli metabolic network reconstruction [20]. OEe similarity between the partitions is compared with the variation of information measure [27] and di- mensionality of the space is reduced with curvilinear component analysis [10] 1. In this work, we consider each high value partition to be infor- mation about latent relationships between vertices inferred through the topology of the network. OEis approach, in and of itself is not unique, as there have been previous approaches that use the con- sensus of an ensemble of clusters to create high quality overlap- ping clustering of networks [22]. Such an approach, whilst well principled, is a context insensitive view of the modular structure of a graph. OEe objective, then, is to use the disagreement between the set of highly modular partitions as information; that is to say, to infer the probability that sets of vertices are contained within the same cluster. Whilst methods based on simulated annealing can be used where m is the number of edges in the network, Ai j is the binary variable indicating the adjacency of nodes i and j, ki is the degree of a vertex, ci indicates the community of a given vertex and δ (ci , cj ) 1OEe reader should note that axis on these plots are a result of the dimensionality reduction performed by curvilinear component analysis [10] and, therefore, have no natural interpretation. 2 to guarantee full coverage of the network, the following section de- scribes a method adapted from the greedy agglomerative Louvain algorithm [3]. 2.1 Algorithm outline A broad outline of the proposed method is presented in Figure 2. In essence, the objective is to use multiple modular representations of a given dataset to generate a relatedness score for a given set of query vertices. In order to cover the space of high modularity partitions, ran- domly generated starting partitions are computed with a random cut set. To achieve this, each edge is either placed inside the cut set or not as the result of an independent Bernoulli trial. Each ran- dom partition is used as the starting partition for the greedy Lou- vain process. In principle, any search exploration procedure, such as simulated annealing [17] could be used. OEe Louvain algorithm was selected as it is fast, running in O(n log n) time complexity [3], and because it is a greedy algorithm and is guaranteed to stop a‰er finding a locally maximal solution. OEe Louvain algorithm is conceptually very simple; starting from a random partition, clusters are agglomerated if the merge results in a positive change in modularity ∆Q. When no possible moves result in an increase in modularity the algorithm has found a local optima. OEe index coverage is directly proportional to the number of starting random partitions. A full coverage index could be con- sidered as every locally optimal partition. Given that there is no free lunch and it is impossible to know every solution, one can only ensure a full coverage index through an exhaustive search over the 2m possible starting cut sets, where m is the number of edges in the graph. Consequently, the approach taken here is to use a large but not exhaustive subset of the possible solutions using a suitably large space of 2000 solutions for the networks studied in this paper 2. 2.2 Measuring the quality of relationships Given a query of vertices, the relatedness to other vertices in a network is quantifiable by the fraction of times they are clustered with the query set, given the set of high quality partitions. For- mally, this can be expressed in terms of the expansion score of a given vertex, for the case where i is in S we, instead, consider the value µi (S − i) to remove bias. 3 RESULTS 3.1 Cross-validation method In this study we test a small number of labels that we intend to use in order to evaluate how well our method correctly generalises to discover unlabelled vertices. We would like to test a significantly smaller number of seed nodes than two class classification meth- ods used in previous studies, which use leave-one-out cross valida- tion [21]. OEe cross validation procedure we devise is described as follows and depends on the size of the community and the number of initial seed labels being used. For this work we would like to capture binary classification per- formance, true positives (tp), true negatives (tn), false positives (fp) and false negatives (fn), on our datasets of community member- ships. In order to generate the different sets for the cross validation we take each label set and generate unique sample sets of vertices from the known true positive labels. As the seed label sets can be as small as 3 vertices, exhaustive cross validation was not possible for all labelling schemes. Conse- quently, cross validation is either conducted on an exhaustive set of all possible (cid:0) S s (cid:1) unique labellings or 120 seed queries sampled randomly without replacement from the possible subsets 3, where S is the set of gold standard true labels and s is the size of the ran- domly selected seed sets. As the selected seed sets can be contained within multiple com- munities, we consider the set of true positives not to be the com- munity for which the seed set is randomly selected, but all com- munities for which that seed set is a subset of. OEis is because the purpose of the approach presented within this paper is to distin- guish between different communities in a context specific manner, if the overlap between two communities is represented by the seed nodes this should be considered in the tests. It should therefore be noted that presented receiver operator characteristic (ROC) scores are dependent on community sizes. We also note that we do not consider separate training and test sets in this study as the method does not use any examples when building the index space from partitions of the graph. Formally, the steps for this procedure with a given label set S are outlined as follows: µi (S) = 1 P S P ∈P j ∈S δ (c p i , c p j ), (2) • Generate up to 120 unique subsets of size s, randomly sam- where S denotes a query set, P is a given partition in the space of p all high quality partitions P, c i indicates the cluster vertex i is con- tained in within partition P and δ (u ,v) is the Dirac delta function p j are the same cluster and 0 otherwise. As that equals 1 if c a simple example, for a pair of vertices i and S such that S = {j} we would consider µi to be the number of times i and j appear in the same cluster, given an ensemble of network clusterings. We define µi (S) for all vertices in the network, including those in S. However, p i and c 2Initial results indicate that a significantly smaller space of partitions may still yield high quality results but we note that further work is required to asses the best number of partitions in a practical context. 3 pled without replacement (set T ). • For each test subset {∀St ∈ T St ⊂ S ∧ St = s }, generate the µi (St ) score for all vertices in the network • Exclude vertices in St from the test • Consider the true community membership of St to be the true positive set. • Consider each of the nodes in V not in the community membership of St to be the true negative set. • Generate a network wide average ROC curve interpolated from all test subsets from all communities. 3OEis is equivalent to (cid:0)10 would not be possible for the larger communities in this study. 3(cid:1) combinations, given time constraints, an exhaustive sample In the case for the synthetic networks tested below, true labels are drawn from the known communities, with each tested in isola- tion. For the real world networks tested the labels are considered in the same manner though many nodes have no assigned labels. Every community is considered with different seed set sizes. 3.2 Random walk with restart In the following sections compare our method with the commonly used random walk with restart method as described in [21]. OEis simulates an infinite random walk with a fixed probability, α that a walker would teleport back to the initial seed nodes. Formally, the random walk with restart algorithm uses the form ®pt +1 = (1 − α)W ®pt + α ®p0 , (3) where W is the row normalised adjacency matrix of a graph, ®p0 is the initial walk vector such that ®p0 = 1 S for vertices in the seed set. OEe random walk algorithm repeats equation 3 from ®p0 until the L1 norm between ®pt and ®pt +1 converges to 0, simulating the steady state vector ®p∞. For the tests performed in this work we use a restart probability α = 0.25. 3.3 Synthetic networks In this section we test the method on benchmark networks con- structed with a ground-truth community structure. To evaluate how our method performs we use the undirected, unweighted LFR benchmark [23] in overlapping and non-overlapping forms. We test the area under the ROC curve (AUC) scores for networks vary- ing the mixing parameter (fraction of edges between communities) and the fraction of overlapping nodes. In these tests, the commu- nity distribution is defined with a power law coefficient of −1.0, the degree distribution is defined with a power law coefficient of −2.0. OEe number of nodes is stated in the text. 3.3.1 Non-overlapping modules. Figure 3 represents tests on 10 networks with 1000 and 5000 nodes varying the mixing coefficient (number of edges between communities). As one would expect, the prediction of the method drops off steeply where communities are less defined above a mixing coefficient of 0.6. Using larger seed sets also improves accuracy with some prediction of true commu- nities being possible at extremely high levels of mixing. Overall, results are comparable to the random walk with restart method, with slightly improved performance with a smaller number of seed nodes. 3.3.2 Overlapping modules. In Figure 4 we show the results of network performance when tested against an increasing level of overlapping communities. For these tests we fix the mixing coeffi- cient at 0.3. Here, each vertex can belong to up to 4 communities. In order to test performance we varied the fraction of nodes that are in more than one community. OEe method still has an AUC score above 0.5 when all nodes are placed in multiple communi- ties. OEis indicates that the method is capable of uncovering latent overlapping memberships even when given a relatively small num- ber of seed nodes. As with the non-overlapping results, the scores are comparable with the rwr method with performance slightly im- proved in the case of 1000 node models, but comparable for 5000 node models. 3.4 Real networks In order to test the performance of the semi-supervised classifica- tion on real-world data we present our findings on example net- works with metadata communities. All datasets use the largest single connected component sub-graph. OEe real networks used are: • EU emails core dataset (EU emails) [25] OEis anonymised dataset is taken from the SNAP database [26] and contains 986 nodes and 16, 687 edges representing emails between individuals. OEe metadata community labels represent dif- ferent departments within the organisation. In total there are 42 communities, 39 of which contain at least 3 nodes. • Yeast protein-protein interaction network (Yeast PPI) [35] OEis dataset is a collection of recorded binary inter- actions between proteins collected with high-throughput yeast-2-hybrid assays. OEe metadata used are known, ex- perimentally validated protein complexes from [31]. OEe network contains 6222 nodes in the largest connected com- ponent, with 22,386 edges. OEere are 409 experimentally validated protein complexes, 236 of which contain 3 or more nodes. OEe protein complexes are typically very small in terms of number of proteins, with 90% of the complexes containing less than 10 proteins and only 2 complexes con- taining 50 or more proteins. • Escherichia coli protein-protein interaction network (E.coli PPI) [34] For the E. coli dataset we used manually curated interacting proteins from [34]. OEe network con- tains 1913 nodes and 7252 edges, the protein complexes range in size between 3 and 65 nodes. 85% of the com- plexes contain 10 or less nodes. • Arabidopsis thaliana protein-protein interaction net- work (Arabidopsis PPI) [11]. OEe network itself con- tains 4519 nodes and 11,096 edges. For the Arabidopsis dataset, the complex sources were more limited. Conse- quently, we obtained all gene ontology annotations under the GO term "Protein-containing complex" from AmiGO [6] where experimentally collected physical interaction ev- idence was acquired. At the time of writing, this resulted in 7 complexes containing between 4 and 12 nodes. In ad- dition, we included small protein complexes from the In- tAct database [30], resulting in a total of 165 unique com- plexes. As the labels for this dataset are small it was not possible to test algorithm performance with 15 seed nodes. ROC curves generated with the cross validation procedure de- scribed in Section 3.1 are shown in Figure 5. OEese results represent ROC curves and mean AUC statistics. OEe results of our method are comparable to the random walk with restart approach, which performs beŠer on the datasets tested with the exception of the EU email dataset for which our model produces higher AUC scores. In the case of the Arabidopsis thaliana network the protein com- plexes tested are significantly smaller than for other networks and so a comparison of seed sizes is not possible. However, in the other networks studied, using 3 or more seed nodes appears to improve results, though for 15 seed nodes the results are not significantly 4 1.0 0.9 0.8 0.7 0.6 0.5 C U A n a e M 0.4 0.0 1 seed nodes μ 1 seed nodes rwr 3 seed nodes μ 3 seed nodes rwr 7 seed nodes μ 7 seed nodes rwr 15 seed nodes μ 15 seed nodes rwr 0.2 0.4 0.6 Mixing coefficient (a) 1000 nodes 1.0 0.9 0.8 0.7 0.6 0.5 C U A n a e M 0.8 1.0 0.4 0.0 1 seed nodes μ 1 seed nodes rwr 3 seed nodes μ 3 seed nodes rwr 7 seed nodes μ 7 seed nodes rwr 15 seed nodes μ 15 seed nodes rwr 0.2 0.4 0.6 Mixing coefficient 0.8 1.0 (b) 5000 nodes Figure 3: Non-overlapping LFR community networks with varying seed nodes with 1000 and 5000 nodes. Data points repre- sent mean AUC scores for all communities on 10 sampled networks at varying mixing coefficients. Error bars represent one standard deviation. 1.0 0.9 0.8 0.7 0.6 0.5 C U A n a e M 0.4 0.0 1.0 0.9 0.8 0.7 0.6 0.5 C U A n a e M 0.8 1.0 0.4 0.0 1 seed nodes μ 1 seed nodes rwr 3 seed nodes μ 3 seed nodes rwr 7 seed nodes μ 7 seed nodes rwr 15 seed nodes μ 15 seed nodes rwr 0.2 0.4 0.6 Overlapping nodes (fraction) 0.8 1.0 1 seed nodes μ 1 seed nodes rwr 3 seed nodes μ 3 seed nodes rwr 7 seed nodes μ 7 seed nodes rwr 15 seed nodes μ 15 seed nodes rwr 0.2 0.4 0.6 Overlapping nodes (fraction) (a) 1000 nodes (b) 5000 nodes Figure 4: Overlapping LFR community networks with varying seed nodes with 1000 and 5000 nodes. Data points represent mean AUC scores for all communities on 10 sampled networks at varying overlapping fraction of nodes. Error bars represent one standard deviation. beŠer than with 7 seeds. OEe lower quality labels within the Ara- bidopsis protein complex dataset likely explains the significant dif- ference in results when compared with other protein interaction datasets. 3.4.1 Tests on gene ontology labels. In a practical situation the higher quality label sets described above are not likely to be avail- able. Consequently, we wish to highlight that the method also serves as a useful network reduction tool where the quality of la- bels is not well defined. In order to achieve this goal, for each of the biological data sets in this study, we acquired all Gene Ontol- ogy terms for each of the proteins from AmiGO [7]. Gene Ontol- ogy is a controlled vocabulary of terms associated with biological 5 functions in three broad categories of Cellular Components (CC), Metabolic Functions (MF) and Biological Processes (BP), forming a hierarchy of terms and associated sub terms. OEese labels are not all likely to be represented within the protein- protein interaction networks, though many biological processes are. For the Yeast, Arabidopsis and E. coli PPIs we collected 85, 549 and 420 terms covering at least 3 nodes, respectively. As expected, average ROC and AUC scores shown in Figure 6 are considerably lower than for the Protein complexes for both our method and the 1.0 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T 0.0 0.0 0.2 1.0 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T 0.0 0.0 0.2 1.0 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T 0.0 0.0 0.2 μ 1 seed node(s) mean AUC: 0.87 (std: 0.14) rwr 1 seed node(s) mean AUC: 0.78 (std: 0.14) μ 3 seed node(s) mean AUC: 0.89 (std: 0.09) rwr 3 seed node(s) mean AUC: 0.82 (std: 0.12) μ 7 seed node(s) mean AUC: 0.89 (std: 0.08) rwr 7 seed node(s) mean AUC: 0.84 (std: 0.10) μ 15 seed node(s) mean AUC: 0.90 (std: 0.07) rwr 15 seed node(s) mean AUC: 0.86 (std: 0.09) 0.4 0.6 False positive rate 0.8 1.0 μ 1 seed node(s) mean AUC: 0.87 (std: 0.12) rwr 1 seed node(s) mean AUC: 0.90 (std: 0.06) μ 3 seed node(s) mean AUC: 0.89 (std: 0.08) rwr 3 seed node(s) mean AUC: 0.91 (std: 0.06) μ 7 seed node(s) mean AUC: 0.89 (std: 0.06) rwr 7 seed node(s) mean AUC: 0.90 (std: 0.06) μ 15 seed node(s) mean AUC: 0.89 (std: 0.09) rwr 15 seed node(s) mean AUC: 0.87 (std: 0.07) 0.4 0.6 False positive rate 0.8 1.0 (a) EU email departments (b) Yeast PPI protein complexes 1.0 0.8 0.6 0.4 0.2 e t a r e v i t i s o p e u r T 0.0 0.0 0.2 μ 1 seed node(s) mean AUC: 0.63 (std: 0.09) rwr 1 seed node(s) mean AUC: 0.73 (std: 0.09) μ 3 seed node(s) mean AUC: 0.76 (std: 0.11) rwr 3 seed node(s) mean AUC: 0.79 (std: 0.13) μ 7 seed node(s) mean AUC: 0.75 (std: 0.13) rwr 7 seed node(s) mean AUC: 0.90 (std: 0.11) 0.4 0.6 False positive rate 0.8 1.0 μ 1 seed node(s) mean AUC: 0.87 (std: 0.12) rwr 1 seed node(s) mean AUC: 0.92 (std: 0.04) μ 3 seed node(s) mean AUC: 0.90 (std: 0.07) rwr 3 seed node(s) mean AUC: 0.92 (std: 0.04) μ 7 seed node(s) mean AUC: 0.89 (std: 0.06) rwr 7 seed node(s) mean AUC: 0.92 (std: 0.03) μ 15 seed node(s) mean AUC: 0.88 (std: 0.06) rwr 15 seed node(s) mean AUC: 0.91 (std: 0.03) 0.4 0.6 False positive rate 0.8 1.0 (c) Arabidopsis PPI protein complexes (d) E. coli PPI protein complexes Figure 5: Receiver operator characteristic (ROC) curves for the high quality labels for real networks described in Section 3.4. Results represent the averages over all receiver operating characteristic scores from all samples of label sets with the cross validation procedure described in 3.1. rwr approach. Notably, however, the performance of the rwr ap- proach is significantly worse than one would expect to find at ran- dom for the Yeast GO terms. OEe reason for this performance re- mains unknown, however, it is likely to to the fact that the gene on- tology labels are poorly represented in the dataset. However, this approach should be considered in contrast to conventional gene enrichment strategies on conventional network clusters [8]. 4 DISCUSSION OEe semi-supervised method for vertex classification presented in this work has been shown to produce good results on both syn- thetic benchmarks and real-world datasets. Interestingly, this method is capable of correctly classifying communities with only a small number of seed query vertices. OEese results show that this query method could be used as a powerful exploratory tool in network analysis. 6 OEe fact that the method is able to uncover small protein com- plexes seems to contradict the principle that modularity maximi- sation algorithms have a resolution limit [12]. Whilst this appears to be the case it is important to note that the resolution limit ap- plies to a single partition of space. Further work is needed to in- vestigate why small communities are still detectable. However, we speculate that it is likely due to the fact that the co-classification of vertices between different partitions remains fairly tolerant to changes. In other words, the small cluster of nodes is always clus- tered in the same community, regardless of the partition. We do note that, where communities are very small, any approach will be extremely sensitive to false positive and false negative results. As such, this should be considered when using any method of this form as an exploratory tool. 1.0 0.8 e t a r e v i t i s o p e u r T 0.6 0.4 0.2 0.0 0.0 0.2 1.0 0.8 e t a r e v i t i s o p e u r T 0.6 0.4 0.2 0.0 0.0 0.2 μ 1 seed node(s) mean AUC: 0.62 (std: 0.08) rwr 1 seed node(s) mean AUC: 0.31 (std: 0.08) μ 3 seed node(s) mean AUC: 0.64 (std: 0.08) rwr 3 seed node(s) mean AUC: 0.36 (std: 0.10) μ 7 seed node(s) mean AUC: 0.68 (std: 0.08) rwr 7 seed node(s) mean AUC: 0.40 (std: 0.11) μ 15 seed node(s) mean AUC: 0.71 (std: 0.07) rwr 15 seed node(s) mean AUC: 0.45 (std: 0.13) 0.4 0.6 False positive rate 0.8 1.0 1.0 0.8 e t a r e v i t i s o p e u r T 0.6 0.4 0.2 0.0 0.0 0.2 μ 1 seed node(s) mean AUC: 0.52 (std: 0.04) rwr 1 seed node(s) mean AUC: 0.53 (std: 0.04) μ 3 seed node(s) mean AUC: 0.56 (std: 0.09) rwr 3 seed node(s) mean AUC: 0.57 (std: 0.08) μ 7 seed node(s) mean AUC: 0.60 (std: 0.12) rwr 7 seed node(s) mean AUC: 0.62 (std: 0.11) μ 15 seed node(s) mean AUC: 0.63 (std: 0.11) rwr 15 seed node(s) mean AUC: 0.66 (std: 0.12) 0.4 0.6 False positive rate 0.8 1.0 μ 1 seed node(s) mean AUC: 0.54 (std: 0.08) rwr 1 seed node(s) mean AUC: 0.57 (std: 0.11) μ 3 seed node(s) mean AUC: 0.63 (std: 0.15) rwr 3 seed node(s) mean AUC: 0.63 (std: 0.16) μ 7 seed node(s) mean AUC: 0.69 (std: 0.16) rwr 7 seed node(s) mean AUC: 0.69 (std: 0.16) μ 15 seed node(s) mean AUC: 0.71 (std: 0.15) rwr 15 seed node(s) mean AUC: 0.71 (std: 0.16) 0.4 0.6 False positive rate 0.8 1.0 (a) Yeast PPI GO terms (b) Arabidopsis PPI GO terms (c) E. coli PPI GO terms Figure 6: Receiver operator characteristic (ROC) curves for gene ontology labels for real networks described in Section 3.4. Results represent the averages over all receiver operating characteristic scores from all samples of label sets with the cross validation procedure described in 3.1. OEe approach also appears to be tolerant to a small number of seed nodes. OEis is interesting as in most sampled cases the rel- evant nodes are unlikely to be direct neighbours. From the per- spective of exploratory studies, this implies that a small number of query vertices can be used to find potentially related vertices. 5 RELATED WORK OEis work relates very strongly to the idea of local community de- tection, more specifically the idea of seed set expansion [16]. Here, a given seed set is created and random walks are analysed to find clearly related communities of vertices. One of the most common approaches to finding related vertices in a network is the random walk with restart (RWR) [5, 21] explained in section 3.2. OEis ap- proach has been applied in fields as diverse as recommender sys- tems and the detection of potential drug targets [9]. In RWR the relatedness of any pair of vertices can be seen as the probability of a particle traversing the graph starting at a given vertex and end- ing at another. Conceptually, RWR is very similar to the method presented in this paper given that the user has a given query. OEe RWR probability as analogous though not equivalent to the value of µi (S). OEe reader may also consider the similarity of this approach to that of label propagation [18, 32], which seeks to find communities based on a vote, where at different time steps a node updates it's label to to be the most common amongst its neighbours. A com- mon problem with label propagation schemes is that they o‰en fail to converge, resulting in many competing clusterings of a net- work. We liken this to the problem encountered by Good et al. [17] in modularity maximisation. A core contribution of this paper is that, in such situations, there is no single, context independent la- belling scheme that can be seen as the "true" community structure, overlapping or not. Indeed, the approach applied here is extremely general and could be adapted to the label propagation approach (or any other community detection algorithm) should sufficient semi- supervised group memberships be known a priori. Many existing method are based on the idea of a locally dense In contrast, the query subgraph containing all query nodes [2]. approach presented here does not require the queries to be a self contained sub-graph. Indeed, queries can contain spurious nodes that are topologically distant from one another - the result is that the µi (S) score for the query set will likely be very low. Further investigation into how to evaluate the quality of high average µi (S) for i ∈ S is le‰ to future work. In the field of community detection, a number of very recent articles have focused on using metadata to improve the results of community detection approaches. OEese algorithms, however, are distinct from the approach taken here as the metadata is not used in the module discovery process. Furthermore, the results in this work aŠempt to explicitly label unlabelled data and only require a relatively small number of labels to operate in such a fashion. In contrast, the recent approach by Newman and Clauset [28], for example, uses examples in which practically the entire network contains labels which is less useful from the perspective of label discovery. 6 CONCLUSIONS OEis paper has presented a novel approach to semi-supervised com- munity detection utilising a consensus of high scoring partitions computed with the popular modularity maximisation approach. Pre- viously the glassy search space of this optimisation algorithm has been seen as a major limitation. However, in this work we consider each locally optimal partition to be information regarding the true multi-class labels that are likely present in real networks. OEe ap- proach presented here differs from other ensemble approaches in that the objective is to provide a probabilistic framework for label classification. Performance was shown to be strong on both syn- thetically generated networks and real-world ground truth com- munities with relatively small sets of labels. In the case of synthetic networks communities are correctly detected up to the detectabil- ity threshold. For real world networks with small label sets, aver- age AUC scores were comparable to the random walk with restart method for the high quality datasets tested in this study. However, this approach requires the community landscape to contain many local maxima, a property likely shared by many real- world, heterogeneous networks. Similarly, the method presented here requires both some labelled data and the labels to be relevant in the context of the underlying network. 7 ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 597–605. [17] Benjamin H Good, Yves-Alexandre de Montjoye, and Aaron Clauset. 2010. Per- formance of modularity maximization in practical contexts. Physical Review E 81, 4 (2010), 046106. [18] Steve Gregory. 2010. Finding overlapping communities in networks by label propagation. New Journal of Physics 12, 10 (2010), 103018. [19] Steve Gregory. 2011. Fuzzy overlapping communities in networks. Journal of Statistical Mechanics: Šeory and Experiment 2011, 02 (2011), P02017. [20] Roger Guimera and Luis A Nunes Amaral. 2005. Functional cartography of complex metabolic networks. Nature 433, 7028 (2005), 895–900. [21] Sebastian Kohler, Sebastian Bauer, Denise Horn, and Peter N Robinson. 2008. Walking the interactome for prioritization of candidate disease genes. Še Amer- ican Journal of Human Genetics 82, 4 (2008), 949–958. [22] Andrea LancichineŠi and Santo Fortunato. 2012. Consensus clustering in com- plex networks. Scientific reports 2 (2012). [23] Andrea LancichineŠi, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing community detection algorithms. Physical Review E 78, 4 (2008), 046110. [24] A. LancichineŠi, F. Radicchi, J.J. Ramasco, and S. Fortunato. 2011. Finding sta- tistically significant communities in networks. PloS one 6, 4 (2011), e18961. [25] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discov- ery from Data (TKDD) 1, 1 (2007), 2. [26] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. hŠp://snap.stanford.edu/data. (June 2014). [27] Marina Meila. 2003. Comparing clusterings by the variation of information. In Learning theory and kernel machines. Springer, 173–187. [28] Mark EJ Newman and Aaron Clauset. 2016. Structure and inference in annotated networks. Nature Communications 7 (2016), 11863. [29] Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating commu- nity structure in networks. Physical review E 69, 2 (2004), 026113. [30] Sandra Orchard, Mais Ammari, Bruno Aranda, Lionel Breuza, Leonardo Brig- anti, Fiona Broackes-Carter, Nancy H Campbell, Gayatri Chavali, Carol Chen, Noemi Del-Toro, and others. 2013. OEe MIntAct project-IntAct as a common curation platform for 11 molecular interaction databases. Nucleic acids research 42, D1 (2013), D358–D363. [31] Shuye Pu, Jessica Wong, Brian Turner, Emerson Cho, and Shoshana J Wodak. 2008. Up-to-date catalogues of yeast protein complexes. Nucleic acids research 37, 3 (2008), 825–831. [32] Usha Nandini Raghavan, R´eka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical Review E 76, 3 (2007), 036106. [33] M Rosvall and C T Bergstrom. 2008. Maps of random walks on complex net- works reveal community structure. Proceedings of the National Academy of Sci- ences of the United States of America 105, 4 (Jan. 2008), 1118–1123. [34] Chong Su, Jose M Peregrin-Alvarez, Gareth Butland, Sadhna Phanse, Vincent Fong, Andrew Emili, and John Parkinson. 2007. Bacteriome. org-an integrated protein interaction database for E. coli. Nucleic acids research 36, suppl 1 (2007), D632–D636. [35] Haiyuan Yu, Pascal Braun, Muhammed A Yıldırım, Irma Lemmens, Kavitha Venkatesan, Julie Sahalie, Tomoko Hirozane-Kishikawa, Fana Gebreab, Na Li, Nicolas Simonis, and others. 2008. High-quality binary protein interaction map of the yeast interactome network. Science 322, 5898 (2008), 104–110. OEis work presents a number of interesting potential future av- enues for research, such as observing how query sets change in time dynamic or multi-scale networks. Furthermore, as the algo- rithm is trivial to run in a distributed manner, this approach could be applied to larger graphs than those studied in this paper. Further research should also be conducted into how this approach could be applied to other partition quality functions, such as the infomap algorithm [33]. OEe method was implemented in python and all so‰ware is available at: hŠps://github.com/SBRCNoŠingham/cluster query tool. ACKNOWLEDGEMENTS We would like to thank Nicole Pearcy and Jenna Reps for assis- tance preparing this manuscript. We are grateful for access to the University of NoŠingham High Performance Computing Facility. OEis work was supported by the UK Biotechnology and Biological Sciences Research Council (BBSRC) grant BB/L013940/1. REFERENCES [1] Yong-Yeol Ahn, James P Bagrow, and Sune Lehmann. 2010. Link communities reveal multiscale complexity in networks. Nature 466, 7307 (2010), 761–764. [2] Austin R Benson, David F Gleich, and Jure Leskovec. 2016. Higher-order orga- nization of complex networks. Science 353, 6295 (2016), 163–166. [3] Vincent D Blondel, Jean-Loup Guillaume, Renaud LambioŠe, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Šeory and Experiment 2008, 10 (2008), P10008. [4] Ulrik Brandes, Daniel Delling, Marco Gaertler, Robert Gorke, Martin Hoefer, Zoran Nikoloski, and Dorothea Wagner. 2007. On Finding Graph Clusterings with Maximum Modularity Graph-OEeoretic Concepts in Computer Science. In Graph-Šeoretic Concepts in Computer Science, Andreas Brandstadt, Dieter Kratsch, and Haiko Muller (Eds.). Lecture Notes in Computer Science, Vol. 4769. Springer Berlin / Heidelberg, Berlin, Heidelberg, Chapter 12, 121–132. DOI: hŠp://dx.doi.org/10.1007/978-3-540-74839-7 12 [5] Tolga Can, Orhan C¸amoglu, and Ambuj K Singh. 2005. Analysis of protein- protein interaction networks using random walks. In Proceedings of the 5th in- ternational workshop on Bioinformatics. ACM, 61–68. [6] Seth Carbon, Amelia Ireland, Christopher J Mungall, ShengQiang Shu, Brad Marshall, Suzanna Lewis, and others. 2009. AmiGO: online access to ontology and annotation data. Bioinformatics 25, 2 (2009), 288–289. [7] Seth Carbon, Amelia Ireland, Christopher J Mungall, ShengQiang Shu, Brad Marshall, Suzanna Lewis, AmiGO Hub, and Web Presence Working Group. 2008. AmiGO: online access to ontology and annotation data. Bioinformatics 25, 2 (2008), 288–289. [8] Edward Y Chen, Christopher M Tan, Yan Kou, Qiaonan Duan, Zichen Wang, Gabriela Vaz Meirelles, Neil R Clark, and Avi Ma'ayan. 2013. Enrichr: interac- tive and collaborative HTML5 gene list enrichment analysis tool. BMC bioinfor- matics 14, 1 (2013), 128. [9] Xing Chen, Ming-Xi Liu, and Gui-Ying Yan. 2012. Drug–target interaction pre- diction by random walk on the heterogeneous network. Molecular BioSystems 8, 7 (2012), 1970–1978. [10] Pierre Demartines and Jeanny H´erault. 1997. Curvilinear component analysis: A self-organizing neural network for nonlinear mapping of data sets. Neural Networks, IEEE Transactions on 8, 1 (1997), 148–154. [11] Matija Dreze, Anne-Ruxandra Carvunis, Benoit Charloteaux, Mary Galli, Samuel J Pevzner, Murat Tasan, Yong-Yeol Ahn, Padmavathi Balumuri, Albert- L´aszl´o Barab´asi, Vanessa Bautista, and others. 2011. Evidence for network evo- lution in an Arabidopsis interactome map. Science 333, 6042 (2011), 601–607. [12] Santo Fortunato and Marc Barth´elemy. 2007. Resolution limit in community detection. Proceedings of the National Academy of Sciences of the United States of America 104, 1 (2007), 36–41. [13] Santo Fortunato and Darko Hric. 2016. Community detection in networks: A user guide. Physics Reports 659 (2016), 1–44. [14] JP Gilbert. 2015. A probabilistic model for the evaluation of module extraction algorithms in complex biological networks. Ph.D. Dissertation. University of Not- tingham. [15] Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences 99, 12 (2002), 7821–7826. [16] David F Gleich and C Seshadhri. 2012. Vertex neighborhoods, low conductance cuts, and good seeds for local community methods. In Proceedings of the 18th 8
1808.00554
2
1808
2018-09-05T08:19:48
Traj2User: exploiting embeddings for computing similarity of users mobile behavior
[ "cs.SI", "cs.DB" ]
Semantic trajectories are high level representations of user movements where several aspects related to the movement context are represented as heterogeneous textual labels. With the objective of finding a meaningful similarity measure for semantically enriched trajectories, we propose Traj2User, a Word2Vec-inspired method for the generation of a vector representation of user movements as user embeddings. Traj2User uses simple representations of trajectories and delegates the definition of the similarity model to the learning process of the network. Preliminary results show that Traj2User is able to generate effective user embeddings.
cs.SI
cs
Traj2User: exploiting embeddings for computing similarity of users mobile behavior Andrea Esuli1, Lucas May Petry2, Chiara Renso1, and Vania Bogorny2 1ISTI-CNR, Pisa, Italy 2Programa de P´os-Gradua¸cao em Ciencia da Computa¸cao, Universidade Federal de Santa Catarina, Florianopolis, Brazil Abstract Semantic trajectories are high level representations of user movements where several aspects related to the movement context are represented as heterogeneous textual labels. With the objective of finding a meaning- ful similarity measure for semantically enriched trajectories, we propose Traj2User, a Word2Vec-inspired method for the generation of a vector representation of user movements as user embeddings. Traj2User uses simple representations of trajectories and delegates the definition of the similarity model to the learning process of the net- work. Preliminary results show that Traj2User is able to generate ef- fective user embeddings. 1 Introduction The widespread use of GPS-equipped smartphones or positioning sensors ap- plied to vehicles and animals, tend to produce a high number of trajectories, recording the spatio-temporal evolution of these objects. These raw trajectories can be enriched with semantic information to what is called semantic trajecto- ries [15, 13], adding more meaning to the pure geometric movement facets. In the era of Big Data, with the explosion of geolocated social media and other kinds of user generated data (e.g. Wikipedia, Flickr, etc), human mobil- ity data can be significantly enriched with information that encompasses our daily life. Enriching information include weather conditions, the transportation means, the goal or the activity performed during the movement, the opinions and comments about people and places, the mood, being with a friend, just to name a few examples discussed in [6] and [2]. Being able to find similarities between trajectories enables several analysis methods like clustering or applications like recommendation systems. Several similarity measures have been proposed for both raw and semantic trajectories, 1 Figure 1: Example of two semantically rich trajectories P and Q. such as EDR[4], LCSS [17], Cats [9], EDWp [14], UMS[7], MSM [8], and other approaches as presented in [1], [11] and [18]. However, these methods analyze a few trajectory attributes and are far from considering all the different semantic aspects that involve movement: previous works have mainly analyzed seman- tic trajectories over one single aspect at a time, such as stops and moves, or transportation means, or activities. The great challenge here is how to integrate all such heterogeneous dimen- sions in a similarity measure dealing with space, time, and multiple semantics. Figure 1 shows an example of two semantic trajectories P and Q from users u1 and u2. The question we want to answer is "how similar are u1 and u2 given their semantic trajectories P and Q?". As can be observed, first of all, the size of trajectories P and Q is different. Both users are shopping at the same place (same spatial location) while on foot (same transportation means) and when the weather is rainy (same weather condition). On the other hand, both users at some time (time dimension) watch TV, but on a different spatial location. Indeed, while the user of trajectory P moves on foot and by bus, the user of trajectory Q moves on foot and by car. Given all these different and heterogeneous data dimensions related to tra- jectories, where each dimension has its own similarity model, how can we com- pute the user similarity based on their trajectories P and Q considering all this information together? In this paper we represent users by modeling the many semantic aspects that describe their movement habits. We take inspiration from word embeddings [12] methods that model the semantics of a word, and its similarity with other words, by observing the many contexts of use of the word in the language. We therefore introduce here, for the first time, the new concept of user embeddings as a way to represent the semantically rich movements of a user. We also propose the Traj2User model for measuring the semantic trajectory similarity of moving users. The main contribution of Traj2User is that it does neither need any explicit definition of the similarity functions for the data dimensions nor any explicit modeling of the relations between data dimensions, 2 PShopping(Mall)Studying(University)On footOn footBy busBy busOn footWatching TV(Home)On footBy carQWatching TV(Home) since these are implicitly learned from data. Experiments show that the neural model of Traj2User learns user embed- dings that better capture user similarity than other embedding methods that are also inspired to language models. We believe that exploiting vectors to represent semantically complex movements is promising for the analysis of semantically enriched movement since several heterogeneous semantic aspects are uniformly modeled into a unique and compact form. One recent approach that considers Point of Interest (POI) and embeddings is the paper [5] where authors propose a method to jointly model the user preference and the sequence of POIs for predicting future visitors for a given POI. 2 Methodology 2.1 Basic definitions We start our definitions with a state-of-art concept of raw trajectories, that has only space and time dimensions. Definition (Raw trajectory) A raw trajectory is the sequence of timestamped locations of the traced moving object o in the form < o, < x1, y1, t1, . . . xn, yn, tn >>, where each xi, yi represents the geographical coordinates and ti the timestamp for each i = 1, . . . , n. In this paper we define a semantic trajectory based on trajectory segments (or movements). Definition (Segmented Trajectory) A segmented trajectory of the moving ob- ject o is a pair t =< o, s1, ..., sn > such that, for each i = 1, ..., n, si is a contiguous part of the trajectory split based on some criteria. Examples of segmenting criteria are the stops and moves [15], the trans- portation means or the purpose of the trip [2]. Definition (Semantic Trajectory) A semantic trajectory of an object o is a pair t = < o,{< s1, l11, ..l1k >, ..., < sn, ln1, ...lnk >} > such that, for each i=1,. . . ,n and j=1, . . . , k lij is the j-th semantic label for the segment si. A semantic trajectory, in the context of this work, is a segmented trajectory where each segment is enriched with a number of different labels that represent different semantic aspects of the trajectory segment. Considering again Figure 1, we see that the first trajectory has 5 segments while the second has 3 segments. The semantic representation of the first trajectory is P = <u1, <s1, "on foot", "watching TV","sunny">, <s2, "by bus, "going to University", "sunny">, <s3, "on foot", "studying", "sunny">, <s4, "by bus", "going shopping", "rainy">, <s5, "on foot", "shopping", "rainy">> 2.2 Building the user embeddings In this work we want to build vectorial representations in an embedding space, for each user, in a population of observed individuals. Each user is represented by a variable-sized set of semantically rich movements. We can consider each 3 movement as a context of the user's life. We observe that this situation is similar to the one in language modeling [16, 10], where one wants to model the semantic properties of a word and measure the semantic similarity between words by observing the many contexts in which the word appears. The intuition of this work is based on the observation that the similarity between two words (e.g., king, queen) can be inferred by observing that they frequently appear in similar contexts (e.g., near other words such as castle, crown, empire, throne. . . ). Analogously, the similarity between two users can be inferred by observing that their semantic trajectories frequently have similar semantic values. Following this parallel between words and users, we make here a first ex- ploration of how some methods for the construction of word embeddings can be applied to the process of constructing user embeddings. In our approach we convert the label of each segment of a semantic trajectory into a vectorial rep- resentation (i.e., a movement descriptor as defined in Section 2.2.1). We then combine the various movement descriptors of a user into a single user embed- ding. We test three main models for the construction of user embeddings, which are described in Section 2.2.2. 2.2.1 Encoding of trajectories into vectors The various labels of a semantic trajectory are heterogeneous by nature and therefore they may have very different forms. In this work we decided to build a movement descriptor by encoding all the values of the segment labels using a one-hot encoding. Given a label a with na possible different values, an actual value la for the label is encoded as a na-sized vector with a one in the position corresponding to the value la and na − 1 zeros for all the other possible values. The result of encoding a movement descriptor is thus a vector d of length d = a∈A na, where A is the set of labels. We are aware that one-hot encoding does not explicitly model any complex relation between values, e.g., values on ordinal scales. Our approach follows the idea of leaving to the embedding generation method the burden of discovering the relations between the values of a label (and across labels). (cid:80) 2.2.2 Generating user embeddings approach is to sum all the vectors into a single vector, i.e., ei = (cid:80) The set of vectors representing movements and associated to a user must be reduced into a single vector that represents the user embedding. A very simple di, where Di identifies all the descriptors associated to the user ui (Sum method). Stacking all the resulting sum vectors for all users produces a matrix M of size U · d. This is similar to what is done when building a word-context matrix to create a language model, in which the position Ti,j of a matrix T of size V · V stores the sums up of how many times the word wj ∈ V appears nearby (in the context of) the word wi ∈ V , where V is a vocabulary. di∈Di Vectors deriving from raw sums can suffer skewness due to some values being much more frequent than others (e.g., weekday in our dataset). Such 4 very frequent values may dominate the directions of vectors and at the same time they may not be very discriminative. Inspired by the approaches used in language modeling to address this issue, we tested a number of methods1 to produce a weight-corrected matrix M of user embeddings starting from the Sum matrix2 M : Positive point-wise mutual information (PPMI) [3] measures the dependence between the two observed variables (a user and a specific attribute value) only on the occurrence of events, i.e., how much the probability of the two events to occur together differs from chance3. M(i,j) = P P M I(ui, dj) = max(log2( P (ui, dj P (ui)P (dj) ), 0) (1) Softmax (SM) is often used to normalize a vector so that all its values are in the [0, 1] interval and their sum is one, i.e., a categorical probability distribution. M(i,j) = σ(M(i,j)) = (2) (cid:80)d eM(i,j) k=1 eM(i,k) None of the methods described so far actually explores the latent correlations between the values of the labels, within a label or among labels. Methods based on matrix decomposition, such as singular value decomposi- tion (SVD) may exploit these latent relations modeling them in a project space that is not constrained to the original encoding of values. Truncated SVD allows to generate shorter embeddings, possibly removing noise components from input data. We tested SVD in combination with the previously described methods (i.e., SVD-PPMI, SVD-SM) with all the above listed methods, and using various reduction factors f , where the resulting user embedding length is d/f . In this paper we propose the Traj2User method that is inspired to the Word2Vec [12] method for the generation of word embeddings. The skip-gram variant of Word2Vec learns word embeddings as a by-product of training a two-layer network on the task of predicting from a single word other words that may appear in its context. In the Traj2User network4, the role of the input word is taken by a user id, and the context by a movement descriptor. Given a user ui represented as a one-hot vector and one movement descriptors di j, the first layer of the network selects the user embedding ei = W T ui, i.e., the matrix W is the matrix of user embeddings. The second layer multiplies ei to a second weight matrix W (cid:48) and applies the sigmoid activation function5 S(x) = 1 1−e−x to predict the movement 1We also tested simple l1 and l2 normalization, with negative results. 2We also tested the application of such weighting methods to the distinct blocks of the matrix M that identify the values from a single label, again with negative results. 3A small dataset, like our, can generate negative values due to lack of a sufficient number of observations. For this reason negative values are clipped to zero. 4The Word2Vec model uses many tricks, such as hierarchical softmax and negative sam- In this work we explore a "simple" model, leaving the pling, to improve its performance. evaluation of these methods to future work. 5We tested also the Softmax function, with negative results. 5 Label Purpose Vehicle Start hour End hour Duration Range Weather Weekday Values at home, at work, eat out, shopping (food), shopping (other), social events, study, entertainment (sport, theater, museum. . . ), services (doctor, bank, hairdresser. . . ), pick- ing up/taking someone home, fueling, stop (changing trans- portation), not specified, incomplete tracking (dead battery, app crash) car, bicycle, motorcycle, city public transport (but, metro), taxi, train, boat, on foot, not specified 0-23 0-23 <5 min, 5-8 min, 8-12 min, 12-20 min, >20 min <1 km, 1 to 2 km, 2 to 4 km, 4 to 10 km, > 10 km sunny, rain, fog, cloudy, not specified weekday, weekend Total count N. 14 9 24 24 5 5 5 2 88 Table 1: Attributes describing trajectories in the dataset. descriptor d = S(W (cid:48)T ei). d is compared to di j so that backpropagation updates W (cid:48) and W . The length of user embeddings ei is a free parameter of the model. Differ- ently from the previous methods, Traj2User makes possible to set ei > d, i.e., expanding the representation space. The idea supporting the use of a rep- resentation space bigger than the original descriptors, is that it may be able to capture and represent more relationships between the attributes. 3 Experiments 3.1 Dataset The raw trajectories dataset has been collected by volunteers using GPS-enabled smartphones in the area of Pisa in the period from May 20, 2014 to Septem- ber 30, 2014, in the context of the TagMyDay6 experiment. Each user tracked his/her movements by using a GPS tracking app installed in their mobile phone. Each volunteer could freely decide which part of their daily movement to track by starting the application. Each trajectory has been uploaded into the experi- ment web site. Here, trajectory segments are automatically computed from the raw data identifying the different movements between two stops. Then, from the web interface the users could annotate these segments with semantic labels like the purpose of the trip, the means of transportation, the weather. Other information has been computed automatically from the raw trajectory like the 6We obtained this data under a non-disclosure agreement, therefore we cannot directly redistribute it. More information at http://kdd.isti.cnr.it/project/tagmyday 6 1 2 compression factor f 0.5 method Sum n/a n/a PPMI n/a SM n/a SVD-PPMI SVD-SM n/a Traj2User 0.858 0.748 0.708 0.378 0.708 0.394 0.858 n/a n/a n/a 0.706 0.394 0.844 4 n/a n/a n/a 0.666 0.393 0.803 8 n/a n/a n/a 0.605 0.363 0.774 Table 2: Comparison of the methods for the generation of user embeddings. Average MRR value across 1,000 test pairs. temporal duration of the segment, the spatial length and the day of the week (weekday, weekend). After the annotation task, a semantically enriched trajectory is identified by the attributes listed in Table 1. The dataset contains traces of 157 users for a total of 10,880 segments. The distribution of the number of trajectories associated to the users follows an exponential decay with the most active user having produced 727 segments and a tail of 39 users with less than 5 segments. The encoding of a trajectory segment into a movement descriptor produces a vector of length d = 88 (see Table 1). 3.2 Experiments and results 1 ra b (cid:80) (ua,ub)∈P We designed our experiment as a similarity search problem. Given two users ua and ub which are known to have very similar mobility habits, we rank all users in U \ {ua} by the similarity of their embedding with ea, using the cosine similarity function, and observe the rank ra b of ub. We repeat this on a large set of pairs of similar users P and measure the mean reciprocal rank M RR(P ) = 1P across all pairs. The higher the M RR score the better, since it indicates that the embeddings capture the similarities among the (ua, ub) pairs. Our dataset does not have an explicit evaluation of similarities among users. To solve this issue we created the pairs of similar users by randomly selecting a user ua from U and then randomly distributing the movement descriptors of ua between two 'virtual' users u(cid:48) a and u(cid:48)(cid:48) a, which actually define a test pair. Given a pair (u(cid:48) a), to capture the similarity between these two users we train user embeddings on the set of users U ∪ {u(cid:48) a} \ {ua}. We generated a test set of a, u(cid:48)(cid:48) 1,000 pairs using this method. Each training of user embeddings consisted of 1,000 epochs, with shuffling after each epoch. a, u(cid:48)(cid:48) Results of experiments7 (Table 2) show that Traj2User outperforms the other tested method by a large margin, i.e., a 14.7% relative improvement over 7We implemented Traj2User on PyTorch. Upon acceptance we will make the code avail- able on GitHub. 7 User-by-user similarity modeled by Traj2User on a simulated Figure 2: population with 20 groups, each one of 10 users (the lighter the color the most similar the pair of users). sum, the second best performer8. An interesting negative result emerges from the comparison of Sum, with PPMI, SM and their SVD methods. These latter methods, that are typically applied with success on language modeling tasks perform poorly on our task. We measured that the distribution of frequency of values in the TagMyDay dataset follow a logarithmic distribution and not the typical Zipf distribution of words in text, yet it is hard to consider this difference as the cause of the drop in MRR. We leave the investigation of this aspect to future work. Softmax-based methods are by far the worst performers, indicating that forcing a probabilistic interpretation of the observed data is a wrong design choice. Shorter embeddings, either from truncated SVD or set- ting smaller size in Traj2User, reduce the MRR. However, even the shortest Traj2User embedding, with f = 8 (ei = 11) outperforms Sum, indicating a graceful degradation of performance and the possibility of exploiting data com- pression. Larger embeddings performed as the original-length ones, indicating that the information contained in the relatively small dataset we were able to obtain was already fully modeled in the original-length embeddings. We ran a further experiment to check if Traj2User user embeddings are able to discover groups of similar users and to consistently model similarities across groups. We used the method for the creation of virtual users described in this section to create a population of 2,000 users composed of 20 groups of 100 virtual users, each one generated from a real user randomly sampled from the TagMyDay dataset. Figure 2 visualizes the cosine similarity among users 8The difference is statistically significant for a t-test on the reciprocal rank score across the 1,000 test pair with p = 3.66 · 10−5. 8 measured on Traj2User user embeddings. Virtual users in the same group are adjacent. As shown, Traj2User captures the (imposed) within-group sim- ilarity between users (the light blocks on the diagonal), and also consistently models the (casual) inter-group similarities. 4 Conclusions and Future Works Traj2User is an innovative way to generate effective user embeddings, starting from simple representations of semantic trajectories and delegating the defini- tion of the similarity model to the learning process of the network. Although the TagMyDay dataset is limited to a few labels, the method is general enough to expand the amount and forms of semantic information (e.g. interactions of the user with social platforms like ratings and comments on Foursquare or Tri- pAdvisor). For example, when the information comes in the form of a piece of text, it can be encoded into a semantic-rich vector using neural language models, e.g., paragraph vectors [10]. As future works we plan to make experiments on other datasets publicly available gathered from social media, and to extend the Traj2User network with a recurrent component, so as to model multi-segment trajectories as a single entity. Acknowledgments The present paper has been partially supported by the MASTER project that has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie-Slodowska Curie grant agreement N. 777695 and the FAPESC project MATCH N. UER2017061000002 References [1] Donald J Berndt and James Clifford. Using dynamic time warping to find patterns in time series. In KDD workshop, volume 10, pages 359 -- 370. AAAI Press, 1994. [2] Vania Bogorny, Chiara Renso, Artur Ribeiro de Aquino, Fernando de Lucca Siqueira, and Luis Otavio Alvares. CONSTAnT -- a conceptual data model for semantic trajectories of moving objects. Transactions in GIS, 18(1):66 -- 68, 2014. [3] John A. Bullinaria and Joseph P. Levy. Extracting semantic representa- tions from word co-occurrence statistics: A computational study. Behavior Research Methods, 39(3):510 -- 526, Aug 2007. [4] Lei Chen, M. Tamer Ozsu, and Vincent Oria. Robust and fast similar- In Proc. of the ACM Inter- ity search for moving object trajectories. 9 national conference on Management of Data (SIGMOD), pages 491 -- 502. ACM, 2005. [5] Shanshan Feng, Gao Cong, Bo An, and Yeow Meng Chee. Poi2vec: Geo- graphical latent representation for predicting future visitors. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, February 4- 9, 2017, San Francisco, California, USA., pages 102 -- 108, 2017. [6] Carlos Andres Ferrero, Luis Otavio Alvares, and Vania Bogorny. Multiple aspect trajectory data analysis: Research challenges and opportunities. In XVII Brazilian Symposium on Geoinformatics, GEOINFO '16, pages 1 -- 12, Campos do Jordao, SP, Brazil, 2016. GEOINFO. [7] Andre Salvaro Furtado, Luis Otavio Campos Alvares, Nikos Pelekis, Yan- nis Theodoridis, and Vania Bogorny. Unveiling movement uncertainty for robust trajectory similarity analysis. International Journal of Geographical Information Science, 32(1):140 -- 168, 2018. [8] Andre Salvaro et al. FURTADO. Multidimensional similarity measuring for semantic trajectories. Transactions in GIS, 20(2):280 -- 298, 2016. [9] Chih-Chieh Hung, Wen-Chih Peng, and Wang-Chien Lee. Clustering and aggregating clues of trajectories for mining trajectory patterns and routes. VLDB J., 24(2):169 -- 192, 2015. [10] Quoc V. Le and Tomas Mikolov. Distributed representations of sentences and documents. CoRR, abs/1405.4053, 2014. [11] Hechen Liu and Markus Schneider. Similarity measurement of moving object trajectories. In Proceedings of the 3rd ACM SIGSPATIAL Interna- tional Workshop on GeoStreaming (IWGS '12), pages 19 -- 22, New York, NY, USA, 2012. ACM. [12] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. Distributed representations of words and phrases and their composition- ality. In Advances in Neural Information Processing Systems 26, pages 3111 -- 3119. Curran Associates, Inc., 2013. [13] Christine Parent, Stefano Spaccapietra, Chiara Renso, Gennady L. An- drienko, Natalia V. Andrienko, Vania Bogorny, Maria Luisa Damiani, Aris Gkoulalas-Divanis, Jos´e Antonio Fernandes de Macedo, Nikos Pelekis, Yan- nis Theodoridis, and Zhixian Yan. Semantic trajectories modeling and analysis. ACM Comput. Surv., 45(4):42, 2013. [14] Sayan Ranu, Deepak P, Aditya D. Telang, Prasad Deshpande, and Sriram Raghavan. Indexing and matching trajectories under inconsistent sampling rates. In 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pages 999 -- 1010, 2015. 10 [15] Stefano Spaccapietra, Christine Parent, Maria Luisa Damiani, Jose Anto- nio de Macedo, Fabio Porto, and Christelle Vangenot. A conceptual view on trajectories. Data and Knowledge Engineering, 65(1):126 -- 146, 2008. [16] Peter D Turney and Patrick Pantel. From frequency to meaning: Vector space models of semantics. J. of artificial intelligence research, 37:141 -- 188, 2010. [17] M. Vlachos, G. Kollios, and D. Gunopulos. Discovering similar multidi- mensional trajectories. In Proceedings of the 18th International Conference on Data Engineering, pages 673 -- 684, San Jose, CA, USA, 2002. IEEE. [18] Xiangye Xiao, Yu Zheng, Qiong Luo, and Xing Xie. Inferring social ties between users with human location history. Journal of Ambient Intelligence and Humanized Computing, 5(1):3 -- 19, 2014. 11
1904.12593
1
1904
2019-04-07T21:01:21
Density-based Community Detection/Optimization
[ "cs.SI", "cs.IR", "physics.soc-ph" ]
Modularity-based algorithms used for community detection have been increasing in recent years. Modularity and its application have been generating controversy since some authors argue it is not a metric without disadvantages. It has been shown that algorithms that use modularity to detect communities suffer a resolution limit and, therefore, it is unable to identify small communities in some situations. In this work, we try to apply a density optimization of communities found by the label propagation algorithm and study what happens regarding modularity of optimized results. We introduce a metric we call ADC (Average Density per Community); we use this metric to prove our optimization provides improvements to the community density obtained with benchmark algorithms. Additionally, we provide evidence this optimization might not alter modularity of resulting communities significantly. Additionally, by also using the SSC (Strongly Connected Components) concept we developed a community detection algorithm that we also compare with the label propagation algorithm. These comparisons were executed with several test networks and with different network sizes. The results of the optimization algorithm proved to be interesting. Additionally, the results of the community detection algorithm turned out to be similar to the benchmark algorithm we used.
cs.SI
cs
DENSITY BASED COMMUNITY DETECTION/OPTIMIZATION Rui Portocarrero Sarmento LIAAD-INESC TEC PRODEI - Faculty of Engineering, University of Porto [email protected] 9 1 0 2 r p A 7 ] I S . s c [ 1 v 3 9 5 2 1 . 4 0 9 1 : v i X r a April 30, 2019 ABSTRACT Modularity-based algorithms used for community detection have been increasing in recent years. Modularity and its application have been generating controversy since some authors argue it is not a metric without disadvantages. It has been shown that algorithms that use modularity to detect communities suffer a resolution limit and, therefore, it is unable to identify small communities in some situations. In this work, we try to apply a density optimization of communities found by the label propagation algorithm and study what happens regarding modularity of optimized results. We introduce a metric we call ADC (Average Density per Community); we use this metric to prove our optimization provides improvements to the community density obtained with benchmark algo- rithms. Additionally, we provide evidence this optimization might not alter modularity of resulting communities significantly. Additionally, by also using the SSC (Strongly Connected Components) concept we developed a community detection algorithm that we also compare with the label prop- agation algorithm. These comparisons were executed with several test networks and with different network sizes. The results of the optimization algorithm proved to be interesting. Additionally, the results of the community detection algorithm turned out to be similar to the benchmark algorithm we used. Keywords Social Networks · Community Detection Optimization · Modularity · Community Density 1 Developments and Benchmark Several developments were made to test the hypothesis. An algorithm was developed, and a metric is introduced in the following sections. 1.1 Average Density per Community (ADC) measure Average Density per Community (ADC) is the measure that is used to compare the algorithm results and is given by the following formula: n(cid:88) Ci=1 ADC = 1 nC Density(Ci) where nC is the number of communities identified in the graph, Density(Ci) is the density of each community Ci. 1.2 Optimization Algorithm Algorithm 1 provides the sequence of tasks we are doing to test the hypothesis 1. We start by using the results of a community detection algorithm. Then, we try to discover if the communities can be disbanded in smaller communities. 1Available Code at https://github.com/Sarmentor/Density-based-Community-Detection-Optimization. These smaller communities are strongly connected components, i.e., groups of nodes with higher density. Then, if the average community density of the disbanded communities is higher than the original community the disbanding is indeed executed. If not, the community founded by the benchmark algorithm is not disbanded and maintains its original id. APRIL 30, 2019 (cid:46) Node List and their Community (cid:46) New Community Structure (cid:46) If community has more than 1 component SCC ← STRONG CONNECTED COMPONENTS OF COMMUNITY(Communityi) mdc ← MEAN DENSITY OF COMPONENTS(SCCs) if mdc > Community Density then if ncomponents > 1 then Algorithm 1 Algorithm Pseudo-Code for Optimization of Community Density Input: Communities Data Output: Community Results 1: while not at the end of Original Communities list do 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: end if 14: 15: end while for SCCi ∈ Community do end for process next community do nothing Community Results ← COMPONENTNODESFORMNEWCOMMUNITY(SCCi) else end if else 1.3 Community Detection Algorithm We developed an algorithm for community detection based on density 2. Moreover, we start by finding strongly connected components in a graph. Then, we initialize all found components to initial communities. After that, we propagate the communities label by aggregating, for each component, the nearby component that maximizes the clustering coefficient of the resulting sub-graph. Algorithm 2 pseudo-code represents the algorithm. Algorithm 2 Algorithm Pseudo-Code for Community Detection Input: Graph Data Output: Community Results 1: SCC ← STRONG CONNECTED COMPONENTS OF GRAPH(Graph Data) 2: while not at the end of SCC list do 3: 4: 5: 6: end for 7: 8: end while if Agg Subgraph CCoef f icient = max ccoef f ient then for each nearbySCC do end if Community Results ← LABELNODESWITHSCCLABEL(N earby SCC N odes) (cid:46) Edge List (cid:46) Community Structure (cid:46) While there are Components to Explore 1.4 Benchmark Algorithm The algorithm we used for community detection was the label propagation algorithm. This algorithm, as its name indicates, does the propagation of community label. At initial condition, nodes carry a label that denotes the community they belong -- belonging to community changes, based on the labels that the neighboring nodes possess. This change is subject to the maximum number of labels within one degree of the nodes. Every node is initialized with a unique label then the labels diffuse through the network. Consequently, densely connected groups reach a common label quickly. When many such dense (consensus) groups are created throughout the network, they continue to expand outwards until it is possible to do so Label propagation algorithm has the advantage in its running time, an amount of a priori information needed about the network structure (no parameter is required to be known beforehand). The main disadvantage is that it produces 2Available Code at https://github.com/Sarmentor/Density-based-Community-Detection-Optimization. 2 no unique solution, but an aggregate of many solutions. Thus, this algorithm suffers from stability issues, and these issues might be adjusted with our optimization algorithm. We will try to apply our algorithm to the results obtained with the label propagation algorithm and see the changes in ADC and also the modularity of both outcomes. APRIL 30, 2019 1.5 Modularity function We used a modularity measure Q to evaluate the quality of the community structure of a graph. Modularity serves as the objective function during the process of calculating the communities Newman and Girvan (2004). This measure, apart from being the most widely used Chen et al. (2015, 2013), was considered as the quality measure used in the evaluation of the algorithms. Higher values for the modularity Q mean better community structures. Therefore, the objective is to find a community assignment for each node in the network such that Q is maximized using the modularity function defined by (cid:20) (cid:88) (cid:21) δ(ci, cj) (1) Aij represents the weight of the edge between i and j, ki =(cid:80) i,j Aij − kikj 2m Q = 1 2m (cid:80) jAij is the sum of the weights of the edges attached to vertex i, ci is the community to which vertex i is assigned, the δ-function δ(u, v) is 1 if u = v and 0 otherwise and ijAij. To calculate the modularity of a specific community, the number of inner edges (in[n]) and the total m = 1 2 number of edges (tot[n]) of a specific node n is used. The modularity of the full network can be calculated using the previous Q function, by considering all the entries of in and tot for all the nodes. 2 Case Study In this case study, we test our optimization algorithm with several toy networks. We used these networks to test the hypothesis that our algorithm indeed provides improvements in the ADC measure in community detection. We also provide a comparison of the modularity results with and without optimization. Additionally, we test our community detection algorithm with the same networks. We provide a comparison with the label propagation algorithm. 2.1 Data Description First, we tried optimization with three toy networks. We will call them toynet1, toynet2, and toynet3. These toy networks are directed graphs of small size. The following figures provide a visualization of these graphs. These toy networks have a different disposition of nodes and have strongly connected components. Thus, they offer a good starting point to apply our optimization algorithm. Figure 1. Toy Network 1 (left), Toy Network 2 (middle) and Toy Network 3 (right) 2.2 Experiments We proceeded by testing both algorithms with several more networks. First, we used three directed toy networks as we previously stated. For the second test, we generated 99 directed networks from the previous toy networks by randomly extracting one edge from each network. This network was a randomly selected network from the set of the three previously described toy networks. This way we would get a mixture of new graphs and also might happen that some 3 APRIL 30, 2019 graphs are repeated among all the 99 graphs. Thus, we have the possibility of testing also if the algorithms behavior is coherent for different runs. 2.2.1 Larger Networks Additionally, since the generated networks are small size networks we did a third test with more extensive networks. The results of these three tests are presented in the next section. 3 Results This section presents the results of the experiments with our algorithms and the benchmark algorithm. Thus, we show results for ADC and community detection for directed networks. 3.1 Community Optimization With the toy networks the optimization algorithm had the results represented in the following table: Table 1. Community Optimization Results Networks Original ADC New ADC Toynet1 Toynet2 Toynet3 0.238 0.250 0.650 0.708 0.833 0.833 Number of new communi- ties 3 4 3 For the second test with the 99 networks the following Figure 2 exposes the improvements in the ADC measure with our algorithm and comparing with the label propagation algorithm results. Figure 2. ADC measure (left) and Modularity results (right) for 99 graphs - comparison between ADC optimization algorithm results (blue) and label propagation results (red) The blue lines indicate our algorithm results and the red lines show the label propagation results. The horizontal lines provide the average of each graph. With these results, it is clear that the algorithm provided better ADC than the ADC presented by the original com- munities provided with the label propagation algorithm. Additionally, regarding modularity, the changes after the optimization are not very significant. 3.2 Community Detection With the toy networks the community detection algorithm had the results represented in the following tables: 4 APRIL 30, 2019 Table 2. Community Detection - 1st simulation Modularity Results Label Propagation Algorithm Our algorithm Then, we did a second, third, fourth and fifth simulation. The second simulation had the following table results: Table 3. Community Detection - 2nd simulation Modularity Results Label Propagation Algorithm Our algorithm Networks Toynet1 Toynet2 Toynet3 Networks Toynet1 Toynet2 Toynet3 Networks Toynet1 Toynet2 Toynet3 Networks Toynet1 Toynet2 Toynet3 0.260 0 0.119 -0.004 0 0.283 -0.004 0 0.283 -0.004 0.283 0.283 0.202 0.252 0.253 0.202 0.252 0.253 0.202 0.252 0.253 0.202 0.252 0.253 Table 4. Community Detection - 3rd simulation Modularity Results Label Propagation Algorithm Our algorithm Table 5. Community Detection - 4th simulation Modularity Results Label Propagation Algorithm Our algorithm After these five simulations, we suspect the label propagation algorithm is very unstable regarding its results. This is clear with the changes in the modularity results for each network simulation. Our algorithm seems to be more stable and presents the same result for every simulation and each tested network. Thus, we proceeded with more tests and with the 99 networks previously generated. The results for modularity are visible in Figure 3. After previous measurements, it is visible that our algorithm presents similar results on average when compared with the label propagation algorithm. This is true for average modularity. 3.2.1 ADC Comparison We measured ADC for both the label propagation results and the developed algorithm for community detection. The figures provide evidence that the developed algorithm improves ADC measure in large scale without loss of modularity when compared with the benchmark algorithm. This is an expected result since the basis of our algorithm for community detection is the primary detection of strongly connected components which are inherently regions of high density in social networks. 4 Conclusions and Future Work There is clear evidence our density optimization algorithms provide improvements when the label propagation results are compared with the optimizations results. This is true with our test networks that are directed and small networks. Additionally, robustness tests were done to ensure better that the algorithms are not unstable. These tests proved to be successful, and when we used a more considerable amount of test networks, we still obtained better ADC results. Regarding the community detection algorithm, in several tests we performed, it achieved similar average results for the modularity measure which might indicate it is a fairly reasonable algorithm for directed networks. Additionally, 5 APRIL 30, 2019 Table 6. Community Detection - 5th simulation Modularity Results Label Propagation Algorithm Our algorithm Networks Toynet1 Toynet2 Toynet3 -0.004 0 0.017 0.202 0.252 0.253 Figure 3. ADC results (left) and Modularity results (right) for 99 graphs - comparison between our community detec- tion algorithm results (blue) and label propagation results (red) this algorithm provides community detection based on dense components, and therefore the density per community (ADC) is higher than the compared benchmark algorithm. Acknowledgments This work was fully financed by the Faculty of Engineering of the Porto University. Rui Portocarrero Sarmento also gratefully acknowledges funding from FCT (Portuguese Foundation for Science and Technology) through a Ph.D. grant (SFRH/BD/119108/2016). The authors want to thank also to the reviewers for the constructive reviews provided in the development of this publication. References Chen, M., Nguyen, T., and Szymanski, B. (2013). On measuring the quality of a network community structure. In Social Computing (SocialCom), 2013 International Conference on, pages 122 -- 127. Chen, M., Nguyen, T., and Szymanski, B. K. (2015). A new metric for quality of network community structure. CoRR, abs/1507.04308. Newman, M. E. J. and Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review E, 69(2):026113+. 6
1110.4015
1
1110
2011-10-18T15:07:30
The large-scale structure of journal citation networks
[ "cs.SI", "cs.DL", "physics.soc-ph" ]
We analyse the large-scale structure of the journal citation network built from information contained in the Thomson-Reuters Journal Citation Reports. To this end, we take advantage of the network science paraphernalia and explore network properties like density, percolation robustness, average and largest node distances, reciprocity, incoming and outgoing degree distributions, as well as assortative mixing by node degrees. We discover that the journal citation network is a dense, robust, small, and reciprocal world. Furthermore, in and out node degree distributions display long-tails, with few vital journals and many trivial ones, and they are strongly positively correlated.
cs.SI
cs
The large-scale structure of journal citation networks Massimo Franceschet Department of Mathematics and Computer Science, University of Udine Via delle Scienze 206 -- 33100 Udine, Italy [email protected] Abstract We analyse the large-scale structure of the journal citation network built from information contained in the Thomson-Reuters Journal Citation Reports. To this end, we take advantage of the network science paraphernalia and explore network properties like density, percolation robustness, average and largest node distances, reciprocity, incoming and outgoing degree distributions, as well as as- sortative mixing by node degrees. We discover that the journal citation network is a dense, robust, small, and reciprocal world. Furthermore, in and out node degree distributions display long-tails, with few vital journals and many trivial ones, and they are strongly positively correlated. Key words: Network science, bibliometrics, journal citation networks, journal citation indicators. 1. Introduction The present study is an interdisciplinary research integrating the fields of network science and bibliometrics. The field of network science -- the holistic analysis of complex systems through the study of the structure of networks that wire their components -- exploded in the last decade, boosted by the availability of large databases on the topology of various real networks, mainly the Web and biological networks. The network science approach has been successfully applied to analyse disparate types of networks, including technological, information, social, and biological networks (Brandes and Erlebach, 2005; Newman et al., 2006; Newman, 2010). Network analysis can be performed at different levels of aggregation: • Node-level analysis. At this level, the goal is to measure the importance or centrality of a node within the network. Centrality here is not an intrinsic and permanent feature of the node but, instead, it is an extrinsic and fleeting property that depends on the interactions of the node with the other nodes in the network. Typical node centrality measures include degree, eigenvector, closeness and betweenness centrality. Preprint submitted to JASIST July 31, 2021 • Group-level analysis. This investigation involves methods for defining and finding cohesive groups (clusters) of nodes in the network. The definition of cluster depends only on the topology of the network. Clusters are tightly knit sets of nodes with many edges inside the cluster and only a few edges between clusters. Two typical methods at this level of analysis are graph partitioning (where the number of clusters is fixed in advance) and community detection (in which the number of clusters is unspecified). • Network-level analysis. The focus of this analysis is on properties of net- works as a whole such as connectivity, mean and largest distances among nodes, distribution of node degrees, frequency of topological motifs, and assortative/disassortative mixing. It also includes the investigation on the- oretical models explaining the generation of networks with certain features (e.g., random, small-world, and scale-free models). Bibliometrics is an older field; it is a branch of information and library science that quantitatively investigates the process of publication of research achievements (Garfield, 1955; de Solla Price, 1965). Networks abound in biblio- metrics; two important examples are citation networks of articles, journals or disciplines and collaboration networks of scholars. Other bibliometric networks are co-citation and co-reference networks of articles, journals or disciplines. Collaboration networks have been largely studied using the network science approach (Newman, 2004; Barab´asi et al., 2002; Grossman, 2002; Moody, 2004; Radicchi et al., 2004; Franceschet, 2011). Journal citation networks have been investigated mainly at node- and group-levels. The investigation at the node- level concerns the proposal of eigenvector-based centrality measures for journals (Pinski and Narin, 1976; Bollen et al., 2006; West et al., 2010), the clustering of journal bibliometric indicators, including centrality measures, on the basis of the statistical correlation among them (Leydesdorff, 2009; Bollen et al., 2009), as well as the use of betweenness centrality as an interdisciplinary indicator for journals (Leydesdorff and Rafols, 2011). The group-level analysis of journal citation networks focuses on the detection, using different methods, of com- munities of journals, which correspond to fields of knowledge in the map of science (Leydesdorff, 2004; Rosvall and Bergstrom, 2008; Klanans and Boyack, 2009; Leydesdorff et al., 2010). The investigation of journal citation networks at the network-level has been mainly focused on the study of the distribution of citations among papers and journals (Seglen, 1992; Redner, 1998; Stringer et al., 2008; Radicchi et al., 2008). The aim of the present investigation is to complement this investigation with additional large-scale structure properties of journal citation networks. More specifically, we focus on the following network properties: density of cita- tion links, robustness with respect to the removal of nodes according to differ- ent percolation strategies, average and largest path lengths, topological motifs of reciprocity, incoming and outgoing degree distributions and their statistical correlations, as well as assortative mixing with respect to incoming and outgoing node degrees. 2 2. The large-scale structure of journal citation networks We considered all science and social science journals indexed in Thomson- Reuters Journal Citation Reports. We built a journal citation network in which the nodes are the selected journals and there is a directed edge from node A to node B if journal A published in 2008 a paper that cites a paper printed in journal B in the temporal window between 2003 and 2007. We only took into account the document types article and review. We considered the sub-network corresponding to the largest strongly connected component of the original net- work, which covers the large majority of the original network.1 The resulting network is a directed unweighted graph with 6708 nodes and 1,315,238 edges between journals with the property that there exists a directed path between any pair of nodes. We loaded the network in the R environment for statisti- cal computing (R Development Core Team, 2008) and analysed the structure of the network using the R package igraph developed by G´abor Cs´ardi and Tam´as Nepusz. The first network property that we analyse is density. Graph density is the relative fraction of edges in the graph, that is the ratio of the actual number of edges and the maximum number of possible edges in the graph. The density of the journal citation graph is 3%, meaning that the graph has 3 edges every 100 possible links between nodes. The density is much higher if we consider only top journals with large total degree, where the total degree of a journal is the sum of the number of incoming edges (citing journals) and the number of outgoing edges (cited journals) of the journal in the network. We sorted the journals in decreasing order of total degree and we computed the density of the graph containing only an increasing share of top journals; the corresponding plot is depicted in Figure 1. For instance, when only the top-30 journals are considered, the citation network, which is shown in Figure 2, is almost complete2, with a remarkably high density of 93% (only 64 edges out of the 870 possible edges are missing). Notably, the density is relatively high (32%) also for the network of top-1000 journals. The journal citation graph is, by construction, strongly connected. This means that there exists a directed path of citations between any pair of journals in the graph: a researcher can start reading any journal in any subject, e.g., tribology, and by following links of citations, they can reach any other journal in any other subject, e.g., mycology. Related to connectedness of a network is the concept of robustness. Network robustness is typically investigated with a dy- namic process called percolation. The percolation process progressively removes nodes, as long as the edges connected to these nodes, from the network, and studies how the connectivity of the network changes. In particular, one wants to find the fraction of nodes to remove from the network in order to disintegrate its 1It is typical in network science to focus the analysis on the largest component when this is a giant one, that is, when it includes the large majority of the nodes of the network (Newman, 2010). 2A complete graph, or clique, is a graph with all possible edges. 3 y t i s n e D 9 . 0 8 . 0 7 . 0 6 . 0 5 . 0 4 . 0 3 . 0 0 200 400 600 800 1000 Number of hubs Figure 1: The density of the network of top journals (journals with high total degree). The x axis shows the number of top journals (up to 1000) and the y axis gives the density of the network containing only these journals. giant strongly connected component into small components. If such a fraction is relatively large, then the network is said to be robust to the process of perco- lation. To realize the percolation process, we progressively removed nodes from the collaboration network and, after each removal, we computed the relative size of the largest strongly connected component of the resulting sub-network. We tested the following node removal strategies (Newman, 2010): 1. degree-driven percolation, in which the nodes are removed in decreasing order of node total degree (the sum of the in-degree and the out-degree of the node); 2. eigenvector-driven percolation, in which the nodes are removed in decreas- ing order of eigenvector centrality scores. A node has high eigenvector score if it is pointed to by nodes which, recursively, have high eigenvector scores; 3. closeness-driven percolation, in which the nodes are removed in decreasing order of closeness centrality scores. A node has high closeness score if the mean distance from the node to all other nodes in the network is low; 4. betweenness-driven percolation, in which the nodes are removed in decreas- ing order of betweenness centrality scores. A node has high betweenness score if the node lies on many geodesics (shortest paths) between other nodes in the network. 4 Figure 2: The citation network of the top-30 journals. The (almost) complete graph resembles some Escher's works. Figure 3 shows the outcomes of the described percolation process. A couple of observations emerge from the plot. First, the best percolation strategy is based on the removal of nodes in order of betweenness centrality. It dominates the total degree strategy, which is better than the closeness one. The least ef- fective percolation strategy is the one based on eigenvector centrality. Hence, when the objective is to dismantle the (strong) connectivity of the network, removing 'broker' nodes (nodes with high betweenness) is more effective than removing nodes with high total degree. Nodes with high betweenness score have been associated with interdisciplinary journals (Leydesdorff and Rafols, 2011), while those with high total degree typically correspond to review journals. It follows that interdisciplinary journals are more responsible to keep the citation network strongly connected than review publication sources. Second, no per- colation strategy is in fact really effective. Using the best percolation strategy (betweenness), 82% of the nodes (almost the entirety of the graph) should be removed to reduce the largest strongly connected component below 50% of the graph. This is a distinct sign of the strong robustness of the journal citation network. The fact that the journal citation network is strongly connected does not tell us anything about the lengths of paths in the network. For instance, compare a 5 t n e n o p m o c t n a g f o e z s e v i t a e R l i i 0 . 1 8 . 0 6 . 0 4 . 0 2 . 0 0 . 0 degree eigenvector closeness betweenness 0.0 0.2 0.4 0.6 0.8 1.0 Fraction of removed nodes Figure 3: Network robustness using the percolation process. The fraction of nodes removed from the network is plotted against the relative size of the largest strongly connected com- ponent. Four centrality strategies have been tested to remove the nodes in the percolation process. graph composed of a circle of nodes and a complete graph in which there is an edge connecting each pair of nodes. Both graphs are strongly connected, but the average distance between nodes in the first graph is of the order of the number of nodes, while in the second graph it is just 1. The geodesic distance between two nodes in a graph is the number of edges of a shortest path (also known as geodesic) connecting the two nodes. We computed the geodesic distance for any pair of nodes in the graph. Figure 4 shows the geodesic distance histogram. The average geodesic distance is remarkably short: 2.4 edges. This means that given a random pair of journals, we can expect that in two or three citation hops we get from one journal to the other. The maximum geodesic distance, known as the diameter of the network, is just 6 links (there are 20 paths with this largest length). We may conclude that the journal citation network is a small world (Watts and Strogatz, 1998), in the sense that the average node distances are remarkably short (logarithmic) with respect to the number of nodes of the network. It is worth noticing that the average path length on co-reference networks have been recently proposed by Rafols and Meyer (2010) in the context of in- dicators of interdisciplinarity. The authors investigate the interdisciplinary re- search in terms of two aspects: diversity (the number, balance and degree of difference between the bodies of knowledge integrated) and coherence (the ex- 6 i s c s e d o e g f o e g a t n e c r e p 6 . 0 5 . 0 4 . 0 3 . 0 2 . 0 1 . 0 0 . 0 1 2 3 4 5 6 geodesic distance Figure 4: Histogram of geodesic distances. For any given geodesic distance from 1 to the diameter of the network (6), a bar shows the percentage of geodesics having that distance. tent that specific topics, concepts, tools and data used in a research process are related). In particular, they propose the mean path length defined on paper bibliographic coupling networks as a possible operationalization of the concept of network coherence. Real complex networks possess basic building blocks or motifs: patterns of interconnections occurring in complex networks at numbers that are significantly higher than those in randomized networks (Milo et al., 2002). Such motifs have been found in diverse networks from biochemistry, neurobiology, ecology, and engineering. It is conjectured that these patterns play the role of functional circuit elements of the complex system underlying the network. The simplest motif that can be studied on a directed network is the loop of length two. On the journal citation network, this corresponds to a pair of journals that reciprocally cites themselves. This concept is known as reciprocity in network science and it is operationalized by counting the relative frequency of edges that belong to a loop of length two in the network (Newman, 2010). We computed reciprocity for the journal citation network and the result is 0.29; this means that 29% of the times that a journal A cites another journal B we have that B cites back to A. This high percentage can be explained with the well-known phenomenon that journals can be partitioned into highly-connected clusters corresponding to disciplines and fields of them when journals are displayed on a citation map (see, for instance, Rosvall and Bergstrom (2008)). Finally, we investigate the node degree distributions of the journal citation 7 y c n e u q e r F 6 0 0 . 0 4 0 0 . 0 2 0 0 . 0 0 0 0 . 0 1 68 157 257 357 457 557 657 758 865 968 1079 1201 Out−degree 1341 1518 2193 Figure 5: The node out-degree (number of cited journals) distribution. network. Since the citation network is a directed graph, each journal has an out-degree -- the number of distinct journals cited by the journal, or the number of edges leaving the journal node -- , and an in-degree -- the number of distinct journals citing the journal, or the number of edges arriving to the journal node. Figures 5 and 6, respectively, depict the out-degree and the in-degree distribu- tions for nodes of the journal citation network. Both distributions have a clear long-tail: most of the journals cite and are cited by a relatively small number of other journals, but there is a significative number of hubs -- journals that cite a large amount of other journals -- , and authorities, journals that are cited by a big number of other journals. The average degree for both distributions is 196.3 The median out-degree is 126, with a maximum out-degree of 2193 (a third of the total number of journals) accomplished by journal PNAS. The median in-degree is 109, with a maximum in-degree of 3697 (more than half of the total number of journals) obtained by journal Science (PNAS is second with 3640). The in-degree distribution is more skewed and concentrated (skewness index is 3.5 and Gini concentration coefficient is 0.55) than the out-degree distribution (skewness index is 1.9 and Gini concentration coefficient is 0.49). Neither dis- tribution follow a power-law, so the network cannot be regarded as a scale-free 3This is the same number since each edge leaving a node is arriving at a node; this is also equal to the ratio of the number of edges and the number of nodes of the network. 8 y c n e u q e r F 8 0 0 . 0 6 0 0 . 0 4 0 0 . 0 2 0 0 . 0 0 0 0 . 0 1 132 300 468 636 804 976 1163 1368 1575 2011 In−degree 2367 3520 Figure 6: The node in-degree (number of citing journals) distribution. network (Barab´asi and Albert, 1999).4 Furthermore, the two distributions (in- and out-degree) are positively cor- related (Spearman and Pearson correlation coefficients are 0.90 and 0.87, re- spectively): this means that there is a tendency for authority journals to be also hub journals and vice versa. This outcome is not crucially influenced by the size of the journal (in terms of number of published papers); indeed, the correlations of journal in-degree and out-degree with journal size are moderate (Spearman and Pearson correlation coefficients are 0.72 and 0.55, respectively). We also raised the following questions: do authorities prefer to cite other author- ities/hubs? Do hubs prefer to cite other hubs/authorities? In network science, assortative/disassortative mixing is the tendency of nodes to connect to other nodes that are like/dislike them in some way (Newman, 2010). The concept is implemented as a Pearson correlation coefficient over the investigated scalar characteristic (in- or out-degrees in our case) for nodes connected by an edge in the network. The correlation is positive and statistically significant in all four cases: 0.08 for authority/authority mixing, 0.14 for hub/hub mixing, 0.11 for authority/hub mixing, and 0.08 for hub/authority mixing. The low magnitude 4We preliminarily observed a clear curvature of the complementary cumulative distribu- tion function plotted on a double logarithmic scale; furthermore we performed Clauset et al. (2009) goodness-of-fit test for the power-law and log-normal models. Both tests excluded a (statistically significant) fit of the empirical distributions of degrees to the surveyed theoretical models (not even in a tail portion of the distribution for the power-law model). 9 of the correlation coefficients is not surprising: most networks are naturally disassortative by degree because they are simple graphs (at most one edge is possible between two nodes). Hence, a positive correlation in this case, although not large in magnitude, indicates a real assortativity by degree. In particular, networks having a community structure override this natural bias and become assortative (Newman, 2010). 3. Conclusion We have analysed the journal citation network extracted from Thomson- Reuters Journal Citation Reports. Our conclusions are summarized in the fol- lowing: • the journal citation network has high reciprocity and positive assortativity by degree, which is coherent with a community structure, in which there are tightly interconnected sets of journals that most likely represent entire disciplines or fields of them; • the journal citation network is a dense and small world. This means that, although the network is divided into closely integrated communities, there are quite intense inter-community flows of information (citations), and hence information can spread quickly over the whole academic community; • the journal citation network is highly robust. These is good news for the whole academic community, since it means that there exists no restricted circle of influential journals that control the connectivity of the network and the diffusion of information on the whole academic community, al- though there are journals that are very influential within their local fields; • interdisciplinary journals are more crucial than review sources for the connectivity of the network and for the diffusion of information over the academic community. The identification of interdisciplinary journals is a hot, partially open problem; interdisciplinarity is often perceived as a mark of good research, more successful in achieving breakthroughs and relevant outcomes (Rafols and Meyer, 2010); • the degree distribution of the journal citation network shows a long tail with many poorly endorsed journals an a significant few highly cited ones; the empirical distribution, however, does not match well the power-law model. To test the adherence to the power-law model we used the princi- pled statistical framework developed by Clauset et al. (2009). The same method is used by the developers to analyse a large number of real-world data sets from a range of different disciplines, each of which has been conjectured to follow a power law distribution in previous studies. Only two-third of them passed the test, and all of them showed the best adher- ence to the model when a (limited) suffix of the distribution is considered. 10 Acknowledgements I would like to thank Ludo Waltman (Centre for Science and Technology Studies, Leiden University) for his assistance in the data collection. References Barab´asi, A.-L., Albert, R., 1999. Emergence of scaling in random networks. Science 286, 509 -- 512. Barab´asi, A. L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A., Vicsek, T., 2002. Evolution of the social network of scientific collaborations. Physica A: Statistical Mechanics and its Applications 311 (3-4), 590 -- 614. Bollen, J., de Sompel, H. V., Hagberg, A., Chute, R., 2009. A principal compo- nent analysis of 39 scientific impact measures. PLoS ONE 4, e6022. Bollen, J., Rodriguez, M. A., de Sompel, H. V., 2006. Journal status. Sciento- metrics 69 (3), 669 -- 687. Brandes, U., Erlebach, T. (Eds.), 2005. Network Analysis: Methodological Foundations. Vol. 3418 of Lecture Notes in Computer Science. Springer. Clauset, A., Shalizi, C. R., Newman, M. E. J., 2009. Power-law distributions in empirical data. SIAM Review 51, 661 -- 703. de Solla Price, D., 1965. Networks of scientific papers. Science 149, 510 -- 515. Franceschet, M., 2011. Collaboration in computer science: a network science approach. Journal of the American Society for Information Science and Tech- nology 62 (10), 1992 -- 2012. Garfield, E., 1955. Citation indexes to science: a new dimension in documenta- tion through association of ideas. Science 122, 108 -- 111. Grossman, J. W., 2002. The evolution of the mathematical research collabora- tion graph. Congressus Numerantium 158, 201 -- 212. Klanans, R., Boyack, K., 2009. Toward a consensus map of science. Journal of the American Society for Information Science and Technology 60 (3), 455476. Leydesdorff, L., 2004. Top-down decomposition of the Journal Citation Report of the Social Science Citation Index: Graph- and factor-analytical approaches. Scientometrics 60 (2), 159 -- 180. Leydesdorff, L., 2009. How are new citation-based journal indicators adding to the bibliometric toolbox? Journal of the American Society for Information Science and Technology 60 (7), 1327 -- 1336. 11 Leydesdorff, L., de Moya-Aneg´on, F., Guerrero-Bote, V. P., 2010. Journal maps on the basis of Scopus data: A comparison with the Journal Citation Re- ports of the ISI. Journal of the American Society for Information Science and Technology 61 (2), 352 -- 369. Leydesdorff, L., Rafols, I., 2011. Indicators of the interdisciplinarity of journals: Diversity, centrality, and citations. Journal of Informetrics 5, 87 -- 100. Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D., Alon, U., 2002. Network motifs: Simple building blocks of complex networks. Science 298 (5594), 824 -- 827. Moody, J., 2004. The structure of a social science collaboration network: Dis- ciplinary cohesion from 1963 to 1999. American Sociological Review 69 (2), 213 -- 238. Newman, M. E. J., 2004. Coauthorship networks and patterns of scientific col- laboration. Proceedings of the National Academy of Sciences of the United States of America 101, 5200 -- 5205. Newman, M. E. J., 2010. Networks: An introduction. Oxford University Press. Newman, M. E. J., Barab´asi, A.-L., Watts, D. J., 2006. The Structure and Dynamics of Networks. Princeton University Press. Pinski, G., Narin, F., 1976. Citation influence for journal aggregates of scientific publications: Theory, with application to the literature of physics. Informa- tion Processing & Management 12 (5), 297 -- 312. R Development Core Team, 2008. R: A Language and Environment for Statis- tical Computing. R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0. URL http://www.R-project.org Radicchi, F., Castellano, C., Cecconi, F., Loreto, V., Parisi, D., 2004. Defin- ing and identifying communities in networks. Proceedings of the National Academy of Sciences of the United States of America 101 (9), 2658 -- 2663. Radicchi, F., Fortunato, S., Castellano, C., 2008. Universality of citation dis- tributions: Toward an objective measure of scientific impact. Proceedings of the National Academy of Sciences of the United States of America 105 (45), 17268 -- 17272. Rafols, I., Meyer, M., 2010. Diversity and network coherence as indicators of interdisciplinarity: Case studies in bionanoscience. Scientometrics 82, 263 -- 287. Redner, S., 1998. How popular is your paper? An empirical study of the citation distribution. The European Physical Journal B 4, 131 -- 134. 12 Rosvall, M., Bergstrom, C. T., 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences of the United States of America 105, 1118 -- 1123. Seglen, P. O., 1992. The skewness of science. Journal of the American Society for Information Science 43 (9), 628 -- 638. Stringer, M. J., Sales-Pardo, M., Amaral, L. A. N., 2008. Effectiveness of journal ranking schemes as a tool for locating information. PLoS ONE 3 (2), e1683. Watts, D. J., Strogatz, S. H., 1998. Collective dynamics of 'small-world' net- works. Nature 393, 440 -- 442. West, J. D., Bergstrom, T. C., Bergstrom, C. T., 2010. The Eigenfactor metrics: A network approach to assessing scholarly journals. College and Research Libraries 71, 236 -- 244. 13
1905.00630
2
1905
2019-11-13T16:00:30
Reliability of relational event model estimates under sampling: how to fit a relational event model to 360 million dyadic events
[ "cs.SI", "stat.ME" ]
We assess the reliability of relational event model parameters estimated under two sampling schemes: (1) uniform sampling from the observed events and (2) case-control sampling which samples non-events, or null dyads ("controls"), from a suitably defined risk set. We experimentally determine the variability of estimated parameters as a function of the number of sampled events and controls per event, respectively. Results suggest that relational event models can be reliably fitted to networks with more than 12 million nodes connected by more than 360 million dyadic events by analyzing a sample of some tens of thousands of events and a small number of controls per event. Using data that we collected on the Wikipedia editing network, we illustrate how network effects commonly included in empirical studies based on relational event models need widely different sample sizes to be estimated reliably. For our analysis we use an open-source software which implements the two sampling schemes, allowing analysts to fit and analyze relational event models to the same or other data that may be collected in different empirical settings, varying sample parameters or model specification.
cs.SI
cs
Reliability of relational event model estimates under sampling: how to fit a relational event model to 360 million dyadic events∗ Jurgen Lerner Alessandro Lomi University of Konstanz University of Lugano, Switzerland [email protected] [email protected] Abstract We assess the reliability of relational event model parameters estimated under two sampling schemes: (1) uniform sampling from the observed events and (2) case-control sampling which samples non-events, or null dyads ("controls"), from a suitably defined risk set. We experimentally determine the variability of estimated parameters as a function of the number of sampled events and controls per event, respec- tively. Results suggest that relational event models can be reliably fitted to networks with more than 12 million nodes connected by more than 360 million dyadic events by analyzing a sample of some tens of thousands of events and a small number of controls per event. Using data that we collected on the Wikipedia editing network we illustrate how network effects commonly included in empirical studies based on relational event models need widely different sample sizes to be reliably estimated. For our analysis we use an open-source software which implements the two sampling schemes, allowing analysts to fit and analyze relational event models to the same or other data that may be collected in different empirical settings, varying sample parameters or model specification. Keywords: relational event models, dynamic networks, large networks, parameter estimation, sampling, Wikipedia 1 Introduction Relational event networks arise naturally from directed social interaction. Examples include communication networks (Monge and Contractor 2003), teams (Leenders et al. 2016), online peer-production (Lerner and Tirole 2001; Lerner and Lomi 2017), international relations (Lerner et al. 2013), and discourse networks (Leifeld 2016; Brandenberger 2019). In all these cases, social interaction reflects, and at the same time shapes, relations among social actors and affects individual sentiments -- such as trust, esteem, like, or dislike -- and their contextual behavioral expressions (Stadtfeld and Block 2017). Relational events resulting from social interaction in open populations are often more directly and ac- curately accessible when interaction is mediated by technology, rather than embedded in face-to-face social relations. Data on relational event networks are increasingly accessible through social media platforms such as Twitter (Dodds et al. 2011) or Facebook (Golder et al. 2007). Advances in automatic data collection and coding strategies recording interaction at fine time-granularity are also encouraging the diffusion of relational event models (Lazer et al. 2009). Relational events have been suggested as the appropriate unit of analysis, for instance, in the study of team processes (Leenders et al. 2016), and interorganizational relations (Vu et al. 2017), where aggregating interaction over more or less arbitrary time intervals continues to represent the dominant research design (Pallotti and Lomi 2011). Building on the path-breaking work of Butts (2008), empirical studies adopting relational event models (REM) are becoming more common (Vu et al. 2017). Practical applicability of REM, however, has been ∗Manuscript accepted for publication in Network Science. We acknowledge support from Deutsche Forschungsgemeinschaft (DFG Grant Nr. LE 2237/2-1) and Swiss National Science Foundation (NSF Project Nr. 100018 150126). 1 hampered by runtime complexity (Foucault Welles et al. 2014) -- a problem that is rooted in the likelihood function which normalizes event rates on dyads that experience events by the rates on all dyads that could have possibly experienced an event at the given point in time. The corresponding risk set can be huge, since its size is often quadratic in the number of nodes. For example, in Wikipedia -- the setting for the data that we examine in the empirical part of this paper -- more than 6 million users contribute to one or several of more than 5 million encyclopedic articles, giving rise to more than 360 million dyadic events. Thus, at given points in time a dyadic event could occur on more than 30 trillion (3× 1013) dyads. Computing explanatory variables (sufficient statistics) for each of these dyads is unfeasible even for a single observed event -- much less so for all 360 million events. Such problems are rather typical since -- as mentioned above -- large quantities of information on relational events are often collected with automatic data-collection technologies which in turn can easily yield large, or very large networks. Empirical studies applying REM, therefore, have often been limited to networks with a rather small number of nodes (Foucault Welles et al. 2014; Lerner et al. 2013; Vu et al. 2017). Exceptions include studies exploiting a "sparsity condition," namely that a single observed event changes the values of some statistics not for all dyads in the risk set but only for a limited subset (Perry and Wolfe 2013; Hunter et al. 2011). For instance, an observed event on a dyad (a, b) changes the out-degree statistic only for all dyads with source a -- implying update costs that are linear, rather than quadratic in the number of nodes. This approach, however, requires to develop specific estimation algorithms for different model statistics. Moreover, it does not apply to models in which statistics on all dyads change from event to event, for instance, when using "recency statistics" (Lomi et al. 2014; Vu et al. 2015). However, even if sparsity conditions hold and explanatory variables change only on a fraction of the risk set, the method is still not applicable to networks of the size that we consider in this paper. A more general and less assuming approach to alleviate the runtime problems and speed-up estimation of REM on large event-networks, involves sampling from the risk set, as suggested by Butts (2008). To our knowledge Vu et al. (2015) were the first to propose a concrete sampling scheme and to apply it in an empirical study (earlier mentioned in the dissertation of the first author). Vu et al. (2015) propose and apply case-control sampling (Borgan et al. 1995) in which a sampled likelihood is constructed by including all observed events (cases) but only a limited number of dyads from the risk set not experiencing an event at given points in time ("null dyads" or controls). Vu et al. (2015), however, do not clarify the variation in the parameters that is caused by sampling, nor do they address issues about the number of controls that should be sampled per observed event. Similarly wanting is a discussion about the possibility of applying other sampling strategies in addition to, or instead of, case-control sampling. For instance, Vu et al. (2015) propose to sample 10,000 controls per event. On the one hand, we might wonder whether 10,000 controls is enough to obtain reliable estimates or, on the other hand, if so many controls per event are really needed. Moreover, Vu et al. (2015) analyze event networks comprising some tens of thousands of events and a maximal risk set size of 1.8 million. Since our data has more than thousand times as many events and a maximal risk set size that is more than ten million times larger, we need lower numbers of controls per event and an additional sampling strategy, besides case-control sampling, to achieve a feasible runtime. Against the backdrop of this general discussion, this paper contributes to the practice of estimating REM by performing systematic experiments to assess the variation in the estimated model parameters caused by sampling. We consider combinations of two sampling schemes, (1) uniform sampling from the set of observed events and (2) case-control sampling, where we sample non-events from the risk set. An alternative to these two sampling schemes would be to restrict the analysis to sub-networks that are sufficiently small, for instance, by considering only events among a specific subset of nodes. An example of this strategy is given by Lerner and Lomi (2019a) who analyze edit and discussion events in Wikipedia restricted to articles about "migration-related topics," which results in some 4, 000 articles and 87, 000 users connected by 950, 000 events. Lerner and Lomi (2019a) applied case-control sampling from the risk set but did not sample from the observed events among this restricted set of nodes. We claim that the sampling strategy proposed and analyzed in this paper, which samples uniformly from all events, is preferable to the analysis of a sub-network for at least two reasons. First, it is questionable whether a sub-network 2 is representative for a larger network. In the given example it seems rather plausible that articles about migration-related topics are not representative for all Wikipedia articles. Second, if we restrict the analysis to sub-networks, the computation of explanatory variables is potentially incorrect. In the example from Lerner and Lomi (2019a), Wikipedia users might contribute to articles that are not in the chosen subset so that, for instance, the out-degree, in-degree, or four-cycle statistics, see Eqs. (8) to (10), might be computed incorrectly. In brief, restricting the analysis to sub-networks needs a strong assumption about the modularity or quasi-decomposability of the relational system of interest (Newman 2006; Simon 1996, 1977). In this paper we follow a different analytical strategy: even though we compute explanatory variables only for a random subset of events, all events are aggregated into the network of past events (see Sect. 3.3) which ensures that all computed explanatory variables are correct. We contribute to the practical applicability of REM in empirical network research by: 1. Providing a proof-of-concept that relational event models can be fitted to large event networks with millions of nodes and hundreds of millions of events by analyzing a sample of some tens of thousands of events and a small number of controls per event. For some network effects it is even sufficient to analyze a sample comprising a few hundreds of events. 2. Assessing the variation of estimated parameters as a function of the number of sampled events and the number of controls per event, separately for different commonly-used network effects. This allows us to determine how many events and controls are needed for reliable estimation of the different effects and sheds light on the question whether we should sample few events and many controls per event or rather many events and fewer controls 3. Identifying characteristics in the data that explain why some network effects need many more observa- tions than others to be reliably estimated and discussing a different sampling strategy that might be applied in situations of badly distributed explanatory variables. 4. Introducing an open-source software with which similar parameter estimation and sensitivity tests can be performed using different sample parameters, different models, or different data. The remainder of this paper is structured as follows. Section 2 recalls the basic framework for relational event models and introduces the two sampling strategies. In Sect. 3 we introduce the setting, data, empirical model specification, and the experimental design. We provide detailed results in Sect. 4 and summarize their implications in Sect. 5 where we also offer recommendations for the practice of estimating REMs and refer to an open-source software that may be adopted to replicate the results of the study in the same or different settings. We conclude with a general discussion of the implications of our work for the practice of estimating relational event models in empirical studies. The majority of the numerical results are included in an appendix. 2 Background 2.1 Relational event models A general statistical modeling framework capable of exploiting the fine-grained time information inherent in relational event sequences has been proposed by Butts (2008). Relational event models (REM) specify time-varying event rates for all dyads as a function of past events on the same or other surrounding dyads. Variations of this model framework include REM for weighted events (Brandes et al. 2009; Lerner and Lomi 2017), models based on marked point-processes (Amati et al. 2018), and actor-oriented REMs (Stadtfeld and Block 2017). In general, relational event models (Butts 2008) specify a likelihood for sequences of relational events E = (e1, . . . , eN ), where each event ei has the form ei = (ui, vi, ti) . 3 In the notation above ti is the time of the event, ui ∈ Uti is the source, sender, or initiator of the event, taken from a set Uti of possible source nodes at the event time, and vi ∈ Vti is the target, receiver, or addressee of the event, taken from a set Vti of possible target nodes at the event time. For each time point t the risk set Rt ⊆ Ut × Vt is the set of dyads on which an event could potentially happen at t. In particular, it holds that (ui, vi) ∈ Rti. (Note that Butts (2008) denoted by "support set" what we call "risk set"; we adopt the latter term, using the symbol R, since it is commonly applied in survival analysis.) For a time point t, the network of past events G[E; t] is a function of events that happened strictly before t (and potentially of exogenous covariates). The network of past events shapes the distribution of events at t as we explain in greater detail and in the specific empirical setting of this paper in Sect. 3.3. For a time point t and a dyad (u, v) ∈ Rt let T denote the random variable of the time of the next event on (u, v), that is the first event e = (u(cid:48), v(cid:48), t(cid:48)) with u(cid:48) = u, v(cid:48) = v and t(cid:48) ≥ t. The hazard rate (also intensity or event rate) on (u, v) at t is defined by λ(u, v, t) = lim ∆t→0 P rob(t ≤ T ≤ t + ∆t t ≤ T ) ∆t . Under rather weak assumptions, the hazard rate λ(u, v, t) can be interpreted as the expected number of events in the dyad (u, v) in a time interval of length one (Lawless 2003). In empirical studies one is typically interested in factors that tend to increase or decrease the dyadic event rate. In the Cox proportional hazard model (Cox 1972) -- corresponding to the REM with ordinal times in Butts (2008) -- the hazard is specified, conditional on the network of past events G[E; t] and dependent on parameters θ ∈ Rk as (1) (2) λ(u, v, t, G[E; t]; θ) = λ0(t) · λ1(u, v, t, G[E; t]; θ) , where λ1(u, v, t, G[E; t]; θ) = exp θ(cid:96) · s(cid:96)(u, v, G[E; t]) . (cid:33) (cid:32) k(cid:88) (cid:96)=1 In the equation above, λ0 is a time-varying baseline hazard function for all dyads in the risk set and the relative event rate λ1(u, v, t, G[E; t]; θ) -- a function of parameters θ(cid:96) and sufficient statistics s(cid:96)(u, v, G[E; t]) -- is proportional to the probability that an event at t happens on (u, v), rather than on any other dyad in the risk set. In the Cox proportional hazard model the partial likelihood based on the observed event sequence E is (cid:89) ei∈E (cid:80) L(θ) = λ1(ui, vi, ti, G[E; ti]; θ) uv∈Rti λ1(u, v, ti, G[E; ti]; θ) , (3) and parameters θ are estimated to maximize L. 2.2 Case-control sampling The problem in maximizing the likelihood is the runtime for evaluating the denominator in each of the factors of Eq. (3). In our empirical case, the risk set at the end of the observation period has more then 30 trillion elements. Thus, we cannot even evaluate the term for the single last event -- much less the terms for all 360 million events. A possible solution has been suggested by Vu et al. (2015) who applied case-control sampling (Borgan et al. 1995). In case-control sampling one analyzes all "cases" (dyads experiencing an event at the given point in time) but only a small random subset of the "controls" (dyads in the risk set not experiencing an event at the given point in time). (In this paper we will also speak of "events" instead of "cases" and of "non-events" instead of "controls".) Let ei = (ui, vi, ti) be the i'th event in E and let m be a positive integer, giving the number of controls per event. In the sampled likelihood the term Rti in the denominator of Eq. (3) is replaced by SRi(m) ⊆ Rti which is drawn uniformly at random from {s ⊆ Rti : (ui, vi) ∈ s ∧ s = m + 1} . 4 sampled events (u1, v1, t1) (u2, v2, t2) (u3, v3, t3) (u4, v4, t4) (u5, v5, t5) (u6, v6, t6) (u7, v7, t7) (u8, v8, t8) (u9, v9, t9) . . . risk sets at sampled event times   Rt1 = Rt4 = . . .   m dyads (controls) are sampled for each sampled event Figure 1: Schematic illustration of sampling. Observed events (left-most column) are sampled independently with probability p; sampled observed events are indicated by black squares. For each sampled event ei, we sample m dyads (controls) from the risk set Rti; sampled controls are indicated by grey squares. Note that all observed events happening before time t (not just the sampled events) are used to maintain the network of past events G[E; t] and, thus, to compute the sufficient statistics s(cid:96) in the specification of the event rate λ1 in Eq. (2). From another point of view, the set SRi(m) contains the dyad (ui, vi), that is the one in which event ei happens, and additional m elements (the "controls"), different from (ui, vi), randomly drawn from Rti without replacement. For a given sequence of sampled case-control sets SR(m) = (SR1(m), . . . , SRN (m)), the sampled likelihood is defined by L[SR(m)](θ) = λ1(ui, vi, ti, G[E; ti]; θ) uv∈SRi(m) λ1(u, v, ti, G[E; ti]; θ) . (4) (cid:89) ei∈E (cid:80) The procedure to sample from the risk set described above differs in several aspects from Markov chain Monte Carlo (MCMC) sampling as it is typically employed in the estimation of exponential random graph models (ERGM) (Hunter et al. 2008). One of the most crucial differences is that the risk set of a relational event model grows linearly in the number of dyads (that is, quadratic in the number of nodes), while the space of an ERGM grows exponentially in the number of dyads. 2.3 Sampling observed events Another sampling strategy that we consider in this paper additionally to case-control sampling involves uniform sampling from the set of observed events. Concretely, for a real number p with 0 < p ≤ 1, let SE(p) ⊆ E be a random subset of observed events, obtained by including each e ∈ E independently at random with probability p. Additionally, let SR(m) be a sequence of sampled case-control sets as described above. The sampled likelihood is given by: L[SR(m),SE(p)](θ) = λ1(ui, vi, ti, G[E; ti]; θ) ei∈SE(p) uv∈SRi(m) λ1(u, v, ti, G[E; ti]; θ) , (5) (cid:89) (cid:80) and parameters θ are estimated to maximize the sampled likelihood L[SR(m),SE(p)](θ). Both sampling schemes, case-control sampling and uniform sampling from the observed events, are illustrated in Fig. 1. We emphasize that the networks of past events G[E; ti] in Eq. (5) are functions of all events in E that happen before ti, not just functions of the sampled events in SE(p). Thus, for a given dyad (u, v) the explanatory variables (sufficient statistics) s(cid:96)(u, v, G[E, t]) from Eq. (2) are computed correctly. This points 5 to a crucial difference to the approach that analyzes sub-networks as discussed in the introduction. Moreover, it points to a crucial difference to situations where events are missing (rather than left out due to sampling); obviously, missing events cannot be used to compute statistics. Using the sampled likelihood for estimation of model parameters introduces another source of uncertainty: if we repeated the sampling of events and controls, we obtained a different sampled likelihood and thus, probably, also different parameter estimates. In our experiments, which are explained in detail in Sect. 3.5, we want to determine how the variation in the model parameters θ introduced by sampling depends on the sampling parameters p (the probability to sample an observed event) and m (the number of sampled controls per sampled event). In this paper we call p and m the sample parameters and θ the model parameters -- unless it is clear from context which set of parameters is meant. 2.4 Asymptotic properties An attractive property of case-control sampling in the Cox proportional hazard model is that it yields an estimator which is consistent and asymptotically normal (Borgan et al. 1995). This is a non-trivial result since case-control sampling is a sampling strategy that actually manipulates the ratio of events to non-events. These asymptotic properties are reassuring -- but they do not diminish the relevance of the experimental approach of this paper. In our experiments we assess the variation in the parameters caused by sampling for different sample sizes. The experimental results we present suggest that for some of the most common network effects typically included in empirical model specifications (Lomi et al. 2014), variation caused by sampling is much larger than the estimated standard errors of model parameters, even for relatively large sample sizes. It seems difficult to determine the sufficient sample size by purely theoretical considerations based on asymptotic properties -- which is why we consider experimental evaluation as necessary. 3 Experiments 3.1 Empirical setting: Network analysis of collaboration in Wikipedia Wikipedia is a prime example of a self-organizing online production community in which voluntary users invest personal time and effort to provide a public good (Lerner and Tirole 2001; Lerner and Lomi 2017). The most crucial resources that articles need to garner in order to attain a high level of quality are the attention and contribution of users (Lerner and Lomi 2018b). This observation motivates a study of the factors that induce particular users to contribute more or less to particular articles. The network of relational events that we consider in this paper includes all events in which any registered user contributes to any article in the English-language edition of Wikipedia. The estimated model reveals basic network effects that explain dyadic contribution rates on all user-article pairs. Previous work analyzing user contributions in Wikipedia mostly aggregates edits over users, articles, or time. For instance, Moat et al. (2013) analyze patterns in the dynamics of edits received by articles -- but do not model dyadic event rates, nor do they analyze network effects explaining edit frequencies. Yasseri et al. (2012) analyze periodic patterns in the global edit activity in different language editions of Wikipedia. Keegan et al. (2012) fit exponential random graph models to the two-mode network connecting Wikipedia users to "breaking-news articles". This model framework, however, requires to aggregate relational events per dyad over time. Surprisingly -- considering that Wikipedia contribution data are naturally provided as time-stamped relational events -- studies analyzing Wikipedia collaboration networks as relational event systems are still relatively infrequent. Perhaps this is due to the lack of methods that are able to estimate REM for large event networks. Lerner and Lomi (2017, 2018a, 2019b) propose and estimate REMs for the edit networks of single articles. Their model does not explain user activity rates but rather specifies dyadic probabilities to undo or redo contributions of other target users, given that a source user becomes active on the focal article. Previous work that seems to be the closest to this paper is a recent article of Lerner and Lomi (2019a) which 6 analyzes a REM for edit and talk events on Wikipedia articles about migration-related topics (also discussed in the introduction). Thus, Lerner and Lomi (2019a) analyze a thematically delineated sub-network. They apply case-control sampling but do not sample from the observed events and do not experimentally vary sample sizes. Data on the Wikipedia editing network provide a particularly valuable setting to perform the experiments that we propose in this paper because of their size, accuracy and complexity, and because of the substantive interest in Wikipedia as one of the largest and most successful examples of peer production projects (Jan Piskorski and Gorbatai 2017; Greenstein and Zhu 2012). 3.2 Data The event network that we consider in this paper is given by the sequence of relational events in which any registered and logged-in Wikipedia user uploads a new version of any article in the English-language edition of Wikipedia in the time period from January 15th 2001 (the launch of Wikipedia) to January 1st, 2018 (the time of data collection). For a point in time t we define Ut to be the set of all users who edited at least one article at or before t and we define At to be the set of all articles that received at least one edit at or before t. The risk set at time t is defined to be the full Cartesian product of users and articles Rt = Ut × At. It is possible to define the risk set in more sophisticated ways: users or articles could enter or leave the risk set as a function of events, due to extended periods of inactivity, or due to exogenously given entry-times or exit times. Such more complex risk set dynamics, however, are not considered in this paper. (We performed robustness checks by letting users and articles drop out of the risk set due to extended periods of inactivity; results were not affected in any meaningful way.) Wikipedia makes its complete database available for public use.1 All edit events can conveniently be extracted from the files enwiki-<date>-stub-meta-history.xml.gz which contain meta-information (in- cluding user, article, and time) of every edit but not the text of the different versions (which we do not need for the analysis in this paper). The time of edits in the Wikipedia data is accurate to the second. The Cox proportional hazard model does not make use of the precise timing of events. The given timestamps of events are used to determine the decay of past events, as explained in Sect. 3.3, and the order of events, but have no further influence on the model. In the given data several events can occur in the same second of time. We nevertheless imposed a strict order on all events. If two events happen simultaneously, then the order in which they appear in the input file was taken as the given order. Two non-simultaneous events are ordered by their timestamps. We believe that the decision to enforce a strict order has no significant impact on the results (actually it is very unlikely to select two simultaneous events in the same sample of events). The data consists of 361, 769, 741 dyadic events of the form e = (u, a, t) indicating that user u ∈ Ut edits article a ∈ At at time t. At the end of the observation period Ut contains 6, 701, 379 users and At contains 5, 542, 465 articles. Thus, at the end of the observation period the risk set contains 6, 701, 379 · 5, 542, 465 ≈ 3.714 · 1013 (approximately 37 trillion) user-article pairs. For reproducibility and for facilitating similar research, the preprocessed data is available at https://doi.org/10.5281/zenodo.1626323. 3.3 Model We specify the relative event rates λ1(u, v, t, G[E; t]; θ) on all user-article pairs (u, a) ∈ Rt at time t as a In doing so, we weight events that function of past events that happened strictly before t, see Eq. (2). happened further in the past weaker than events that happened more recently. More precisely, following the model proposed in Brandes et al. (2009), we define the network of past events G[E; t] at time t as the weighted two-mode network with node sets Ut and At where the weight w(u, a, t) on any (u, a) ∈ Ut × At is a function of past events happening in (u, a) before t, that is, the weight is a function of the events Euat = {(u(cid:48), v(cid:48), t(cid:48)) ∈ E : u(cid:48) = u ∧ a(cid:48) = a ∧ t(cid:48) < t} 1https://dumps.wikimedia.org/ 7 given by the formula (cid:88) (u,v,t(cid:48))∈Euat exp (cid:18) −(t − t(cid:48)) · ln(2) T1/2 (cid:19) w(u, a, t) = (6) for a given halflife T1/2 > 0. We set T1/2 to 30 days so that an event counts as (close to) one in the very next instant of time, it counts as 1/2 one month later, it counts as 1/4 two months after the event, and so on. To reduce memory consumption needed to store the network of past events, we set a dyadic weight to zero if its value drops below 0.01. If a single event occurred in some dyad this would happen after 6.64 · T1/2, that is after more than half a year. The weight w(u, a, t) can be interpreted as the recent event intensity in the dyad (u, a) before t. Edges in the network of past events are implicitly defined to be all dyads with non-zero weights. As a robustness check we repeated some of our analyses in a model without any decay (not reported in this paper); in general, findings did not change in any meaningful way. Following Lerner and Lomi (2019a), the event rate λ1(u, v, t, G[E; t]; θ), see Eq. (2), is specified using the following five sufficient statistics. repetition(u, a, G[E; t]) = w(u, a, t) popularity(u, a, G[E; t]) = activity(u, a, G[E; t]) = f our.cycle(u, a, G[E; t]) = (cid:88) (cid:88) (cid:88) a(cid:48)∈At u(cid:48)∈Ut w(u(cid:48), a, t) w(u, a(cid:48), t) (cid:88) (7) (8) (9) (10) (11) assortativity(u, a, G[E; t]) = popularity(u, a, G[E; t]) · activity(u, a, G[E; t]) u(cid:48)∈Ut\{u} a(cid:48)∈At\{a} min[w(u, a(cid:48), t), w(u(cid:48), a(cid:48), t), w(u(cid:48), a, t)] The statistic repetition(u, a, G[E; t]) characterizes the recent event intensity in the same dyad (u, a). A positive parameter associated with this statistic would reveal that users are more likely to edit articles they have recently edited before. The popularity statistic aggregates the recent event intensities in all dyads with target a, that is, it gives the recent intensity by which the article a is edited. A positive parameter associated with the popularity statistic would reveal that popular articles (those, that recently received many edits by any user) are likely to receive edits (by potentially different users) at a higher rate in the future. The activity statistic aggregates the recent event intensities in all dyads with source u, that is, it gives the recent cumulative edit activity of user u. A positive parameter associated with the activity statistic would reveal that users who have recently been more active will also edit (potentially different articles) at a higher rate in the future. The four-cycle effect models local clustering. If users u and u(cid:48) recently collaborated in writting an article a(cid:48) and, in addition, user u(cid:48) recently contributed to article a, then a positive parameter associated with f our.cycle(u, a, G[E; t]) would reveal that u has a tendency to edit a at a higher rate. The assortativity statistic models the interaction between user activity and article popularity. A positive parameter would reveal that the more active users are rather drawn to editing the more popular articles while a negative assortativity parameter would reveal that the more active users are rather drawn to editing the less popular articles -- where these relations have to be understood relative to the effects of the basic variables activity and popularity. These five effects are very common in relational event modeling and are not particular to the specific setting that we examine -- except that when analyzing a one-mode network, instead of a two-mode network, we would typically include a three-cycle effect, perhaps instead of the four-cycle effect. These effects are interesting for our current study since they assume dependence of dyadic observations on previous obser- vations in varying levels of complexity. Repetition assumes that the rate of future events in (u, a) depends just on previous events in the same dyad. The popularity and activity effects assume that the rate of future events in (u, a) depends on previous events that have the same target article a (for popularity) or the same source user u (for activity). The four-cycle effect assumes that the rate of future events in (u, a) depends on previous events in a three-path of the form (u, a(cid:48)), (a(cid:48), u(cid:48)), (u(cid:48), a) for any user-article pair (u(cid:48), a(cid:48)) -- that are 8 Table 1: Correlation (above the diagonal), variance (bold, on the diagonal), and covariance (below the diagonal) of the five statistics computed from about 21 million observations obtained by aggregating 100 samples with p = 10−4 and m = 5. repetition popularity activity four.cycle assortativity 0.33 0.36 0.60 0.27 2.25 repetition popularity activity four.cycle 0.35 0.49 0.79 1.83 5.55 0.41 0.42 6.22 2.65 9.37 0.64 0.94 1.02 0.64 3.95 assortativity 0.72 0.75 0.70 0.76 29.17 different from u and a, respectively -- provided that there was at least one recent event in all three dyads (u, a(cid:48)), (u(cid:48), a(cid:48)), and (u(cid:48), a). Assortativity is an interaction effect modeling that activity of a user u has a different impact for editing popular articles than for editing less popular articles and vice versa. Considering these five effects in our study is interesting since it is plausible that the different effects need different sample sizes to be reliably estimated. Due to skewed distributions we apply the mapping x (cid:55)→ log(1 + x) to the four statistics repetition, popularity, activity, and f our.cycle. The interaction effect assortativity is defined to be the product of popularity and activity after applying this logarithmic transformation. Table 1 provides information on correlation, variance, and covariance of the five statistics computed on the aggregated observations from 100 samples with sample parameters p = 10−4 and m = 5 (see Sects. 3.5 and 4.2). All correlations are positive and moderately high. 3.4 Runtime complexity The total time for computing all explanatory variables is the computation time for maintaining the network of past events plus the time needed to compute the statistics for all sampled observations, that is for sampled events and sampled controls. Below we briefly discuss that maintenance of the network of past events has a much smaller asymptotic runtime per event than the computation of statistics per dyad. This is an important property of our approach since we use all events to maintain the network of past events but we compute statistics only on a sample of observations. The network of past events can be updated in constant time per event, so that the total cost in maintaining the network of past events is proportional to the total number of events E. This might seem surprising since the weights on all edges change due to decay whenever time increases, see Eq. (6) -- which actually happens after most input events. We achieve the linear runtime by a "lazy" strategy: we do not perform the time-decay when time increases; instead we store for each edge, additionally to its weight, the time of the last weight-update. The weight on a dyad (u, a) is only updated if either an event happens in (u, a) or if the value w(u, a, t) has to be accessed to compute statistics for (u, a) or surrounding dyads. The cost for computing the statistics varies. The values of repetition, popularity, activity, and assortativity for a given dyad at a given point in time can be computed in constant time. In order to achieve this for the degree statistics (popularity and activity) we maintain weighted in-degrees of articles and weighted out-degrees of users explicitly as functions defined on nodes in the network of past events. (The cost for maintaining these node-weights is also linear in the number of events.) The time for computing the four-cycle statistic of a dyad (u, a) is bounded by the product of the unweighted degrees (that is, the number of incident edges) of u and a. If the unweighted degrees of all nodes were equal to d, then the runtime for computing the four-cycle statistic for one dyad would be bounded by d2. In summary, it is much more costly to compute statistics for one observation than to update the network of past events as a result of one event. This is the rationale for our approach to use all events for maintaining the network of past events but only a fraction of events to compute the likelihood defined in Eq. (5). As discussed before, taking all events to update the network of past events ensures that the computed statistics for each sampled observation are correct. 9 3.5 Experimental design The general goal of the computational experiments we report in the next section, is to determine how the distributions of estimated model parameters θ -- and their associated standard errors, z-values, and significance levels -- depend on the sample parameters p and m. We first conducted a preliminary exploratory analysis to identify sample parameters p0 and m0 that are large enough to reliably assess the effects of all five statistics. It turned out that the different statistics require largely different numbers of observations to be reliably estimated (discussed in more detail in Sect. 4). We have chosen p0 and m0 such that at least the direction of all five effects, that is, whether they tend to increase or decrease the event rate, can be assessed with high confidence. After the preliminary analysis we set these initial sample parameters to p0 = 0.0001 = 10−4 and m0 = 5 resulting in approximately 36, 000 sampled events and about 5 · 36, 000 sampled controls, that is about 216, 000 sampled observations. Then we performed four types of experiments to assess how the distributions of estimated model parameters depend on the sample parameters. • (fixed p and m) We repeat the sampling one hundred times with fixed sample parameters p = p0 and m = m0. Doing so allows us to assess for each of the five effects the variation of model parameters, standard errors, and z-values caused by sampling. • (varying p for fixed m) For fixed m = m0 we vary p as in (p0/2i)i=1,...,10. That is, for i from one to ten we halve, starting from p0, the probability to sample events in each step. This results in approximately 18, 000 sampled events for i = 1 and only about 35 sampled events for i = 10. The number of sampled controls is five times the number of sampled events, so that the number of sampled observations ranges from 108, 000 to 211. For each i = 1, . . . , 10 we repeat the sampling ten times to assess the distribution of estimated model parameters for the five effects. In this type of experiment we assess which sample sizes are sufficient to reliably estimate parameters for the various effects. • (varying m for fixed p) For fixed p = p0/10 = 10−5 we vary m as in the sequence (2i)i=0,...,7. This results in one control per event for i = 0 and 128 controls per event for i = 7. The expected number of sampled events is fixed to about 3, 600 so that the number of sampled observations ranges from 7, 200 (for i = 0) to 464, 400 (for i = 7). Thus, for i = 7 we sample more than twice as many observations as for the initial sample parameters p0 and m0 -- but the sampled observations contain much fewer events and a much higher ratio of controls per event. For each i = 0, . . . , 7 we repeat the sampling ten times. In this type of experiment we assess the benefit of using more controls per event for a given limited number of events. • (varying p and m for a fixed budget of observations) Similar to the experiment type above, we vary m as in the sequence (2i)i=1,...,8. However, in this type of experiment we let p change as a function of m to fix the number of sampled observations to that determined by p0 and m0. More precisely, for i = 1, . . . , 8 we set m = 2i and p = 6 · 10−4/(2i + 1). The expected number of sampled observations is, thus, fixed at about 216, 000. The number of controls per event ranges from 2 to 256 and the expected number of sampled events ranges from about 72, 000 (for i = 1) to about 840 (for i = 8). For each i = 1, . . . , 8 we repeat the sampling ten times. In this type of experiment we assume that we have a given budget of observations (for instance, constrained by runtime considerations) and assess whether it is preferable to include more events (and fewer controls per event), or the other way round, or if there is an optimal intermediate number of controls per event. After conducting these experiments and analyzing the results we perform additional analyses to identify reasons why the estimation of the model parameter for the repetition effect needs so many more observations than for the other effects. 4 Results In Sect. 4.1 we present and discuss estimated parameters on a single sample obtained with p = p0 and m = m0. Sections 4.2 to 4.5 present and discuss results of the four types of experiments described above. 10 Table 2: Estimated parameters and standard errors (in brackets) on a single sample obtained with p0 = 0.0001 and m0 = 5. All parameters are significantly different from zero at the 0.1% level. repetition 12.348 (0.999) popularity 1.244 (0.035) activity 1.445 (0.030) four.cycle 0.659 (0.089) assortativity −0.120 (0.024) 5,607.475 AIC Num. events 36,114 216,684 Num. obs. Section 4.6 conducts additional analyses to clarify findings about the repetition effect. 4.1 Model estimation on a single sample Table 2 reports estimated model parameters and standard errors of a single sample obtained with the initial sample parameters p0 = 10−4 and m0 = 5 resulting in about 36, 000 events and 216, 000 observations. All parameters are significantly different from zero at the 0.1% level, point in the expected direction, and are consistent with results reported in previous studies based on a much smaller sub-network (Lerner and Lomi 2019a). The parameter associated with repetition is positive indicating that a user u typically is more likely to edit an article if she has recently edited it before. We find a positive popularity effect: articles that recently received more edits from any user are likely to be edited at a higher rate by potentially different users. Considering that contributions by users are a crucial resource for articles (Lerner and Lomi 2018b), this "rich-get-richer" effect (Barab´asi and Albert 1999) might actually have adverse implications for the development and quality of Wikipedia. Indeed, if contributing users tend to crowd together on a few popular articles, other articles are in danger of being neglected. We also find a positive activity effect: users that recently contributed more frequently to any article are likely to edit potentially different articles at a higher rate. The positive parameter of the four-cycle effect points to local clustering, where the clusters might be interpreted as latent topics of articles, or interests of users, respectively. If the interpretation via user interests and article topics applies, the four-cycle effect can be understood as follows. If two users u and u(cid:48) recently co-edited an article a(cid:48), then they are likely to have similar interests. If, additionally u(cid:48) recently edited another article a, then a and a(cid:48) are likely to involve similar topics. In turn user u is also likely to edit article a at a higher rate. Assortativity, that is the interaction effect between the activity of users and the popularity of articles, is found to be negative. Thus, while users in general have the tendency to edit already popular articles, this behavior is less pronounced for the more active users. Thus, the more active users seem to dedicate a bigger share of their work (than the less active users) to the less popular articles. In the light of the discussion about the popularity effect above, this negative assortativity might be very important for Wikipedia, since it gives an indication that the more active users might be the ones who start editing less popular articles -- which would otherwise be in danger of being neglected. Having established the consistency of the results with prior studies (Lerner and Lomi 2019a), and the contextual interpretability of the empirical estimates, we focus in the next sections on the variation in the estimates associated with different sample parameters. 4.2 Variation caused by sampling (fixed sample parameters) Table 3 reports summary statistics of estimated parameters, standard errors, and z-values for the five effects over these 100 samples. The boxplots in Fig. 2 display the summary statistics for the estimated parameters. It is encouraging that all estimations over 100 samples confirm the qualitative findings from Table 2. The parameters for the repetition, popularity, activity, and four-cycle effects are positive in all 100 samples 11 Table 3: Summary statistics (minimum, first quartile, median, mean, third quartile, maximum, and standard deviation) of parameters (par ), standard errors (se), and z-values (z ) for the five effects repetition (rep), popularity (pop), activity (act), four.cycle (4cy), and assortativity (asr ) over 100 samples with p = 0.0001 and m = 5. Bold-font highlights the standard deviation of the parameters and the mean of the standard errors. min 1st qu median mean 3rd qu max 9.38 0.61 3.44 1.20 0.04 32.99 1.39 0.03 44.83 0.47 0.08 5.37 -0.25 0.02 -9.53 sd 86.73 27.00 6.40 18.18 3.53 15.33 1.39 0.04 0.00 0.04 0.78 36.73 0.04 1.57 0.03 0.00 1.00 50.08 0.15 1.24 0.01 0.12 1.07 10.38 -0.10 0.03 0.00 0.03 -3.57 1.39 66.38 14.49 11.07 1.32 0.04 35.63 1.52 0.03 48.14 0.87 0.10 8.54 -0.14 0.03 -5.37 19.25 2.91 7.08 1.29 0.04 35.16 1.50 0.03 47.54 0.79 0.10 7.94 -0.16 0.03 -6.36 34.86 6.42 8.16 1.29 0.04 35.17 1.49 0.03 47.40 0.79 0.10 7.94 -0.16 0.03 -6.36 effect rep rep rep pop pop pop act act act 4cy 4cy 4cy asr asr asr par se z par se z par se z par se z par se z 13.40 1.30 5.02 1.27 0.04 34.71 1.47 0.03 46.66 0.68 0.09 7.17 -0.18 0.02 -7.37 Figure 2: Boxplots (different y-axes) of parameter estimates for the five effects over 100 samples with p = 0.0001 and m = 5. 12 20406080repetition1.201.30popularity1.401.50activity0.61.0four cycle−0.25−0.15assortativity and the parameters for the assortativity effect are negative in all samples. These findings are also highly significant in all samples. The minimum absolute value of a z-value (that is, the parameter divided by its standard error) over all 100 samples and all five effects is 3.44 (for repetition) -- still pointing to an effect that is significant at the 0.1% level. Thus, the conclusions about the effects in the Wikipedia collaboration network could have been obtained by analyzing any of the 100 samples and coincide with the effects discussed in Sect. 4.1. Differences in the reliability of estimates for the different effects, however, become apparent once we focus on the size of parameters. Variability of parameters over the different samples shown in Table 3 (also compare Fig. 2) varies between effects. The parameters for the popularity and activity effects -- and to a lesser extent for four-cycle and assortativity -- show relatively small variations as do their associated standard errors and z-values. For instance, for the popularity effect the interquartile range of parameters is [1.27, 1.32] and the minimum and maximum parameters over 100 samples span the interval [1.20, 1.39]. Thus, had we analyzed just one of the samples, then with 50% probability we would have obtained a parameter value from the interval [1.27, 1.32], with 25% probability a value from [1.20, 1.27], and with 25% probability a value from [1.32, 1.39]. Conclusions drawn from any of these results would hardly vary in a remarkable way. Parameters for the activity effect show about the same variability and the variability of the parameters for the assortativity and four-cycle effects are somewhat higher but would still not affect conclusions in any meaningful way. By far the highest variation can be found for the repetition effect where parameters range from 9.38 to 86.73 with an interquartile range of [13.40, 66.38]. We also find that the mean over the repetition parameter is considerably higher than the median pointing to a right-skewed distribution (also compare Fig. 2). Standard errors and z-values for the repetition effect also show high variations. Thus, while the qualitative finding of a significantly positive repetition effect does not depend on the specific sample, the magnitude of the parameter strongly varies over samples, at least for the given sample parameters p0 and m0. We will tackle in Sect. 4.6 why exactly the repetition effect displays such a different behavior. A further insight that we can draw from Table 3 is that for those effects that have a low variation over samples (that is, popularity, activity, assortativity, and to a lesser extent the four-cycle effect) the standard deviation2 of the model parameters over samples and the mean standard errors of the model parameters are quite similar. For these four effects, variation of standard errors is also rather small. Together, these findings seem to suggest that, if variation over samples is small, then the standard deviation of parameters caused by sampling can be approximated by the typical standard error -- a result that is consistent with asymptotic properties. This is a convenient result since standard errors can be estimated from a single sample. However, checking the relation between standard deviation of parameters over samples and mean standard error for the repetition effect, we find a much larger difference. The standard deviation of the repetition parameter over the 100 samples is 27.00 -- much higher than the mean standard error (6.42), or the median standard error (2.91), and even higher than the maximum standard error over all 100 samples (18.18). Thus, judging variation in model parameters caused by sampling from the standard error of a single sample would be a poor approximation for the repetition effect. 4.3 Varying the number of events In a second family of experiments we fix the number of controls per event to m = 5 and let the probability p to sample from events vary from about 10−7 to 0.5· 10−4 where we double p in each step (compare Sect. 3.5). For each of these values of p we draw ten samples. Model parameters for the five effects estimated for the different sample parameter settings are displayed in Figure 3; summary statistics of estimated parameters, standard errors, and z-values for the five effects are in the Appendix in Tables 5 to 9. Typically, variability of parameters decreases when the number of sampled events increases -- as it could have been expected. An exception to this rule is the repetition effect which we discuss last. For the popularity effect (see Table 6) we find that only the two smallest sample sizes give unreliable (but also insignificant) results. We never estimated a parameter that is significantly negative at the 5% level 2In the whole paper, standard deviation refers to the unbiased estimator of the sample standard deviation, where we divide the sum of squared differences to the mean by the number of values minus one. 13 Figure 3: Boxplots of parameter estimates over 10 samples with varying p (as given in the x-axis) and m = 5. We discard boxplots if their dispersion causes a scaling of the y-axis that would make the less dispersed boxplots unreadable. (All results are given in the Appendix in Tables 5 to 9.) 14 0.977E−70.195E−60.391E−60.781E−60.156E−50.313E−50.625E−50.125E−40.25E−40.5E−4050100repetition0.391E−60.781E−60.156E−50.313E−50.625E−50.125E−40.25E−40.5E−40.81.01.21.41.61.82.0article popularity0.156E−50.313E−50.625E−50.125E−40.25E−40.5E−41.52.02.5user activity0.313E−50.625E−50.125E−40.25E−40.5E−412345four cycle0.313E−50.625E−50.125E−40.25E−40.5E−4−0.4−0.3−0.2−0.10.00.10.2assortativity (corresponding to a z-value that is at least 1.96 in absolute value). For values of p = 0.391 · 10−6 -- which corresponds to as little as 140 events (and five times as many controls) -- or higher we estimate only positive parameters, although not all estimates are significant. For values of p = 0.156 · 10−5 -- which corresponds to 561 events -- or higher we estimate only parameters for the popularity effect which are significantly positive at the 5% level. The mean of estimated standard errors for p = 0.156 · 10−5 is already approximately equal to the standard deviation of parameters over the different samples. For higher values of p they become even closer and both tend to zero. In summary, to reliably estimate the parameter of the popularity effect a few hundred events already seem to be sufficient. Findings for the activity effect (see Table 7) are similar to those of popularity. All estimated parameters for user activity are positive (though not always significant), even for the smallest sample comprising about 35 events. All parameters are significantly positive at the 5%-level, starting from p = 0.781 · 10−6 resulting in about 281 events and five times as many controls. The standard deviation of estimated parameters is close to the mean of the standard errors for all but the two smallest sample sizes and tends to zero when the sample size increases. Reliable estimation of the parameter for the four-cycle effect (see Table 8) requires more observations than for the degree effects popularity and activity. For a sample probability ranging from p = 0.977· 10−7 to p = 0.156 · 10−5 (corresponding to about 35 to 561 events) some of the estimated four-cycle parameters are negative (in contrast to the more reliable finding reported in Table 2) -- although the negative parameters are never significant at the 5%-level. Starting from p = 0.313 · 10−5 all estimates are positive and for p = 0.25·10−4 (corresponding to about 9, 000 sampled events), or higher, all estimated four-cycle parameters are significantly positive. Findings for the assortativity effect (see Table 9) are similar to those for the four-cycle effect (keeping in mind that there is a negative assortativity effect according to the findings reported in Table 2). For p up to 0.313 · 10−5 we estimate some positive parameters for the assortativity effect -- which, however are never significant at the 5%-level. For p = 0.5 · 10−4 (corresponding to about 18, 000 events) all estimated assortativity parameters are significantly negative. For both effects, four-cycle and assortativity, the identity between the standard deviation of the parameters and the mean standard error is approximately valid once all parameters are significant and these values tend to zero when the sample size increases. Findings for the repetition effect (see Table 5) are different. For this effect we observe that the standard deviation of the estimated parameters (that is, the uncertainty caused by sampling) does not decrease when we increase the number of sampled events from 35 to 18,000. In contrast, the standard errors tend to decrease with increasing sample size. Together we obtain that the identity between the standard deviation of the parameters and the mean standard error does not hold for the repetition effect (at least not for this range of sample sizes). While these findings are somewhat disturbing since they imply that considerable uncertainty in the parameter sizes is caused by sampling, findings on the direction of the repetition effect seem to be quite reliable. For all but the two smallest sample sizes we only estimate positive parameters (the negative estimates are never significant) and for p = 0.5 · 10−4 all estimates are significantly positive. Thus, while there is considerable uncertainty about the size of the repetition effect, the danger of incorrectly rejecting the null hypothesis seems to be small. We further analyze why the repetition effect shows such an outlying behavior in Sect. 4.6. 4.4 Varying the number of controls per event In the next family of experiments we fix the probability to sample events to p = 10−5, corresponding to about 3, 600 sampled events, and let the number of controls per event m vary from 1 to 128 where we double m in each step (compare Sect. 3.5). Thus, for the smallest m = 1 we sample about 7, 200 observations (events plus controls) and for the largest m = 128 we sample about 464, 400 observations, which are more than twice as many observations as we analyzed in Table 2 or in each of the samples considered in Sect. 4.2, but with a much higher ratio of controls over events. For each of these values of m we draw ten samples. Model parameters for the five effects estimated for the different sample parameter settings are displayed in Figure 4; summary statistics of estimated parameters, standard errors, and z-values for the five effects are in 15 Figure 4: Boxplots of parameter estimates over 10 samples with varying m (as given in the x-axis) and p = 1.0E − 5. (All results are given in the Appendix in Tables 10 to 14.) the Appendix in Tables 10 to 14. In general, the variability of parameters decreases for all but the repetition effect when the number of sampled controls increases for a fixed number of sampled events. Similar to the findings obtained by varying the number of sampled events, for the repetition effect (see Table 10) we observe that the variability caused by sampling (that is, the standard deviation of parameter estimates) does not decrease when increasing the number of observations. On the other hand, all parameter estimates are consistently positive and all estimates are significantly positive at the 5%-level for m = 128. In contrast to the standard deviation of the parameters, the mean standard errors do decrease with growing number of observations. Thus, for higher m more and more parameters are significantly different from zero. We can observe however, that the strategy to sample more controls per event needs higher numbers of observations to achieve the same standard errors. For instance, we need more than 464, 000 observations, 3, 600 of which are events, to bring down the standard errors to about 12.9, while 18, 000 events (p = 0.5 · 10−4) together with 90, 000 controls yield a mean standard error of about 7.7 (see Table 5). This supports the rationale of case-control sampling that "the contribution of the nonfailures [controls], in terms of the statistical power of the study, will be negligible compared to that of the failures [events]" (Borgan et al. 16 124816326412820406080100repetition12481632641281.01.11.21.31.41.51.6article popularity12481632641281.21.41.61.82.02.22.42.6user activity1248163264128−0.50.00.51.01.52.0four cycle1248163264128−0.6−0.4−0.20.0assortativity 1995). In Sect. 4.5 we will analyze more systematically whether there is an optimal number of controls per event. For the popularity effect (see Table 11) we find that not only the mean standard error, but also the standard deviation of the parameters gets smaller with growing number of observations for a fixed number of events. All parameter estimates for this effect are significantly positive, for all values of m that we considered in this type of experiments. We find that increasing the number of controls for a fixed number of events seems to require more observations to bring down the standard errors -- or the standard deviation of parameters -- than when sampling more events but fewer controls per event. For instance, the setting with sample parameters p = 10−5 and m = 64 yields about 234, 000 observations and achieves about the same standard deviation of the parameters as the setting with p = 0.5·10−4 and m = 5 which yields about 108, 000 observations. Findings for the activity effect (see Table 12) are very similar to those for the popularity effect. Estimating the parameters of the four-cycle effect (see Table 13) requires more observations than for the degree effects. The setting with p = 10−5 and m = 2 is actually the only one in which we estimate a parameter that is significant at the 5%-level and that points in the opposite direction than the corresponding parameter given in Table 2. Considering that we draw and analyze in total 360 samples, it seems to be acceptable to incorrectly reject a null hypothesis once at the 5%-level. We find in Table 13 that starting from m = 16 we only estimate significantly positive four-cycle parameters. Estimated parameters for the assortativity effect (see Table 14) are in most cases negative (as in Table 2), the positive estimates are never significant, and starting from m = 64 we only estimate significantly negative parameters. 4.5 Varying the ratio of controls per event for a given budget of observations In the final set of computational experiments we explore whether, given a limited budget to allocate to observations, it is preferable to draw fewer events and more controls per events or whether more events and fewer controls yield more reliable estimates. Thus, we fix the number of observations to about 216, 000 -- the number of observations resulting from the initial sample parameters p = 10−4 and m = 5 considered in Sect. 4.2. We let the number of controls per event m vary from 2 to 256 where we double m in each step (compare Sect. 3.5). For a given m we set the probability to sample events to p = 6·10−4/(m+1) to keep the number of sampled observations constant. Thus, for the smallest m = 2 we sample about 72, 000 events and 144, 000 controls and for the largest m = 256 we sample about 840 events and about 215, 000 controls. For each of these values of m and p we draw ten samples. Model parameters for the five effects estimated for the different sample parameter settings are displayed in Figure 5; summary statistics of estimated parameters, standard errors, and z-values for the five effects are in the Appendix in Tables 15 to 19. In general, the variability of parameters increases when we sample additional controls at the expense of sampling fewer events, so that sampling more events and fewer controls seems to be the better investment. Findings for the repetition effect (see Table 15) fit into the general pattern that variability of estimates increases if the number of sampled events decreases and the number of controls increases accordingly. For this effect, a considerable jump becomes apparent when m changes from 2 over 4 to 8. For m = 2 the standard deviation of the parameters is 3.33 and the mean standard error is equal to 0.97. These numbers increase to a standard deviation of 9.09 and a mean standard error of 1.87 for m = 4 and to a standard deviation of 26.06 and a mean standard error of 13.34 for m = 8. For higher values of m, the standard deviation is consistently above 20 and the mean standard error consistently above 10. Starting from m = 64, some of the estimated parameters are no longer significant at the 5%-level, although all estimates are positive. These findings seem to suggest that increasing the ratio of events over controls, while keeping the number of observations constant, is a strategy for reliably estimating the repetition parameter. As a cautionary note we want to indicate already here that results from Sect. 4.6 suggest that this is misleading: the repetition variable is very skewed and almost all controls have the same value (equal to zero). We discuss estimation of the repetition effect in more detail in Sect. 4.6. Parameter estimates for the popularity effect (see Table 16) are almost unaffected by the ratio of controls over events for values from m = 2 to m = 32. Standard errors and standard deviation of the parameter estimates increase slightly for m = 64 and m = 128 and increase sharply for m = 256. For this last value 17 Figure 5: Boxplots of parameter estimates over 10 samples with varying m (as given in the x-axis) and varying p satisfying (m + 1) · p = 6 · 0.0001. We discard boxplots if their dispersion causes a scaling of the y-axis that would make the less dispersed boxplots unreadable. (All results are given in the Appendix in Tables 15 to 19.) 18 24816326412825620406080100repetition2481632641282560.60.81.01.21.4article popularity2481632641281.301.351.401.451.501.551.60user activity2481632641280.20.40.60.81.0four cycle248163264128−0.20−0.15−0.10−0.05assortativity Table 4: Density (i. e., proportion of observations with non-zero values) for the five statistics, reported for all observations (2nd column), restricted to events (3rd column), and restricted to controls (4th column) computed from the about 21 million observations obtained by aggregating the 100 samples with p = 10−4 and m = 5, used in Sect. 4.2. statistic repetition popularity activity four.cycle assortativity density.obs density.events density.controls 0.000006 0.748634 0.258588 0.042329 0.215737 0.084385 0.780180 0.378371 0.163034 0.332671 0.506282 0.937911 0.977290 0.766557 0.917340 we also get the first non-significant estimates, although all estimates are positive. Findings for the activity effect (see Table 17) and the four-cycle effect (see Table 18) are similar to those for the popularity effect, showing a sharp increase in variability for m = 256 -- although all estimated parameters for activity and four-cycle remain significant for the analyzed range of m. For the assortativity effect (see Table 19) we make the same observation that variability increases sharply for m = 256. Some estimates for this parameter become insignificant for m = 32 or higher, although all estimates are negative. In general, it seems to be a more useful investment to sample events, rather than controls, so that the number of controls per event is best set to a small number. For values in the range of m = 2 to m = 16 the actual value seems to make little difference. The remarkable differences between m = 2, 4, or 8 for the repetition effect rather seems to be a spurious finding, as discussed in Sect. 4.6. 4.6 Examining the repetition effect A common pattern in the results discussed above is that the estimated parameters of the repetition effect had a much higher variability across samples than those of the other effects. Disturbingly -- and in contrast to findings for the other effects in the model -- the variability of the repetition parameter does often not decrease when we increase the sample size, at least not for the ranges of sample parameters considered so far. We have also found -- again in contrast to findings for the other effects -- that the standard errors of the repetition effect are a poor approximation for the variability caused by sampling. Thus, while the direction of this effect is consistently positive, its magnitude can only be estimated with a relatively high degree of uncertainty. In this section we perform an additional analysis to find explanations why the estimated parameters of the repetition effect have such a high standard deviation, compared to the other effects. We analyze the combined 100 samples obtained with p = 10−4 and m = 5, that is, the aggregation of the samples used in Sect. 4.2. These constitute more than 21 million observations, 16.7% of which are events and 83.3% are controls. The densities, that is, the proportions of observations with non-zero values for the five statistics are reported in Table 4. We compute and report densities separately for all observations, restricted to events, and restricted to controls (i. e., dyads not experiencing an event at the given time). In short, the reason for the anomalous behavior of the repetition parameter seems to be the extremely low number of controls that have a non-zero value in the repetition statistic. The density of the repetition statistic restricted to controls is just about 6 · 10−6. In the aggregation of all 100 samples, we have about 100 controls with non-zero repetition values. Thus, each of the samples analyzed in Sect. 4.2 has on average just one control with a non-zero repetition value. The high variability of estimated repetition parameters across samples seems to be caused by the randomness of sampling none, just one, or several controls with a non-zero value in the repetition statistic. We can now also better understand the result reported in Sect. 4.5 (also see Table 15) that sampling fewer controls (while increasing the number of events accordingly) seems to bring down the variability of the repetition parameter to a relatively low value. Decreasing the number of sampled controls actually also 19 decreases the probability that the sample includes an exceptional non-event dyad with non-zero repetition variable. For low numbers of controls it becomes unlikely to sample even a single one of these exceptional controls. In such situations, the parameter estimates become only seemingly reliable, since the sample variation of the explanatory variable among the controls suddenly drops to zero. Clearly this is misleading: if our sample accidentally included one of the exceptional controls with non-zero repetition variable, then the parameter estimate would change strongly. The other four statistics are much more homogeneously distributed. The statistic with the next lowest density is the four-cycle statistic, which has a density of 0.04 among the controls. This translates to more than 760, 000 controls with a non-zero four-cycle statistic in the aggregation of all 100 samples and on average more than 7, 600 in each of the samples analyzed in Sect. 4.2. Apparently this number is sufficient to estimate parameters with low uncertainty caused by sampling. The other statistics, popularity, activity, and assortativity, are more evenly distributed than the four-cycle statistic. We discuss in Sect. 5.1 a possible way to reduce the variability of the repetition parameter. We emphasize that it is important to check the density of non-zero values -- or, more generally, the distributions of explanatory variables -- separately for events and controls. Table 4 reveals that the density of the repetition statistic over all observations (events and controls) is not exceptional. 5 Summary of results and future work In general, findings reported in this paper are encouraging. Reliably estimating relational event models on event networks with millions of nodes and hundreds of millions of events seems to be possible by sampling some tens of thousands of events and a small number of controls per event. For some of the analyzed effects -- most notably the degree effects popularity and activity -- an even smaller sample size comprising a few hundred events seems to be sufficient. In general, z-values (that is, parameters divided by their standard errors) seem to provide a reliable criterion for whether estimated parameters are significantly positive or negative. This suggests that one way to scale up REMs is by applying relatively simple and well-established sampling schemes. Thus, the direction of effects can apparently be estimated in a reliable way with relatively small sample sizes. A different task however is to assess the size of parameters with small variability. In this aspect, the repetition effect turned out to be exceptionally difficult. For those settings of the sample parameters that yield a low parameter variation caused by sampling, the standard deviation of parameters across samples is approximately equal to the mean standard errors, as suggested by asymptotic results. This is a convenient result since standard errors can be estimated from a single sample. Our results related with the repetition parameter, however, indicate that this approximate identity can not be taken for granted: the standard deviation of the repetition parameter is consistently much higher than its typical standard error. We identified the extreme sparseness of the repetition variable among the controls as a likely reason for this finding. Only six controls in a million have a non-zero value in the repetition variable. Reliable estimation seems to need more than just a few of these exceptional controls, implying that the sampled set of controls should have several millions of elements (see, however, Sect. 5.1 for a more efficient way to get reliable estimates). Due to the above findings, analysts should not just estimate parameters and standard errors for a single sample and draw their conclusions from the resulting z-values. It is definitely recommendable to check the distribution of statistics separately for sampled events and for sampled controls. It seems to be problematic if any of these distributions reveal that almost all controls, or almost all events, have the same value. Just checking the distribution of statistics over all observations (events and controls) is insufficient to detect outlying statistics -- as is the variance, covariance, or correlation of statistics computed over all observations, see Table 1. Additionally to checking empirical distributions one could also infer by theoretical arguments whether certain statistics are likely to be heavily skewed. In our concrete model we could conclude by comparing the size of the risk set (more than 30 trillion) with the number of dyadic events (about 360 million) that the repetition variable cannot be evenly distributed over the risk set. (On the other hand, it seems to be much more difficult to conclude from theoretical considerations why the four-cycle statistic has 20 a relatively high density, equal to 0.04, among the controls.) In situations in which almost all controls take a single value in some statistic, the most efficient way seems to change the sampling design as it is sketched in Sect. 5.1. If computational resources are sufficient, analysts can draw several samples with the same sample pa- rameters, fit models separately to these, and then assess the variation caused by sampling (as we do in this paper). If for computational reasons (or otherwise) repeated sampling is not possible, bootstrap sampling (Efron 1992) might be an alternative to assess variation of parameters from one given set of observations. (We experimentally applied bootstrap sampling to one single sample and found parameter variation esti- mated from bootstrapping to be very similar to the one obtained in Sect. 4.2.) However, in light of the findings discussed in Sects. 4.5 and 4.6, re-sampling (or bootstrap sampling) does not render it unnecessary to check distributions of statistics: if some statistic is extremely degenerate, even large combined sample sizes might miss the exceptional observations and would incorrectly suggest a small parameter variation. Inspecting the values of statistics separately on sampled events and sampled controls might reveal that, for instance, all sampled controls take the same value, and thus could point to near-degenerate distributions. We also analyzed the trade-off between sampling more events and fewer controls per event versus sampling fewer events and more controls per event, given a limited budget of observations. Results seem to confirm that events are more valuable than controls (Borgan et al. 1995) so that m, the number of controls per event is best kept at a small number -- provided that the number of observed events to sample from is sufficiently high. In our experiments, the actual value of m seemed to make little difference for values up to m = 16, but choosing higher values of m -- at the expense of sampling fewer events -- increased parameter variation. We fitted model parameters also after standardizing explanatory variables (these estimates are not re- ported in this paper). That is, we transformed all the statistics by subtracting their mean and dividing by their standard deviation before fitting the model. In general, standardization resulted in lower variation of the estimated model parameters; this applies especially to the repetition effect, as variation for the other effects is small anyway. However, dividing statistics by their standard deviation has a side effect when we want to compare estimations on samples with varying numbers of controls per event. Typically, controls have much smaller values in the various statistics. Thus, if we include more controls per event we typically get lower standard deviations of statistics. Due to these data characteristics, standardization of statistics resulted in parameter estimates that systematically tend to zero with higher ratio of controls per event (although standardization does not affect z-values, since standard errors are scaled with the same factor as parameters). In this paper, we leave it open whether standardization of statistics is recommendable in general. In our study we do not want to scale statistics with different factors in different samples -- for this reason we report results obtained without standardization. Yet, in other studies standardization might be appropriate to improve comparability of parameter sizes over different effects. 5.1 Improving estimation of the repetition parameter: stratified sampling Reliable estimation of the size of the repetition parameter turned out to be much more difficult than for the other effects. We have found in Sect. 4.6 that the extreme sparsity of the repetition statistic among the controls is a likely cause for this. One obvious way to bring down the sample variance of the repetition parameter is to further increase the sample size, until the samples include a sufficiently high number of controls with non-zero values. However, this approach is inefficient. A more efficient approach seems to be stratified sampling (Langholz and Borgan 1995) where we divide observations into strata -- for instance, those dyads that have zero weights, compare Sect. 3.3, and those that have non-zero weights -- and sample controls evenly from these strata. When applying stratified sampling we have to re-weight observations when estimating the Cox-proportional hazard model. Stratification typically leads to estimates with lower variation (Langholz and Borgan 1995); it has been applied to fitting REM in Vu et al. (2015). We do not consider stratified sampling in this paper, but suggest it as a strategy to estimate REM in situations with near-degenerate explanatory variables, that is, variables that are (almost) constant on the vast majority of instances, but take considerably different values on few instances. 21 5.2 Beyond the Cox proportional hazard model In this paper we considered the Cox proportional hazard model where the estimated parameters explain which statistics increase or decrease the rate of events but where the baseline hazard λ0(t), see Eq. (1), is left unspecified. This model, which corresponds to the "ordinal model" from Butts (2008), is appropriate in many situations since we are often less interested in the absolute rate of events but rather in the factors that increase or decrease the likelihood of events. In our setting, the baseline hazard λ0(t) corresponds to the rate of edit events at time t in the whole of Wikipedia, that is, independent of the active user or the target article. This global rate of events changes systematically over the lifetime of Wikipedia and also changes periodically by the day of the week and the time of the day (Yasseri et al. 2012). Thus, it seems to be even preferable to filter out these regularities in the event rate -- as it is done in the Cox proportional hazard model -- if the goal of a study is to analyze network effects explaining dyadic event rates. Yet, in other applications of relational event models analysts might be interested in the absolute event rate, or from another point of view, in the expected time to events, and not just in whether the rate on some dyads tends to be higher than on others. Relational event models that achieve this are well-known (Butts 2008) -- but applying case-control sampling to these REMs that take time information from a ratio scale, rather than an ordinal scale, brings up some additional issues. It is easy to see that manipulating the number of controls per event -- as it is done by case-control sampling -- affects at least the intercept of a parametric specification of the full hazard function. (In contrast, a Cox proportional hazard model has no intercept since an intercept would be absorbed by the baseline hazard.) An alternative for analysts interested in the absolute hazard rate would be to estimate the integrated 0 λ0(t(cid:48)) dt(cid:48), where λ0(t) is the baseline hazard from Eq. (1), in a non-parametric way -- an approach that can be combined with case-control sampling (Borgan et al. 1995). If we also sample from the observed events with probability p < 1, additionally to case-control sampling, we just have to scale the obtained baseline hazard with 1/p. baseline hazard Λ0(t) =(cid:82) t 5.3 Reproducibility Computation of explanatory variables for the experiments presented in this paper has been done with the open-source software eventnet 3 and parameter estimation has been done with the survival package4 (Th- erneau and Grambsch 2013) in the R software for statistical computing. The preprocessed list of 360 million relational events which constitutes our input data is publicly available at https://doi.org/10. 5281/zenodo.1626323. The eventnet configuration, and an R script to fit models are also available online.5 This facilitates to reproduce experiments as the ones presented in this paper -- potentially varying sample parameters, model statistics, model estimation procedure, or the empirical data used to fit the model. 6 Conclusion Relational event networks naturally result from computer-mediated communication and collaboration or automated data collection strategies that record social interaction. Networks obtained in this way are often large. Relational event models provide an appropriate statistical framework to model event networks without having to aggregate dyadic events over time intervals. Yet, studies that apply REM to large event networks are surprisingly rare. Previous work (Vu et al. 2015) proposed case-control sampling to reduce the size of the risk set which is often quadratic in the number of nodes. In this paper we systematically assess the variation in parameter estimates that have been obtained by a combination of case-control sampling and uniform sampling from the observed events. Results from this paper give an encouraging message. It seems to be possible to reliably fit relational event models to networks with millions of nodes and hundreds of millions of events by analyzing a sample 3https://github.com/juergenlerner/eventnet 4https://CRAN.R-project.org/package=survival 5https://github.com/juergenlerner/eventnet/wiki/Large-event-networks-(tutorial) 22 of some tens of thousands of events and a small number of controls per event. Some network effects, such as degree effects, seem to require even much smaller sample sizes comprising a few hundred events to be reliably estimated. We identified characteristics of the data that might cause a relatively high variability in the estimation of some effects and recommend that analysts should check distributions of explanatory variables -- separately for sampled events and controls -- to recognize such situations. Future work might experimentally assess empirical properties of different sampling strategies, including stratified sampling (Vu et al. 2015) which might be a way to overcome situations of very skewed variables. Additionally to case-control sampling and sampling observed events used for fitting the model, one might also consider sampling from the input events that define the network of past events, see Sect. 3.3. Such an approach might be a way to analyze even larger event networks -- especially if the unrestricted network of past events is too large to be kept in computer memory. In this paper we maintained the network of past events as a function of all input events without sampling, since this ensures that explanatory variables are computed correctly. Sampling from the input events would require to conduct sensitivity experiments similar to the ones presented in this paper. (We note that the scenario of using only the sampled events to build up the network of past events is equivalent to settings with missing data -- given the assumption that dyadic observations are missing completely at random. In our situation, where we have the full data available and sample only to reduce computational runtime, the assumtion of "missing completely at random" is guaranteed by design.) Last but not least, computation times of statistics could potentially be reduced by improvements in graph algorithms. For instance, in our model the computation of the four-cycle statistic has an asymptotic runtime which is by orders of magnitude larger than the runtime needed to compute the other statistics. Algorithms for more efficiently maintaining counts of four-cycles in dynamic networks exist (Eppstein et al. 2012) but do not match the usage scenario of this paper where we have many updates and need four-cycle counts only for a much smaller number of dyads. Conflicts of interest: the authors have nothing to disclose. References Amati, V., Lomi, A., and Mascia, D. (2018), "Some days are better than others: Examining time-specific variation in the structuring of interorganizational relations," Social Networks, forthcomming. Barab´asi, A.-L. and Albert, R. (1999), "Emergence of scaling in random networks," Science, 286, 509 -- 512. Borgan, Ø., Goldstein, L., and Langholz, B. (1995), "Methods for the analysis of sampled cohort data in the Cox proportional hazards model," The Annals of Statistics, 1749 -- 1778. Brandenberger, L. (2019), "Predicting Network Events to Assess Goodness of Fit of Relational Event Mod- els," Political Analysis, 1 -- 16. Brandes, U., Lerner, J., and Snijders, T. A. (2009), "Networks Evolving Step by Step: Statistical Analy- sis of Dyadic Event Data," in Proc. 2009 Intl. Conf. Advances in Social Network Analysis and Mining (ASONAM), IEEE, pp. 200 -- 205. Butts, C. T. (2008), "A relational event framework for social action," Sociological Methodology, 38, 155 -- 200. Cox, D. (1972), "Regression Models and Life-Tables," Journal of the Royal Statistical Society. Series B (Methodological), 34, 87 -- 22. Dodds, P. S., Harris, K. D., Kloumann, I. M., Bliss, C. A., and Danforth, C. M. (2011), "Temporal patterns of happiness and information in a global social network: Hedonometrics and Twitter," PloS one, 6, e26752. Efron, B. (1992), "Bootstrap methods: another look at the jackknife," in Breakthroughs in statistics, Springer, pp. 569 -- 593. 23 Eppstein, D., Goodrich, M. T., Strash, D., and Trott, L. (2012), "Extended dynamic subgraph statistics using h-index parameterized data structures," Theoretical Computer Science, 447, 44 -- 52. Foucault Welles, B., Vashevko, A., Bennett, N., and Contractor, N. (2014), "Dynamic models of communi- cation in an online friendship network," Communication Methods and Measures, 8, 223 -- 243. Golder, S. A., Wilkinson, D. M., and Huberman, B. A. (2007), "Rhythms of social interaction: Messaging within a massive online network," in Communities and technologies 2007, Springer, pp. 41 -- 66. Greenstein, S. and Zhu, F. (2012), "Is Wikipedia Biased?" American Economic Review, 102, 343 -- 48. Hunter, D., Smyth, P., Vu, D. Q., and Asuncion, A. U. (2011), "Dynamic egocentric models for citation networks," in Proceedings of the 28th International Conference on Machine Learning (ICML-11), pp. 857 -- 864. Hunter, D. R., Handcock, M. S., Butts, C. T., Goodreau, S. M., and Morris, M. (2008), "ergm: A package to fit, simulate and diagnose exponential-family models for networks," Journal of statistical software, 24, nihpa54860. Jan Piskorski, M. and Gorbatai, A. (2017), "Testing Coleman's social-norm enforcement mechanism: Evi- dence from Wikipedia," American Journal of Sociology, 122, 1183 -- 1222. Keegan, B., Gergle, D., and Contractor, N. (2012), "Do editors or articles drive collaboration? Multilevel sta- tistical network analysis of Wikipedia coauthorship," in Proc. 2012 Conf. Computer Supported Cooperative Work, ACM, pp. 427 -- 436. Langholz, B. and Borgan, Ø. (1995), "Counter-matching: a stratified nested case-control sampling method," Biometrika, 82, 69 -- 79. Lawless, J. F. (2003), Statistical Models and Methods for Lifetime Data, Wiley. Lazer, D., Pentland, A., Adamic, L., Aral, S., Barab´asi, A.-L., Brewer, D., Christakis, N., Contractor, N., Fowler, J., Gutmann, M., Jebara, T., King, G., Macy, M., Roy, D., and Van Alstyne, M. (2009), "Computational Social Science," Science, 323, 721 -- 723. Leenders, R. T. A., Contractor, N. S., and DeChurch, L. A. (2016), "Once upon a time: Understanding team processes as relational event networks," Organizational Psychology Review, 6, 92 -- 115. Leifeld, P. (2016), "Discourse Network Analysis: Policy Debates as Dynamic Networks," in The Oxford Handbook of Political Networks, eds. Victor, J. N., Montgomery, A. H., and Lubell, M., Oxford University Press. Lerner, J., Bussmann, M., Snijders, T. A., and Brandes, U. (2013), "Modeling Frequency and Type of Interaction in Event Networks," Corvinus Journal of Sociology and Social Policy, 4, 3 -- 32. Lerner, J. and Lomi, A. (2017), "The Third Man: Hierarchy Formation in Wikipedia," Applied Network Science, 2, 24. Lerner, J. and Lomi, A. (2018a), "The free encyclopedia that anyone can dispute: an analysis of the micro- structural dynamics of positive and negative relations in the production of contentious Wikipedia articles," Social Networks, forthcoming https://doi.org/10.1016/j.socnet.2018.12.003. Lerner, J. and Lomi, A. (2018b), "Knowledge categorization affects popularity and quality of Wikipedia articles," PloS one, 13, e0190674. Lerner, J. and Lomi, A. (2019a), "Let's Talk About Refugees: Network Effects Drive Contributor Attention to Wikipedia Articles About Migration-Related Topics," in Proc. Complex Networks and Their Applications VII, Springer International Publishing, pp. 211 -- 222. 24 Lerner, J. and Lomi, A. (2019b), "The Network Structure of Successful Collaboration in Wikipedia," in Proc. 52nd Hawaii Intl. Conf. System Sciences (HICSS 2019), IEEE Computer Society, pp. 2622 -- 2631. Lerner, J. and Tirole, J. (2001), "The open source movement: Key research questions," European economic review, 45, 819 -- 826. Lomi, A., Mascia, D., Vu, D. Q., Pallotti, F., Conaldi, G., and Iwashyna, T. J. (2014), "Quality of care and interhospital collaboration: a study of patient transfers in Italy," Medical care, 52, 407. Moat, H. S., Curme, C., Avakian, A., Kenett, D. Y., Stanley, H. E., and Preis, T. (2013), "Quantifying Wikipedia usage patterns before stock market moves," Scientific reports, 3, 1801. Monge, P. R. and Contractor, N. S. (2003), Theories of Communication Networks, Oxford University Press, USA. Newman, M. E. (2006), "Modularity and community structure in networks," Proceedings of the national academy of sciences, 103, 8577 -- 8582. Pallotti, F. and Lomi, A. (2011), "Network influence and organizational performance: The effects of tie strength and structural equivalence," European Management Journal, 29, 389 -- 403. Perry, P. O. and Wolfe, P. J. (2013), "Point process modelling for directed interaction networks," Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75, 821 -- 849. Simon, H. A. (1977), "Aggregation of variables in dynamic systems," in Models of Discovery, Springer, pp. 183 -- 213. Simon, H. A. (1996), The architecture of complexity, Cambridge, MA: MIT Press. Stadtfeld, C. and Block, P. (2017), "Interactions, actors, and time: Dynamic network actor models for relational events," Sociological Science, 4, 318 -- 352. Therneau, T. M. and Grambsch, P. M. (2013), Modeling survival data: extending the Cox model, Springer Science & Business Media. Vu, D., Lomi, A., Mascia, D., and Pallotti, F. (2017), "Relational event models for longitudinal network data with an application to interhospital patient transfers," Statistics in medicine, 36, 2265 -- 2287. Vu, D., Pattison, P., and Robins, G. (2015), "Relational event models for social learning in MOOCs," Social Networks, 43, 121 -- 135. Yasseri, T., Sumi, R., and Kert´esz, J. (2012), "Circadian patterns of Wikipedia editorial activity: A demo- graphic analysis," PloS one, 7, e30091. A Detailed results: distributions of parameters, standard errors, and z-values 25 Table 5: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition effect over 10 samples with m = 5 and varying p (as given in the first column). se z se z se z se z p 0.977E-7 par 0.977E-7 0.977E-7 0.195E-6 par 0.195E-6 0.195E-6 0.391E-6 par 0.391E-6 0.391E-6 0.781E-6 par 0.781E-6 0.781E-6 0.156E-5 par 0.156E-5 0.156E-5 0.313E-5 par 0.313E-5 0.313E-5 0.625E-5 par 0.625E-5 0.625E-5 0.125E-4 par 0.125E-4 0.125E-4 0.25E-4 0.25E-4 0.25E-4 0.5E-4 0.5E-4 0.5E-4 se z par se z par se z se z se z se z 1st qu median 13.81 min 2.71 -24.29 141.56 10145.18 0.00 8.73 304.21 0.00 43.76 730.62 0.01 85.47 902.81 0.01 83.03 226.98 0.08 69.45 56.15 0.50 72.90 56.08 0.75 59.24 31.15 1.00 43.75 21.93 2.06 11.75 1.37 3.58 -0.00 -1.20 101.80 -0.00 20.89 70.17 0.00 26.31 181.24 0.01 34.95 39.04 0.02 31.09 43.21 0.04 8.06 1.74 0.70 34.91 25.11 0.87 21.49 7.18 1.60 10.33 0.97 3.19 mean 13.41 0.00 49.91 7374.75 0.09 85.64 3rd qu 29.71 12967.66 12726.78 14125.86 0.00 74.09 8400.51 0.19 115.40 4732.95 10076.41 0.08 128.36 5816.34 0.12 118.24 1222.64 0.46 91.20 186.65 0.79 105.36 131.87 1.41 72.52 53.42 1.88 80.65 33.90 2.54 42.50 13.17 8.62 0.00 43.78 3534.09 0.01 106.11 2352.02 0.04 108.36 1960.73 0.04 98.40 532.09 0.15 78.68 118.55 0.65 92.39 91.67 0.98 67.53 42.43 1.39 59.93 31.14 2.44 13.30 1.92 6.98 0.19 97.35 3318.56 0.13 94.46 1232.39 0.29 78.95 355.64 0.79 83.28 88.97 1.41 67.14 51.70 1.54 59.73 26.59 2.31 31.09 7.74 6.44 max 34.48 30204.59 0.01 125.75 37400.83 0.28 143.17 10852.35 1.50 131.21 9886.83 0.69 127.19 5309.28 0.90 108.30 2534.21 2.23 110.79 145.67 4.64 96.80 111.70 2.79 88.57 34.77 2.99 85.84 23.90 10.60 sd 18.40 7990.80 0.00 45.21 11410.16 0.11 45.61 4794.37 0.46 38.30 3350.04 0.21 29.72 1659.93 0.29 22.71 767.86 0.61 31.64 48.37 1.20 17.63 29.81 0.66 23.27 9.66 0.45 29.53 9.19 2.76 26 Table 6: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity effect over 10 samples with m = 5 and varying p (as given in the first column). se z se z p 0.977E-7 par 0.977E-7 0.977E-7 0.195E-6 par 0.195E-6 0.195E-6 0.391E-6 par 0.391E-6 0.391E-6 0.781E-6 par 0.781E-6 0.781E-6 0.156E-5 par 0.156E-5 0.156E-5 0.313E-5 par 0.313E-5 0.313E-5 0.625E-5 par 0.625E-5 0.625E-5 0.125E-4 par 0.125E-4 0.125E-4 0.25E-4 0.25E-4 0.25E-4 0.5E-4 0.5E-4 0.5E-4 se z par se z par se z se z se z se z se z se z mean 12.52 min 1st qu median -3.48 11.72 0.71 -0.57 -21.66 0.73 -0.34 0.67 0.41 1.16 0.79 0.32 1.61 0.83 0.23 2.69 0.71 0.18 3.67 1.06 0.13 7.52 1.11 0.10 10.11 1.18 0.07 15.70 1.21 0.05 23.33 2.75 107.06 0.00 1.01 1.00 0.00 1.16 0.55 1.46 0.87 0.36 2.49 0.87 0.28 3.19 1.04 0.20 4.67 1.20 0.15 8.00 1.20 0.10 11.46 1.22 0.07 16.62 1.28 0.05 24.66 3rd qu 20.78 3296.22 2765.42 4865.10 0.03 7.05 948.11 1.26 1.84 1.05 2.28 1.79 0.58 3.06 1.51 0.33 4.80 1.42 0.24 5.81 1.46 0.16 9.02 1.34 0.11 12.22 1.31 0.08 17.47 1.35 0.05 25.60 0.05 0.00 1.62 5.47 46.57 2504.07 0.56 0.07 1.46 1.49 0.83 0.77 1.90 1.84 1.28 1.34 0.49 0.49 2.76 2.66 1.23 1.04 0.31 0.31 3.91 3.84 1.17 1.14 0.22 0.22 5.33 5.24 1.33 1.31 0.16 0.16 8.50 8.52 1.29 1.28 0.11 0.11 11.75 12.09 1.28 1.25 0.07 0.07 17.13 17.30 1.31 1.31 0.05 0.05 25.13 25.01 max 34.24 5552.37 0.76 65.67 22365.06 1.84 1.94 1.39 2.92 2.07 0.75 3.97 1.95 0.39 5.10 1.51 0.31 6.39 1.63 0.18 9.60 1.46 0.12 12.95 1.40 0.08 18.83 1.39 0.06 25.90 sd 11.73 2440.08 0.32 23.47 6996.94 0.85 0.43 0.35 0.59 0.51 0.14 0.64 0.45 0.05 0.91 0.27 0.04 0.86 0.18 0.01 0.71 0.11 0.01 0.92 0.07 0.00 0.88 0.06 0.00 0.80 27 Table 7: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity effect over 10 samples with m = 5 and varying p (as given in the first column). se z se z se z se z p 0.977E-7 par 0.977E-7 0.977E-7 0.195E-6 par 0.195E-6 0.195E-6 0.391E-6 par 0.391E-6 0.391E-6 0.781E-6 par 0.781E-6 0.781E-6 0.156E-5 par 0.156E-5 0.156E-5 0.313E-5 par 0.313E-5 0.313E-5 0.625E-5 par 0.625E-5 0.625E-5 0.125E-4 par 0.125E-4 0.125E-4 0.25E-4 0.25E-4 0.25E-4 0.5E-4 0.5E-4 0.5E-4 se z par se z par se z se z se z se z 0.00 3.89 mean 10.63 min 1st qu median 0.49 10.61 0.56 0.00 0.66 0.37 0.00 1.11 0.24 0.37 0.97 0.23 2.35 1.12 0.22 3.69 1.28 0.16 6.44 1.32 0.11 9.66 1.39 0.08 14.23 1.41 0.06 22.93 1.45 0.04 31.86 5.69 103.33 0.00 1.25 1.73 0.07 1.24 0.44 1.74 1.25 0.31 2.70 1.47 0.25 4.59 1.55 0.20 6.76 1.43 0.12 11.03 1.42 0.09 15.88 1.46 0.06 23.08 1.46 0.04 32.90 3rd qu 12.11 3698.22 2992.04 4814.90 0.20 14.02 414.82 1.36 2.60 1.46 2.84 2.09 0.69 4.29 1.97 0.43 5.73 1.83 0.27 7.86 1.62 0.15 12.14 1.60 0.10 16.54 1.55 0.07 23.52 1.59 0.05 34.07 0.24 7.90 12.12 1964.63 0.67 2.25 1.80 2.37 1.84 0.59 3.59 1.78 0.36 5.25 1.73 0.24 7.30 1.56 0.14 11.41 1.51 0.09 16.09 1.51 0.06 23.46 1.52 0.05 33.56 0.30 1.61 0.69 2.40 1.61 0.41 3.74 1.67 0.30 5.54 1.70 0.24 7.25 1.52 0.13 11.47 1.51 0.09 16.13 1.52 0.06 23.40 1.50 0.04 33.73 max 30.82 7721.00 1.27 24.62 15140.75 2.00 6.64 8.64 4.54 3.53 1.37 4.78 2.61 0.64 6.72 2.35 0.36 8.08 1.94 0.20 12.56 1.67 0.11 17.39 1.58 0.07 25.10 1.63 0.05 34.77 sd 8.69 2744.08 0.45 8.95 4784.95 0.81 1.69 2.63 1.11 0.81 0.40 0.92 0.46 0.14 0.96 0.31 0.06 0.62 0.21 0.03 0.92 0.10 0.01 0.91 0.06 0.00 0.62 0.07 0.00 0.91 28 Table 8: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle effect over 10 samples with m = 5 and varying p (as given in the first column). min 1st qu median 2.61 se z se z se z se z p 0.977E-7 par 0.977E-7 0.977E-7 0.195E-6 par 0.195E-6 0.195E-6 0.391E-6 par 0.391E-6 0.391E-6 0.781E-6 par 0.781E-6 0.781E-6 0.156E-5 par 0.156E-5 0.156E-5 0.313E-5 par 0.313E-5 0.313E-5 0.625E-5 par 0.625E-5 0.625E-5 0.125E-4 par 0.125E-4 0.125E-4 0.25E-4 0.25E-4 0.25E-4 0.5E-4 0.5E-4 0.5E-4 se z par se z par se z se z se z se z -18.92 5.81 -0.01 -28.76 0.96 -0.36 -8.50 0.76 -1.50 -1.23 0.57 -1.83 -0.39 0.42 -0.85 0.21 0.57 0.37 0.25 0.25 0.90 0.33 0.25 0.90 0.56 0.16 2.75 0.50 0.12 3.99 -3.98 526.14 -0.00 -0.04 24.15 -0.00 0.86 1.92 0.19 0.16 0.76 0.19 0.56 1.08 0.46 0.52 0.70 0.80 0.69 0.36 1.95 0.74 0.27 2.45 0.66 0.20 3.76 0.67 0.13 5.11 0.00 3.74 0.09 19.84 mean 5.63 3rd qu 6.44 6998.87 5963.65 7674.41 0.04 53.04 75.29 2309.34 3626.52 0.27 4.33 13.34 0.84 4.48 3.20 1.37 2.93 1.45 1.97 3.21 1.78 1.91 1.77 0.60 2.88 1.12 0.36 2.98 1.02 0.23 4.55 0.93 0.15 5.86 0.08 8.42 40.34 0.32 2.99 2.58 0.39 2.43 1.74 1.08 1.98 1.23 1.38 1.19 0.47 2.37 0.89 0.32 2.77 0.87 0.21 4.07 0.76 0.14 5.53 0.02 2.26 4.49 0.40 0.24 1.08 0.26 1.73 1.23 1.27 1.43 0.80 1.27 1.08 0.47 2.51 0.79 0.34 2.85 0.98 0.21 4.18 0.70 0.13 5.42 max 62.52 15535.57 0.52 93.26 11803.40 0.54 70.53 343.64 1.39 15.70 10.94 2.00 8.22 6.02 2.08 4.98 2.83 2.54 2.04 0.70 3.37 1.36 0.42 3.93 1.11 0.24 5.01 1.04 0.17 7.48 sd 21.94 5562.52 0.19 42.49 4023.58 0.27 22.24 106.75 0.83 5.17 3.17 1.21 2.77 1.67 1.01 1.86 0.79 0.74 0.66 0.16 0.81 0.33 0.05 0.86 0.21 0.02 0.74 0.19 0.02 0.98 29 Table 9: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assortativity effect over 10 samples with m = 5 and varying p (as given in the first column). se z se z se z p 0.977E-7 par 0.977E-7 0.977E-7 0.195E-6 par 0.195E-6 0.195E-6 0.391E-6 par 0.391E-6 0.391E-6 0.781E-6 par 0.781E-6 0.781E-6 0.156E-5 par 0.156E-5 0.156E-5 0.313E-5 par 0.313E-5 0.313E-5 0.625E-5 par 0.625E-5 0.625E-5 0.125E-4 par 0.125E-4 0.125E-4 0.25E-4 0.25E-4 0.25E-4 0.5E-4 0.5E-4 0.5E-4 se z par se z par se z se z se z se z se z -0.00 0.50 mean -1.56 min 1st qu median -9.31 -1.81 0.91 -0.72 -13.44 0.48 -0.61 -0.91 0.16 -2.32 -1.41 0.17 -2.14 -0.65 0.16 -2.50 -0.40 0.14 -2.04 -0.41 0.08 -2.76 -0.22 0.06 -3.27 -0.27 0.04 -5.92 -0.23 0.03 -6.94 -4.00 79.70 -0.00 -1.76 7.36 -0.00 -0.37 0.53 -1.33 -0.33 0.24 -1.09 -0.32 0.21 -1.50 -0.22 0.18 -0.98 -0.26 0.10 -2.32 -0.19 0.07 -2.58 -0.19 0.05 -3.99 -0.20 0.03 -5.55 3rd qu 1.54 1588.41 1614.18 2140.75 0.00 11.23 425.53 0.36 0.92 2.48 0.44 0.36 0.68 0.91 -0.17 0.33 -0.50 0.08 0.27 0.29 -0.14 0.13 -1.37 -0.13 0.08 -1.67 -0.10 0.06 -1.75 -0.15 0.04 -4.04 -0.01 2.36 39.79 1545.68 0.14 0.41 2.14 -0.40 0.16 0.61 -0.08 -0.12 0.33 -0.75 -0.09 0.22 -0.45 -0.20 0.11 -1.66 -0.13 0.08 -1.87 -0.15 0.05 -2.99 -0.17 0.04 -4.85 0.14 0.04 0.77 0.03 0.04 0.48 0.07 -0.29 0.27 -1.02 -0.08 0.21 -0.34 -0.19 0.11 -1.51 -0.17 0.08 -2.25 -0.17 0.05 -3.46 -0.17 0.04 -4.67 max 7.66 4405.15 0.61 13.31 11377.11 0.85 2.47 10.56 0.73 2.94 1.84 1.60 1.23 0.86 1.43 0.15 0.35 0.70 0.02 0.16 0.20 0.24 0.13 1.86 0.00 0.06 0.07 -0.11 0.04 -3.14 sd 4.91 1667.14 0.32 9.20 3609.04 0.42 1.13 3.17 1.09 1.22 0.53 1.33 0.52 0.21 1.28 0.19 0.07 0.93 0.12 0.02 0.85 0.13 0.02 1.42 0.08 0.01 1.75 0.04 0.00 1.30 30 Table 10: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column). min 1st qu median 86.95 0.57 84.20 mean 3rd qu 84.80 91.64 184.99 183.31 258.16 0.78 94.86 147.94 180.60 248.64 1.07 87.87 73.77 1.60 88.18 66.96 1.67 84.24 54.28 3.06 84.03 33.39 3.67 67.03 31.18 4.68 61.24 16.69 5.29 0.73 74.08 79.83 1.34 67.11 49.18 1.78 63.85 33.71 2.60 65.04 23.94 3.80 47.24 22.68 3.31 53.03 12.90 4.68 0.50 89.39 0.52 80.18 57.82 1.03 69.01 48.82 1.36 72.21 32.96 1.89 74.40 24.73 3.07 44.10 18.18 2.65 54.74 14.40 4.30 max 101.02 311.05 0.93 109.33 485.05 1.42 94.42 291.75 3.26 99.30 87.42 5.03 105.82 60.01 5.93 98.10 44.54 8.71 79.21 64.24 6.71 95.40 26.17 7.00 sd 10.66 89.50 0.25 19.18 140.31 0.46 20.20 77.35 0.81 26.24 24.45 1.19 34.09 22.34 1.47 29.47 13.96 2.25 23.92 20.99 1.77 25.90 7.53 1.30 m par 65.46 1 se 81.66 1 z 0.24 1 par 45.70 2 32.85 se 2 z 0.21 2 par 33.99 4 24.61 se 4 z 0.32 4 par 11.93 8 se 2.37 8 z 0.94 8 par 10.45 16 se 1.76 16 z 1.36 16 par 12.30 32 1.41 se 32 z 1.92 32 par 19.85 64 3.89 se 64 64 z 1.23 128 par 16.83 128 se 2.59 3.13 128 z 76.66 104.62 0.36 75.30 76.29 0.38 68.32 46.56 0.95 55.17 35.12 1.27 37.27 17.86 1.66 60.51 18.53 2.43 25.22 4.84 2.08 31.61 6.27 3.90 31 Table 11: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column). sd 1.55 0.18 0.30 0.04 6.38 0.53 1.66 0.21 0.03 0.22 8.63 0.72 1.53 0.15 0.01 0.14 11.71 0.94 1.40 0.08 0.11 0.00 13.42 0.55 1.42 0.10 0.09 0.00 17.06 1.14 1.36 0.08 0.00 0.07 20.20 1.39 1.32 0.05 0.00 0.06 22.17 1.22 1.27 0.03 0.05 0.00 1.01 25.79 min 1st qu median mean 3rd qu max 1.03 0.18 4.87 1.02 0.13 6.55 1.10 0.11 8.92 1.12 0.10 11.51 1.13 0.08 13.43 1.08 0.06 16.15 1.15 0.06 18.19 1.16 0.05 22.16 1.35 0.23 5.80 1.29 0.17 7.69 1.31 0.12 10.50 1.28 0.10 12.56 1.26 0.08 15.13 1.20 0.07 17.82 1.25 0.06 21.19 1.24 0.05 23.72 par se z par se z par se z par se z par se z par se z par se z m 1 1 1 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 1.45 0.26 6.25 1.44 0.19 8.15 1.45 0.13 11.35 1.33 0.11 12.91 1.35 0.09 16.01 1.23 0.07 18.47 1.29 0.06 21.98 1.26 0.05 24.26 1.33 0.21 5.47 1.11 0.15 7.34 1.19 0.12 9.83 1.24 0.10 12.30 1.17 0.08 14.32 1.15 0.07 16.59 1.22 0.06 20.90 1.23 0.05 23.23 1.38 0.23 5.89 1.30 0.16 7.90 1.28 0.13 10.37 1.27 0.10 12.61 1.24 0.08 14.87 1.21 0.07 17.78 1.26 0.06 21.58 1.25 0.05 23.43 32 Table 12: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column). sd 2.64 0.37 0.46 0.08 8.28 0.78 2.18 0.27 0.04 0.26 11.92 1.09 1.84 0.16 0.01 0.14 14.58 0.61 1.66 0.11 0.10 0.01 18.58 0.58 1.62 0.08 0.07 0.00 23.36 0.56 1.43 0.04 0.00 0.05 30.51 1.19 1.42 0.03 0.00 0.04 37.14 0.84 1.38 0.02 0.03 0.00 0.74 44.34 min 1st qu median mean 3rd qu max 1.21 0.15 5.71 1.26 0.11 8.34 1.35 0.09 12.40 1.36 0.07 16.51 1.32 0.06 21.74 1.30 0.04 26.24 1.32 0.04 34.21 1.30 0.03 42.17 1.75 0.25 7.27 1.60 0.16 10.34 1.55 0.12 13.33 1.47 0.08 17.61 1.45 0.06 22.45 1.36 0.05 29.14 1.36 0.04 35.19 1.34 0.03 43.36 par se z par se z par se z par se z par se z par se z par se z m 1 1 1 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 1.84 0.26 7.77 1.66 0.17 10.89 1.64 0.12 13.67 1.56 0.09 17.92 1.49 0.07 22.80 1.39 0.05 29.75 1.38 0.04 35.40 1.35 0.03 43.91 1.59 0.21 6.84 1.44 0.13 9.88 1.43 0.11 12.93 1.40 0.08 17.40 1.39 0.06 21.98 1.34 0.05 28.87 1.35 0.04 34.63 1.32 0.03 42.68 1.68 0.24 7.32 1.54 0.15 10.31 1.54 0.12 13.25 1.43 0.08 17.56 1.44 0.06 22.36 1.36 0.05 29.11 1.36 0.04 35.03 1.34 0.03 43.62 33 Table 13: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column). sd 2.28 0.50 1.46 0.30 2.28 0.43 2.31 0.81 0.18 0.88 3.32 1.52 1.33 0.28 0.06 0.55 3.63 0.66 1.43 0.42 0.34 0.05 4.25 1.49 1.14 0.24 0.22 0.03 5.22 0.82 0.94 0.17 0.01 0.15 6.85 0.86 0.84 0.14 0.01 0.11 7.95 1.00 0.56 0.04 0.08 0.00 0.47 7.78 min 1st qu median mean 3rd qu max 0.66 0.59 0.75 -0.57 0.28 -2.03 0.56 0.31 1.57 -0.20 0.18 -1.07 0.32 0.14 2.30 0.46 0.11 3.79 0.45 0.08 5.07 0.45 0.07 6.53 1.35 0.93 1.47 0.61 0.45 1.06 0.86 0.38 2.25 0.78 0.26 2.85 0.75 0.19 3.91 0.67 0.13 5.10 0.63 0.10 6.31 0.52 0.07 7.17 par se z par se z par se z par se z par se z par se z par se z m 1 1 1 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 1.67 1.00 1.68 0.95 0.51 1.99 1.06 0.40 2.51 0.98 0.29 3.56 0.88 0.21 4.41 0.80 0.14 5.38 0.74 0.11 7.21 0.55 0.07 7.55 1.02 0.77 1.32 0.13 0.34 0.36 0.61 0.36 1.82 0.64 0.25 2.60 0.61 0.17 3.60 0.54 0.12 4.56 0.50 0.09 5.49 0.49 0.07 6.85 1.27 0.84 1.39 0.49 0.39 1.14 0.78 0.36 2.05 0.83 0.26 3.34 0.75 0.19 4.06 0.62 0.13 5.05 0.63 0.10 6.05 0.53 0.07 7.12 34 Table 14: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assorta- tivity effect over 10 samples with p = 1.0E − 5 and varying m (as given in the first column). par se z par se z par se z par se z par se z par se z par se z m 1 1 1 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z min 1st qu median mean 3rd qu max -0.67 0.14 -3.56 -0.37 0.09 -3.56 -0.30 0.08 -3.42 -0.27 0.05 -4.39 -0.19 0.05 -4.04 -0.18 0.03 -5.54 -0.21 0.02 -7.35 -0.14 0.02 -6.76 sd -0.02 0.23 0.29 0.06 -0.07 1.25 0.13 0.17 0.03 0.18 1.03 1.54 0.10 0.11 0.01 0.12 0.90 1.25 -0.07 0.07 0.08 0.01 -0.94 1.15 -0.01 0.06 0.06 0.00 -0.20 1.20 -0.03 0.06 0.00 0.04 -0.65 1.87 -0.07 0.04 0.00 0.03 -2.36 1.43 -0.07 0.02 0.02 0.00 1.17 -3.04 -0.14 0.25 -0.80 -0.01 0.12 -0.14 -0.13 0.11 -1.28 -0.09 0.07 -1.34 -0.09 0.05 -1.67 -0.08 0.04 -1.95 -0.11 0.03 -3.69 -0.09 0.02 -3.91 -0.51 0.15 -2.72 -0.25 0.10 -1.98 -0.24 0.09 -2.36 -0.21 0.06 -3.17 -0.15 0.05 -2.83 -0.17 0.03 -4.80 -0.15 0.03 -5.11 -0.12 0.02 -5.61 -0.34 0.16 -1.74 -0.16 0.11 -1.25 -0.19 0.10 -2.26 -0.16 0.07 -2.30 -0.12 0.05 -2.33 -0.15 0.04 -4.41 -0.13 0.03 -4.54 -0.10 0.02 -4.64 -0.33 0.19 -1.80 -0.13 0.12 -1.21 -0.17 0.10 -1.83 -0.16 0.07 -2.34 -0.11 0.05 -2.30 -0.12 0.04 -3.53 -0.13 0.03 -4.60 -0.10 0.02 -4.79 35 par se z par se z par se z par se z par se z par se z m 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 256 par 256 se 256 z min 1st qu median mean 3rd qu 12.34 7.83 0.48 1.15 15.46 7.06 14.32 10.61 1.52 0.67 5.06 12.53 80.75 14.64 18.95 1.63 4.92 3.58 12.42 71.88 13.31 1.24 6.10 3.98 75.97 15.91 2.46 23.24 3.81 2.80 77.97 13.17 26.28 1.39 3.91 1.78 25.74 83.31 33.59 5.26 3.53 1.34 77.15 7.13 0.58 17.94 5.13 0.74 10.79 9.36 0.97 0.61 13.16 14.73 15.73 12.72 1.86 1.11 11.06 11.76 62.76 60.02 14.27 13.34 4.98 4.68 57.97 53.13 12.32 10.87 6.01 5.34 67.61 56.56 16.87 16.56 3.71 3.47 61.98 55.70 19.70 19.68 3.05 3.82 79.49 64.01 23.93 26.64 2.85 2.60 64.14 54.71 15.78 21.27 4.31 3.65 8.48 0.56 11.03 12.11 0.94 10.20 50.30 10.53 4.42 30.66 5.43 4.61 31.35 9.96 3.18 32.18 8.86 2.82 32.59 13.71 2.29 37.28 11.71 2.68 Table 15: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the repetition effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p = 6 · 0.0001. sd max 3.33 17.16 0.66 2.21 3.37 16.44 9.09 41.14 2.23 8.14 3.02 15.81 88.85 26.06 6.62 20.42 8.97 1.46 91.63 27.80 7.22 23.00 10.12 2.25 93.35 26.47 27.58 8.51 1.06 6.47 88.49 27.29 14.27 49.80 9.44 2.17 102.49 29.76 17.01 59.53 4.89 1.10 80.65 27.54 71.37 20.76 3.20 12.32 36 par se z par se z par se z par se z par se z par se z m 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 256 par 256 se 256 z min 1st qu median mean 3rd qu max 1.23 0.03 35.52 1.24 0.04 34.80 1.25 0.04 31.82 1.13 0.04 26.50 1.14 0.05 21.87 1.08 0.06 17.36 1.03 0.07 12.76 0.54 0.08 0.47 sd 1.38 0.05 0.04 0.00 37.30 0.57 1.36 0.04 0.00 0.04 36.64 0.63 1.36 0.04 0.00 0.04 33.90 0.72 1.29 0.05 0.00 0.05 29.62 0.87 1.29 0.05 0.05 0.00 25.50 1.39 1.36 0.08 0.00 0.07 21.61 1.52 1.37 0.09 0.00 0.08 17.32 1.28 1.27 0.30 1.16 0.43 5.89 14.21 1.30 0.04 36.44 1.31 0.04 35.69 1.29 0.04 32.85 1.23 0.04 28.32 1.22 0.05 23.70 1.22 0.06 19.31 1.24 0.08 16.07 0.93 0.39 7.59 1.28 0.03 36.37 1.28 0.04 35.18 1.26 0.04 32.25 1.22 0.04 27.90 1.21 0.05 22.75 1.21 0.06 17.86 1.22 0.07 16.00 0.61 0.09 1.00 Table 16: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the popularity effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p = 6 · 0.0001. 1.34 0.04 36.77 1.34 0.04 36.27 1.32 0.04 33.27 1.26 0.04 28.84 1.26 0.05 25.07 1.25 0.06 20.28 1.27 0.08 16.82 1.17 0.68 11.65 1.30 0.04 36.40 1.31 0.04 35.57 1.28 0.04 32.89 1.25 0.04 28.34 1.22 0.05 23.39 1.23 0.06 19.51 1.25 0.08 16.31 1.09 0.11 10.57 37 par se z par se z par se z par se z par se z par se z m 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 256 par 256 se 256 z min 1st qu median mean 3rd qu max 1.58 1.48 0.03 0.03 48.40 46.32 1.59 1.48 0.03 0.03 46.85 48.62 1.50 1.39 0.03 0.03 46.89 45.01 1.38 1.48 0.03 0.03 45.70 41.82 1.46 1.36 0.04 0.04 39.63 36.55 1.44 1.30 0.04 0.04 35.65 32.46 1.27 1.43 0.05 0.04 30.65 28.02 5.36 1.26 0.05 1.17 27.72 4.34 1.51 0.03 46.77 1.49 0.03 47.25 1.44 0.03 45.73 1.39 0.03 42.90 1.40 0.04 37.97 1.34 0.04 32.73 1.32 0.04 28.17 1.28 0.05 5.62 1.53 0.03 47.11 1.51 0.03 47.65 1.47 0.03 46.52 1.42 0.03 43.23 1.42 0.04 38.64 1.37 0.04 33.45 1.33 0.05 29.28 1.30 0.05 24.16 sd 0.03 0.00 0.69 0.03 0.00 0.57 0.03 0.00 0.65 0.03 0.00 1.07 0.03 0.00 1.04 0.04 0.00 1.16 0.05 0.00 1.13 2.03 0.51 10.44 Table 17: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the activity effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p = 6 · 0.0001. 1.53 0.03 47.26 1.52 0.03 47.66 1.46 0.03 46.23 1.42 0.03 43.31 1.41 0.04 38.31 1.37 0.04 33.68 1.34 0.05 29.31 2.86 0.44 17.24 1.54 0.03 47.79 1.53 0.03 47.86 1.49 0.03 46.74 1.44 0.03 43.64 1.42 0.04 38.91 1.39 0.04 34.21 1.37 0.05 30.41 5.14 0.93 25.27 38 Table 18: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the four-cycle effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p = 6 · 0.0001. min 1st qu median mean 3rd qu max 1.01 0.11 8.91 0.95 0.11 9.25 0.91 0.11 8.39 0.91 0.11 8.43 0.80 0.12 7.42 0.72 0.11 6.77 0.75 0.12 6.26 sd 0.17 0.01 1.20 0.12 0.00 1.04 0.09 0.01 0.60 0.10 0.01 0.71 0.09 0.01 0.77 0.10 0.01 0.68 0.16 0.01 1.18 31.43 15.16 7.41 3.12 0.72 5.93 0.85 0.11 7.90 0.86 0.10 8.66 0.80 0.10 8.08 0.70 0.10 7.13 0.66 0.10 6.71 0.67 0.11 6.29 0.63 0.12 5.53 29.21 5.29 5.14 0.70 0.10 6.94 0.79 0.10 8.15 0.77 0.10 7.94 0.67 0.10 6.93 0.63 0.10 6.53 0.60 0.10 5.77 0.57 0.11 5.08 0.61 0.13 4.77 0.72 0.10 7.06 0.79 0.10 7.92 0.75 0.10 7.68 0.67 0.10 6.96 0.63 0.10 6.34 0.58 0.10 5.76 0.53 0.11 4.78 12.26 2.49 4.69 m par 0.45 2 se 0.09 2 z 5.20 2 par 0.58 4 0.10 se 4 z 6.04 4 par 0.60 8 0.09 se 8 z 6.58 8 par 0.53 16 0.09 se 16 z 5.85 16 par 0.47 32 se 0.09 32 z 5.28 32 par 0.42 64 0.08 se 64 64 z 4.88 128 par 0.20 0.10 128 se 128 z 2.09 256 par 0.40 256 se 0.11 3.41 256 z 0.61 0.09 6.20 0.72 0.10 7.29 0.71 0.10 7.40 0.63 0.09 6.68 0.59 0.10 5.64 0.50 0.10 5.14 0.44 0.10 4.24 0.53 0.12 4.24 39 Table 19: Summary statistics of parameters (par ), standard errors (se), and z-values (z ) for the assor- tativity effect over 10 samples with varying m (as given in the first column) and varying p satisfying (m + 1) · p = 6 · 0.0001. m 2 2 2 4 4 4 8 8 8 16 16 16 32 32 32 64 64 64 128 par 128 se 128 z 256 par 256 se 256 z min 1st qu median mean 3rd qu max -0.23 0.02 -8.96 -0.19 0.02 -7.61 -0.21 0.02 -8.77 -0.14 0.02 -5.33 -0.20 0.03 -7.30 -0.16 0.03 -5.71 -0.17 0.03 -5.36 -2.31 0.03 -5.75 -0.19 0.03 -7.16 -0.17 0.03 -6.49 -0.13 0.03 -5.21 -0.12 0.03 -4.45 -0.10 0.03 -3.79 -0.10 0.03 -3.24 -0.08 0.03 -2.68 -0.14 0.04 -3.40 -0.20 0.03 -7.55 -0.18 0.03 -7.04 -0.16 0.02 -6.52 -0.13 0.03 -5.00 -0.13 0.03 -4.63 -0.14 0.03 -4.58 -0.14 0.03 -4.29 -1.71 0.03 -4.73 par se z par se z par se z par se z par se z par se z -0.18 0.03 -6.91 -0.16 0.03 -6.33 -0.14 0.03 -5.56 -0.11 0.03 -4.33 -0.11 0.03 -3.92 -0.10 0.03 -3.54 -0.10 0.03 -3.16 -0.82 0.19 -3.66 sd -0.13 0.03 0.03 0.00 -4.57 1.38 -0.12 0.03 0.00 0.03 -4.40 1.07 -0.11 0.04 0.00 0.03 -3.92 1.65 -0.07 0.02 0.00 0.03 -2.73 0.89 -0.06 0.04 0.03 0.00 -1.69 1.65 -0.04 0.04 0.00 0.03 -1.25 1.51 -0.05 0.05 0.00 0.04 -1.33 1.45 -0.05 0.94 0.54 0.20 1.43 -1.52 -0.17 0.03 -6.21 -0.15 0.03 -5.52 -0.11 0.03 -4.10 -0.10 0.03 -4.10 -0.08 0.03 -2.68 -0.07 0.03 -2.63 -0.07 0.03 -2.00 -0.10 0.34 -2.74 40
1904.02413
1
1904
2019-04-04T08:54:00
Temporal similarity metrics for latent network reconstruction: The role of time-lag decay
[ "cs.SI", "physics.data-an" ]
When investigating the spreading of a piece of information or the diffusion of an innovation, we often lack information on the underlying propagation network. Reconstructing the hidden propagation paths based on the observed diffusion process is a challenging problem which has recently attracted attention from diverse research fields. To address this reconstruction problem, based on static similarity metrics commonly used in the link prediction literature, we introduce new node-node temporal similarity metrics. The new metrics take as input the time-series of multiple independent spreading processes, based on the hypothesis that two nodes are more likely to be connected if they were often infected at similar points in time. This hypothesis is implemented by introducing a time-lag function which penalizes distant infection times. We find that the choice of this time-lag strongly affects the metrics' reconstruction accuracy, depending on the network's clustering coefficient and we provide an extensive comparative analysis of static and temporal similarity metrics for network reconstruction. Our findings shed new light on the notion of similarity between pairs of nodes in complex networks.
cs.SI
cs
TEMPORAL SIMILARITY METRICS FOR LATENT NETWORK RECONSTRUCTION: THE ROLE OF TIME-LAG DECAY A PREPRINT Hao Liao National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060, PR China Ming-Kai Liu National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060, PR China Manuel Sebastian Mariani Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu 610051, PR China URPP Social Networks Universitat Zurich CH-8050 Switzerland Mingyang Zhou National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060, PR China Xingtong Wu 9 1 0 2 r p A 4 ] I S . s c [ 1 v 3 1 4 2 0 . 4 0 9 1 : v i X r a National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060, PR China April 5, 2019 ABSTRACT When investigating the spreading of a piece of information or the diffusion of an innovation, we of- ten lack information on the underlying propagation network. Reconstructing the hidden propagation paths based on the observed diffusion process is a challenging problem which has recently attracted attention from diverse research fields. To address this reconstruction problem, based on static simi- A PREPRINT - APRIL 5, 2019 larity metrics commonly used in the link prediction literature, we introduce new node-node temporal similarity metrics. The new metrics take as input the time-series of multiple independent spreading processes, based on the hypothesis that two nodes are more likely to be connected if they were often infected at similar points in time. This hypothesis is implemented by introducing a time-lag function which penalizes distant infection times. We find that the choice of this time-lag strongly affects the metrics' reconstruction accuracy, depending on the network's clustering coefficient and we provide an extensive comparative analysis of static and temporal similarity metrics for network reconstruc- tion. Our findings shed new light on the notion of similarity between pairs of nodes in complex networks. Keywords Information networks · Network reconstruction · Temporal similarity · Innovation diffusion 1 Introduction Our understanding of social networks is affected by the fact that, typically, we only have incomplete knowledge about the topology of real networks [16, 5]. Aimed at overcoming this shortcoming, the problem of reconstructing missing links has attracted enormous attention from scholars from diverse fields (see [53] for a recent review on the problem). Existing approaches to the network reconstruction problem include the use of local structural metrics [43, 53, 19], global walk-counting methods [39, 53], stochastic block models [33], fitness-based methods [14], structural perturba- tion analysis [50, 47], machine-learning techniques [31], among many others. Scholars have aimed to identify missing connections in a wide variety of systems, including protein-protein interaction networks [41], neural networks [10], citation networks [15], and social networks [49, 4]. In parallel, there has been recent interest [59, 63, 28, 83, 68, 48] on a different problem of network reconstruction: if we are only provided with information on the outcome of a dynamical process on an unknown propagation network, can we reconstruct the propagation network? The problem -- which has been referred to as latent network reconstruc- tion [59] -- can be included in the broader class of problems that aim to reconstruct the properties of a spreading process (for instance, the seed node [9] or the epidemic parameters [59]) from data on observed realizations of the process. The question is fundamentally different from the traditional link prediction problem [53]: while link prediction stud- ies [53] typically assume that only part of the network is hidden and needs to be reconstructed, here we assume that the topology of the propagation network is completely hidden. The reconstruction problem studied here is important as we often deal with datasets where the propagation network is largely unknown: for instance, the owners of an online e-commerce platform might have complete information on the time-series of users' purchases, but lack information about the social connections between the users which might have affected, to some extent, the observed purchasing patterns. Existing works have tackled the latent network reconstruction problem from various perspectives. Among the most rel- evant contributions, Myers et al. [59] addressed the problem through a maximum-likelihood estimation method based on a cascade spreading model, which was further mapped into a convex optimization problem. Gomez-Rodriguez et al. [28] developed a faster maximum-likelihood method based on a cascade propagation model. Shen et al. [68] lever- aged compressed sensing theory to map the network reconstruction problem into a convex optimization problem. Such a mapping is non-trivial and model-specific; they solved the problem for the Susceptible-Infected-Susceptible (SIS) and the "contact process" dynamics [68]. The main limitation of these approaches is that they are model-dependent: Different spreading models require the solution of a different set of equations. For example, in the compressed-sensing theory approach, the convex-optimization equations for the SIS and the contact process model differ substantially [68]. Besides, the compressed-sensing approach to network reconstruction can be only applied to sparse networks [68]. On the other hand, other studies [83, 48] have tackled the latent network reconstruction problem by means of simple similarity metrics. With respect to convex optimization [59] and methods based on compressed sensing theory [68], similarity metrics have two main advantages: (1) They do not depend on the specific spreading model considered; (2) Their implementation is faster. Temporal similarity metrics for the latent network reconstruction [48] build on the hypothesis that two nodes are more likely to be connected if independent spreading processes tend to infect them at similar times. A simple way to implement this assumption is to impose, for each pair (i, j) of nodes that are infected by the same spreading process, a contribution to their similarity sij in the form of a power-law decreasing function of the time lag between the two infection times [48]. For this reason, we refer to these metrics as temporal similarities with power-law time lag decay. Here, we develop new temporal similarity indexes based on the hypothesis that two nodes are more likely to be con- nected if independent spreading processes tend to infect them at two consecutive time steps of the dynamics. We refer to the new metrics as temporal similarities with one-step time lag decay. Based on the power-law and one-step decay functions, for each of the eight classes of structural similarity metrics considered here, we construct two corresponding 2 (a) BA- -Precision-COS 0.8 (b) BA- -Precision-SSI 0.8 (c) BA- -Precision-HPI 0.8 (d) BA- -Precision-CN 0.6 A PREPRINT - APRIL 5, 2019 i i n o s c e r P 0.6 0.4 0.2 COS TCOS TCOS-1 i i n o s c e r P 0.6 0.4 0.2 SSI TSSI TSSI-1 i i n o s c e r P 0.6 0.4 0.2 HPI THPI THPI-1 i i n o s c e r P 0.4 0.2 CN TCN TCN-1 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 (e) BA- -Precision-JAC 0.8 0.8 (f) BA- -Precision-HDI (g) BA- -Precision-PA 0.4 (h) BA- -Precision-LHN 0.8 i i n o s c e r P 0.6 0.4 0.2 JAC TJAC TJAC-1 HDI THDI THDI-1 i i n o s c e r P 0.6 0.4 0.2 i i n o s c e r P 0.3 0.2 0.1 i i n o s c e r P 0.6 0.4 0.2 LHN TLHN TLHN-1 0 0 0.1 0.2 0.3 PA TPA TPA-1 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 Figure 1: Reconstruction precision of different similarity metrics as a function of β for eight classes of similarity metrics (CN, COS, SSI, HPI, JAC, HDI, PA, LHN), for the SIR dynamics (f = 0.5) on BA networks (N = 500, hki = 5). The results are averaged over 50 independent realizations. For sufficiently large β values, temporal similarity metrics with one-step time-lag decay substantially outperform temporal similarity metrics with power-law time-lag and static metrics. temporal similarity metrics. We compare their performance in reconstructing the whole propagation network in both synthetic and real data. By analyzing 40 empirical networks, we provide the first systematic performance comparison of temporal similarity metrics based on different classes of structural similarity metrics. We find that for the Susceptible-Infected-Recovered (SIR) spreading dynamics [64], for almost all the analyzed net- works, the temporal similarities with one-step time lag decay outperform the temporal similarities with a power-law time lag decay. The performance gap is substantially larger for spreading processes sufficiently above their critical point. Besides, among all the classes of similarity metrics considered, we find that the temporal similarity metric with one-step time-lag decay based on the Cosine similarity [67] tends to outperform the other metrics; other competitive classes of similarity are the temporal variants of the Sorensen index [69] and the Jaccard similarity [37]. Results for two additional spreading models (Susceptible-Infected, SI, and Linear Threshold Model, LTM) are in qualitative agreement. Our findings move the first steps toward an extensive benchmarking of methods for the reconstruction of a hidden topology from the available event time-series of a spreading process. Our work sheds new light on the notion of node-similarity based on the outcome of dynamical processes on networks, and it has potential implications for social network analysis that will be outlined in the Discussion section. 2 Results 2.1 Problem statement We assume that there is a unipartite network (whose adjacency matrix is denoted by A) whose topology is unknown, and our goal is to reconstruct it. Our available information is the time-stamped list of adoptions of multiple items that diffuse through a given spreading process. Entry (i, α, tiα) in this list tells us that node i adopted item α at time tiα. The adoption processes considered here is ruled by the SIR dynamics [64]: the "adoption" of item α corresponds to the "infection" during realization α of the SIR dynamics. For this reason, in the following, we will use "adoption" and "infection" interchangeably. 3 (a) SW- -Precision-COS 1 (b) SW- -Precision-SSI 1 (c) SW- -Precision-HPI 1 (d) SW- -Precision-CN 1 A PREPRINT - APRIL 5, 2019 i i n o s c e r P 0.5 COS TCOS TCOS-1 0.5 SSI TSSI TSSI-1 i i n o s c e r P i i n o s c e r P 0.5 HPI THPI THPI-1 i i n o s c e r P 0.5 CN TCN TCN-1 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 (e) SW- -Precision-JAC 1 (f) SW- -Precision-HDI 1 (g) SW- -Precision-PA 1 (h) SW- -Precision-LHN 1 i i n o s c e r P 0.5 JAC TJAC TJAC-1 0.5 HDI THDI THDI-1 i i n o s c e r P i i n o s c e r P 0.5 PA TPA TPA-1 i i n o s c e r P 0.5 LHN TLHN TLHN-1 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 0 0 0.1 0.2 0.3 Figure 2: (Color online) Reconstruction precision of different similarity metrics as a function of β for eight classes of similarity metrics (CN, COS, SSI, HPI, JAC, HDI, PA, LHN), for the SIR dynamics (f = 0.5) on SW networks (N = 500, P = 0.1, hki = 5). The results are averaged over 50 independent realizations. For sufficiently large β values, temporal similarity metrics with one-step time-lag decay substantially outperform temporal similarity metrics with power-law time-lag and static metrics. We consider 40 empirical unipartite networks; among these, 20 are information networks (details in the Supplemen- tary Material). We generate the time-series {(i, α, tiα)} of adoptions by running, for each network, 50 independent realizations of the SIR spreading dynamics initiated by a fraction f of initiators (see Methods for details) [48]. Each independent realization α of the spreading process is therefore interpreted as an item that gradually diffuses across the network. In fact, the time-series {(i, α, tiα)} can be interpreted as a temporal bipartite network [34]; we denote by R the incidence matrix of the corresponding time-aggregate bipartite network: Riα = 1 if node i adopted item α. We address the following problem. Assuming that we only know {i, α, tiα}, which is the best method to reconstruct the E edges of A from {i, α, tiα}? While, in principle, several techniques of network reconstruction can be designed [53, 68, 48], we narrow our focus to similarity metrics that aim to infer the similarity sij of two nodes i and j based on their co-adoption patterns [83, 48]. The definitions of the metrics of interest are provided in Sections 2.2 and 4.1. Such similarity metrics produce a ranking of the pairs of nodes (potential edges) in descending order of sij. Assuming that we know the number of edges E of the underlying propagation network A, the E top-ranked links by sij form the network A(s) reconstructed by metric s. It is natural to assess the precision of the metric sij by measuring the fraction of common links between A and A(s). This metric is typically referred to as precision in the link prediction [53] and information filtering literature, and we use it to evaluate the reconstruction performance of the similarity metrics. The results for another evaluation metric1 (Area Under the Curve, AUC [51]) are in qualitative agreement with those obtained with the precision (Figs. S8). 2.2 From structural to temporal similarity metrics We consider here eight classes of structural similarities [53]: common neighbors (CN), Jaccard Index (Jac), Leicht- Holme-Newman Index (LHN), Cosine Index (COS), Sorensen Index (SSI), Hub Promoted Index (HPI), Hub De- pressed Index (HDI), Preferential Attachment (PA). These structural metrics have been used by researchers from diverse domains to address various problems in network analysis. They have been applied to the reconstruction of missing links in networks where only a part of the topology is available [16, 51], to the prediction of new connections in social and information systems [49], and to the latent network reconstruction problem studied here as well [83]. 1Differently from the precision metric, the AUC metric is independent of E. 4 A PREPRINT - APRIL 5, 2019 (b) TSSI1-SSI 30 20 10 0 (c) THPI1-HPI 30 20 10 0 ) S P ( / ) , S 1 T ( P (d) TCN1-CN 30 20 10 0 ) S P ( / ) , S 1 T ( P (a) TCOS1-COS 30 20 10 0 ) S P ( / ) , S 1 T ( P -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 (e) TJAC1-JAC 30 20 10 0 (f) THDI1-HDI 30 20 10 0 (g) TPA1-PA 30 20 10 0 ) S P ( / ) , S 1 T ( P (h) TLHN1-LHN 30 20 10 0 ) S P ( / ) , S 1 T ( P ) S P ( / ) , S 1 T ( P ) S P ( / ) , S 1 T ( P ) S P ( / ) , S 1 T ( P -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 -10 0 1 Clustering coefficient 0.5 Figure 3: Reconstruction precision relative difference ∆P (T 1, S)/P (S) = (P (T 1) − P (S))/P (S) as a function of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact networks. For all classes of similarity, almost all the empirical networks fall above the P (T 1) = P (S) red line. We use β = 4βc and f = 0.5 here. The results are averaged over 50 independent realizations. For each class2 X of similarities, we consider the standard static metric [53] (directly denoted as X), and two temporal similarity metrics: temporal metrics with the power-law time-lag decay (denoted as TX) [48], and the new temporal metrics with the one-step time-lag decay (denoted as TX1). The last two classes of metrics differ in how the similarity score of a given pair (i, j) of nodes depends on the time lag tiα − tjα between node i's and j's adoption times tiα and tjα for item α. We refer to the Methods section for all the definitions. To illustrate the main idea behind each class of metrics, we define here the common-neighbors metrics: static common neighbors (CN), temporal common neighbors with a power-law decay of time-lag (TCN), and temporal common neighbors with one-step decay of time lag (TCN1). The common neighbors (CN) of a given pair (i, j) of nodes is simply given by [53] ij = X sCN RiαRjα. α (1) According to this definition, two nodes are similar (and, therefore, more likely to be connected in the hidden unipartite network) if they often adopted the same item. Zeng [83] found that this metric and similar static metrics can be used to reconstruct the topology of a hidden network based on the time-series of a spreading dynamics. Subsequently, the static metric proved to be sub-optimal with respect to time-aware metrics [48]. Indeed, while it is plausible that two nodes that often adopt the same item at similar times are more likely to be connected, the same is not necessarily true if the common adoptions happen at very distant points in time: given two adopters i and j, with tiα ≪ tjα, item α might indeed have reached j though a long network path, without the two nodes being directly connected. To penalize longer time lags, [48] introduced the temporal common neighbors with power-law time-lag decay (TCN) as (2) sT CN ij = X Riα Rjα tiα − tjα−1(1 − δtiα,tjα ). α This time-aware metric significantly outperforms its static counterpart, sCN , in the latent network reconstruction [48]. However, as a consequence of the power-law function, the similarity sT CN of a given pair of nodes receives substantial non-zero contributions also when the two nodes adopt the same item at substantially different times. 2X is a placeholder here. E.g., X can represent common neighbors CN. 5 A PREPRINT - APRIL 5, 2019 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (a) TCOS1-TCOS 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (b) TSSI1-TSSI 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (c) THPI1-THPI (d) TCN1-TCN 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (e) TJAC1-TJAC 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI (g) TPA1-TPA 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 Figure 4: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact networks. For all classes of similarity, almost all the empirical networks fall above the P (T 1) = P (T ) red line; the only exceptions are some of the networks with low clustering coefficient. We use β = 4βc and f = 0.5 here. The results are averaged over 50 independent realizations. In this work, we introduce the temporal common neighbors with a one-step decay time-lag decay (TCN1) as sT CN 1 ij = X Riα Rjα δtiα−tjα,1. α (3) According to this definition, the similarity sT CN 1 of a given pair (i, j) of nodes only receives a contribution when the two nodes adopt the same item at two consecutive time steps. Analogous definitions for the other seven classes of similarities and their temporal variants with power-law and one- step time-lag decay are provided in the Methods section. The goal of the rest of the paper is to extensively compare the performance of these metrics in reconstructing both synthetic and empirical networks. 2.3 Reconstruction of synthetic networks We start our investigation from synthetic networks generated with the Barabási-Albert model [6] (see Methods for the generation details). Fig. 1 shows our reconstruction results: each panel refers to a class of similarities; for each class of similarities (e.g., common neighbors), we show the results for the static metric (CN), the temporal metric with power-law time lag decay (TCN), and the new temporal metric with one-step time lag decay (TCN1). The precision values attained by the metrics are shown as a function of the transmission probability β of the SIR spreading process. For each considered structural metric (e.g., CN), for sufficiently large β values, the corresponding temporal metric with one-step decay (TCN1) performs significantly better than the corresponding temporal metric with power-law decay (e.g., TCN). As we reduce β, spreading processes tend to die out more rapidly, and it becomes increasingly harder to correctly reconstruct the underlying diffusion network; in the small-β regime, the temporal metrics with a one-step and power-law decay perform similarly. As expected [48], the time-aware metrics significantly outperform the static metric. Fig. 2 shows analogous results for a small-world network [79] (see Methods for the generation details). We observe again a systematic performance edge of the temporal metrics with a one-step time lag decay over the temporal metrics with power-law time lag decay, yet this gap is smaller than in the BA networks. 6 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 Real networks mean relative precision TC O S1 TPA1 TSSI1 TJA C1 TH DI1 TC N1 TH PI1 TLH N1 7 6 5 k n a r n a e M 4 3 2 1 0 A PREPRINT - APRIL 5, 2019 Real networks mean rank TC O S1 TSSI1 TJA C1 TH DI1 TH PI1 TC N1 TLH N1 TPA1 i l i n o s c e r p e v i t a e r n a e M Figure 5: Mean relative precision (higher values correspond to better performance) and mean rank (lower values correspond to better performance) of the eight TX1 metrics. According to both evaluation metrics, TCOS1 is the best-performing metric, followed by TSSI1 and TJAC1. We use β = 4βc and f = 0.5 here. The results are averaged over 50 independent realizations. 2.4 Reconstruction of real networks Our results on synthetic networks suggest that the temporal metrics with one-step time lag decay reconstruct synthetic contact networks better than the temporal metrics with power-law time lag decay. To further validate this assertion, we analyzed 40 empirical contact networks of diverse nature including 20 information networks (details in the Supple- mentary Material). For almost all the analyzed datasets, the temporal metrics with one-step time lag decay substantially improve the reconstruction accuracy with respect to both static (Fig. 3) and temporal metrics with power-law time lag decay (Fig. 4). The only networks where the temporal metrics with power-law time-lag decay can outperform the temporal metrics with one-step time-lag decay are those with low clustering coefficient3. This is intuitive: In a network with lower clustering, it is less likely that two non-connected nodes are reached by long propagation paths. This mitigates the advantage of considering only adoptions with one-step time lag when computing the similarity score of a given pair of nodes. The results in Fig. 4 were obtained with β = 4 βc, where βc is the epidemic threshold [64]. As expected from the synthetic network analysis, we find that for larger β values (Fig. S1), the one-step time lag metrics show better reconstruction accuracy for the vast majority of datasets and considered metrics. On the other hand, for lower β values, there is not a clear advantage of the metrics with the one-step time-lag decay (Figs. S2-S3). So far, we have compared similarities of the same class (e.g., common neighbors) with different time-lag decay func- tions. A natural question arises: what is the relative performance of the eight temporal metrics TX1 with one-step time-lag decay obtained from the eight different classes of similarities? We compare the eight metrics' performance across the 40 empirical datasets considered here. We refer to Figs. S4-S5 for the results on individual datasets. To gain a general understanding of the metrics' performance, we aggregate the metrics' performance over the analyzed networks. To this end, we consider two evaluation metrics: the metrics' mean rank [58] and the mean relative precision. 3In our work, we use the average local clustering coefficient as a metric for clustering. For each node i in the network, we calculate the number Ki of existing edges that connect nodes that are connected with i, and the maximum number Ei of possible links between i's neighbors. For an undirected graph, Ei = ki (ki − 1)/2. Finally, we define i's local clustering coefficient Ci = Ki/Ei, and the network's clustering coefficient as C = N −1 Pi Ci. 7 A PREPRINT - APRIL 5, 2019 To compute the metrics' mean rank, for each dataset d, we rank the eight TX1 metrics in order of decreasing precision. We denote by rd(s) ∈ {1, 2, . . . , 8} the ranking position metric s for dataset d. Given D analyzed empirical networks (D = 40 in our work), the mean rank r(s) of metric s is simply defined as r(s) = D−1 PD d=1 rd(s). Better performing metric should exhibit lower mean rank values [58]. In addition, denoting by Pd(s) the precision achieved by metric s in dataset d, we define the mean relative precision P (s) of metric s as D−1 PD d=1 Pd(s)/ maxs′ {Pd(s′)}. Better performing metric should exhibit larger mean relative precision values. Both evaluation metrics lead to the same overall conclusion (Fig. 5): on average, the TCOS1 (temporal Cosine with one-step time-lag decay) metric sT COS1 ij = Pα RiαRjαδtiα−tjα,1 pPα Riα Pα Rjα (4) is the best-performing metric, followed by TSS1 and TJAC1 (see Methods for their definition). While TCOS1 provides us with a computationally fast metric to reconstruct the hidden topology, its mean precision is 0.349. This leaves the door open for future performance improvements, possibly based on new similarity metrics or more sophisticated methods. 3 Discussion Our work provided a systematic benchmarking of temporal similarity metrics with respect to their accuracy in recon- structing a hidden network topology. The reconstruction was more accurate for SIR spreading processes with a large transmission probability, i.e., in the supercritical regime. On both real and synthetic networks, we found that temporal metrics with one-step time-lag decay perform systematically better than metrics with power-law time-lag decay. Be- sides, we found that the temporal cosine metric with one-step time-lag decay is the best-performing metric. Differently from maximum-likelihood methods [28] and compressed-sensing theory approaches [59], the temporal similarity met- rics considered here are general and not restricted to a specific dynamics. In this sense, they can be interpreted not only as parsimonious and effective reconstruction tools, but also as general baselines against which more sophisticated, model-specific reconstruction techniques can be evaluated. While we focused on the SIR dynamics, we also assessed the metrics' performance for two additional spreading models: the Susceptible-Infected (SI) model [3, 70] and the Linear Threshold Model (LTM) [30, 40, 12]. The results obtained for these two models are in qualitative agreement with the results obtained for the SIR model (Figs. S6-S7), supporting the generality of our conclusions. Our study paves the way for several extensions. Temporal similarity metrics might be applied to other network recon- struction problems, such as the problem where part of the topology is known [51] and the matching of user accounts across different domains or devices [11, 46]. Even more intriguingly, one can attempt to reconstruct the hidden topol- ogy of a social network based on the observed dynamics of real diffusion processes. For instance, from the observed spreading dynamics of many pieces of information, one might attempt to reconstruct propagation networks in social media [65] and e-commerce platforms [56]. The results presented here support metrics based on one-step time lags as the best-performing ones in the latent network reconstruction task. While the time step of the dynamics is unambigu- ously defined for simulated processes, the same does not hold for real spreading processes. Using temporal similarity metrics to reconstruct propagation topologies based on real time-series data will likely require us to first identify the typical timescale needed for a given piece of information to be transmitted from an individual to another, and then to use this typical timescale as the time-lag parameter in the similarity metric. Finally, our work contributes to the rich literature on similarity on social and information networks [45, 44, 73, 29, 13, 66]. Previous research has stressed the role of structural similarity metrics, i.e., similarity metrics based either on the time-aggregate contact network of individuals (who is connected to whom) [35, 80, 42] or on the time-aggregate user- item bipartite adoption network (who collected what) [44, 83]. Here, we combined structure and temporal information (who collected what at which time) to define temporal similarity metrics that are effective in the propagation network task. We envision that future research on social and information network analysis might further develop simple yet well-performing time-aware metrics for network reconstruction. 4 Methods 4.1 Temporal similarity metrics For each class C of similarity metrics, we define three metrics: a static metric C, a temporal metric with power-law time-lag decay T C, and a temporal metric with one-step time-lag decay T C1. In our work, we consider eight classes C of similarities: Common Neighbors (CN), Jaccard (Jac), Cosine (COS), Leicht-Holme-Newman (LHN), Sorensen 8 Index (SSI), Hub-promoted Index (HPI), Preferential Attachment (PA), Hub-depressed Index (HDI). As we already defined the three CN similarities in the main text, we define here the metrics based on the seven additional classes. A PREPRINT - APRIL 5, 2019 Jaccard (Jac) similarity We define three metrics: • Jaccard similarity (Jac): sJac ij = • Temporal Jaccard similarity with power-law time-lag decay (TJac): Pα Riα Rjα . Pα(Riα + Rjα − Riα Rjα) sT Jac ij = Pα Riα Rjα tiα − tjα−1(1 − δtiα,tjα ) Pα(Riα + Rjα − Riα Rjα) . • Temporal Jaccard similarity with one-step time-lag decay (TJac1): sT Jac1 ij = Pα RiαRjαδtiα−tjα,1 Pα(Riα + Rjα − RiαRjα) . Cosine (COS) similarity We define three metrics: • Cosine similarity (COS): pPα Riα Pα Rjα • Temporal Cosine similarity with power-law time-lag decay (TCOS): ij = Pα RiαRjα sCOS . pPα Riα Pα Rjα • Temporal Cosine similarity with one-step time-lag decay (TCOS1): sT COS ij = Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα ) . = Pα RiαRjαδtiα−tjα,1 pPα Riα Pα Rjα Leicht-Holme-Newman Index (LHN) similarity We define three metrics: sT COS1 ij . • Leicht-Holme-Newman Index similarity (LHN): sLHN ij = Pα RiαRjα Pα Riα Pα Rjα . • Temporal Leicht-Holme-Newman Index similarity with power-law time-lag decay (TLHN): sT LHN ij = Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα ) Pα Riα Pα Rjα . • Temporal Leicht-Holme-Newman Index similarity with one-step time-lag decay (TLHN1): sT LHN 1 ij = Pα RiαRjαδtiα−tjα,1 Pα Riα Pα Rjα . Sørensen Index (SSI) similarity We define three metrics: • Sørensen Index similarity (SSI): • Temporal Sørensen Index similarity with power-law time-lag decay (TSSI): sSSI ij = 2 × Pα RiαRjα Pα Riα + Pα Rjα . sT SSI ij = 2 × Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα ) Pα Riα + Pα Rjα . • Temporal Sørensen Index similarity with one-step time-lag decay (TSSI1): 2 × Pα RiαRjαδtiα−tjα,1 sT SSI1 ij = . Pα Riα + Pα Rjα 9 (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15) (16) A PREPRINT - APRIL 5, 2019 Hub Promoted Index (HPI) similarity We define three metrics: • Hub Promoted Index similarity (HPI): sHP I ij = Pα RiαRjα min{Pα Riα, Pα Rjα} • Temporal Hub Promoted Index similarity with power-law time-lag decay (THPI): = Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα ) sT HP I ij min{Pα Riα, Pα Rjα} • Temporal Hub Promoted Index similarity with one-step time-lag decay (THPI1): sT HP I1 ij = Pα RiαRjαδtiα−tjα,1 min{Pα Riα, Pα Rjα} Hub Depressed Index (HDI) similarity We define three metrics: • Hub Depressed Index similarity (HDI): sHDI ij = Pα RiαRjα max{Pα Riα, Pα Rjα} • Temporal Hub Depressed Index similarity with power-law time-lag decay (THDI): sT HDI ij = Pα RiαRjαtiα − tjα−1(1 − δtiα,tjα ) max{Pα Riα, Pα Rjα} • Temporal Hub Depressed Index similarity with one-step time-lag decay (THDI1): sT HDI1 ij = Pα RiαRjαδtiα−tjα,1 max{Pα Riα, Pα Rjα} Preferential Attachment (PA) similarity We define three metrics: • Preferential Attachment similarity (PA): ij = X sP A Riα X Rjα. α α • Temporal Preferential Attachment similarity with power-law time-lag decay (TPA): ij = X sT P A Riα X Rjαtiα − tjα−1(1 − δtiα,tjα ). α α • Temporal Preferential Attachment similarity with one-step time-lag decay (TPA1): sT P A1 ij = X Riα X Rjαδtiα−tjα,1. α α (17) (18) (19) (20) (21) (22) (23) (24) (25) In all the temporal similarity methods above, we set (tiα − tjα)−1 = 0 when tiα = tjα. Note that in the TC metrics, the factor 1 − δtiα,tjα makes sure that events where tiα = tjα do not contribute to the similarity. Indeed, when tiα = tjα, i is not the node that infected j; therefore, i and j are unlikely to be connected in the networks. Note that in other problems such as link prediction and recommendation, the case tiα = tjα may need to be treated differently. 4.2 SIR spreading dynamics In the SIR model, each node is in one of the three states: Susceptible (S), Infected (I), Recovered (R). Each node has a probability f to be an initiator of the spreading process; therefore, there are f × N simultaneous initiators, on average, for each spreading process. At each time step, each infected node can infect each of its neighbors with probability β; each infected node can recover with probability µ. For simplicity, we fix µ = 1 (each node recovers one step after having been infected). The process ends when there are no more infected nodes in the system. For each empirical network, we run 50 independent realizations of the SIR dynamics. For each process α, we record the temporal list of the nodes infected by that process. The bipartite adjacency matrix R records which nodes were infected by which process: Riα = 1 if i has been infected by α, whereas Riα = 0 otherwise. If Riα = 1, the time step at which i was infected by α is recorded in tiα. 10 A PREPRINT - APRIL 5, 2019 4.3 Generation of the synthetic networks We use two well-known models for the generation of synthetic networks: the Barabási-Albert (BA) model [6], and the Small-World (SW) model [79]. Barabási-Albert (BA) We generate networks composed of N = 500 nodes. Our initial condition is a regular network where each node composed of m0 = 9 nodes; each initial node has the degree equal to hki = 5. At each time step t, we add a new node to the network. The new node connects with hki preexisting nodes; the probability that a preexisting node i is selected is proportional to its degree ki(t) at time t. Small-World (SW) We start from a regular ring lattice composed of N = 500 nodes and degree k = hki = 5: we connect each of the N nodes with its nearest k neighbors. We rewire each link with probability p -- in this work, we set p = 0.1. More specifically, for each node i, we select a node j from its neighbors and we extract a random number r from the uniform distribution in (0, 1). If p is larger than r, we and remove the edge between node i and node j, we randomly select a node m, and we establish an edge between node i and node m. Competing interests The authors declare that they have no competing interests. Author's contribution The work presented in this paper corresponds to a collaborative development by all authors. Conceptualization, H.L., M.S.M, and M-Y.Z.; Data Curation, M-K.L. and H.L.; Formal Analysis, H.L., M-K.L. and M.S.M.; Funding Ac- quisition, H.L. and M-Y.Z.; Methodology, M.S.M.; Resources, H.L. and M-Y.Z.; Software, M-K.L. and X-T.W.; Writing -- Original Draft, M.S.M., M-K.L., M-Y.Z., X-T.W. and H.L. Acknowledgements We wish to thank Prof. Ginestra Bianconi and Prof. Chi Ho Yeung for providing us valuable suggestions. H.L and M.Y.Z acknowledge financial support from the National Natural Science Foundation of China (Grant Nos. 61803266, 61703281), Guangdong Province Natural Science Foundation (Grant Nos. 2016A030310051,2017A030310374, 2017B030314073), Guangdong Pre-national project (Grant Nos. 2014GK XM054), Shenzhen Fundamental Research Foundation ( JCYJ20160520162743717, JCYJ20150529164-656096), Nat- ural Science Foundation of SZU (Grant No. 2016-24), Foundation for Distinguished Young Talents in Higher Educa- tion of Guangdong, China(Grant No. 2015K-QNCX143). MSM acknowledges the University of Zurich for support through the URPP Social Networks. Supplementary Here we describe the 40 empirical networks analyzed in the main text. Data Description 1) Facebook: a social network which contains Facebook user -- user friendships. [55] 2) Jazz: a music collaboration network obtained from the Red Hot Jazz Archive digital database. It includes 198 bands that performed between 1912 and 1940, with most of the bands from 1920 to 1940. [27] 3) Residence hall: a network which contains friendship ratings between 217 residents living at a residence hall located in the Australian National University campus. [23] 4) E.coli: a metabolic network of E.coli. [38] 5) Physicians: a network which captures the spreading paths of an innovation among 246 physicians in for towns in Illinois, Peoria, Bloomington, Quincy and Galesburg. [17] 6) Neural: a neural network in C. elegans. [20] 7) Usair: the US air transportation network that connects airport located in the United States. 11 A PREPRINT - APRIL 5, 2019 8) Dublin: a network which describes the face-to-face behavior of people during the exhibition "infectious: stay away" in 2009 at the Science Gallery in Dublin. [36] 9) Crim: a network which connects persons who appeared in at least one crime case as either a suspect, a victim, a witness or both a suspect and victim at the same time. 10) Caenorhabditis elegans: a metabolic network of the roundworm Caenorhabditis elegans. [21] 11) Email: an email communication network at the University Rovira i Virgili in Tarragona in the south of Catalonia in Spain [32] 12) Blogs: a network which contains front-page hyperlinks between blogs in the context of the 2004 US elec- tion. [1] 13) Air traffic control: a network which was constructed from the USA's FAA (Federal Aviation Administration) National Flight Data Center (NFDC), Preferred Routes Database. 14) Human protein: a network of interactions between proteins in Humans (Homo sapiens), from the first large- scale study of protein -- protein interactions in Human cells using a mass spectrometry-based approach. [71] 15) Hamsterster friendships: a network which contains friendships between users of the website hamster- ster.com. 16) UC Irvine messages: a network which contains sent messages between the users of an online community of students from the University of California, Irvine. [62] 17) Adolescent health: a network which was created from a survey that took place in 1994/1995. [57] 18) Advogato: a network from an online community platform for developers of free software launched in 1999. [54] 19) Euroroad: an international E-road network, a road network located mostly in Europe. [76] 20) Highschool: a network which contains friendships between boys in a small high school in Illinois. [18] 21) Hypertext: a network of face-to-face contacts between the attendees of the ACM Hypertext 2009 confer- ence. [36] 22) IUI: a network of the collaborations among the authors of papers published in Informatica and Uporabna informatika. [24] 23) Amazon: a network between web pages in amazon.com. [72] 24) SCSC: a network of collaborations between Slovenian computer scientists. [7] 25) Zachary karate club: the well-known Zachary karate club social network. [82] 26) Polbooks: a network of books about US politics published around the time of the 2004 presidential election and sold by the online bookseller Amazon.com. [2] 27) Powergrid: the power grid of the Western States of the United States of America. [78] 28) Subelj: the software class dependency network of the JUNG 2.0.1 and javax 1.6.0.7 libraries, namespaces edu.uci.ics.jung and java/javax. 29) PPI: a protein-protein interaction network. [75] 30) Openflights: a network which contains flights between airports of the world. [61] 31) Bible: a network which contains nouns (places and names) of the King James Version of the Bible and information about their co-occurrences. [84] 32) Chicago: a network on the road transportation of the Chicago region (USA). [22, 8] 33) DNC email: a network of emails in the 2016 Democratic National Committee email leak. [81] 34) Word: an adjacency network of common adjectives and nouns in the novel David Copperfield written by Charles Dickens. [60] 35) Football: a network of American football games between Division IA colleges during regular season Fall 2000. [26, 74] 36) Little Rock Lake: the food web of Little Rock Lake, Wisconsin in the United States of America. [52] 37) Unicode: a bipartite network denotes which languages are spoken in which countries. Here we transferred it to a unipartite network. [77] 38) Netsci: a coauthorship network between scientists who published on the topic of network science. [60] 39) TAP: a yeast protein binding network generated by tandem affinity purification experiments. [25] 40) Slavko: a small friendship network from an online website. [7] 12 A PREPRINT - APRIL 5, 2019 SI Tables Table 1: Properties of the analyzed empirical networks. N is the number of nodes. E is the number of edges. The parameter hki, refers to the average node degree. C is the average clustering coefficient. βc = hki/(hk2i − hki) represents the critical value of the transmission probability in the SIR model in the mean-field scenario [64]. Network Zachary karate club (Zkc) Highschool (Highs) Polbooks (Polbs) Word Hypertext (Hypert) Football (Footb) Little Rock Lake (LRL) Jazz Residence hall (Rhall) E.coli Physicians (Phys) Neural USAir Slavko Netsci Dublin Caenorhabditis elegans (Cae) Unicode (Unic) Scsc Email Euroroad (Eroad) Blogs Air traffic control (Air.tra) TAP Crim Chicago (Chic) Human protein (HP) Bible Hamsterster friendships (HF) UC Irvine messages (UC.irv) DNC emails (DNC) IUI PPI Adolescent health (Health) Amazon (Ama) Facebook (Faceb) Openflights (Oflgs) Powergrid (Pgrid) Subelj Advogato (Adv) N 34 70 105 112 113 115 183 198 217 230 241 297 332 334 379 410 453 767 961 1133 1174 1224 1226 1373 1380 1467 1706 1773 1858 1899 2029 2288 2375 2539 2880 2888 2939 4941 6434 6541 hki 4.58 10.45 8.4 3.79 368.46 21.4 27.25 27.69 24.62 6.04 9.11 15.88 12.8 13.28 4.82 13.48 10.15 3.27 4.01 9.62 2.41 31.08 4.26 9.96 2.13 1.76 7.27 18.5 13.49 63.01 38.70 3.66 9.84 10.21 3.49 2.06 20.75 2.66 46.93 7.82 E 78 366 441 425 20818 1231 2494 2742 2672 695 1098 2359 2126 2218 914 2765 4596 1255 1925 5451 1417 19025 2615 6833 1476 1298 6207 16401 12534 59835 39264 4190 11693 12969 5037 2981 30501 6594 150985 51127 13 C 0.12 0.29 0.15 0.17 0.26 0.17 0.09 0.62 0.24 0.22 0.13 0.12 0.63 0.17 0.74 0.30 0.07 0.01 0.02 0.22 0.01 0.14 0.02 0.53 0.1 0 0.02 0.1 0 0.04 0.06 0.03 0.3 0.10 0.01 0 0.39 0.01 0.09 0.11 βc 0.1688 0.1487 0.2067 0.0783 0.0392 0.1623 0.0229 0.0266 0.0688 0.0752 0.1366 0.049 0.0231 0.0791 0.1424 0.1044 0.0465 0.0455 0.2033 0.0565 0.1563 0.0123 0.2353 0.0651 0.0458 0.1411 0.0653 0.1299 0.0217 0.0317 0.0164 0.3068 0.0301 0.1408 0.1651 0.1879 0.0184 0.1175 0.0513 0.0171 url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url A PREPRINT - APRIL 5, 2019 Table 2: Basic properties of real networks and the performance of the COS, TCOS, TCOS1, SS, TSS, TSS1, LHN, TLHN, TLHN1, HD, THD and THD1 methods on these networks, based on the AUC metric. The parameters are set as β = 4 βc and f = 0.5. We select a relatively large β because the performance difference between traditional similarity metric and temporal similarity metric becomes more significant under large β. The similarity method with the best performance in each network is highlighted in bold font. The results are averaged over 50 independent realizations. Network Basic properties Zkc Highs Polbs Word Hypert Footb LRL Jazz Rhall E. coli Phys Neural USAir Slavko Netsci Dublin Cae Unic Scsc Email Eroad Blogs Air.tra TAP Crim Chic HP Bible HF Uc.irv DNC IUI PPI Health Ama Faceb Oflgs Pgrid Subelj Adv TLHN TLHN1 0.6770 0.6776 0.8367 0.8367 0.6711 0.6714 0.9033 0.9396 0.5491 0.5509 0.7108 0.7116 0.6469 0.6469 0.7875 0.8218 0.8308 0.8311 0.8999 0.9307 0.8375 0.8377 0.7865 0.8068 0.8199 0.8273 0.7574 0.7576 0.9632 0.9635 0.7567 0.7567 0.7161 0.7190 0.6020 0.6021 0.8159 0.8160 0.9407 0.9823 0.9172 0.9177 0.8451 0.8452 0.8568 0.8571 0.9902 0.9980 0.8297 0.8298 0.6518 0.6519 0.9756 0.9760 0.7303 0.7310 0.7737 0.7738 0.9265 0.9266 0.9432 0.9437 0.8283 0.8278 0.9249 0.9250 0.9339 0.9347 0.9160 0.9168 0.7108 0.7116 0.7957 0.7957 0.8927 0.8928 0.6908 0.6916 0.8361 0.8373 TCOS1 0.6811 0.8525 0.7199 0.9506 0.5438 0.7216 0.6491 0.8783 0.8682 0.9822 0.8738 0.8380 0.9539 0.7683 0.9752 0.8462 0.7348 0.6020 0.8161 0.9946 0.9185 0.8581 0.8643 0.9983 0.8446 0.6517 0.9831 0.7555 0.7770 0.9471 0.9619 0.8274 0.9747 0.8979 0.9178 0.7216 0.9578 0.8929 0.7016 0.9270 E 78 366 441 425 20818 1231 2494 2742 2672 695 1098 2359 2126 2218 914 2765 4596 1255 1925 5451 1417 19025 2615 6833 1476 1298 6207 16401 12534 59835 39264 4190 11693 12969 5037 2981 30501 6594 150985 51127 SSI 0.6659 0.7600 0.7073 0.7821 0.5219 0.6557 0.6452 0.8211 0.6856 0.8876 0.8587 0.7287 0.9089 0.7596 0.9198 0.7322 0.7062 0.6019 0.8151 0.8423 0.8943 0.8401 0.8257 0.8757 0.6986 0.6517 0.8802 0.7131 0.7673 0.8973 0.9608 0.8281 0.9336 0.7502 0.6502 0.6557 0.9311 0.8922 0.6353 0.9099 TSSI 0.6797 0.8491 0.7096 0.8898 0.5356 0.6945 0.6482 0.8609 0.7954 0.9659 0.8717 0.8098 0.9365 0.7615 0.9760 0.8427 0.7202 0.6021 0.8159 0.9617 0.9146 0.8493 0.8533 0.9906 0.7556 0.6516 0.9371 0.7253 0.7714 0.9254 0.9613 0.8268 0.9707 0.8886 0.9172 0.6945 0.9505 0.8929 0.6745 0.9242 COS 0.6683 0.7614 0.7201 0.8413 0.5314 0.6789 0.6462 0.8312 0.7103 0.9018 0.8610 0.7314 0.9135 0.7711 0.9225 0.7959 0.7122 0.6018 0.8158 0.8567 0.8942 0.8431 0.8439 0.8964 0.7959 0.6513 0.9376 0.7413 0.7726 0.8996 0.9613 0.8276 0.9349 0.7561 0.6535 0.6789 0.9384 0.8927 0.6284 0.9104 TCOS 0.6816 0.8532 0.7206 0.9350 0.5447 0.7216 0.6488 0.8650 0.8683 0.9726 0.8737 0.8266 0.9435 0.7686 0.9755 0.8460 0.7369 0.6020 0.8160 0.9725 0.9186 0.8580 0.8640 0.9924 0.8444 0.6515 0.9833 0.7551 0.7768 0.9471 0.9618 0.8277 0.9747 0.8970 0.9172 0.7216 0.9581 0.8928 0.7016 0.9269 LHN 0.6585 0.6396 0.6552 0.8311 0.5446 0.6813 0.6431 0.7563 0.7094 0.7924 0.6278 0.7174 0.7852 0.7552 0.9138 0.6985 0.6794 0.6022 0.8158 0.8341 0.8114 0.8342 0.8330 0.8423 0.7870 0.6517 0.9274 0.7056 0.7708 0.8952 0.9372 0.8287 0.7811 0.7896 0.6531 0.6813 0.6979 0.8916 0.6616 0.7914 HDI 0.6604 0.7500 0.6888 0.8056 0.5137 0.6373 0.6464 0.7942 0.7030 0.8965 0.8521 0.7213 0.9023 0.7508 0.8987 0.7735 0.6992 0.6021 0.8151 0.8389 0.8925 0.8269 0.8527 0.8558 0.7738 0.6519 0.9081 0.6822 0.7701 0.8956 0.9603 0.8275 0.9314 0.7444 0.6314 0.6373 0.9239 0.8917 0.6178 0.9050 THDI 0.6782 0.8411 0.7002 0.8937 0.5271 0.6750 0.6488 0.8487 0.8344 0.9504 0.8672 0.7920 0.9289 0.7549 0.9810 0.8226 0.7160 0.6021 0.8162 0.9470 0.9136 0.8391 0.8652 0.9814 0.8219 0.6517 0.9720 0.7005 0.7737 0.9123 0.9612 0.8271 0.9652 0.8724 0.9138 0.6750 0.9432 0.8928 0.6550 0.9180 THDI1 0.6775 0.8410 0.7011 0.9313 0.5271 0.6741 0.6488 0.8686 0.8346 0.9712 0.8675 0.8176 0.9390 0.7549 0.9807 0.8231 0.7163 0.6020 0.8154 0.9797 0.9136 0.8390 0.8652 0.9966 0.8220 0.6518 0.9723 0.7007 0.7733 0.9127 0.9611 0.8278 0.9650 0.8733 0.9140 0.6741 0.9433 0.8927 0.6541 0.9173 N 34 70 105 112 113 115 183 198 217 230 241 297 332 334 379 410 453 767 961 1133 1174 1224 1226 1373 1380 1467 1706 1773 1858 1899 2029 2288 2375 2539 2880 2888 2939 4941 6434 6541 AUC TSSI1 0.6835 0.8490 0.7101 0.9305 0.5352 0.6941 0.6481 0.8753 0.7956 0.9797 0.8720 0.8303 0.9474 0.7609 0.9760 0.8430 0.7231 0.6023 0.8159 0.9925 0.9148 0.8494 0.8537 0.9982 0.7558 0.6516 0.9373 0.7245 0.7717 0.9258 0.9614 0.8278 0.9706 0.8890 0.9172 0.6941 0.9507 0.8926 0.6741 0.9249 14 A PREPRINT - APRIL 5, 2019 Table 3: Basic properties of real networks and the performance of the COS, TCOS, TCOS1, SS, TSS, TSS1, LHN, TLHN, TLHN1, HD, THD and THD1 methods on these networks, based on the precision metric. The parameters are set as β = 4 βc and f = 0.5. We select a relatively large β because the performance difference between traditional similarity metric and temporal similarity metric becomes more significant under large β. The similarity method with the best performance in each network is highlighted in bold font. The results are averaged over 50 independent realizations. Network Basic properties Zkc Highs Polbs Word Hypert Footb LRL Jazz Rhall E. coli Phys Neural USAir Slavko Netsci Dublin Cae Unic Scsc Email Eroad Blogs Air.tra TAP Crim Chic HP Bible HF Uc.irv DNC IUI Health Ama Faceb Oflgs Pgrid Subelj Adv N 34 70 105 112 113 115 183 198 217 230 241 297 332 334 379 410 453 767 961 1133 1174 1224 1226 1373 1380 1467 1706 1773 1858 1899 2029 2288 2539 2880 2888 2939 4941 6434 6541 E 78 366 441 425 20818 1231 2494 2742 2672 695 1098 2359 2126 2218 914 2765 4596 1255 1925 5451 1417 19025 2615 6833 1476 1298 6207 16401 12534 59835 39264 4190 12969 5037 2981 30501 6594 150985 51127 COS 0.207 0.365 0.217 0.313 0.221 0.224 0.282 0.434 0.189 0.323 0.315 0.178 0.561 0.253 0.371 0.203 0.141 0.104 0.233 0.467 0.230 0.173 0.186 0.232 0.034 0.294 0.135 0.152 0.090 0.176 0.373 0.140 0.025 0.008 0.224 0.248 0.185 0.067 0.061 TCOS TCOS1 0.235 0.236 0.535 0.610 0.217 0.241 0.568 0.624 0.239 0.244 0.286 0.320 0.287 0.310 0.531 0.538 0.462 0.565 0.584 0.652 0.460 0.464 0.327 0.376 0.541 0.555 0.258 0.261 0.581 0.771 0.355 0.361 0.229 0.236 0.153 0.156 0.271 0.279 0.568 0.766 0.424 0.425 0.242 0.287 0.374 0.402 0.635 0.734 0.227 0.228 0.303 0.304 0.221 0.312 0.208 0.213 0.157 0.195 0.354 0.370 0.373 0.376 0.196 0.229 0.533 0.618 0.015 0.015 0.286 0.320 0.321 0.368 0.311 0.312 0.124 0.130 0.155 0.322 SSI 0.209 0.365 0.217 0.307 0.215 0.212 0.275 0.426 0.181 0.348 0.162 0.152 0.554 0.243 0.370 0.115 0.139 0.103 0.230 0.442 0.227 0.166 0.179 0.215 0.041 0.298 0.122 0.148 0.067 0.113 0.372 0.143 0.025 0.009 0.212 0.248 0.183 0.065 0.060 TSSI 0.237 0.536 0.213 0.548 0.231 0.267 0.305 0.528 0.340 0.558 0.275 0.312 0.549 0.254 0.583 0.212 0.224 0.152 0.266 0.503 0.424 0.216 0.383 0.617 0.228 0.303 0.189 0.207 0.075 0.257 0.375 0.196 0.530 0.013 0.268 0.320 0.310 0.120 0.151 Precision LHN 0.193 0.181 0.138 0.241 0.220 0.156 0.259 0.304 0.189 0.278 0.309 0.124 0.219 0.132 0.279 0.199 0.077 0.098 0.179 0.145 0.137 0.173 0.056 0.158 0.077 0.287 0.136 0.043 0.086 0.171 0.013 0.351 0.039 0.005 0.157 0.021 0.122 0.016 0.002 TSSI1 0.230 0.611 0.234 0.610 0.240 0.306 0.286 0.537 0.457 0.626 0.353 0.369 0.536 0.253 0.773 0.279 0.233 0.153 0.272 0.707 0.425 0.246 0.403 0.717 0.228 0.304 0.246 0.216 0.086 0.324 0.374 0.205 0.616 0.014 0.306 0.363 0.311 0.125 0.288 TLHN TLHN1 0.214 0.221 0.474 0.571 0.172 0.186 0.320 0.390 0.231 0.233 0.201 0.232 0.287 0.294 0.342 0.407 0.379 0.506 0.303 0.354 0.439 0.468 0.243 0.295 0.234 0.339 0.162 0.175 0.0.517 0.628 0.343 0.370 0.101 0.114 0.141 0.152 0.214 0.234 0.206 0.341 0.185 0.259 0.226 0.254 0.132 0.156 0.502 0.713 0.229 0.287 0.302 0.304 0.199 0.255 0.052 0.056 0.127 0.159 0.371 0.374 0.019 0.019 0.303 0.323 0.327 0.478 0.014 0.014 0.201 0.232 0.028 0.031 0.206 0.228 0.046 0.051 0.069 0.091 HDI 0.209 0.357 0.205 0.297 0.202 0.176 0.270 0.405 0.185 0.317 0.284 0.142 0.526 0.215 0.359 0.176 0.112 0.101 0.216 0.256 0.228 0.171 0.158 0.187 0.041 0.298 0.131 0.119 0.071 0.155 0.362 0.142 0.025 0.007 0.176 0.244 0.184 0.066 0.061 THDI THDI1 0.224 0.230 0.537 0.620 0.198 0.220 0.489 0.562 0.221 0.228 0.233 0.278 0.285 0.302 0.509 0.531 0.408 0.520 0.514 0.579 0.427 0.453 0.271 0.335 0.532 0.533 0.229 0.236 0.579 0.788 0.319 0.348 0.195 0.214 0.148 0.152 0.250 0.258 0.397 0.581 0.413 0.414 0.226 0.256 0.366 0.367 0.590 0.678 0.228 0.231 0.303 0.304 0.198 0.255 0.184 0.210 0.122 0.151 0.339 0.342 0.370 0.373 0.183 0.199 0.418 0.599 0.013 0.014 0.234 0.278 0.293 0.335 0.301 0.302 0.114 0.115 0.120 0.240 15 A PREPRINT - APRIL 5, 2019 (a) TCOS1-TCOS 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P SI FIGURES (b) TSSI1-TSSI 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (c) THPI1-THPI (d) TCN1-TCN 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 (e) TJAC1-TJAC 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (g) TPA1-TPA 6 4 2 0 ) T ( P , / ) T 1 T ( P 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -2 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 Figure S1: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = 8βc here, where βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations. (a) TCOS1-TCOS 0.2 0 -0.2 -0.4 ) T ( P , / ) T 1 T ( P (c) THPI1-THPI (b) TSSI1-TSSI 0.2 0 -0.2 -0.4 ) T ( P , / ) T 1 T ( P 0.5 0 -0.5 -1 ) T ( P , / ) T 1 T ( P (d) TCN1-TCN 0.5 0 -0.5 -1 ) T ( P , / ) T 1 T ( P -0.6 0 1 Clustering coefficient 0.5 -0.6 0 1 Clustering coefficient 0.5 -1.5 0 1 Clustering coefficient 0.5 -1.5 0 1 Clustering coefficient 0.5 (e) TJAC1-TJAC 0.5 0 -0.5 -1 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI 0.5 0 -0.5 -1 ) T ( P , / ) T 1 T ( P (g) TPA1-TPA 1 0 -1 -2 ) T ( P , / ) T 1 T ( P 2 0 -2 -4 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -1.5 0 1 Clustering coefficient 0.5 -1.5 0 1 Clustering coefficient 0.5 -3 0 1 Clustering coefficient 0.5 -6 0 1 Clustering coefficient 0.5 Figure S2: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = βc here, where βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations. 16 (a) TCOS1-TCOS 1 0.5 0 ) T ( P , / ) T 1 T ( P 1 0.5 0 ) T ( P , / ) T 1 T ( P -0.5 1 0 Clustering coefficient 0.5 -0.5 (b) TSSI1-TSSI (c) THPI1-THPI ) T ( P , / ) T 1 T ( P 1 0.5 0 -0.5 A PREPRINT - APRIL 5, 2019 (d) TCN1-TCN 1 0.5 0 ) T ( P , / ) T 1 T ( P 1 0 Clustering coefficient 0.5 1 0 Clustering coefficient 0.5 -0.5 1 0 Clustering coefficient 0.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (e) TJAC1-TJAC 1 0.5 0 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI (g) TPA1-TPA 1 0.5 0 ) T ( P , / ) T 1 T ( P 1 0.5 0 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 Figure S3: Results for the SIR spreading dynamics: Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient (see Methods for the definition). Each dot represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = 2 βc here, where βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations. i i n o s c e r P i i n o s c e r P i i n o s c e r P i i n o s c e r P i i n o s c e r P 1 0.5 0 1 0.5 0 1 0.5 0 1 0.5 0 0.4 0.2 0 (a) Word TC O S1 TSSI1 TH PI1 TJA C1 TC N1 (c) Residence hall TH DI1 TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TJA C1 TH DI1 TC N1 (e) Physicians TPA1 TLH N1 i i n o s c e r P i i n o s c e r P TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 (g) USAir i i n o s c e r P TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 (i) Crim TH DI1 TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 TPA1 TLH N1 i i n o s c e r P i i n o s c e r P 1 0.5 0 1 0.5 0 0.4 0.2 0 0.4 0.2 0 0.2 0.1 0 (b) Jazz TJA C1 TH DI1 (d) E.coli TJA C1 TH DI1 (f) Neural TJA C1 TH DI1 (h) Dublin TPA1 TLH N1 TPA1 TLH N1 TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TC O S1 TSSI1 TH PI1 TC N1 TC O S1 TSSI1 TH PI1 TC N1 TC O S1 TSSI1 TC N1 TH PI1 TPA1 (j) Caenorhabditis elegans TJA C1 TH DI1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 TPA1 TLH N1 Figure S4: Results for the SIR spreading dynamics: Reconstruction precision for 10 networks. Each panel represents the performance of the 8 TX1 metrics for a single network. This figure shows the results for β = 4 βc, where βc = hki/(hk2i − hki), and f = 0.5. The results are averaged over 50 independent realizations. 17 i i n o s c e r P i i n o s c e r P i i n o s c e r P i i n o s c e r P 1 0.5 0 0.4 0.2 0 0.2 0.1 0 1 0.5 0 i i n o s c e r P 0.02 0.01 0 (a) Email TC O S1 TSSI1 TH PI1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 (c) Air traffic control TC N1 (e) Human protein TJA C1 TH DI1 i i n o s c e r P i i n o s c e r P TPA1 TLH N1 TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TPA1 (g) UC Irvine messages TJA C1 TH DI1 TLH N1 TC O S1 TSSI1 TH PI1 TJA C1 TH DI1 TC N1 (i) Advogato TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 TPA1 TLH N1 i i n o s c e r P i i n o s c e r P i i n o s c e r P 0.4 0.2 0 1 0.5 0 0.4 0.2 0 0.4 0.2 0 1 0.5 0 A PREPRINT - APRIL 5, 2019 (b) Blogs TC O S1 TSSI1 TH PI1 TC N1 TJA C1 (d) TAP TH DI1 TPA1 TLH N1 TC O S1 TSSI1 TC N1 TH PI1 TPA1 (f) Hamsterster friendships TJA C1 TH DI1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 (h) Adolescent health TPA1 TLH N1 TLH N1 TC O S1 TSSI1 TH PI1 TH DI1 TC N1 (j) Euroroad TJA C1 TPA1 TLH N1 TC O S1 TSSI1 TH PI1 TC N1 TJA C1 TH DI1 TPA1 TLH N1 Figure S5: Results for the SIR spreading dynamics: Reconstruction precision for 10 networks. Each panel is the performance of the 8 TX1 metrics for a single network. This figure shows the results for β = 4 βc, where βc = hki/(hk2i − hki), and f = 0.5. The results are averaged over 50 independent realizations. 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (a) TCOS1-TCOS 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (b) TSSI1-TSSI 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (c) THPI1-THPI (d) TCN1-TCN 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (e) TJAC1-TJAC 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI (g) TPA1-TPA 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P 1.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 Figure S6: Results for the SI spreading dynamics [3, 70]. The SI model is a special case of the SIR model where each infected node cannot recover (µ = 0). Reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact networks. For all classes of similarity, almost all the empirical networks fall above the P(T1)=P(T) red line; the only exceptions are some of the networks with low clustering coefficient. We used β = 4hki/(hk2i − hki), and f = 0.5 here. The results are averaged over 50 independent realizations. 18 A PREPRINT - APRIL 5, 2019 1 0.5 0 ) T ( P , / ) T 1 T ( P (a) TCOS1-TCOS 1 0.5 0 ) T ( P , / ) T 1 T ( P (b) TSSI1-TSSI 1 0.5 0 ) T ( P , / ) T 1 T ( P (c) THPI1-THPI 1 0.5 0 ) T ( P , / ) T 1 T ( P (d) TCN1-TCN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 1 0.5 0 ) T ( P , / ) T 1 T ( P (e) TJAC1-TJAC 1 0.5 0 ) T ( P , / ) T 1 T ( P (f) THDI1-THDI 1 0.5 0 ) T ( P , / ) T 1 T ( P (g) TPA1-TPA 1 0.5 0 ) T ( P , / ) T 1 T ( P (h) TLHN1-TLHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 Figure S7: Results for the LTM (Linear Threshold Model) [12, 30]. In the LTM, we replace a link by a pair of directed links, A → B and B → A, and every directed edge has a weight 1/kind represents the indegree of node i. Each node is in one among two possible states, Inactive or Active. A node activates if Pj Aij Wij ≥ θi, where θi represents node i's threshold. In our simulations, we start from an initial condition with a fraction f = 0.5 of randomly-selected Active nodes, and we set θi = θ = 0.1. We show here the reconstruction precision relative difference ∆P (T 1, T )/P (T ) = (P (T 1) − P (T ))/P (T ) as a function of the network clustering coefficient. Each dot represents an empirical network; we analyzed 40 empirical contact networks. For all classes of similarity, almost all the empirical networks fall above the P(T1)=P(T) red line; the only exceptions are some of the networks with low clustering coefficient. The results are averaged over 50 independent realizations. , where kind i i 19 A PREPRINT - APRIL 5, 2019 (c) THPI1-HPI (b) TSSI1-SSI (a) TCOS1-COS 1 0.5 0 1 0.5 0 ) ( S C U A / ) , S 1 T ( C U A 1 0.5 0 ) ( S C U A / ) , S 1 T ( C U A 1 0.5 0 ) ( S C U A / ) , S 1 T ( C U A (d) TCN1-CN -0.5 1 0 Clustering coefficient 0.5 -0.5 1 0 Clustering coefficient 0.5 -0.5 1 0 Clustering coefficient 0.5 -0.5 1 0 Clustering coefficient 0.5 (g) TPA1-PA (f) THDI1-HDI (e) TJAC1-JAC 1 0.5 0 1 0.5 0 ) ( S C U A / ) , S 1 T ( C U A 2 1 0 ) ( S C U A / ) , S 1 T ( C U A 1 0.5 0 ) ( S C U A / ) , S 1 T ( C U A (h) TLHN1-LHN -0.5 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 -1 0 1 Clustering coefficient 0.5 -0.5 0 1 Clustering coefficient 0.5 ) ( S C U A / ) , S 1 T ( C U A ) ( S C U A / ) , S 1 T ( C U A for Results the SIR spreading Figure S8: difference ∆AU C(T 1, S)/AU C(S) = (AU C(T 1) − AU C(S))/AU C(S) as a function of the network clustering coeffi- cient (see Methods for the definition). Each dot represents an empirical network, we totally analyzed 40 empirical network. We use f = 0.5, β = 4 βc here, where βc = hki/(hk2i − hki). The results are averaged over 50 independent realizations. Reconstruction AUC relative dynamics: References [1] Lada A Adamic and Natalie Glance. The Political Blogosphere and the 2004 US Election: Divided they Blog. In Proceedings of the 3rd International Workshop on Link Discovery, pages 36 -- 43. ACM, 2005. [2] Mohammad Al Hasan and Mohammed J Zaki. A survey of link prediction in social networks. In Social network data analytics, pages 243 -- 275. Springer, 2011. [3] Roy M Anderson and Robert M May. Infectious diseases of humans: dynamics and control. Oxford university press, Oxford, England, UK, 1992. [4] Lars Backstrom and Jure Leskovec. Supervised random walks: predicting and recommending links in social networks. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pages 635 -- 644. ACM, 2011. [5] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The role of social networks in information In Proceedings of the 21st International Conference on World Wide Web, pages 519 -- 528. ACM, diffusion. 2012. [6] Albert-László Barabási and Réka Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. [7] Neli Blagus, Lovro Šubelj, and Marko Bajec. Self-similar scaling of density in complex real-world networks. Physica A, 391(8):2794 -- 2802, 2012. [8] D. E. Boyce, K. S. Chon, M. E. Ferris, Y. J. Lee, K-T. Lin, and R. W. Eash. Implementation and evaluation of combined models of urban travel and location on a sketch planning network. Chicago Area Transportation Study, pages xii + 169, 1985. [9] Dirk Brockmann and Dirk Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337 -- 1342, 2013. [10] Carlo Vittorio Cannistraci, Gregorio Alanis-Lobato, and Timothy Ravasi. From link-prediction in brain con- nectomes and protein interactomes to the local-community-paradigm in complex networks. Sci. Rep., 3:1613, 2013. 20 A PREPRINT - APRIL 5, 2019 [11] Wei Chen, Hongzhi Yin, Weiqing Wang, Lei Zhao, and Xiaofang Zhou. Effective and efficient user account linkage across location based social networks. In Proceedings of the 34th IEEE International Conference on Data Engineering, pages 1085 -- 1096. IEEE, 2018. [12] Wei Chen, Yifei Yuan, and Li Zhang. Scalable influence maximization in social networks under the linear threshold model. In Proceedings of the 10th IEEE International Conference on Data Mining, pages 88 -- 97. IEEE, 2010. [13] Yuanfang Chen, Noel Crespi, Antonio M Ortiz, and Lei Shu. Reality mining: A prediction algorithm for disease dynamics based on mobile big data. Inf. Sci., 379:82 -- 93, 2017. [14] Giulio Cimini, Tiziano Squartini, Diego Garlaschelli, and Andrea Gabrielli. Systemic risk analysis on recon- structed economic and financial networks. Sci. Rep., 5:15758, 2015. [15] Valerio Ciotti, Moreno Bonaventura, Vincenzo Nicosia, Pietro Panzarasa, and Vito Latora. Homophily and missing links in citation networks. EPJ Data Sci., 5(1):7, 2016. [16] Aaron Clauset, Cristopher Moore, and Mark EJ Newman. Hierarchical structure and the prediction of missing links in networks. Nature, 453(7191):98, 2008. [17] James Coleman, Elihu Katz, and Herbert Menzel. The diffusion of an innovation among physicians. Sociometry, pages 253 -- 270, 1957. [18] James Samuel Coleman. Introduction to mathematical sociology. London Free Press Glencoe, 1964. [19] Simone Daminelli, Josephine Maria Thomas, Claudio Durán, and Carlo Vittorio Cannistraci. Common neigh- bours and the local-community-paradigm for topological link prediction in bipartite networks. New J. Phys., 17(11):113037, 2015. [20] Jordi Duch and Alex Arenas. Community detection in complex networks using extremal optimization. Phys. Rev. E Stat. Nonlin. Soft, 72(2):027104, 2005. [21] Jordi Duch and Alex Arenas. Community detection in complex networks using extremal optimization. Phys. Rev. E Stat. Nonlin. Soft, 72(2):027104, 2005. [22] R. W. Eash, K. S. Chon, Y. J. Lee, and D. E. Boyce. Equilibrium traffic assignment on an aggregated highway network for sketch planning. Transportation Research Record, 994:30 -- 37, 1983. [23] Linton Clarke Freeman, Cynthia Marie Webster, and Deirdre M Kirke. Exploring social structure using dynamic three-dimensional color images. Social Networks, 20(2):109 -- 118, 1998. [24] Zhong-Ke Gao, Yu-Xuan Yang, Peng-Cheng Fang, Ning-De Jin, Cheng-Yi Xia, and Li-Dan Hu. Multi- frequency complex network from time series for uncovering oil-water flow structure. Sci. Rep., 5:8222, 2015. [25] Anne-Claude Gavin, Patrick Aloy, Paola Grandi, Roland Krause, Markus Boesche, Martina Marzioch, Christina Rau, Lars Juhl Jensen, Sonja Bastuck, Birgit Dümpelfeld, et al. Proteome survey reveals modularity of the yeast cell machinery. Nature, 440(7084):631, 2006. [26] M Girvan and MEJ Newman. Network of american football games between division ia colleges during regular season fall 2000. Proc. Natl. Acad. Sci., 99:7821 -- 7826, 2002. [27] Pablo M. Gleiser and Leon Danon. Community structure in jazz. Advances in Complex Systems, 6(4):565 -- 573, 2003. [28] Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Krause. Inferring networks of diffusion and influence. ACM Trans. Knowl. Discov. Data, 5(4):21, 2012. [29] Maoguo Gong, Jianan Yan, Bo Shen, Lijia Ma, and Qing Cai. Influence maximization in social networks based on discrete particle swarm optimization. Inf. Sci., 367:600 -- 614, 2016. [30] Mark Granovetter. Threshold models of collective behavior. Am. J. Sociol., 83(6):1420 -- 1443, 1978. [31] Aditya Grover and Jure Leskovec. Node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 855 -- 864. ACM, 2016. [32] Roger Guimerà, Leon Danon, Albert Dàaz-Guilera, Francesc Giralt, and Alex Arenas. Self-similar community structure in a network of human interactions. Phys. Rev. E Stat. Nonlin. Soft, 68(6):065103, 2003. [33] Roger Guimerà and Marta Sales-Pardo. Missing and spurious interactions and the reconstruction of complex networks. Proc. Natl. Acad. Sci., 106(52):22073 -- 22078, 2009. [34] Petter Holme and Jari Saramäki. Temporal networks. Phys. Rep., 519(3):97 -- 125, 2012. 21 A PREPRINT - APRIL 5, 2019 [35] Zan Huang and Dennis KJ Lin. The time-series link prediction problem with applications in communication surveillance. INFORMS J. Comput., 21(2):286 -- 303, 2009. [36] Lorenzo Isella, Juliette Stehlà c(cid:13), Alain Barrat, Ciro Cattuto, Jean-François Pinton, and Wouter Van den Broeck. What's in a crowd? analysis of face-to-face behavioral networks. J. Theor. Biol., 271(1):166 -- 180, 2011. [37] Paul Jaccard. Étude comparative de la distribution florale dans une portion des alpes et des jura. Bull. Soc. Vaudoise Sci. Nat., 37:547 -- 579, 1901. [38] Hawoong Jeong, Bálint Tombor, Réka Albert, Zoltan N Oltvai, and A-L Barabási. The large-scale organization of metabolic networks. Nature, 407(6804):651, 2000. [39] Leo Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39 -- 43, 1953. [40] David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137 -- 146. ACM, 2003. [41] István A Kovács, Katja Luck, Kerstin Spirohn, Yang Wang, Carl Pollis, Sadie Schlabach, Wenting Bian, Dae- Kyum Kim, Nishka Kishore, and Tong Hao. Network-based prediction of protein interactions. bioRxiv, page 275529, 2018. [42] Danielle H Lee and Peter Brusilovsky. How to measure information similarity in online social networks: A case study of citeulike. Inf. Sci., 418:46 -- 60, 2017. [43] Elizabeth A Leicht, Petter Holme, and Mark EJ Newman. Vertex similarity in networks. Phys. Rev. E, 73(2):026120, 2006. [44] Rong-Hua Li, Jeffery Xu Yu, Xin Huang, and Hong Cheng. Robust reputation-based ranking on bipartite rating networks. In Proceedings of the 2012 SIAM International Conference on Data Mining, pages 612 -- 623. SIAM, 2012. [45] Rong-Hua Li, Jeffrey Xu Yu, and Jianquan Liu. Link prediction: the power of maximal entropy random walk. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pages 1147 -- 1156. ACM, 2011. [46] Yongjun Li, Zhen Zhang, You Peng, Hongzhi Yin, and Quanqing Xu. Matching user accounts based on user generated content across social networks. Future Gener. Comput. Syst., 83:104 -- 115, 2018. [47] Hao Liao, Manuel Sebastian Mariani, Matúš Medo, Yi-Cheng Zhang, and Ming-Yang Zhou. Ranking in evolv- ing complex networks. Phys. Rep., 689:1 -- 54, 2017. [48] Hao Liao and An Zeng. Reconstructing propagation networks with temporal similarity. Sci. Rep., 5:11404, 2015. [49] David Liben-Nowell and Jon Kleinberg. The link-prediction problem for social networks. J. Am. Soc. Inform. Sci. Tech., 58(7):1019 -- 1031, 2007. [50] Linyuan Lü, Liming Pan, Tao Zhou, Yi-Cheng Zhang, and H Eugene Stanley. Toward link predictability of complex networks. Proc. Natl. Acad. Sci., 112(8):2325 -- 2330, 2015. [51] Linyuan Lü and Tao Zhou. Link prediction in complex networks: A survey. Physica A, 390(6):1150 -- 1170, 2011. [52] Neo D. Martinez, John J. Magnuson, Timothy. Kratz, and M. Sierszen. Artifacts or attributes? effects of resolution on the Little Rock Lake food web. Ecological Monographs, 61:367 -- 392, 1991. [53] Víctor Martínez, Fernando Berzal, and Juan-Carlos Cubero. A survey of link prediction in complex networks. ACM Comput. Surv., 49(4):69, 2017. [54] Paolo Massa, Martino Salvetti, and Danilo Tomasoni. Bowling alone and trust decline in social network sites. In Proc. Int. Conf. Dependable, Autonomic and Secure Computing, pages 658 -- 663, 2009. [55] Julian McAuley and Jure Leskovec. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems, pages 548 -- 556. 2012. [56] Matúš Medo, Manuel S Mariani, An Zeng, and Yi-Cheng Zhang. Identification and impact of discoverers in online social systems. Sci. Rep., 6:34218, 2016. [57] James Moody. Peer influence groups: Identifying dense clusters in large networks. Social Networks, 23(4):261 -- 283, 2001. 22 A PREPRINT - APRIL 5, 2019 [58] Alessandro Muscoloni and Carlo Vittorio Cannistraci. Local-ring network automata and the impact of hyper- bolic geometry in complex network link-prediction. arXiv preprint arXiv:1707.09496, 2017. [59] Seth Myers and Jure Leskovec. On the convexity of latent social network inference. In Advances in Neural Information Processing Systems 23, pages 1741 -- 1749, 2010. [60] Mark E. J. Newman. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E Stat. Nonlin. Soft, 74(3), 2006. [61] Tore Opsahl, Filip Agneessens, and John Skvoretz. Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 3(32):245 -- 251, 2010. [62] Tore Opsahl and Pietro Panzarasa. Clustering in weighted networks. Social Networks, 31(2):155 -- 163, 2009. [63] Fragkiskos Papadopoulos, Maksim Kitsak, M Ángeles Serrano, Marián Boguná, and Dmitri Krioukov. Popu- larity versus similarity in growing networks. Nature, 489(7417):537, 2012. [64] Romualdo Pastor-Satorras, Claudio Castellano, Piet Van Mieghem, and Alessandro Vespignani. Epidemic processes in complex networks. Rev. Mod. Phys., 87(3):925, 2015. [65] Sen Pei, Lev Muchnik, José S Andrade Jr, Zhiming Zheng, and Hernán A Makse. Searching for superspreaders of information in real-world social media. Sci. Rep., 4:5547, 2014. [66] Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, and Dongqing Xie. Social influence modeling using information theory in mobile social networks. Inf. Sci., 379:146 -- 159, 2017. [67] Gerard Salton and Michael J. McGill. Introduction to Modern Information Retrieval. McGraw-Hill, Inc., New York, NY, USA, 1986. [68] Zhesi Shen, Wen-Xu Wang, Ying Fan, Zengru Di, and Ying-Cheng Lai. Reconstructing propagation networks with natural diversity and identifying hidden sources. Nat. Commun., 5:4323, 2014. [69] T.J. Sørensen. A Method of Establishing Groups of Equal Amplitude in Plant Sociology Based on Similarity of Species Content and Its Application to Analyses of the Vegetation on Danish Commons. Biologiske skrifter. I kommission hos E. Munksgaard, Argentina, Schleswig, Sun, 1948. [70] Michele Starnini, Anna Machens, Ciro Cattuto, Alain Barrat, and Romualdo Pastor-Satorras. Immunization strategies for epidemic processes in time-varying contact networks. J. Theor. Biol., 337:89 -- 100, 2013. [71] U. Stelzl, U. Worm, M. Lalowski, C. Haenig, F. H. Brembeck, H. Goehler, M. Stroedicke, M. Zenkner, A. Schoenherr, S. Koeppen, J. Timm, S. Mintzlaff, C. Abraham, N. Bock, S. Kietzmann, A. Goedde, E Toksàz, A. Droege, S. Krobitsch, B. Korn, W. Birchmeier, H. Lehrach, and E. E. Wanker. A human protein -- protein interaction network: A resource for annotating the proteome. Cell, 122:957 -- 968, 2005. [72] Lovro Šubelj and Marko Bajec. Ubiquitousness of link-density and link-pattern communities in real-world networks. Eur. Phys. J. B Condens. Matter, 85(1):32, 2012. [73] Zhi Sun, Qinke Peng, Jia Lv, and Jing Zhang. A prediction model of post subjects based on information lifecycle in forum. Inf. Sci., 337:59 -- 71, 2016. [74] Matic Tribušon and Matevž Lenic. Identifying top football players and springboard clubs from a football player collaboration and club transfer networks. arXiv preprint arXiv:1602.03664, 2016. [75] Christian Von Mering, Roland Krause, Berend Snel, Michael Cornell, Stephen G Oliver, Stanley Fields, and Peer Bork. Comparative assessment of large-scale data sets of protein -- protein interactions. Nature, 417(6887):399, 2002. [76] Lovro Šubelj and Marko Bajec. Robust network community detection using balanced propagation. Eur. Phys. J. B, 81(3):353 -- 362, 2011. [77] Jian Wang, Reinhilde Veugelers, and Paula Stephan. Bias against novelty in science: A cautionary tale for users of bibliometric indicators. Research Policy, 46(8):1416 -- 1436, 2017. [78] Duncan J. Watts and Steven H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(1):440 -- 442, 1998. [79] Duncan J Watts and Steven H Strogatz. Collective dynamics of 'small-world'networks. Nature, 393(6684):440, 1998. [80] Peipei Xia, Li Zhang, and Fanzhang Li. Learning similarity with cosine similarity ensemble. Inf. Sci., 307:39 -- 52, 2015. [81] Zhi Yu, Can Wang, Jiajun Bu, Xin Wang, Yue Wu, and Chun Chen. Friend recommendation with content spread enhancement in social networks. Inf. Sci., 309:102 -- 118, 2015. 23 A PREPRINT - APRIL 5, 2019 [82] Wayne Zachary. An information flow model for conflict and fission in small groups. J. of Anthropological Research, 33:452 -- 473, 1977. [83] An Zeng. Inferring network topology via the propagation process. J. Stat. Mech. Theory Exp., 2013(11):11010, 2013. [84] Qian-Ming Zhang, Linyuan Lü, Wen-Qiang Wang, Tao Zhou, et al. Potential theory for directed networks. PloS one, 8(2):e55437, 2013. 24
1307.2084
1
1307
2013-07-08T13:15:12
Mitigating Epidemics through Mobile Micro-measures
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Epidemics of infectious diseases are among the largest threats to the quality of life and the economic and social well-being of developing countries. The arsenal of measures against such epidemics is well-established, but costly and insufficient to mitigate their impact. In this paper, we argue that mobile technology adds a powerful weapon to this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure and model the detailed behavioral patterns of the affected population, and (b) they enable the delivery of personalized behavioral recommendations to individuals in real time. We combine these two ideas and propose several strategies to generate such recommendations from mobility patterns. The goal of each strategy is a large reduction in infections, with a small impact on the normal course of daily life. We evaluate these strategies over the Orange D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the population participates. These preliminary results demonstrate the potential of mobile technology to complement other measures like vaccination and quarantines against disease epidemics.
cs.SI
cs
Mitigating Epidemics through Mobile Micro-measures Mohamed Kafsi, Ehsan Kazemi, Lucas Maystre, Lyudmila Yartseva, Matthias Grossglauser, Patrick Thiran School of Computer and Communication Sciences, EPFL [email protected] Abstract. Epidemics of infectious diseases are among the largest threats to the quality of life and the economic and social well-being of developing countries. The arsenal of measures against such epidemics is well-established, but costly and insufficient to mitigate their impact. In this paper, we argue that mobile technology adds a powerful weapon to this arsenal, because (a) mobile devices endow us with the unprecedented ability to measure and model the detailed behavioral patterns of the affected population, and (b) they enable the delivery of personalized behavioral recommendations to individuals in real time. We combine these two ideas and propose several strategies to generate such recommendations from mobility patterns. The goal of each strategy is a large reduction in infections, with a small impact on the normal course of daily life. We evaluate these strategies over the Orange D4D dataset and show the benefit of mobile micro-measures, even if only a fraction of the population participates. These preliminary results demonstrate the potential of mobile technology to complement other measures like vaccination and quarantines against disease epidemics. 1 Introduction Modeling and effectively mitigating the spread of infectious diseases has been a long- standing public health goal. The stakes are high: throughout human history, epidemics have had significant death tolls. In the mid-14th century [15], between 30% and 50% of Eu- rope's population died due to the Black Death. In 1918, the Spanish flu pandemic caused an estimated 50 million deaths worldwide [33]. More recently, the 2002 -- 2003 SARS pan- demic that originated in Hong-Kong and spread worldwide caused the death of 774 [36]. These events highlight not only the scale of the problem but also our vulnerability, past and present. The situation worsens in times of crises. A recent example is the ongoing cholera outbreak in Haiti: it started in 2010, a few months after a major earthquake. Cholera is a recurring issue in West African countries as well, with many deaths reported each time. Effective measures against an epidemic require an accurate and up-to-date assessment of the situation, a very fast response and a strong coordination, which are colossal organizational efforts under tight time constraints. To this day, there is no uncontested way of preventing epidemics in general. Traditionally, many methods that have been used involve top-down approaches such as vaccination campaigns, the set-up of medical shelters, travel restrictions or quarantines [19]. These methods have several drawbacks: they are difficult and slow to be put into place, they can be expensive and also freedom-restrictive. It is clear that any improvement could have a tremendous impact and translate into significant welfare gains. In our work, we focus on human-mediated epidemics (transmitted by human contact, e.g., influenza). For these epidemics, human mobility clearly plays a crucial role in that it enables the epidemic to travel and spread geographically. We will explore new mitigation methods 1 3 1 0 2 l u J 8 ] I S . s c [ 1 v 4 8 0 2 . 7 0 3 1 : v i X r a and expand the solution space. In particular, we argue that taking advantage of mobile technology opens up many possibilities for mitigating the spread of an epidemic in original and distinctive ways. Importantly, mobile technology is unique in that it is allows the personalization of countermeasures through precise measurements at the individual level, as well as individualized recommendations. It is this combination of information extracted from mobile data and subsequent personalization of prevention advice that opens up novel ways of mitigating an epidemic. We envision a mobile service that sends recommendations that invite the individuals to adapt their behavior, for example by delaying or canceling a trip. More generally, we formulate subtle, precise and minimally restrictive personalized behavioral rules that, if followed even partially, will have a positive global effect on the epidemic. 1.1 Context and Contributions Our work was spurred by the Data for Development challenge1 organized by France Telecom- Orange, a global telecommunications operator. Participants in this challenge have access to data gathered from 2.5 billion calls made by 5 million users in Ivory Coast. The goal is to find an original and creative use of this data that contributes towards the social, economic and environmental development of Ivory Coast. Four different datasets were derived from call detail records (CDRs) recorded over a period of 5 months, from December 2011 to April 2012. Blondel et al. [8] provide a detailed description of the datasets. Among these, two are mobility traces containing the time and the location at which a sample of the users made their phone calls. In order to protect the users' privacy, the datasets reflect different trade- offs in terms of the location's accuracy and the time span over which the trace is provided. We use this data to build a home location and time-dependent model of human mobility in Ivory Coast, which allows us to accurately capture population movements across the country (Section 4). These mobility patterns then power the core of our epidemic model, which allows us to analyze epidemic outbreaks at the level of single individuals (Section 5). Beyond these models, our main contribution is to foster the idea of a mobile service that sends personal recommendations to help mitigate an epidemic. The mobile service is an original idea that has several advantages over existing methods. In particular, we introduce and motivate the concept of micro-measures, individual countermeasures tailored to their recipients' specific behavior; this new approach is the opposite of the one-size-fits-all pattern that characterizes most traditional mitigation measures. We present several concrete such micro-measures and discuss their potential (Section 3). Finally, we empirically evaluate their effectiveness using our epidemic model and provide some insights into further research directions (Section 6). 2 Related Work Infectious diseases, also known as transmissible diseases are one of the the major causes of deaths in human societies. An epidemic is a rapid and extensive spread of a transmissible disease that affects many individuals in an area, community, or population. In order to study epidemics, scientists need to describe them mathematically, which enables them to 1See: http://www.d4d.orange.com/. The challenge was launched in mid-2012 and ended on February 15th, 2013. 2 predict epidemic outbreaks and to find strategies for decreasing mortality rates, and hence the costs to the economy. In their seminal work, Kermack and McKendrick [23] introduce a SIR model with three distinct classes of populations: susceptibles, infectives and recovered. This simple, yet powerful, model is very popular for modeling the evolution of epidemics in populations. Hethcote [17] reviews different extensions of this model (SIS, SI, SEIS and etc.), as well as threshold theorems involving measures such as the reproduction number, which is the average number of secondary infections caused by an infected individual when in contact with a population of susceptibles. Instead of modeling an epidemic for the population in a region, it is possible to increase geographical granularity by dividing the original region in sub-regions, and then study the SIR model for the population of each region [1, 5, 26, 34]. By assuming that human contacts are responsible for disease transmission, the disease spread among sub-regions is driven by the mobility of individuals. Sattenspiel and Dietz [26] take into account the home region of individuals in order to simulate their mobility. One of the simple approaches to modeling population mobility is the gravity model that is based on two assumptions: Mobility flux between two regions is proportional to the product of their population's size. It decays as the distance separating them increases [29]. For example, recently, Rinaldo et al. [25] study the Haiti cholera outbreak (2010 -- 2011) and try to predict the next outbreaks of cholera, using the gravity model and rainfall as drivers of disease transmission. By using a stochastic computational framework, Colizza et al. [9] study the epidemic propagation on a larger scale: They analyse the effect of airline transportation (complete worldwide air travel infrastructure complemented with census population data) on global epidemics. In order to improve the realism of epidemic models, we need to build more accurate and data- driven mobility models. CDRs collected by cellular services are used for studying human mobility, because they represent a rich source of information about mobility [2, 3, 4, 14, 20, 31]. For example, Gonzalez et al. [14] analyze the trajectory of 100,000 mobile phone users over a six-month period. They find that human trajectories exhibit very regular patterns, hence we can model each individual mobility with only a few parameters. Isaacman et al. [21] model how a large population move within different metropolitan areas. Because of the sporadic nature of CDRs, Ficek and Kencl [12] use a Gaussian mixture model to reproduce probabilistically location of users between two consecutive calls. Based on the number of unique antennas observed by each user, Halepovic and Williamson [16] assume that some proportion of the population are static and always stay in their home regions. The development of strategies for controlling epidemics such as influenza is one of the high priorities of global public health policies [11, 13, 18, 19]. SIR models, which incorporate mo- bility between regions, represent powerful tools for designing and testing different strategies to control epidemics. The quarantine is one of the methods often used to limit the spread of infectious diseases within human populations. We lack information however about the ef- fectiveness of quarantine on controlling epidemics. Sattenspiel and Herring [27] use records of the influenza epidemic, which took place in Canada at 1918-19, to investigate the effect of quarantine. They show that a quarantine is effective only when mobility is restricted, and that it depends on its application-time and duration. In addition to these issues about the effectiveness of quarantine, there are issues, that include implementation challenges, economic cost and the violation of civil rights, especially in the cases of long confinement or isolation from society. Another way to control epidemics is to vaccinate the susceptible 3 population in a series of pulses called pulse vaccination [24, 28, 30, 37, 38]. For example, Zaman et al. [37] define a control optimization problem based on the SIR model. They try to compute the optimum percentage of susceptible population to be vaccinated at each time. This method requires the vaccination of at least 10 percent of the susceptible population at each time step, in order to make a small change in the epidemic behaviour of the infectious disease. 3 Mobile Micro-measures Traditional epidemic mitigation methods consist of heavy, top-down approaches such as blockades, quarantines or large-scale vaccinations. As an alternative, we suggest that mobile technology could enable a much richer and sophisticated set of mitigation measures for human-mediated epidemics, which we name micro-measures. Let us illustrate our vision by describing a simple scenario. Jean, an 18 year old inhabitant of Ivory Coast living in Northeastern Bouak´e, would like to play pickup football. He knows that a meningitis outbreak just surfaced in his district, and he does not want to take any risk. Bouak´e happens to be part of a pilot program of a mobile service that helps mitigate the spread of meningitis. Using his mobile phone, he sends a short request to the service that instantly computes the following personalized recommendation for him: to minimize the risk, he should try the football field a few kilometers southwards, instead of going to the one he is used to. It would be best if he took the gbaka (small bus) in about 17 minutes, this way he would avoid contact with the kids coming back home from the school nearby. Of course, this scenario presents an idealized and naive view of reality; Jean might not have a cell phone to begin with, the bus might not have such a precise schedule, and there might not be alternative locations where people are playing pickup football. It nevertheless gives an overview of the level of refinement that can be achieved through personal recommendations. The main properties of such a service are as follows: Personalized. Recommendations are generated and communicated on an individual basis. Mobile technology enables this in two ways: first, it allows for a quantity of valuable behavioral information (such as location and activity) to be recorded and second, it provides a readily available unicast communication channel. Adaptive. As the epidemic progresses and each individuals' intentions are discovered, the recommendations are instantly adapted. The personalization of mobile micro- recommendations ensures their effectiveness. Such recommendations, in contrast with most large-scale mitigation efforts, would typically require much less time to be set up and would always be in phase with the current state of the epidemic. Microscopic. In contrast with a one-size-fits-all policy that typically considers an epidemic from a macroscopic perspective, micro-measures tend to focus on subtle and local changes. These changes, when looked at independently, are mostly insignificant; but taken together, they result in important global improvements. 4 State-independent. An additional property of the service is that it is epidemic-state independent: the recommendation should not depend on whether the individual is infective or not. First, it does not require prior knowledge about the state of an individual: it is often hard to determine precisely when he becomes infected. Second, it aligns the incentives: without additional knowledge, everyone can expect to benefit from following the recommendation -- this might not necessarily be the case when the state is known. This lays the foundation of our approach but does not yet suggest any concrete mitigation scheme. Still, there are fundamental questions related to the feasibility of micro-measures. Under which conditions do small, local changes (such as an individual agreeing to commute slightly earlier) have a global impact? How many individuals need to cooperate, and how does this, significantly alter the dynamics of the epidemic ? An epidemic can often be seen as being either supercritical (the epidemic grows) or subcritical (it declines). What microscopic changes are susceptible to cause a phase transition? Although a precise characterization of these changes and, by extension, rigorous answers to these questions are beyond the scope of our work, we intend to show initial evidence of the relevance of such a mobile service. 3.1 Concrete Micro-Measures Beyond a theoretical argument, our contribution is the description and evaluation of three concrete strategies we can use to generate micro-measures. They represent initial baselines for further developments. Let us first note that contacts between individuals can broadly be categorized into two groups: the deliberate contacts are, for example, between family members or at work, whereas the accidental contacts are formed by random encounters, for instance, while shopping or commuting. At a high level, our approach is to maintain deliberate contacts and rewiring the accidental ones. The idea is to weaken the links in the contact network that form the path through which the epidemic spreads. By changing its structure, we seek to decelerate the dynamics and drive the epidemic down to a sub-critical level. CutCommunities DecreaseMix GoHome to Knowledge maintain Recommendation Do not cross commu- List of communities of locations Intuition nity boundaries Weakening the weak geographical links Social communities of users Stay with your social circle Segmenting communities social State of the epidemic across regions Go/stay home Home is a safe place Table 1. We recapitulate the main characteristics of the three strategies we have imple- mented to mitigate the spread of epidemic. 3.1.1 CutCommunities strategy It is clear that mobility drives the spread of an epidemic. A straightforward strategy would therefore be to reduce long-range contacts, be it at the expense of reinforcing local ones. Uniformly reducing mobility is, however, both expensive and inflexible. To overcome 5 Figure 1. We find 30 communities in the mobility network (Section 6) when using the Louvain community detection algorithm. It is not surprising that these communities reflects the geographical proximity between nodes, as trips are more frequent between close antennas than between distant ones. this, our first strategy, CutCommunities, takes into account communities of locations in the mobility network, and focuses on reducing human mobility over inter-community links -- this is, in a sense, analogous to weakening the weak links in the network. The main difference with a simple blockade is that our strategy is able to adapt to changes in the network (mobility patterns vary over time, cf. Section 4). In practice, the service operator would maintain a list of location communities identified through the mobility patterns of its userbase; when an individual checks whether a trip is safe, the service would verify whether it crosses community boundaries and, if this is the case, discourage the individual from making this trip2. If additional per-location information is available about the current state of the epidemic, recommendations could be further corrected according to the strength 2As a relaxation of this counter-measure, we could consider postponing the trip instead. Simply by delaying certain trips, we could prevent harmful interactions between groups of individuals. This is analogous to time-division multiplexing; a slight change in the habits of a group of people might significantly change the contact surface. 6 of the epidemic at the individual's current and projected locations. 3.1.2 DecreaseMix strategy Instead of acting on mobility to segment contacts across location communities, we also consider segmentation social communities. The aim is to separate individuals inside the same location, e.g., by making them visit different aisles of the same supermarket at different times. Putting in place such a segmentation is more sophisticated than in the case of mobility, but this strategy is the perfect example of another extremal point in the solution space. The service operator would keep a list of social communities and would communicate a distinctive tag (e.g., a color) to individuals according to their community. Individuals would access locations differently, depending on their tag; for example, seating in a theater would be organized in such a way that contacts between communities are minimized. We are aware that this strategy could raise many concerns, because it segregates people, therefore great care would be needed if it were to be implemented. Despite this, we retain it because it reflects a different trade-off with respect to CutCommunities: instead of discouraging individuals from going to certain locations where they can be in contact with everyone, we allow them go everywhere, but restrict the contact network. 3.1.3 GoHome strategy We consider a third case where the service recommends individuals to go home. The intu- ition behind this strategy is that we assume that when at home, the contact rate decreases. Whereas the previous strategies target the individuals' location or contact network, this one is distinctive in that it affects the the rate of contact. With information on the progress of the epidemic across locations, the operator could prioritize sending advice to those indi- viduals whose cooperation would yield the greatest effect. In Section 6, we will provide a detailed evaluation of the three described strategies. Before doing so, we will introduce the mobility and epidemic models used for our assessments. 4 Mobility Model Because the spread of epidemics depends greatly on the mobility of infected individuals, and on the locations where they interact with other individuals, a realistic, data-driven mobility model is a essential tool for simulating realistic epidemic propagation. It should therefore model population mobility, take into account certain microscopic aspects at the individual level, and still allow simulations of epidemic propagation to scale up to millions of individuals. Moreover, it should capture the main differences between the mobility of different groups of individuals, where a group is constituted of individuals exhibiting similar mobility profiles. To construct a mobility model that fulfils these requirements, our intuition is : The home location of individuals strongly shapes their mobility patterns because the places they visit regularly e.g., their workplaces, schools or the shopping centers, depend on the proximity to their home. Typically, we expect the most visited location (home) and the second most visited location (school, university or work) to be geographically close to each other. In addition to this geographical aspect, mobility is strongly time-dependent: Individuals commute between home and work during the weekdays, with a substantial change in their travel behavior during the weekends. 7 Definition A = {1, . . . , 1231} SP = {1, . . . , 255} k sphome(u) ahome(u) X(n) t(n) hk(n) d(n) = day(t(n)) w(n) = weekday(t(n)) Domain - - N SP A A N Explanation Set of antennas Set of sub-prefectures Time resolution Home sub-prefecture Home antenna Antenna Absolute time {1, . . . , k} Period of the day {1, . . . , 7} Day of the week {0, 1} Day type: weekday or weekend Table 2. List of the definition and domain of the variables relative to user u, as well as those describing his nth visit. Building on this, we make the assumption that the individuals that share the same home- location exhibit a similar mobility pattern. Therefore, we construct a location and time- based mobility model that depends on the variables presented in Table 2. The conditional distribution of the location X(n) of user u depends on his home antenna ahome(u), but also on the time of the visits (hk(n), w(n)): p (X(n)u, t(n)) = p X(n)hk(n), w(n), ahome(u) (cid:16) (cid:17) . (1) First, we choose the the time resolution k = 3 in order to divide the day in 3 distinct periods: Morning (6 am to 1 pm), afternoon (1 pm to 8 pm) and night (8 pm to 6 am). Second, conditioning on the parameter w(n) allows us to distinguish between weekdays and weekends. Finally, the home antenna ahome(u) of user u is defined as the most visited antenna during the night period. Consequently, given the period of the day, the day type and the home antenna of user u, the distribution of the location that he might visit (1) is a multinomial distribution with A categories. 4.1 Learning and Evaluating Mobility Models In order to build our model from data, we analyse SET2, one of the datatsets provided by France Telecom-Orange [8]. It contains high-resolution trajectories of 500,000 users, observed over a two-week period. We focus on this datatset, as it offers the highest geo- graphical resolution : Individuals' locations are observed across antennas. To avoid having to deal with users whose location samples are very sparse, we consider only the users who visited more than 1 antenna and made on average more than 1 call per day. In order to evaluate the realism of our mobility model, we separate the data into two parts: For each user, we put 90% of the calls in the training set and the remaining 10% in the test set. First, we build a mobility model by learning from the training set by using a maximum likelihood estimator . Then, we evaluate our mobility model by computing the average log-likelihood of the calls belonging to the unseen test set. The average log-likelihood reflects how well our model generalizes to unseen data. As the test set might contain some locations not visited by a given class of users in the training set, the maximum likelihood estimate of the distri- bution (1) assigns zero probability to these observations. We cope with this by assuming 8 Mobility model Average log-likelihood Our model SPM TM MC -1.07 -1.67 -2.9 -6.49 Table 3. Log-likelihood of the unseen data from the test set. Our mobility model signifi- cantly outperforms the baseline models since its predictive power, with respect to the test set, is higher. that the distribution (1) is a multinomial distribution drawn from an exchangeable Dirichlet distribution, which implies that the inferred distribution (1) is a random variable drawn from a posterior distribution conditioned on the training data. A more detailed description of this smoothing procedure is given by Blei et al. [6]. We tested several variants of mobility models by varying their structure and parameters (time resolution, day of the week, etc). To have three representative baseline models for comparison, we choose three predictors out of the several variants we tested. The first baseline model is a time-based mobility (TM) model X(n)hk(n), w(n) p (X(n)u, t(n)) = p (cid:16) (cid:17) , (2) where all mobile-phone users exhibit the same time-dependant geographical distribution. The second baseline is a location-dependent first order Markov chain (MC) p (X(n)u, t(n), X(n − 1), . . . , X(0)) = p (X(n)X(n − 1)) , (3) where the current location of a user depends only the location he visited just before. The third baseline is a time and sub-prefecture dependant mobility model (SPM) p (X(n)u, t(n)) = p X(n)hk(n), w(n), sphome(u) (cid:16) (cid:17) , (4) where the home of a user is represented by a sub-prefecture instead of an antenna. This implies a more important aggregation of users, where two users who share the same home sub-prefecture, have the same mobility pattern. The experimental results are shown in Table 3. The first order Markov chain (MC) performs the worst. This is not surprising since the time difference between two call records varies greatly, ranging from a few minutes to a few days. The location associated with a call made in the past few hours or days does not necessarily affect the current location. As the location data is sporadic, it is not surprising than any model that learns from transitions performs poorly, and is outperformed by time-based models. Our model performs the best; and by comparing it to the time-based model (TM), we realise that knowing the home-locations of users enhances the predictive power of the mobility model. Moreover, the granularity of home locations is crucial: Our model significantly outperforms the sub-prefecture dependent mobility model because it has a finer granularity of the home-location. 9 A realistic mobility model is an essential building block of a realistic epidemic propagation model because mobility drives population flows between regions, and therefore the geo- graphical proximity between individuals. In the next section, we introduce the epidemic model we use to simulate a local epidemic propagation. 5 Epidemic Model Building up on the mobility, this section introduces our epidemic model. It is based on a discretized, stochastic version of the SIR model [23]; Tables 4 and 5 provide an overview of the different parameters and quantities used throughout the section. We assume that the size of the population (N individuals) remains constant -- there are no births nor deaths, a reasonable assumption if the time horizon is limited to at most a few months. Under the SIR model, an individual can be either susceptible to the disease, infective, or recovered from the disease and immunized against further infections3. We assume that most of the population is initially susceptible, except for a small number of infective individuals that form the seed of the epidemic. Individuals successively go through the susceptible, infective and recovered states; a desirable outcome would have many individuals stay susceptible without ever becoming infective. The basic SIR model assumes random mixing of the whole population: any individual meets any other one with a uniform probability. In our model, we relax this strong assumption by taking into account the mobility. We spread the population across M regions; each region bears its own SIR process where the corresponding meta-population mixes at random. These regional processes are independent and isolated, and the only way the epidemic crosses regional boundaries is through human mobility [22]. In summary, regional interactions take place uniformly at random, whereas global interactions are shaped by the individuals' mobility. i N M number of regions N∗ L β g total population initial population of region i, where i ∈ {1, . . . , M} number of different mobility classes contact probability recovery probability Table 4. Parameters of the epidemic model. 5.1 Local Epidemic Dynamics In order to work at the individual level, we adapt the classic deterministic SIR model in order to have a discrete-time stochastic variant. The contact probability β and recovery probability g are constant across all regions4. For a region i ∈ {1, . . . , M} we compute, at each time step, the force of infection λi = β Ii . This quantity represents the probability Ni of making a contact that results in an infection. During a time step, every susceptible individual gets infected independently at random with probability λi, while every infective 3In the literature, this state is sometimes known as removed. The important point is that they do not participate in the epidemic anymore. 4These quantities are rates in the continuous time SIR model. In order to carry over the characteristics of the SIR model to our discretized version, we need to ensure that the sampling interval is short enough to ensure that β, g < 1. 10 cl mobility class l, where l ∈ {1, . . . , L} Si distribution of the number of susceptible individuals in re- gion i across classes. Si = (Si,c1, . . . , Si,cL) distribution of the number of infected individuals in region i across classes. Ii = (Ii,c1, . . . , Ii,cL) distribution of the number of recovered individuals in region i across classes. Ri = (Ri,c1, . . . , Ri,cL) number of susceptible individuals in region i, equal to (cid:107)Si(cid:107)1 number of infected individuals in region i, equal to (cid:107)Ii(cid:107)1 number of recovered individuals in region i, equal to (cid:107)Ri(cid:107)1 population of region i, where i ∈ {1, . . . , M} infection probability for region i. λi = β Ii Ni Ii Ri Si Ii Ri Ni λi Table 5. Notation for various quantities related to the epidemic. individual recovers independently at random with probability g. If we denote by ∆Xi the variation of Xi, Xi ∈ {S, I, R} after one time step, it is easy to see that E(∆Si) = −λiSi E(∆Ii) = λiSi − gIi E(∆Ri) = gIi, which are the expected difference equations for the SIR model under the random mixing assumption. We note that our model has many similarities with that of Colizza et al. [10], used to model the SARS pandemic. 5.2 Implementation To allow for distinctive mobility patterns across the population, individuals belong to one out of L classes {c1, . . . , cL} that fully characterize their mobility patterns. In accordance with the mobility model (Section 4), the individuals' class is determined by their home an- tenna. The implementation is best understood when decomposed into two distinct, succes- sive phases: a mobility phase where individuals can move between regions, and an epidemic phase where individuals get infected or recover. Mobility phase We consider every individual. Suppose the individual is in region i; the mobility model assigns a new region j according to its mobility class. If i (cid:54)= j we update the vectors Xi and Xj accordingly, where X ∈ {S, I, R} depends on the current state of the individual. Epidemic phase We consider every region i ∈ {1, . . . , M}. We begin this phase by up- dating the infection rate λi given the current values of Ni and Ii. Every infected individual then recovers with probability g, while every susceptible individual gets infected with probability λi. Si, Ii and Ri are updated accordingly. This process is repeated until the end of the period of interest. 11 Figure 2. Snapshots of a sample epidemic process where each dot represents a region (here, the surroundings of an antenna). Colors indicate the relative proportion of infective individuals. Initially, just a few individuals form a seed of infectives (left). A little more that 9 days later, the epidemic has spread over most of the country (right). 6 Empirical Evaluation Next, we use our models to test the strategies previously described in Section 3. Before evaluating our strategies, we first explain how the epidemic model is parameterized and how epidemic spreads are quantitatively characterized. 6.1 Model Parameters and Evaluation Metrics In order to be consistent with our mobility model, the epidemic model defines regions to be the area surrounding the antennas (M = 1231). Hence, we will use the words region and antenna interchangeably. As an individual's mobility is tied to his home antenna, we distinguish among L = 1231 different classes. To initialize the population attached to each antenna, we use data from the AfriPop project [32] which provides us with Ivory Coast population figures at the hectare level; to account for the fact that not every individual is mobile, we allow only 55% of the population to move during the mobility phase5, which roughly corresponds to the proportion of the population in the 15-to-64 age bracket [35]. Days are divided into three time steps in order to match the mobility model6, and the typical time horizon is between 100 and 400 time steps (i.e. 1 -- 4 months). Contact and recovery probability are usually set to β = 1, respectively g = 0.5; Although these synthetic values do not directly match any well-known disease, they are still qualitatively close to realistic cases, such as influenza. All our simulations start with a seed set of 23 infectives 5This distinction is rather crude and could certainly be further refined. However we deemed it to be sufficient for our purposes. 6Notice that this is not a formal requirement. We use this subdivision mainly for simplicity. 12 p 0.90 0.99 1.00 Affected movements Maximum 10.91% 12.57% 5.32% 21.38% (ts = 42) 22.91% (ts = 51) 12.20% (ts = 33) Table 6. Proportion of movements affected when using the CutCommunities strategy for three different values of the compliance probability p. We indicate the overall average over the 80 time steps, as well as the maximum value. distributed across 5 antennas7 in the Att´ecoub´e district of Abidjan. In order to quantify the difference between epidemic spreads, we propose three metrics to (cid:80)M evaluate the effectiveness of our mitigation strategies. Figure 3 shows how these quan- tities are related to the epidemic's evolution over time. For notational clarity, let X = i=1 Xi, X ∈ {S, I, R} be the total number of individuals in each state over the country as a whole. As these quantities evolve over time, they are functions of the time step n. The first metric is the size of the largest outbreak or, equivalently, the maximal proportion of infective individuals, ∗ = max I n I(n) N . The reasoning behind this metric is self-evident: in most cases, the larger the proportion of infective individuals, the more difficult the control of the epidemic. It is also, broadly speaking, a good indicator of the epidemic's strength. Our second metric is closely related to the first one, but considers the complementary dimension: it measures the time of the largest outbreak, ∗ = arg max T I(n). n Delaying the moment at which the epidemic reaches its peak allows individuals and gov- ernments to have enough time to adapt their behavior, respectively, to deploy measures. Finally, our last metric captures the tail behavior of the epidemic: it measures the final proportion of recovered users, ∗ = lim Q n→∞ R(n) N . Note that we would like to minimize this metric. After the epidemic dies out, all individuals are either recovered or susceptible, and a low proportion of recovered individuals means that a high percentage of the population did not go through the infective state at all. 6.2 Results We now take a closer look at our three proposed strategies. We will describe how we instantiate them and we provide qualitative and quantitative assessments with respect to their effectiveness. 13 Figure 3. Metrics used to evaluate the effectiveness of mitigation strategies. I∗ indicates the magnitude of the epidemic's peak, T ∗ the time at which the peak happens, and Q∗ describes the asymptotic number of individuals that got infected and recovered. 6.2.1 CutCommunities strategy The first strategy divides the country into location communities according to the network of mobility. We consider the weighted, undirected graph where nodes represent antennas, and edge weight is equal to the average number of trips between the two endpoints (regardless of direction). We use the Louvain community detection algorithm [7]; Figure 1 shows the 30 identified communities. It is interesting -- but not surprising -- to note that the communities are roughly geographicaly based8. This confirms our hypothesis stating that there are geographical weak links. Micro-measures are then generated as follows: when an individual checks whether a trip is safe, the service first verifies whether the trip crosses community boundaries and whether the current or projected locations are affected by the disease; if both of these conditions are met, the individual is discouraged from making the trip. The recipient then complies with probability p. Figure 4 shows the effect of CutCommunities for different values of p. Compared to the baseline (p = 0), the strategy affects the size I∗ and the time T ∗ of the epidemic's peak. However, it does not change much the tail behavior: Q∗ stays constant at around 0.8, except for the degenerate case where p = 1, which represents a blockade around the community initially infected. We also observe that there seem to be two infection phases, 7In the datasets provided by France Telecom-Orange, these antennas have the following identifiers: 57, 146, 330, 836, 926. 8As a sidenote, we ran the Louvain method on a number of other graphs generated from the datasets provided for the D4D challenge, including one derived from SET1 representing total antenna-to-antenna communications. The communities always displayed the same geographical clustering. Furthermore, we observed that mobility communities seem to be correlated to phone call communities. 14 T∗Q∗I∗ Figure 4. Shape of the epidemic under the CutCommunities strategy, β = 1.0, g = 0.5. On the left: solid lines represent the baseline (p = 0), dashed lines p = 0.9, dotted lines p = 0.99. On the right, we compare p = 0.99 (solid) to a complete blockade (p = 1, dashed). made progressively more apparent as p → 1, and that the blockade removes the second phase; these two phases correspond to infections happening inside, respectively, outside the initially infected community. Recall that this strategy only sends micro-measures to a fraction of the individuals, those who cross community boundaries -- a case that by definition should not happen too often. It is therefore interesting to consider the number of trips actually canceled as a result: Table 6 lists the average and maximal proportion for different values of p. The numbers are quite low9, suggesting that the communities form a natural partitioning of the regions. In conclusion, this strategy does not affect the asymptotic behavior of the epidemic but significantly shifts its peak. Altogether, it justifies the relevance of mobility-based geographical communities as a data source to generate micro-measures. 6.2.2 DecreaseMix strategy Recall that this strategy assigns tags to individuals according to the social community to which they belong and segregates contacts across social communities. A service operator might use the call graph (i.e. the social network derived from who calls whom) to infer social communities in the population; unfortunately, we do have access to such data10. In order to quantify the effectiveness this strategy, we proceed as follows. Similarly to our mobility model, we make the assumption that the individual's community C is determined by his home antenna. The DecreaseMix strategy do not decrease the total number of contacts; instead it rewires contacts across communities to contacts inside the community. This is done by splitting the contact probability to into intra-community and inter-community 9That these proportions are lowest when p = 1 is due to the fact that the epidemic is local to the infective seeds' community 10The data provided for the Orange D4D challenge does include a dataset consisting of myopic views of the call graph. SET4 is a sample of egonets, i.e. balls of radius two centred at a particular user. However, this dataset did not yield anything useful for our purposes. 15 01020304050607080time step0.00.20.40.60.81.0proportion of populationinfectedrecovered01020304050607080time step0.00.20.40.60.81.0proportion of populationinfectedrecovered Figure 5. Shape of the epidemic under the DecreaseMix strategy averaged over 10 runs, β = 1.0, g = 0.5, for different values of the mixing parameter. Solid lines correspond to q = 1.0, dashed ones to q = 0.1, dotted ones to q = 0.01. contact probabilities and introducing a mixing parameter q (cid:18) (cid:19) β 1 − q + q Ni,C Ni βi,C = βi,C = β − βi,C Ii,C Ni,C λi,C = βi,C + βi,C Ii,C Ni,C , where Ni,C indicates the number of individuals of community C currently in region i, Ni,C = Ni − Ni,C and the other quantities follow the same convention of notation. The intuition is as follows: When q = 1, everyone mixes at random inside a region just as if no countermeasure was applied at all. At the other extreme, when q = 0, contacts happen only with individuals from the same community. Intermediary values of q allow us to play with the strength of the segregation. We evaluate the effectiveness of DecreaseMix for different values of the mixing parameter q. Our simulations are parameterized with β = 1.0, g = 0.5 and q ∈ {1, 0.1, 0.01}; Figure 5 shows the average behavior of the epidemic over 10 runs. The main characteristic of this strategy is that it delays the epidemic outbreak. However, the slopes of the two curves at the strongest point of the epidemic are not very differentiated. As s result, the final proportion of recovered Q∗ does not vary much. But by making it 10 or 100 times more likely to contact an individual of the same community, we delay T ∗ by approximately 5 and 16 days, respectively, on average. Our intuition about this phenomenon is that it takes more time for the epidemic to reach certain communities (as they are more segregated), but 16 050100150200time step0.00.20.40.60.81.0proportion of populationinfectedrecovered p 0.1 0.5 Affected movements Maximum 2.81% 15.80% 5.21% (ts = 190) 26.12% (ts = 316) Table 7. Proportion of movements affected when using the GoHome strategy for two different values of the compliance probability p. We indicate the overall average over the 400 time steps, as well as the maximum value. once a community sees its first case of infection, the spread is just as fast as before. We argue that one of the main limiting factors at play here is the random mixing assumption: if we were able to bring finer structural changes to the contact graph, the situation would look very different. 6.3 GoHome strategy Figure 6. Shape of the epidemic under the GoHome strategy, β = 1.0, g = 0.5. Light curves indicate individual runs, dark curves indicate average. On the left: p = 0.1, on the right: p = 0.5. Our last strategy advices individuals to go home or stay home. In order to focus the micro- measures on the most influential individuals, we assume that at each time step, the service operator knows the proportion of susceptible, infective and recovered individuals across locations. We suppose that before every trip, an individual sends a request to the service that compares the proportion of infectives in both source and destination, and recommends to go home if the destination has a proportion of infectives, lower than the source location. Individuals then comply with probability p. The main intuition behind this choice is to avoid sending infective individuals to highly susceptible locations. Note that we keep the state-independent assumption here: we do not know the state of the individual when sending out a recommendation. The second important assumption is that, when the individual is at at home, the contact probability is set to be equal to the recovery probability11, i.e. βhome := g. This models the fact that there are less contacts at home, in term of accidental 11When contact and recovery probability are equal, the single-population SIR epidemic (under the random mixing assumption) does not develop anymore; setting βhome := g can therefore be seen as the least change needed to stabilize the epidemic. 17 050100150200250300350400time step0.000.020.040.060.080.100.120.140.160.18proportion of populationinfectedrecovered050100150200250300350400time step0.000.020.040.060.080.100.120.140.160.18proportion of populationinfectedrecovered ones. Mixing is not exactly uniform anymore, and the infection probability is adapted as follows: λi,loc = βhome Ii Ni λi,vis = β Ivis Ni + βhome Iloc Ni . Quantities with loc and vis subscripts correspond to individuals whose home region is (respectively is not) i. Note that the contact probability of visitors can significantly decrease in a region where the proportion of visitors to locals is low. This time, the effectiveness depends on the value of the compliance probability p. We use again β = 1.0, g = 0.5 and let p ∈ {0.0, 0.1, 0.5, 0.7}; Figure 6 shows the behavior of the epidemic over 10 runs. As opposed to the results obtained with the DecreaseMix strategy, we obtain significant improvements to Q∗ as p increases12. This observation is not surprising because by suggesting to individuals to go home, we are directly reducing their contact probability, which is a determining factor of the epidemic's dynamics. It is also interesting to look at the actual number of trips that are affected (i.e., cancelled) because of the micro-measures; Table 7 shows that a relatively low number of trips have to be affected to noticeably impact the spread. In summary, this strategy has the potential to be quite effective, although the assumptions it makes deserve closer analysis. 7 Conclusion In this paper, we explore the novel idea of using mobile technology in order to mitigate the spread of human-mediated infectious diseases. We motivate the concept of mobile micro- measures that consist of personalized behavioral recommendations given to individuals. By affecting, even partially, individual behaviors, we are able to globally impact the epi- demic propagation. These mobile micro-measures have several original properties; they are adaptive, target individuals at the microscopic level and provide a rich set of mitigation methods. Using the data provided for the Orange D4D challenge [8], we first develop a realistic mobility model for the population of Ivory Coast. Then, we incorporate it into an epidemic model based on SIR in order to simulate the epidemic propagation, while taking into account population mobility. Taking advantage of this framework, we propose and evaluate three concrete strategies used to generate micro-measures. Our strategies weaken the epidemic's intensity, successfully delay its peak and, in one case, significantly lower the total number of infected individuals. These preliminary results allow us to identify several research avenues. First, random mixing is the most limiting assumption. Being able to change the structure of human contacts at a finer level is a key component of more advanced micro-measures. The mobile call graph is an example of a source of information about social contacts, one that is readily available to mobile phone operators. Second, beyond our preliminary strategies, it is highly important to deepen our understanding of the key ingredients that make mobile micro-measures effective yet minimally restrictive. In parallel to mobile micro-measures, the 12Unfortunately, our simulation was limited to 400 time steps, which is not enough to clearly show the asymptotical behavior. The claim, however, is justified by looking at the worst runs whose slope quickly tends to zero. 18 availability of large-scale mobility data opens up new research directions in epidemiology: a more precise characterization of the relation between epidemic spread and human mobility patterns is an interesting topic we would also like to investigate in the future. To conclude, we firmly believe that data-driven and personalized measures which take ad- vantage of mobile technology are an important step towards effective epidemic mitigation. Acknowledgements We would like to thank Vincent Etter for his insightful comments and feedback about this paper. References [1] J. Arino and P. Van den Driessche. A multi-city epidemic model. Mathematical Pop- ulation Studies, 10(3):175 -- 193, 2003. [2] A.-L. Barabasi. The origin of bursts and heavy tails in human dynamics. Nature, 435 (7039):207 -- 211, 2005. [3] M. A. Bayir, M. Demirbas, and N. Eagle. Discovering SpatioTemporal Mobility Profiles of Cellphone Users. In WoWMoM 2009, pages 1 -- 9. IEEE, 2009. [4] R. Becker, R. C´aceres, K. Hanson, S. Isaacman, J. M. Loh, M. Martonosi, J. Rowland, S. Urbanek, A. Varshavsky, and C. Volinsky. Human Mobility Characterization from Cellular Network Data. Communications of the ACM, 56(1):74 -- 82, 2013. [5] V. Belik, T. Geisel, and D. Brockmann. The impact of human mobility on spatial disease dynamics. In CSE 2009, volume 4, pages 932 -- 935. IEEE, 2009. [6] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Allocation. Journal of Machine Learning Research, 3:993 -- 1022, 2003. [7] V. Blondel, J. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10): P10008, 2008. [8] V. D. Blondel, M. Esch, C. Chan, F. Clerot, P. Deville, E. Huens, F. Morlot, Z. Smoreda, and C. Ziemlicki. Data for Development: the D4D Challenge on Mo- bile Phone Data. arXiv preprint arXiv:1210.0137, 2012. [9] V. Colizza, A. Barrat, M. Barth´elemy, and A. Vespignani. The role of the airline transportation network in the prediction and predictability of global epidemics. PNAS, 103(7):2015 -- 2020, 2006. [10] V. Colizza, A. Barrat, M. Barth´elemy, and A. Vespignani. Predictability and epi- demic pathways in global outbreaks of infectious diseases: the SARS case study. BMC Medicine, 5(34), 2007. [11] N. M. Ferguson, D. A. Cummings, C. Fraser, J. C. Cajka, P. C. Cooley, and D. S. Burke. Strategies for mitigating an influenza pandemic. Nature, 442(7101):448 -- 452, 2006. 19 [12] M. Ficek and L. Kencl. Inter-Call Mobility Model: A Spatio-temporal Refinement of Call Data Records Using a Gaussian Mixture Model. In INFOCOM 2012, pages 469 -- 477. IEEE, 2012. [13] T. C. Germann, K. Kadau, I. M. Longini Jr, and C. A. Macken. Mitigation strategies for pandemic influenza in the United States. PNAS, 103(15):5935 -- 5940, 2006. [14] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi. Understanding individual human mobility patterns. Nature, 453(7196):779 -- 782, 2008. [15] R. Gottfried. Black Death. Simon and Schuster, 1985. [16] E. Halepovic and C. Williamson. Characterizing and Modeling User Mobility in a Cellular Data Network. In Proc. Workshop on PE-WASUN 20, pages 71 -- 78. ACM, 2005. [17] H. W. Hethcote. The Mathematics of Infectious Diseases. SIAM review, 42(4):599 -- 653, 2000. [18] L. Hufnagel, D. Brockmann, and T. Geisel. Forecast and control of epidemics in a globalized world. PNAS, 101(42):15124 -- 15129, 2004. [19] T. Inglesby, J. Nuzzo, T. O'Toole, and D. Henderson. Disease Mitigation Measures in the Control of Pandemic Influenza. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 4(4):366 -- 375, 2006. [20] S. Isaacman, R. Becker, R. C´aceres, S. Kobourov, M. Martonosi, J. Rowland, and A. Varshavsky. Ranges of Human Mobility in Los Angeles and New York. In PERCOM 2011, pages 88 -- 93. IEEE, 2011. [21] S. Isaacman, R. Becker, R. C´aceres, M. Martonosi, J. Rowland, A. Varshavsky, and W. Willinger. Human Mobility Modeling at Metropolitan Scales. In MobiSys 2012, pages 239 -- 252. ACM, 2012. [22] M. J. Keeling, L. Danon, M. C. Vernon, and T. A. House. Individual identity and movement networks for disease metapopulations. PNAS, 107(19):8866 -- 8870, 2010. [23] W. Kermack and A. McKendrick. A contribution to the mathematical theory of epi- demics. Proceedings of the Royal Society A, 115:700 -- 721, 1927. [24] X. Meng and L. Chen. The dynamics of a new SIR epidemic model concerning pulse vaccination strategy. Applied Mathematics and Computation, 197(2):582 -- 597, 2008. [25] A. Rinaldo, E. Bertuzzo, L. Mari, L. Righetto, M. Blokesch, M. Gatto, R. Casagrandi, M. Murray, S. M. Vesenbeckh, and I. Rodriguez-Iturbe. Reassessment of the 2010 -- 2011 Haiti cholera outbreak and rainfall-driven multiseason projections. PNAS, 109 (17):6602 -- 6607, 2012. [26] L. Sattenspiel and K. Dietz. A Structured Epidemic Model Incorporating Geographic Mobility Among Regions. Mathematical Biosciences, 128(1):71 -- 91, 1995. [27] L. Sattenspiel and D. A. Herring. Simulating the Effect of Quarantine on the Spread of the 1918 -- 19 Flu in Central Canada. Bulletin of Mathematical Biology, 65(1):1 -- 26, 2003. 20 [28] B. Shulgin, L. Stone, and Z. Agur. Pulse Vaccination Strategy in the SIR Epidemic Model. Bulletin of Mathematical Biology, 60(6):1123 -- 1148, 1998. [29] F. Simini, M. C. Gonz´alez, A. Maritan, and A.-L. Barab´asi. A universal model for mobility and migration patterns. Nature, 484(7392):96 -- 100, 2012. [30] L. Stone, B. Shulgin, and Z. Agur. Theoretical Examination of the Pulse Vaccination Policy in the SIR Epidemic Model. Mathematical and Computer Modelling, 31(4): 207 -- 215, 2000. [31] Y. Tanahashi, J. R. Rowland, S. North, and K.-L. Ma. Patterns from Anonymized Mobile Communication Usage. 151 -- 160. ACM, 2012. Inferring Human Mobility In MoMM 2012, pages [32] Tatem, A.J. Cote d'Ivoire AfriPop Data 2010 (alpha version). Emerging Pathogens In- stitute, University of Florida, 2010. URL http://www.clas.ufl.edu/users/atatem/ index_files/CIV.htm. [33] J. Taubenberger and D. Morens. 1918 Influenza: The mother of all pandemics. Rev Biomed, 17:69 -- 79, 2006. [34] J. Truscott and N. M. Ferguson. Evaluating the Adequacy of Gravity Models as a Description of Human Mobility for Epidemic Modelling. PLOS Computational Biology, 8(10):e1002699, 2012. [35] United Nations, Department of Economic and Social Affairs. World Population Prospects, the 2010 Revision, 2010. URL http://esa.un.org/unpd/wpp/index.htm. [36] World Health Organization. Summary of probable SARS cases with onset of illness from 1 November 2002 to 31 July 2003, 2004. URL http://www.who.int/csr/sars/ country/table2004_04_21/en/index.html. [37] G. Zaman, Y. Han Kang, and I. H. Jung. Stability analysis and optimal vaccination of an SIR epidemic model. BioSystems, 93(3):240 -- 249, 2008. [38] G. Zaman, Y. H. Kang, and I. H. Jung. Optimal treatment of an SIR epidemic model with time delay. BioSystems, 98(1):43 -- 50, 2009. 21
1710.11064
3
1710
2018-11-13T15:57:51
Asymptotic degree distributions in large (homogeneous) random networks: A little theory and a counterexample
[ "cs.SI", "cs.DM", "math.PR", "physics.soc-ph" ]
In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these two degree distributions coincide asymptotically in large homogeneous random networks. The discussion is carried under three basic statistical assumptions on the degree sequences: (i) a weak form of distributional homogeneity; (ii) the existence of an asymptotic (nodal) degree distribution; and (iii) a weak form of asymptotic uncorrelatedness. We show that this asymptotic equality may fail in homogeneous random networks for which (i) and (ii) hold but (iii) does not. The counterexample is found in the class of random threshold graphs. An implication of this finding is that random threshold graphs cannot be used as a substitute to the Barab\'asi-Albert model for scale-free network modeling, as has been proposed by some authors. The results can also be formulated for non-homogeneous models by making use of a random sampling procedure over the nodes.
cs.SI
cs
1 Asymptotic degree distributions in large (homogeneous) random networks: A little theory and a counterexample Siddharth Pal and Armand M. Makowski Abstract -- In random graph models, the degree distribution of an individual node should be distinguished from the (empirical) degree distribution of the graph that records the fractions of nodes with given degree. We introduce a general framework to explore when these two degree distributions coincide asymptotically in a sequence of homogeneous random networks of increasingly large size. The discussion is carried under three basic statistical assumptions on the degree sequences: (i) distributional homogeneity; (ii) existence of an asymptotic (nodal) degree distribution; and (iii) asymptotic uncorrelatedness. It follows from the discussion that under (i)-(ii) the asymptotic equality of the two degree distributions occurs if and only if (iii) holds. We use this observation to show that the asymptotic equality may fail in some homogeneous random networks. The counterexample is found in the class of random threshold graphs for which (i) and (ii) hold but where (iii) does not. An implication of this finding is that these random threshold graphs cannot be used as a substitute to the Barab´asi-Albert model for scale-free network modeling, as was proposed by some authors. The results can also be formulated for non-homogeneous models by making use of a random sampling procedure over the nodes. Index Terms -- Random graphs; random threshold graphs; degree distribution; scale-free networks. ! 1 INTRODUCTION In the past three decades considerable efforts have been devoted to understanding the rich structure and functions of complex networks, be they technologically engineered, found in nature or generated through social interactions. These developments have been recorded in surveys, e.g., [1], [19], [32], research monographs, e.g., [4], [16], [20], [25], [33], and anthologies of research papers, e.g., [34]. The questions of interest often relate to a collection of entities (alternatively called nodes, agents, etc.) and to a set of relationships between them. The pairings can be phys- ical, logical or social in nature; when pictured as links or edges between nodes, they naturally give rise to graphs and graph-like structures (customarily referred to as networks) on the set of nodes. Often the pairwise relationships are best viewed as inherently random, suggesting that random graph models be used to frame the relevant issues -- Here we understand a random graph to be a graph-valued random variable (rv). A popular research direction has been concerned with designing random graph models that exhibit key proper- This work was supported in part by NSF Grant CCF-1217997. The paper was completed during the academic year 2014-2015 while A.M. Makowski was a Visiting Professor with the Department of Statistics of the Hebrew University of Jerusalem with the support of a fellowship from the Lady Davis Trust. This document does not contain technology or technical data controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations. Parts of the material were presented in the 53rd IEEE Conference on Decision and Control (CDC 2015), Osaka (Japan), December 2015. S. Pal was with the Department of Electrical and Computer Engineering, and the Institute for Systems Research, University of Maryland, College Park, MD 20742 USA. He is now with Raytheon BBN Technologies (email: [email protected]). A. M. Makowski is with the Department of Electrical and Computer Engineer- ing, and the Institute for Systems Research, University of Maryland, College Park, MD 20742 USA (e-mail: [email protected]). ties observed in real networks. Historically attention has been given to the simplest of network properties, namely the degree of nodes and their various distributions. The discussion invariably starts with the work of Erdos and R´enyi [22]: With n nodes and link probability p, the (bino- mial) Erdos-R´enyi graph G(n; p) postulates that the n(n−1) potential undirected links between these n nodes are each created with probability p, independently of each other. The degree distribution in Erdos-R´enyi graphs is announced to be Poisson-like, the justification going roughly as follows: (i) With Dn,k(p) denoting the degree rv of node k in G(n; p), the rvs Dn,1(p), . . . , Dn,n(p) are identically distributed, each distributed according to a binomial rv Bin(n − 1; p); (ii) If the link probability scales with n as pn ∼ λ n for some λ > 0, then Poisson convergence ensures the distributional convergence 2 Dn,1(pn) =⇒n D (1) (2) with D denoting a Poisson rv with parameter λ. A rich asymptotic theory has been developed for Erdos-R´enyi graphs in the many node regime; see the monographs [10], [18], [20], [26]. However, in many networks the data tells a different story: If the network comprises a large number n nodes and Nn(d) is the number of nodes with degree d in the network, then statistical analysis suggests a power-law behavior of the form Nn(d) (cid:39) Cd−α n for some α in the range [2, 3] (with occasional exceptions) and C > 0. See [20, Section 4.2] for an introductory dis- cussion and references, and the paper by Clauset et al. [15] for a principled statistical framework. Statements such as (2) are usually left somewhat vague as the range of d is never carefully specified; networks where (2) was observed are often called scale-free networks. On account of this observation, Erdos-R´enyi graphs were deemed inadequate for modeling scale-free networks (as well as other networks of interest). As a result, new classes of random graph models have been proposed in an attempt to capture the behavior (2) (and other properties), e.g., the configuration model [8], [9], [30], [31], generalized random graphs [12], and exponential random graphs [24], [40] to name some of the possibilities. The Barab´asi-Albert network model came to prominence for its ability to formally "ex- plain" the existence of power law degree distributions in large networks via the mechanism of preferential attach- ment [3]. The statement (2) concerns an empirical degree distribu- tion computed network-wide, whereas the convergence (1) addresses the behavior of the (generic) degree of a single node, its distribution being identical across nodes. A natural question is then whether these two different points of view are compatible with each other and can be reconciled, at least asymptotically, in large networks, and if so, under what conditions. The purpose of this paper is to explore this issue in some details. What follows is an outline of some of the contributions along these lines: 1. In Section 2 a general framework to investigate this discrepancy is introduced in terms of a sequence of random graphs {Gn, n = 1, 2, . . .} whose size goes to infinity with n. Two different settings of increasing generality are considered. 2. The homogeneous setting captures situations where an asymptotic nodal degree distribution exists, and is pre- sented in Section 3. It is defined in terms of the following three assumptions: (i) A weak form of distributional homogeneity (hence the terminology homogeneous networks): In particular, for each n = 1, 2, . . ., the degree rvs in Gn are identically distributed across nodes -- Let Dn denote the generic degree rv in Gn; (ii) Existence of an asymptotic (nodal) degree distribution: In analogy with (1), there exists an N-valued rv D such that Dn =⇒n D. (3) Let (p(d), d = 0, 1, . . .) denote the pmf of D; and (iii) Asymptotic uncorrelatedness: The degree rvs {Dn, n = 1, 2, . . .} display a weak form of asymptotic "pairwise independence." 3. The relevant results for the homogeneous case are dis- cussed in Section 4. Under the aforementioned assumptions, Proposition 4.2 states that if (Pn(d), d = 0, 1, . . .) is the empirical degree distribution in Gn (with Pn(d) denoting the fraction of nodes with degree d in Gn), then Pn(d) P−→n p(d), d = 0, 1, . . . (4) where the pmf (p(d), d = 0, 1, . . .) on N is as postulated in (ii) above. A strengthening of this result in terms of total variation distance is provided as Proposition 6.1. 4. A more general setting is considered in Section 5 where degree homogeneity, namely (i) above, is replaced by a ran- dom sampling procedure over pairs of nodes. Many situations are easily fitted into this more general framework. They 2 include the non-homogeneous Barab´asi-Albert model (and other growth models), sequences of deterministic graphs and sequences which are locally weakly convergent [2] (or weakly convergent in the sense of Benjamini and Schramm [5]). 5. In Section 7 we introduce a broad class of models where the underlying assumptions (i) -- (iii) can be checked; this pro- vides a natural and convenient setting for applying Propo- sition 4.2. Erdos-R´enyi graphs (under the scaling yielding (1)) are readily subsumed in this framework, as are many other homogeneous networks of interest in applications; see [35] for details. This resolves the discrepancy mentioned earlier in that the appropriate version of (4) does hold for both Erdos-R´enyi graphs (by virtue of Proposition 4.2) [35] and for the Barab´asi-Albert model (for which (4) holds with limiting pmf satisfying p(d) ∼ d−3 (d → ∞) [11]). 6. Next we turn our attention to the proposition, too often taken for granted, that in homogeneous random graphs the convergence (3) of the generic degree distribution automati- cally implies the convergence (4) of the empirical degree dis- tribution. In Section 8 we provide a counterexample drawn from the class of random threshold graph models [13], [23], [29], [39]. For this class of models under exponentially distributed fitness, although (3) is known to take place with p(d) ∼ d−2 (d → ∞) [23], we show that (4) fails to hold. This fact, contained in Proposition 8.2, constitutes an easy byproduct of Proposition 8.1. Proofs occupy Section 10 to Section 13, and rely on the asymptotics of order statistics for i.i.d. variates [21], [28]. We illustrate this failure through limited simulation results in Section 9. 7. One implication of this last finding is that random thresh- old graphs with exponentially distributed fitness cannot be used as an alternative scale-free model to the Barab´asi- Albert model (see below) as claimed by some authors [13], [39]. Indeed, only the convergence (4) has meaning in the preferential attachment model while (3) is meaningless there, with the situation being reversed for random thresh- old graphs. In other words, leaving aside the issue of which value of α is appropriate, the two models cannot be com- pared in terms of their degree distributions! This highlights the fact that even in homogeneous graphs, the network-wide degree distribution and the nodal degree distribution may capture vastly different information. Some of the results discussed in this paper were an- nounced in the conference paper [36], mostly without proofs. Different proofs to establish Proposition 8.2. were originally given in the Ph.D. thesis of the first author [35]. 2 A SIMPLE FRAMEWORK First some notation and conventions: The random variables (rvs) under consideration are all defined on the same proba- bility triple (Ω,F, P). The construction of a probability triple sufficiently large to carry all the required rvs is standard, and omitted in the interest of brevity. All probabilistic state- ments are made with respect to the probability measure P, and we denote the corresponding expectation operator by P−→n (resp. =⇒n) is used to signify con- E. The notation vergence in probability (resp. convergence in distribution) (under P) with n going to infinity; see the monographs [7], [14] for definitions and properties. If E is a subset of Ω, then 1 [E] is the indicator rv of the set E with the usual understanding that 1 [E] (ω) = 1 (resp. 1 [E] (ω) = 0) if ω ∈ E (resp. ω /∈ E). The symbol N (resp. N0) denotes the set of non-negative (resp. positive) integers. The discussion is carried out in the following framework often encountered in the literature; see Section 7 for ex- amples: Given is a sequence of random graphs {Gn, n = 2, 3, . . .} defined on the probability triple (Ω,F, P) -- We interchangeably use the terms random graphs and random networks. Fix n = 2, 3, . . .. The random graph Gn is then an ordered pair (Vn, En) defined on the set of nodes Vn with random edge set En ⊆ Vn × Vn. Throughout the deterministic set Vn is assumed to be non-empty and fi- nite. The random edge set En is equivalently determined by a set of {0, 1}-valued edge rvs {χn(k, (cid:96)), k, (cid:96) ∈ Vn} -- Thus, χn(k, (cid:96)) = 1 (resp. χn(k, (cid:96)) = 0) if there is a directed edge (resp. no edge) from node k to node (cid:96), so that En = {(k, (cid:96)) ∈ Vn × Vn : χn(k, (cid:96)) = 1}. We do not necessarily assume that Gn is an undirected graph, and we allow self-loops. There is no loss in generality in taking Vn = {1, . . . , kn} for some positive integer kn. In most cases of interest Vn = {1, . . . , n} so that kn = n. graph Gn is the rv Dn,k given by For each k in Vn, the degree of node k in the random Dn,k = χn(k, (cid:96)). (5) (6) (cid:88) (cid:88) (cid:96)∈Vn k∈Vn For each d = 0, 1, . . ., the rv Nn(d) defined by Nn(d) = 1 [Dn,k = d] (cid:88) k∈Vn counts the number of nodes in Vn which have degree d in Gn. The fraction of nodes in Vn with degree d in Gn is then given by Pn(d) = Nn(d) Vn = This defines the random pmf 1 Vn (cid:18) Nn(d) Vn P n = , d = 0, 1, . . . 1 [Dn,k = d] . (cid:19) on N with support contained in Vn ∪ {0}. Strictly speaking, the expression (5) defines the out-degree of a node. How- ever, everything said for out-degrees can also be developed for in-degrees with no substantive changes. In what follows the term degree will refer interchangeably to either out- degree or in-degree, the point being moot when considering undirected graphs as is the case in many situations. For each d = 0, 1, . . ., we explore the convergence (in probability) of the random sequence {Pn(d), n = 2, . . .} to a deterministic limit, say L(d) in R, when the graph size becomes infinitely large, namely limn→∞ Vn = ∞. For sequences of bounded rvs, convergence in proba- bility and mean-square convergence are equivalent by stan- dard facts concerning modes of convergence for rvs [7], [14]. Therefore, the convergence occurs if and only if lim n→∞ Pn(d) P−→n L(d) E(cid:104)Pn(d) − L(d)2(cid:105) = 0. (7) (8) 3 For each n = 2, 3, . . ., standard properties of the variance give E(cid:104)Pn(d) − L(d)2(cid:105) = Var [Pn(d)] + E [Pn(d)] − L(d)2 , (9) and the following characterization is readily obtained. Fact 2.1. With d = 0, 1, . . ., the convergence in probability (7) occurs to some scalar L(d) if and only if we simultaneously have limn→∞ E [Pn(d)] = L(d) and limn→∞ Var [Pn(d)] = 0. first two moments E [Nn(d)] and E(cid:2)Nn(d)2(cid:3). The definition To exploit this observation we begin by computing the (6) of the rv Nn(d) yields the expressions E [Nn(d)] = P [Dn,k = d] (10) (cid:88) k∈Vn and E(cid:2)Nn(d)2(cid:3) (cid:88) (cid:88) k∈Vn = + P [Dn,k = d]  (cid:88) E [1 [Dn,k = d] 1 [Dn,(cid:96) = d]] (11)  k∈Vn (cid:96)∈Vn: (cid:96)(cid:54)=k by the binary nature of the involved rvs. We leverage Fact 2.1 in two different settings: The homo- geneous setting, introduced in Section 3, captures situations already mentioned in the introduction where an asymptotic nodal degree distribution exists; the relevant results are presented in Section 4. A more general setting is considered in Section 5. 3 THE HOMOGENEOUS CASE -- ASSUMPTIONS First we specify what we mean by a random network (or interchangeably, a random graph) to be homogeneous for the purpose of this paper. Assumption 1. (Homogeneity) For each n = 2, 3, . . ., the degree rvs in Gn are equidistributed in the sense that Dn,k =st Dn,1, k ∈ Vn and (Dn,k, Dn,(cid:96)) =st (Dn,1, Dn,2) k (cid:54)= (cid:96) k, (cid:96) ∈ Vn. (12) (13) Obviously condition (13) implies condition (12). In many settings (see Section 7), Assumption 1 follows from the stronger structural assumption that for each n = 1, 2, . . ., the edge rvs {χn(k, (cid:96)), k, (cid:96) ∈ Vn} (or a subset thereof in the undirected case) are exchangeable -- Random networks with this property are traditionally called homogeneous. Under Assumption 1, for each n = 2, 3, . . ., it is appropriate to speak of the degree distribution of a node in Gn, namely the distribution of Dn,1. In many cases of interest the degree rvs {Dn,1, n = 2, 3, . . .} converge in the following sense. Assumption 2. (Existence of an asymptotic degree distribu- tion) Assume that Assumption 1 holds and that there exists an N-valued rv D such that Dn,1 =⇒n D. (14) Let p = (p(d), d = 0, 1, . . .) denote the pmf of the limiting rv D. Assumption 2 can be rephrased as P [Dn,1 = d] = p(d), lim n→∞ d = 0, 1, . . . (15) Even in well-structured settings where Assumption 1 holds, the convergence (14) may fail. For instance, in large homoge- neous binary multiplicative attribute graph (MAG) models introduced by Kim and Leskovec [27], although (14) occurs, it does so only with a trivial limiting pmf p, say D = 0 a.s. or D = ∞ a.s. depending on the parameter values; see [38] for an extended discussion. In the homogeneous setting, the motivating issue driving the discussion is whether under Assumptions 1 and 2, the convergence Pn(d) P−→n p(d), d = 0, 1, . . . (16) takes place where the pmf p = (p(d), d = 0, 1, . . .) is the pmf postulated in Assumption 2. The next assumption turns out to be key. Assumption 3. (Asymptotic uncorrelatedness) Assume that Assumption 1 holds, and that for each d = 0, 1, . . ., the identically distributed rvs 1 [Dn,1 = d] and 1 [Dn,2 = d] are asymptotically uncorrelated in the sense that lim n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] = 0. (17) Assumption 3 amounts to the convergence statement (cid:0)P [Dn,1 = d, Dn,2 = d] − P [Dn,1 = d] P [Dn,2 = d](cid:1) = 0 lim n→∞ (18) for each d = 0, 1, . . .. It is implied by the following stronger assumption which is easier to check in practice; see Section 7 for some examples in a commonly occurring setting. Assumption 4. (Pairwise asymptotic independence) As- sume Assumptions 1 and 2 to hold. Furthermore, the degree rvs Dn,1 and Dn,2 are asymptotically independent in the sense that (Dn,1, Dn,2) =⇒n (D1, D2) (19) where D1 and D2 are independent N-valued rvs, each dis- tributed according to the pmf p postulated in Assumption 2. and Var [Pn(d)] = E (cid:21)(cid:19)2 (cid:18) E (cid:20) Nn(d) Vn − · P [Dn,1 = d, Dn,2 = d] − (P [Dn,1 = d])2 (cid:34)(cid:18) Nn(d) (cid:19)2(cid:35) Vn Vn − 1 Vn P [Dn,1 = d] + Vn Vn Vn − 1 Vn Var [1 [Dn,1 = d]] = = of independence of the rvs D1 and D2 does not preclude the possibility that the rvs 1 [D1 = d] and 1 [D2 = d] are independent -- It is possible to have P [D1 = d, D2 = d] = P [D1 = d] P [D2 = d] for all d = 0, 1, . . . without the rvs D1 and D2 being independent. 4 4 A LITTLE THEORY -- THE HOMOGENEOUS CASE We return to Fact 2.1. Fix d = 0, 1, . . . and n = 2, 3, . . .. Under Assumption 1, the expressions (10) and (11) become E [Nn(d)] = Vn · P [Dn,1 = d] and E(cid:2)Nn(d)2(cid:3) = Vn(Vn − 1) · P [Dn,1 = d, Dn,2 = d] + Vn · P [Dn,1 = d] , respectively. It follows that E [Pn(d)] = P [Dn,1 = d] (20) (21) + · Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] since P [Dn,1 = d] = P [Dn,2 = d] under Assumption 1. Let n go to infinity in (20) and (21) with limn→∞ Vn = ∞. It is plain that limn→∞ E [Pn(d)] exists if and only if limn→∞ P [Dn,1 = d] exists, and that limn→∞ Var [Pn(d)] exists if and only if the limit C(d) ≡ lim n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] (22) exists. Fact 2.1 translates into the following equivalence. Proposition 4.1. Assume Assumption 1. With d = 0, 1, . . ., we have the convergence (7) for some constant L(d) in R if and only if P [Dn,1 = d] = L(d) lim n→∞ and (23) (24) While Assumption 4 reads lim n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] = 0. d, d(cid:48) = 0, 1, . . . P [Dn,1 = d, Dn,2 = d(cid:48)] = p(d)p(d(cid:48)), lim n→∞ Assumption 3 does not require the joint convergence (19) to hold. However, if (19) were known to hold (but with no further characterization of the joint limit), then under Assumption 2 it is easy to check that Assumption 3 is equivalent to the independence of the binary rvs 1 [D1 = d] and 1 [D2 = d] for each d = 0, 1, . . .. However, the lack Under Assumption 1, Assumption 2 and Assumption 3 imply that the conditions (23) (with L(d) = p(d)) and (24) hold for all d = 0, 1, . . ., respectively. Applying Proposition 4.1 we then obtain the following compact conclusion. Proposition 4.2. Under Assumptions 1-3, the convergence (16) holds for all d = 0, 1, . . . where the pmf p = (p(d), d = 0, 1, . . .) is the pmf postulated in Assumption 2. To formulate a converse to Proposition 4.2, assume As- sumption 1 to hold. The mere existence of the limit (23) for all d = 0, 1, . . . does not guarantee that the limiting values {L(d), d = 0, 1, . . .} constitute a pmf on N. Without any d=0 L(d) ≤ 1: d∈V Pn(d) ≤ 1 for E [Pn(d)] ≤ 1. By d∈V P [Dn,1 = d] ≤ 1. d∈V d∈V p(d) ≤ 1, and the additional assumption, it only holds that (cid:80)∞ Indeed, for each n = 2, 3, . . ., we have(cid:80) every finite subset V ⊆ N, hence (cid:80) virtue of (20) this is equivalent to(cid:80) Letting n go to infinity we get (cid:80) desired conclusion follows. Proposition 4.3. Under Assumption 1, assume that for every d = 0, 1, . . ., there exists a scalar L(d) such that Pn(d) P−→n L(d). (25) If the limiting values {L(d), d = 0, 1, . . .} constitute a pmf p = (p(d), d = 0, 1, . . .) on N, then both Assumption 2 (with pmf p) and Assumption 3 must hold. Proof. By Proposition 4.1, the validity of (25) for all implies (24) for all d = 0, 1, . . ., hence d = 0, 1, . . . Assumption 3 holds. By Proposition 4.1, the validity of (25) for all d = 0, 1, . . . also implies that (23) holds for all d = 0, 1, . . .. If additionally the limiting values {L(d), d = 0, 1, . . .} constitute a pmf p on N, then there exists an N-valued rv D distributed according to the pmf p such that Dn,1 =⇒n D, and Assumption 2 holds. As we survey the discussion so far, it is plain that under Assumptions 1-2, the convergence (7) necessarily takes the form (16). Furthermore, whenever we have lim n→∞ Cov [1 [Dn,1 = d] , 1 [Dn,2 = d]] > 0, (26) then (16) cannot hold. 5 A LITTLE THEORY -- THE GENERAL SETTING Proposition 4.1 is a special case of a more general fact that does not require any homogeneity assumption. We devote this section to a presentation of this more general viewpoint: Fix n = 2, 3, . . .. In the context of the random graph Gn, let Σn denote the set {(k, (cid:96)) ∈ Vn × Vn : k (cid:54)= (cid:96)} that comprises all ordered pairs drawn from Vn without repetition. Let also the rv (νn, µn) : Ω → Σn be uniformly distributed over Σn, i.e., P [νn = k, µn = (cid:96)] = 1 Vn(Vn − 1) , k (cid:54)= (cid:96) k, (cid:96) ∈ Vn. Thus, the rv (νn, µn) models the randomly uniform selec- tion of two nodes in Vn (without repetition); the rvs νn and µn are both uniformly distributed over Vn. The selection rv (νn, µn) is assumed to be independent of the random graph Gn. Fix d = 0, 1, . . .. Under the enforced independence assumptions, we note from (10) that (cid:20) Nn(d) (cid:21) Vn E 1 Vn · (cid:88) (cid:88) k∈Vn = = P [Dn,k = d] k∈Vn P [νn = k, Dn,k = d] , 5 (27) and it follows that E [Pn(d)] = P [Dn,νn = d] . Using (11) we also conclude from (27) that E(cid:2)Nn(d)2(cid:3) = Vn · P [Dn,νn = d] + Vn (Vn − 1) · P [Dn,νn = d, Dn,µn = d] , whence Var [Pn(d)] = E (cid:34)(cid:18) Nn(d) (cid:19)2(cid:35) Vn (cid:20) Nn(d) (cid:21)(cid:19)2 E (cid:18) − Vn − 1 Vn Vn · P [Dn,νn = d, Dn,µn = d] + Vn P [Dn,νn = d] − P [Dn,νn = d] P [Dn,µn = d] Var [1 [Dn,νn = d]] = = Vn Vn − 1 Vn + · Cov [1 [Dn,νn = d] , 1 [Dn,µn = d]] . (28) To obtain the variance term in (28) we used the obvious equality P [Dn,µn = d] = P [Dn,νn = d]. Let n go to infinity in (27) and (28) with limn→∞ Vn = ∞. Appealing again to Fact 2.1 we obtain the following analog of Proposition 4.1. Proposition 5.1. Under the foregoing assumptions, with d = 0, 1, . . ., the convergence (7) holds for some scalar L(d) in R if and only if P [Dn,νn = d] = L(d) lim n→∞ and lim n→∞ Cov [1 [Dn,νn = d] , 1 [Dn,µn = d]] = 0. (29) (30) Under Assumption 1, for each n = 1, 2, . . . the distri- butional equalities Dn,νn =st Dn,1, Dn,µn =st Dn,1, and (Dn,νn , Dn,µn ) =st (Dn,1, Dn,2) hold, in which case the conditions (29) and (30) reduce to conditions (23) and (24) of Proposition 4.1, respectively -- Proposition 4.1 is plainly subsumed by Proposition 5.1. While the latter holds under no assumption on the sequence {Gn, n = 2, 3, . . .}, unfor- tunately in that generality it does not retain the operational ability of Proposition 4.1 of equating the two different degree distributions available in the homogeneous case. Proposition 5.1 also applies when the graphs {Gn, n = 2, 3, . . .} are deterministic. The non-homogeneous Barab´asi- Albert model (and other growth models) are easily fitted into this more general framework. In particular, Proposition 5.1 offers the possibility of establishing the convergence (7) through (29) and (30). These two properties follow if the sequence {Gn, n = 2, 3, . . .} is locally weakly convergent (or weakly convergent in the sense of Benjamini and Schramm [5]); see the reference [2] for an introduction to these ideas. The Barab´asi-Albert model (and some of its variants) were shown to be locally weakly convergent by Berger et al. [6]. However, in the Barab´asi-Albert model, Bollob´as et al. have shown the convergence (7) by direct Hoeffding-Azuma bounding arguments [11], thereby implying (30) (as well as (29) trivially by bounded convergence). 6 CONVERGENCE IN TOTAL VARIATION DISTANCE The weak convergence of N-valued rvs is equivalent to convergence in the total variation distance of their corre- sponding pmfs (on N); this is a well-known consequence of Scheff´e's Theorem [7, App. II, p. 224] when applied to discrete rvs. Here we show an analogous equivalence when the convergence in probability (16) holds for all d = 0, 1, . . .: If µ = (µ(x), x = 0, 1, . . .) and ν = (ν(x), x = 0, 1, . . .) are two pmfs on N, the total variation distance between them is given by dTV(µ, ν) = 1 2 µ(x) − ν(x) . ∞(cid:88) x=0 ∞(cid:88) ∞(cid:88) This quantity can alternatively be expressed as dTV(µ, ν) = (µ(x) − ν(x))+ = (ν(x) − µ(x))+ . x=0 x=0 Proposition 6.1. Under Assumptions 1-3, we have dTV (P n, p) P−→n 0 (31) where the pmf p = (p(d), d = 0, 1, . . .) is the pmf postulated in Assumption 2. x∈V (cid:88) E(cid:104) Proof. Pick V ⊆ N0 arbitrary with V < ∞. Using the alternate representation above, we get (p(x) − Pn(x))+(cid:105) E [dTV (P n, p)] ≤ (cid:88) each x = 0, 1, . . ., whence limn→∞ E(cid:104) E [dTV (P n, p)] ≤ (cid:88) by bounded convergence. It follows that for each n = 1, 2, . . .. Let n go to infinity in this last inequality. By Proposition 4.2 we have Pn(x) P−→n p(x) for = 0 (p(x) − Pn(x))+(cid:105) p(x). p(x) + x /∈V lim sup n→∞ x /∈V The set V being an arbitrary finite subset of N and p being a pmf on N (hence tight), we readily obtain limn→∞ E [dTV (P n, p)] = 0, and the desired conclusion (31) follows by Markov's inequality. 6 Gn ≡ G(n; αn), n = 2, 3, . . . because all nodes have the same degree distribution, namely that of the rv Dn,1(α). We construct the collection {Gn, n = 2, 3, . . .} by setting (33) for some scaling α : N0 → A, in which case Dn,k = Dn,k(αn) for each k in Vn -- Scalings are sequences which we view as mappings defined on N0; the mapping itself is denoted by the same symbol used for the generic element of the sequence. The scaling α : N0 → A appearing in (33) is the (usually unique) scaling which ensures the convergence Dn,1(αn) =⇒n D (34) for some non-degenerate N-valued rv D; this scaling is often the critical scaling associated with the emergence of a max- imal component. Under these circumstances, Assumptions 1 and 2 are automatically satisfied, and only Assumption 3 needs to be verified. ∼ c n ∼ c n [10], [18], [22]; The setting outlined above applies to a number of ex- amples routinely discussed in the literature: Here for each n = 1, 2, . . ., we take Vn = {1, . . . , n}. With c > 0, 1) Erdos-R´enyi graphs G(n; p) (0 ≤ p ≤ 1) with scaling 2) Geometric random graphs G(n; ρ) on a unit square (ρ > n [37]; 3) Random key graphs K(n; K, P ) (K < P in N0) with p : N0 → [0, 1] such that pn ∼ c 0) with scaling ρ : N0 → R+ such that πρ2 and scalings K, P : N0 → N0 such that K2 Assumption 1 is readily satisfied in these homogeneous situations. In each case, Poisson convergence can be invoked to validate Assumption 2 with the rv D in (34) being a Poisson rv with parameter c. In all cases, the stronger Assumption 4 is established, thereby implying Assumption 3. While it is elementary to do so for Erdos-R´enyi graphs, the calculations become increasingly tedious as we move from geometric random graphs to random key graphs; see [35] for details. Finally, despite an abundance of situations where Assumptions 1-3 are satisfied (beyond the ones discussed above), it is nevertheless possible to find homogeneous random networks in the sense of Assumption 1 where (14) occurs but where the convergence (16) fails. This is taken on in the remainder of the paper starting with the next section. n [41]. n Pn 7 A COMMONLY ENCOUNTERED SETTING In many situations of interest the sequence of random graphs {Gn, n = 1, 2, . . .} arises in the following natural manner: Given is an underlying parametric family of random graphs, say {G(n; α), n = 2, 3, . . .}, α ∈ A ⊆ Rr (32) where A is some parameter set and r is a positive integer. With α in A, for each n = 2, 3, . . ., the random graph G(n; α) is a random graph on Vn whose statistics depend on the parameter α. For each k in Vn, let Dn,k(α) denote the degree of node k in G(n; α); it is often the case that the rvs {Dn,k(α), k ∈ Vn} constitute an exchangeable family, as we assume thereafter in this section. Thus, there is no ambiguity when speaking of the (nodal) degree distribution in G(n; α) 8 A COUNTEREXAMPLE 8.1 Random threshold graphs The setting is that of [13], [23], [29], [39]: Let {ξ, ξk, k = 1, 2, . . .} denote a collection of i.i.d. R+-valued rvs de- fined on the probability triple (Ω,F, P), each distributed according to a given (probability) distribution function F : R → [0, 1] with F (x) = 0 for x ≤ 0. With ξ acting as a generic representative for this sequence of i.i.d. rvs, we have P [ξ ≤ x] = F (x), x ∈ R. Once F is specified, random thresholds graphs are char- acterized by two parameters, namely a positive integer n and a threshold value θ > 0: The network comprises n nodes, labelled k = 1, . . . , n, and to each node k we assign a fitness variable (or weight) ξk which measures its importance or rank. For distinct k, (cid:96) = 1, . . . , n, the nodes k and (cid:96) are declared to be adjacent if ξk + ξ(cid:96) > θ, (35) and a bidirectional edge exists between nodes k and (cid:96). The adjacency notion (35) defines the random threshold graph T(n; θ) on the set of vertices Vn = {1, . . . , n}. The degree Dn,k(θ) of node k in T(n; θ) is clearly given by Dn,k(θ) = 1 [ξk + ξ(cid:96) > θ] , k = 1, . . . , n. n(cid:88) (cid:96)=1, (cid:96)(cid:54)=k the Under Dn,1(θ), . . . , Dn,n(θ) tributed. enforced are assumptions, exchangeable, the rvs equidis- thus 8.2 Applying Proposition 4.2 under exponential fitness From now on we focus on the special case when ξ is exponentially distributed with parameter λ > 0, written ξ ∼ Exp(λ), that is P [ξ ≤ x] = 1 − e−λx+ , x ∈ R (36) where we have used the standard notation x+ = max(x, 0). While other distributions could be considered to develop counterexamples to Proposition 4.2, the exponential distri- bution was selected for two main reasons: This situation was considered in the references [13], [23], [39] in making the case that scale-free networks can be generated through the fitness-based mechanism used in random threshold graphs; more on that later. Moreover, calculations are greatly sim- plified in the exponential case. With random threshold graphs as the underlying family (32), the definition (33) here takes the form Gn = T(n; θ(cid:63) n), n = 2, 3, . . . with scaling θ(cid:63) : N0 → [0,∞) given by n = λ−1 log n, n = 2, 3, . . . . θ(cid:63) (37) (38) We are in the setting of Section 7. Having in mind to apply Proposition 4.2 to the random graphs {Gn, n = 1, 2, . . .}, we recover the notation of Section 2 by setting Dn,k = Dn,k(θ(cid:63) n), k = 1, . . . , n n = 2, 3, . . . Assumption 1 is obviously satisfied in light of the afore- mentioned exchangeability. It was shown by Fujihara et al. [23, Example 1, p. 366] that Dn,1 =⇒n D where the N-valued rv D is a conditionally Poisson rv with pmf pFuj = (pFuj(d), d = 0, 1, . . .) given by (cid:34) (cid:35) 7 8.3 Assumption 3 fails The remainder of the paper is devoted to showing the following convergence result. Proposition 8.1. Assume ξ ∼ Exp(λ) for some λ > 0. For each d = 0, 1, . . ., the limit C(d) ≡ lim n) = d] , 1 [Dn,2(θ(cid:63) n) = d]] (41) n→∞ Cov [1 [Dn,1(θ(cid:63) exists and C(d) > 0. Proposition 8.1 is established from Section 10 to Section 12 where expressions are given for the limits (41): For instance, we show at (70) that C(0) = E(cid:104) e− max(eλξ1 ,eλξ2 )(cid:105) − E(cid:104) e−(eλξ1 +eλξ2 )(cid:105) > 0. The expression (74) of the limit C(d) for d (cid:54)= 0 is rather cumbersome and is omitted at this point. However, the fact that C(d) > 0 on the entire range suffices to establish the desired counterexample by virtue of the observation following Proposition 4.3. Proposition 8.2. Assume ξ ∼ Exp(λ) for some λ > 0. For each d = 0, 1, . . ., the sequence of rvs (cid:41) 1 [Dn,k(θ(cid:63) n) = d] , n = 2, 3, . . . (42) does not converge in probability to any constant. In fact, for each d = 0, 1, . . ., there exists a non- degenerate [0, 1]-valued rv Π(d) with E [Π(d)] = pFuj(d) and Var [Π(d)] > 0 such that (cid:40) n(cid:88) k=1 1 n n(cid:88) k=1 1 n 1 [Dn,k(θ(cid:63) n) = d] =⇒n Π(d). Details are available in [35]. The failure of the convergence (16) in the context of random threshold graphs with exponentially distributed fitness is noteworthy for the following reason: Caldarelli et al. [13], [39] have proposed this class of random graph models as an alternative scale-free model to the preferential attachment model of Barab´asi and Albert [3]. The basis for their proposal was the provable power-law behavior pFuj(d) ∼ d−2 (d → ∞). (43) See Fujihara et al. [23, Example 1, p. 366] for details. How- ever, a meaningful comparison between the two models would have required at minimum the validity of the con- vergence 1 [Dn,k(θ(cid:63) n) = d] P−→n pFuj(d), d = 0, 1, . . . By Proposition 8.2 this last convergence fails to happen, and the two models cannot be meaningfully compared since for the Barab´asi-Albert model it only holds that n(cid:88) k=1 1 n n(cid:88) k=1 pFuj(d) = P [D = d] = E (eλξ)d d! e−eλξ , d = 0, 1, . . . (39) 1 n 1 [Dn,k(θ(cid:63) n) = d] P−→n pBA(d), d = 0, 1, . . . Therefore, Assumption 2 holds with P [Dn,1 = d] = pFuj(d), lim n→∞ d = 0, 1, . . . (40) with pBA(d) ∼ d−3 (d → ∞) [11]. Although the Barab´asi- Albert model has attracted much attention as a network model, its tree-like structure does not make it a particularly good fit for the empirical data coming from large real-life networks. Similar comments apply to the class of random threshold graph models due to a propensity to produce star- like structures. 9 SIMULATION RESULTS Through a limited set of simulation experiments, we now demonstrate the failure of the convergence (16) established for random threshold graphs in Proposition 8.2. Through- out, the fitness variable ξ is taken to be exponentially distributed with parameter λ = 1, and the threshold is scaled in accordance to (38), namely θ(cid:63) n = log n for each n = 2, 3, . . .. The number n of nodes being given, we gen- erate R mutually independent the random threshold graph T(n; θ(cid:63) n); they are denoted T(1)(n; θ(cid:63) n), . . . , T(n)(n; θ(cid:63) n), respectively. For each k = 1, 2, . . . , n and r = 1, 2, . . . , R, let D(r) n,k(θ(cid:63) n) denote the degree of node k in the random graph T(r)(n; θ(cid:63) n). n), T(2)(n; θ(cid:63) realizations of 8 (cid:105) (cid:104) n(cid:88) k=1 through a single network realization. We do so by plotting the histograms N (r) n (d; θ(cid:63) n) n = 1 n 1 D(r) n,k(θ(cid:63) n) = d , d = 0, 1, . . . r = 1, . . . , R (44) for various values of d and r, and large n, and compar- ing against the corresponding value for the limiting nodal distribution pFuj(d) given in (39). Using this expression we numerically evaluate pFuj(d) as (cid:90) ∞ 0 pFuj(d) = 1 d! e−ex e−xdx edx d! n n (.;θ(cid:63) n) for each d = 0, 1, . . .. In Figure 1 we plot the histogram N (r) for different runs r = 1, 2, . . . , R and varying graph sizes n = 10000, 30000. Observe the high variability with respect to the nodal degree distribution pFuj which does not change as the graph size is increased. We smooth out the variability observed in Figure 1 by averaging the empirical degree distributions (44) over the n), . . . , T(R)(n; θ(cid:63) R i.i.d. realizations T(1)(n; θ(cid:63) n). This results in the statistic N (r) n), T(2)(n; θ(cid:63) R(cid:88) n (d; θ(cid:63) n) , d = 0, 1, . . . . (45) Fix d = 0, 1, . . .. The Strong Law of Large Numbers yields (cid:20) Nn(d; θ(cid:63) n) (cid:21) n a.s. (46) = P [Dn,1(θ(cid:63) n) = d] by exchangeability. On the other hand, by virtue of (40) we have limn→∞ P [Dn,1(θ(cid:63) n) = d] = pFuj(d). Combining these observations yields the approximation lim R→∞ 1 R with 1 R r=1 n N (r) R(cid:88) (cid:20) Nn(d; θ(cid:63) r=1 n E n) (cid:21) n n (d; θ(cid:63) n) = E R(cid:88) N (r) n (d; θ(cid:63) n) r=1 n (a) n = 10000, R = 100 1 R =Approx pFuj(d) (47) for large n and R. The goodness of the approximation (47) is noted in Figure 1, where the empirical distribution averaged over R = 100 runs is observed to be very close to the nodal degree distribution. However, the accuracy of the approximation (47) does in no way imply the validity of (16). In fact the mistaken belief that (16) holds, implicitly assumed in the papers [13], [39], might have stemmed from using the smoothed estimate (47). 10 PREPARING THE PROOF OF PROPOSITION 8.1 For every n = 2, 3, . . . and θ > 0, the decomposition Dn,j(θ) = 1 [ξ1 + ξ2 > θ] + D(cid:63) n,j(θ), j = 1, 2 (48) holds where we have set D(cid:63) n,j(θ) = n(cid:88) 1 [ξj + ξk > θ] . Fix d = 0, 1, . . .. It is a simple matter to check that k=3 (cid:12)(cid:12)P [Dn,j(θ) = d] − P(cid:2)D(cid:63) n,j(θ) = d(cid:3)(cid:12)(cid:12) (b) n = 30000, R = 100 Fig. 1 We explore the behavior of the empirical degree dis- tribution along the scaling (38) (with λ = 1) as generated ≤ 2P [ξ1 + ξ2 > θ] , j = 1, 2 and (cid:12)(cid:12)P [Dn,j(θ) = d, j = 1, 2] − P(cid:2)D(cid:63) n,j(θ) = d, j = 1, 2(cid:3)(cid:12)(cid:12) (49) ≤ 2P [ξ1 + ξ2 > θ] . (50) and Next we consider the case d = 1, 2, . . .. Under the enforced independence assumptions we have (cid:96)=1 (cid:3) (cid:35) = P [ξ1 + η(cid:96) ≤ θ, (cid:96) = 1, . . . , n − 2] n,1(θ) = 0, D(cid:63) (cid:34)n−2(cid:88) P(cid:2)D(cid:63) = P = P [ξ1 + η(cid:96) ≤ θ, ξ2 + η(cid:96) ≤ θ, (cid:96) = 1, . . . , n − 2] = P(cid:2)ξ1 + ηn−21 ≤ θ(cid:3) = P(cid:2)ηn−21 − θ ≤ −ξ1 n,2(θ) = 0(cid:3) 1(cid:2)ξj + ηn−2(cid:96) > θ(cid:3) = 0, j = 1, 2 = P(cid:2)ξ1 + ηn−21 ≤ θ, ξ2 + ηn−21 ≤ θ(cid:3) = P(cid:2)ηn−21 − θ ≤ − max (ξ1, ξ2)(cid:3) . n,1(θ) = d(cid:3) P(cid:2)D(cid:63) (cid:34)n−2(cid:88) (cid:35) 1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) = d (cid:3) = P(cid:2)ξ1 + ηn−2d+1 ≤ θ < ξ1 + ηn−2d (cid:3) = P(cid:2)θ − ηn−2d < ξ1 ≤ θ − ηn−2d+1 = E(cid:104) e−λ(θ−ηn−2d)+ − e−λ(θ−ηn−2d+1)+(cid:105) P(cid:2)D(cid:63) n,2(θ) = d(cid:3) (cid:34)n−2(cid:88) (cid:35) 1(cid:2)ξj + ηn−2(cid:96) > θ(cid:3) = 0, j = 1, 2 = P(cid:2)ξj + ηn−2d+1 ≤ θ < ξj + ηn−2d, j = 1, 2(cid:3) = P(cid:2)θ − ηn−2d < ξj ≤ θ − ηn−2d+1, j = 1, 2(cid:3) (cid:20)(cid:16) e−λ(θ−ηn−2d)+ − e−λ(θ−ηn−2d+1)+(cid:17)2(cid:21) n,1(θ) = d, D(cid:63) = E = P = P (cid:96)=1 (cid:96)=1 . 9 (54) (55) (56) (57) and In the next step, carried out in Section 12, we replace θ by θ(cid:63) n in the expressions above, and let n go to infinity in the resulting expressions. To evaluate these limits we shall rely on asymptotic properties of the order statistics which are discussed next. (cid:33) (cid:32) s−1(cid:88) 11 ASYMPTOTIC RESULTS FOR ORDER STATISTICS We begin with a one-dimensional result. For each s = 1, 2, . . ., consider the mapping Gs : R → R+ defined by e−mxs m! Gs(xs) ≡ (58) where G : R → R+ denotes the well-known Gumbel distribution given by m=0 G(xs), xs ∈ R G(x) = e−e−x , x ∈ R. (59) The next result is well known [28, Thm. 2.2.1, p. 33], and takes the following form when applied to exponential dis- tributions. Lemma 11.1. For each s = 1, 2, . . ., it holds that (cid:1) ≤ xs (cid:3) = Gs(xs), xs ∈ R P(cid:2)λ(cid:0)ηps − θ(cid:63) p (60) lim p→∞ where the scaling θ(cid:63) : N0 → R is given by (38). P(cid:2)D(cid:63) n,1(θ(cid:63) Next, for each n = 2, 3, . . . we substitute θ by θ(cid:63) n in the bound (50) and let n go to infinity in n = ∞, we the resulting inequality. Since limn→∞ θ(cid:63) n) = d] − conclude that n) = d, Dn,2(θ(cid:63) limn→∞(cid:12)(cid:12)P [Dn,1(θ(cid:63) n) = d(cid:3)(cid:12)(cid:12) = 0, whence P(cid:2)D(cid:63) n,2(θ(cid:63) P [Dn,1(θ(cid:63) n,1(θ(cid:63) n) = d, Dn,2(θ(cid:63) n,2(θ(cid:63) n) = d, D(cid:63) n) = d, D(cid:63) lim n→∞ = lim n→∞ (51) provided either limit exists. The same argument applied to the bounds (49) readily yields n) = d] n) = d(cid:3) n) = d(cid:3) n,j(θ(cid:63) j = 1, 2 P(cid:2)D(cid:63) lim n→∞ P [Dn,j(θ(cid:63) n) = d] = lim n→∞ = pFuj(d), (52) in light of (40). It then follows from (51) and (52) that C(d) n→∞ Cov(cid:2)1(cid:2)D(cid:63) = lim n) = d(cid:3) , 1(cid:2)D(cid:63) n,1(θ(cid:63) n) = d(cid:3)(cid:3) (53) n,2(θ(cid:63) provided either limit at (51) exists. As we now turn to evaluating (53), it will be notation- ally convenient to introduce a second collection of R+- valued rvs {η(cid:96), (cid:96) = 1, 2, . . .}. We assume that the rvs {η(cid:96), (cid:96) = 1, 2, . . .} are also i.i.d. rvs, each of which is exponentially distributed with parameter λ > 0. The two collections {ξ, ξk, k = 1, 2, . . .} and {η(cid:96), (cid:96) = 1, 2, . . .} are assumed to be mutually independent. For each integer p = 2, 3, . . ., let ηp1, . . . , ηpp denote the values of the rvs η1, . . . , ηp arranged in decreasing order, namely ηpp ≤ . . . ≤ ηp1, with a lexicographic tiebreaker when needed. The rvs ηp1, . . . , ηpp are the order statistics associated with the collection η1, . . . , ηp, so that for each s = 1, . . . , p, the rv ηps denotes the sth largest value amongst η1, . . . , ηp; in particular ηp1 and ηpp are the maximum and minimum of the rvs η1, . . . , ηp, respectively [17], [21]. The evaluation of the limiting covariances (53) proceeds with the following observation: Fix d = 0, 1, . . . and take n = 3, 4, . . . such that d ≤ n − 2. Under the enforced i.i.d. assumptions, for each θ > 0 we get (cid:0)D(cid:63) n,1(θ), D(cid:63) n,2(θ)(cid:1) (cid:32) n(cid:88) (cid:32)n−2(cid:88) (cid:32)n−2(cid:88) 1 [ξ1 + ξk > θ] , n(cid:88) n−2(cid:88) 1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) , 1 [ξ1 + η(cid:96) > θ] , k=3 k=3 (cid:96)=1 (cid:96)=1 (cid:96)=1 = =st = First, with d = 0 we find P(cid:2)D(cid:63) n,1(θ) = 0(cid:3) = P (cid:34)n−2(cid:88) (cid:96)=1 (cid:33) (cid:33) 1 [ξ2 + ξk > θ] (cid:96)=1 n−2(cid:88) 1 [ξ2 + η(cid:96) > θ] 1(cid:2)ξ2 + ηn−2(cid:96) > θ(cid:3)(cid:33) (cid:35) 1(cid:2)ξ1 + ηn−2(cid:96) > θ(cid:3) = 0 where =st denotes distributional equality between rvs. Two different cases arise: With s = 1, Lemma 11.1 expresses the well-known membership of exponential distributions in the maximal domain of attraction of the Gumbel distribution [21] [28, Example 1.7.2, p. 21]. We now turn to the two-dimensional result we need: For each s = 1, 2, . . ., define the mapping Js : R2 → R+ given by (. . .) × e−ksxs ks! · e−e − min(xs ,xs+1) (61) Js(xs+1, xs) ≡ s−1(cid:88) (cid:16) s(cid:88) ks=0 . . . = with ks+1=ks (cid:17)ks+1−ks e− min(xs,xs+1) − e−xs (ks+1 − ks)! (62) and as xs and xs+1 range over R. In these expressions we use the convention 00 = 1. Lemma 11.2. For each s = 1, 2, . . ., we have P(cid:2)λ(ηps+1 − θ(cid:63) lim p→∞ p) ≤ xs+1, λ(ηps − θ(cid:63) p) ≤ xs = Js(xs+1, xs), xs+1, xs ∈ R (63) with mapping Js : R2 → R+ given by (61)-(62), and scaling θ(cid:63) : N0 → R given by (38). (cid:3) This result is a consequence of Theorem 2.3.1 in [28, p. 34]. As only the case s = 1 was discussed in [28, Thm 2.3.2, p. 34], we provide in Section 13 a proof for arbitrary values of s when the variates {ηk, k = 1, 2, . . .} are exponentially distributed. By inspection we note from (61)-(62) that and 10 12 COMPLETING THE PROOF OF PROPOSITION 8.1 We return to the expressions obtained in Section 10: With d = 0, 1, . . . held fixed, for each n = 2, 3, . . . we substitute θ by θ(cid:63) n in these expressions according to (38), and let n go to infinity in the resulting expressions. 12.1 The case d = 0 For each n = 3, 4, . . ., with the aforementioned substitution, we rewrite (54) and (55) as n,1(θ(cid:63) P(cid:2)D(cid:63) P(cid:2)D(cid:63) = P(cid:2)λ(ηn−21 − θ(cid:63) n) = 0(cid:3) = P(cid:2)λ(ηn−21 − θ(cid:63) n) = 0(cid:3) n) ≤ −λ max(ξ1, ξ2)(cid:3) n) = 0, D(cid:63) n) ≤ −λξ1 n,1(θ(cid:63) n,2(θ(cid:63) (cid:3) where by construction the rv ηn−21 is independent of the i.i.d. rvs ξ1 and ξ2. n−2 lim n→∞ Let Λ1 denote a rv which is distributed according to the Gumbel distribution (59), and which is independent of the i.i.d. rvs ξ1 and ξ2. By Lemma 11.1 (for s = 1 and p = n− 2), since limn→∞(cid:0)θ(cid:63) n,1(θ(cid:63) n,2(θ(cid:63) n,1(θ(cid:63) n − θ(cid:63) n) = 0, D(cid:63) pFuj(0) = lim n→∞ n) = 0(cid:3) = P [Λ1 ≤ −λξ1] = E(cid:104) n) = 0(cid:3) P(cid:2)D(cid:63) = P [Λ1 ≤ −λ max(ξ1, ξ2)] = E(cid:104) n→∞ Cov(cid:2)1(cid:2)D(cid:63) n) = 0(cid:3) , 1(cid:2)D(cid:63) = E(cid:104) e−eλ max(ξ1 ,ξ2)(cid:105) − E(cid:104) n→∞ Cov(cid:2)1(cid:2)D(cid:63) = E(cid:104) e−eλ max(ξ1,ξ2)(cid:105) − E(cid:104) (cid:1) = 0, it is now plain that P(cid:2)D(cid:63) e−eλξ1(cid:105) e−eλ max(ξ1 ,ξ2)(cid:105) n) = 0(cid:3)(cid:3) e−eλξ2(cid:105) n) = 0(cid:3)(cid:3) e−eλξ2(cid:105) e−eλξ1(cid:105) E(cid:104) n) = 0(cid:3) , 1(cid:2)D(cid:63) e−eλξ1(cid:105) E(cid:104) n,2(θ(cid:63) n,1(θ(cid:63) n,2(θ(cid:63) under the independence assumptions. Collecting these facts, we find As we make use of the reduction step (53) discussed in Section 10. It follows that C(0) = lim n,1(θ(cid:63) (69) lim . > 0 (70) since max(eλξ1 , eλξ2 ) < eλξ1 + eλξ2. 12.2 The case d = 1, 2, . . . Pick n = 3, 4, . . . such that d < n − 2. Under the aforemen- tioned substitution, we can rewrite (56) and (57) as n) = d(cid:3) n,1(θ(cid:63) P(cid:2)D(cid:63) = E(cid:104) P(cid:2)D(cid:63) n,1(θ(cid:63) n) = d, D(cid:63) n,2(θ(cid:63) n) = d(cid:3) e−λ(θ(cid:63) n−ηn−2d)+ − e−λ(θ(cid:63) n−ηn−2d+1)+(cid:105) (71) Js(xs+1, xs) = Gs(xs), xs ≤ xs+1 xs, xs+1 ∈ R Js(∞, xs) = lim xs+1→∞ Js(xs+1, xs) = Gs(xs), xs ∈ R so that while Js(xs+1,∞) = lim xs→∞ Js(xs+1, xs) = Gs+1(xs+1), xs+1 ∈ R. (64) (65) (66) This confirms that the probability distributions Gs+1 and Gs are the one-dimensional marginal distributions of Js (as expected). For use in Section 12 we find it convenient to give Lemma 11.1 and Lemma 11.2 the following probabilistic (and more compact) formulation: For any given s = 1, 2, . . ., there exists a pair of R-valued rvs Λs+1 and Λs defined on (Ω,F, P) such that λ(cid:0)ηps+j − θ(cid:63) p (cid:1) =⇒p Λs+j, j = 0, 1 and(cid:0)λ(cid:0)ηps+1 − θ(cid:63) p (cid:1) , λ(cid:0)ηps − θ(cid:63) p (cid:1)(cid:1) =⇒p (Λs+1, Λs) (67) (68) with (Λs+1, Λs) jointly distributed according to Js, and the R-valued rvs Λs+1 and Λs distributed according to Gs+1 and Gs, respectively. and (cid:20)(cid:16) = E e−λ(θ(cid:63) n−ηn−2d)+ − e−λ(θ(cid:63) n−ηn−2d+1)+(cid:17)2(cid:21) .(72) given in [28, Section 2.2, p. 33]; see also [28, Theorem 2.3.2, p. 36] for the case s = 1. Throughout we shall write 11 Applying Lemma 11.1 and Lemma 11.2 (for s = d and p = n − 2) we conclude that (cid:1)(cid:1) =⇒n (Λd+1, Λd) (cid:0)λ(cid:0)ηn−2d+1 − θ(cid:63) in the notation used at (68). Because limn→∞(cid:0)θ(cid:63) (cid:1) = (cid:1)+(cid:17) (cid:16) λ(cid:0)θ(cid:63) (cid:1) , λ(cid:0)ηn−2d − θ(cid:63) (cid:1)+ , λ(cid:0)θ(cid:63) 0, we obtain n − θ(cid:63) n − ηn−2d n−2 n−2 n−2 n − ηn−2d+1 =⇒n ((−Λd+1)+, (−Λd)+) by the Continuous Mapping Theorem for weak conver- gence, whence e−λ(θ(cid:63) n−ηn−2d)+ − e−λ(θ(cid:63) =⇒n e−(−Λd)+ − e−(−Λd+1)+ n−ηn−2d+1)+ (73) lim n→∞ e−λ(θ(cid:63) by applying the Continuous Mapping Theorem once more. Let n go to infinity in (71) and (72): The Bounded Convergence Theorem yields for each a = 1, 2 upon observing the obvious bounds n−ηn−2d)+ − e−λ(θ(cid:63) n−ηn−2d)+ − e−λ(θ(cid:63) n−ηn−2d+1)+(cid:17)a(cid:105) e−(−Λd)+ − e−(−Λd+1)+(cid:17)a(cid:105) E(cid:104)(cid:16) = E(cid:104)(cid:16) (cid:12)(cid:12)(cid:12)e−λ(θ(cid:63) n−ηn−2d+1)+(cid:12)(cid:12)(cid:12) ≤ 1, n = 3, 4, . . . n) = d(cid:3) , 1(cid:2)D(cid:63) n→∞ Cov(cid:2)1(cid:2)D(cid:63) (cid:20)(cid:16) e−(−Λd)+ − e−(−Λd+1)+(cid:17)2(cid:21) −(cid:16)E(cid:104) e−(−Λd)+ − e−(−Λd+1)+(cid:105)(cid:17)2 n→∞ Cov(cid:2)1(cid:2)D(cid:63) n) = d(cid:3) , 1(cid:2)D(cid:63) e−(−Λd)+ − e−(−Λd+1)+(cid:105) (cid:104) n) = d(cid:3)(cid:3) and the reduction step (53) leads to n) = d(cid:3)(cid:3) It follows that C(d) = lim = E n,2(θ(cid:63) n,1(θ(cid:63) n,1(θ(cid:63) n,2(θ(cid:63) = Var lim . (74) Note that C(d) > 0 as the variance of the non-degenerate rv e−(−Λd)+ − e−(−Λd+1)+. 13 A PROOF OF LEMMA 11.2 First some preliminaries. Fix p = 1, 2, . . . and u ≥ 0. The rv Sp(u) given by p(cid:88) up(x) = λ−1 (log p + x)+ , x ∈ R. (76) Fix s = 1, 2, . . ., and pick xs and xs+1 in R. Two cases (i) If xs ≤ xs+1 in R, then for each p = s + 1, s + 2, . . ., it are possible: holds that up(xs) ≤ up(xs+1), whence P(cid:2)ηps+1 ≤ up(xs+1), ηps ≤ up(xs)(cid:3) = P(cid:2)ηps+1 ≤ up(xs), ηps ≤ up(xs)(cid:3) = P(cid:2)ηps ≤ up(xs)(cid:3) P(cid:2)λ(ηps+1 − θ(cid:63) P(cid:2)λ(ηps − θ(cid:63) since ηps+1 ≤ ηps. From Lemma 11.1 it follows that p) ≤ xs+1, λ(ηps − θ(cid:63) p) ≤ xs p) ≤ xs lim p→∞ = lim p→∞ (cid:3) (cid:3) = Gs(xs) and (63) holds as seen through (64). (ii) If xs+1 ≤ xs in R, then for each p = s + 1, s + 2, . . ., the equivalence (75) yields P(cid:2)ηps+1 ≤ up(xs+1), ηps ≤ up(xs)(cid:3) = P [Sp(up(xs+1)) < s + 1, Sp(up(xs)) < s]  s(cid:88) (cid:32) s(cid:88) s−1(cid:88) s−1(cid:88) ks=0 ks+1=0 P  Sp(up(xs+1)) = ks+1  (cid:80)p (cid:80)p P = = Sp(up(xs)) = ks (cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1  (77) (78)  ks=0 ks+1=ks (cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks upon noting the fact Sp(up(xs)) ≤ Sp(up(xs+1)) since up(xs+1) ≤ up(xs). For arbitrary ks, ks+1 = 0, 1, . . . with ks ≤ ks+1, standard counting arguments give P (cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks (cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1  (cid:80)p  (cid:80)p (cid:32) (cid:33) e−λksup(xs)(cid:16) e−λup(xs+1) − e−λup(xs)(cid:17)ks+1−ks (cid:32) (cid:33)(cid:16) 1 − e−λup(xs+1)(cid:17)p−ks+1 p − ks ks+1 − ks · p! · p−ks+1 (cid:18) (p − ks+1)! ×(cid:0)e−xs+1 − e−xs(cid:1)ks+1−ks · · e−ksxs 1 − e−xs+1 (cid:19)p−ks+1 ks!(ks+1 − ks)! p ks × 1 = = (79) p where the last step holds whenever p is large enough so that log p + xs > 0 and log p + xs+1 > 0. Let p go to infinity in (78): From (79) the limit of each (cid:96)=1 1 [ξ(cid:96) > up(xs+1)] = ks+1  (cid:80)p (cid:80)p · (e−xs+1 − e−xs)ks+1−ks (cid:96)=1 1 [ξ(cid:96) > up(xs)] = ks (ks+1 − ks)! e−ksxs ks!  · e−e −xs+1 Sp(u) = 1 [ξ(cid:96) > u] term in (78) is given by (cid:96)=1 counts the number of exceedances of level u by the rvs ξ1, . . . , ξp. The proof of Lemma 11.2 relies on the well- known equivalence ηps ≤ u if and only if Sp(u) < s, s = 0, 1, . . . , p (75) P lim p→∞ = for ks ≤ ks+1 in N, as we note that = 1 lim p→∞ (cid:18) p! (p − ks+1)! · pks+1 (cid:19)p−ks+1 1 − e−xs+1 p = e−e −xs+1 . and lim p→∞ The convergence (63) follows upon using the equivalence (77) together with the observation that up(xs) = λ−1 (log p + xs) and up(xs+1) = λ−1 (log p + xs+1) for p sufficiently large. ACKNOWLEDGMENT The authors thank the anonymous referee from the first round of reviews for pointing out reference [28] which lead to a much shorter proof of Proposition 8.1, and for additional comments which greatly improved the presen- tation of the paper. They also would like to thank another anonymous referee which indicated the possibility of ex- tending the original results to a more general setting without homogeneity assumptions as was done in Section 5. REFERENCES [1] R. Albert and A.L. Barab´asi, "Statistical mechanics of complex systems," Review of Modern Physics 74 (2002), pp. 47-97. [2] D. Aldous and J.M. Steele, "The Objective Method: Probabilistic Combinatorial Optimization and Local Weak Convergence," Proba- bility on Discrete Structures pp. 1-72 [3] A.L. Barab´asi and R. Albert, "Emergence of scaling in random networks," Science 286 (1999), pp. 509-512. [4] A. Barrat, M. Barth´elemy and A. Vespignani, Dynamical Processes on Complex Networks, Cambridge University Press, Cambridge (U.K.), 2008. [5] I. Benjamini and O. Schramm, "Recurrence of distributional limits of finite planar graphs," Electronic Journal of Probability 6 (2001), pp. 1-13. [6] N. Berger, C. Borgs, J.T. Chayes and A. Saberi, "Asymptotic behav- ior and distributional limits of preferential attachment graphs," The Annals of Probability 42 (20140, pp. 1-40. [7] P. Billingsley, Convergence of Probability Measures, John Wiley & Sons, New York (NY), 1968. [8] E.A. Bender and E.R. Caulfield, "The asymptotic number of labelled graphs with given degree sequence," Journal of Combinatorial Theory (A) 24 (1978), pp. 296-307. [9] B. Bollob´as, "A probabilistic proof of an asymptotic formula for the number of labelled regular graphs," European Journal of Combina- torics 1 (1980), pp. 311-316. [10] B. Bollob´as, Random Graphs, Second Edition, Cambridge Stud- ies in Advanced Mathematics, Cambridge University Press, Cam- bridge (UK), 2001. [11] B. Bollob´as, O. Riordan, J. Spencer and G. Tusn´ady, "The degree sequence of a scale free random graph process," Random Structures and Algorithms 18 (2001), pp. 279-290. [12] T. Britton, M. Deijfen, and A. Martin-Lof, "Generating simple random graphs with prescribed degree distribution," Journal of Statistical Physics 124 (2006), pp. 1377-1397. [13] G. Caldarelli, A. Capocci, P. De Los Rios and M.A. Mu noz, "Scale-free networks from varying vertex intrinsic fitness," Physical Review Letters 89 (2002), 258702. [14] K.L. Chung, A Course in Probability Theory, Second Edition, Academic Press, Harcourt, New York (NY), 1974. [15] A. Clauset, C. Rohilla Shalizi and M.E.J. Newman, "Power-law distributions in empirical data," SIAM Review 51 (2009), pp. 661- 703. [16] R. Cohen and S. Havlin, Complex Networks: Structure, Robustness and Function, Cambridge University Press, Cambridge (U.K.), 2010. 12 [17] H.A. David and H.N. Nagaraja, Order Statistics, 3rd Edition, Wiley Series in Probability and Statistics, John Wiley & Sons, Hoboken (NJ), 2003. [18] M. Draief and L. Massouli´e, Epidemics and Rumours in Complex Networks, London Mathematical Society Lecture Note Series 369, Cambridge University Press, Cambridge (UK), 2010. [19] S.N. Dorogovstev and J.F.F. Mendes, "Evolution of networks," Advances in Physics 51 (2002), pp. 1097-1187. [20] R. Durrett, Random Graph Dynamics, Cambridge Series in Statis- tical and Probabilistic Mathematics, Cambridge University Press, Cambridge (U.K.), 2007. [21] P. Embrechts, C. Kl uppelberg and T. Mikosch, Modelling Extremal Events for Insurance and Finance, Stochastic Modelling and Ap- plied Probability, Springer-Verlag, New York (NY), 1997. [22] P. Erdos and A. R´enyi, "On the evolution of random graphs," Publ. Math. Inst. Hung. Acad. Sci 5 (1960), pp. 17-61. [23] A. Fujihara, Y. Ide, N. Konno, N. Masuda, H. Miwa and M. Uchida, "Limit theorems for the average distance and the degree distribu- tion of the threshold network model," Interdisciplinary Information Sciences 15 (2003), pp. 361-366. [24] P.W. Holland and S. Leinhardt, "An exponential family of prob- ability distributions for directed graphs," Journal of the American Statistical Association 76 (1981), pp. 33-50. [25] M.O. Jackson, Social and Economic Networks, Princeton Univer- sity Press, Princeton (NJ), 2008. [26] S. Janson, T. Łuczak and A. Ruci ´nski, Random Graphs, Wiley- Interscience Series in Discrete Mathematics and Optimization, John Wiley & Sons, 2000. [27] M. Kim and J. Leskovec, "Multiplicative attribute graph model of real-world networks," Internet Mathematics 8 (2011), pp. 113-160. [28] M.R. Leadbetter, G. Lindgren and H. Rootz´en Extremes and Related Properties of Random Sequences and Processes, Springer Series in Statistics, Springer (Berlin), 1983. [29] A. M. Makowski and O. Yagan, "Scaling laws for connectivity in random threshold graph models with non-negative fitness vari- ables," IEEE Journal on Selected Areas in Communications JSAC -- 31 (2013), Special Issues on Emerging Technologies in Communica- tions (Area 4: Social Networks). [30] M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence," Random Structures and Algorithms 6 (1995), pp. 161-179. [31] M. Molloy and B. Reed, "The size of the giant component of a random graph with a given degree sequence," Journal of Combina- torics, Probability and Computing 7 (1988), pp. 295-305 [32] M.E.J. Newman, "The structure and function of complex net- works," SIAM Review 45 (2003), pp. 167-256. [33] M.E.J. Newman, Networks: An Introduction, Oxford University Press, Oxford (U.K.), 2010. [34] M.E.J. Newman, A.L. Barab´asi and D.J. Watts, Edrs., The Structure and Dynamics of Networks, Princeton University Press, Princeton (NJ), 2006. [35] S. Pal, Adventures on Networks: Degrees and Games, Ph.D. The- sis, Department of Electrical and Computer Engineering, University of Maryland, College Park (MD). December 2015. [36] S. Pal and A.M. Makowski, "On the asymptotics of degree dis- tributions," in the Proceedings of the 53rd IEEE Conference on Decision and Control (CDC 2015), Osaka (Japan), December 2015. [37] M.D. Penrose, Random Geometric Graphs, Oxford Studies in Prob- ability 5, Oxford University Press, New York (NY), 2003. [38] S. Qu and A.M. Makowski, "On the log-normality of the degree distribution in large homogeneous binary multiplicative attribute graph models," Available at arXiv:1810.10114. [39] V.D.P. Servedio and G. Caldarelli, "Vertex intrinsic fitness: How to produce arbitrary scale-free networks," Physical Review E 70 (2004), 056126. [40] D. Strauss, "On a general class of models for interaction," SIAM Review 28 (1986), pp. 513-527. [41] O. Yagan and A.M. Makowski, "Zero-one laws for connectivity in random key graphs." IEEE Transactions on Information Theory IT-58 (2012), pp. 2983-2999. Siddharth Pal received his Bachelors degree in Electronics and Telecommunication Engineering from Jadavpur University, India, in 2011, and his Masters and Ph.D degrees. both in Electrical Engineering from University of Maryland College Park, USA, in 2014 and 2015 respectively. Since then he has been working as a research sci- entist at Raytheon BBN Technologies. His re- search interests include network science and analysis, game theory, machine learning with emphasis on neural network based approaches, and stochastic systems. 13 Armand M. Makowski (M'83-SM'94-F'06) re- ceived the Licence en Sciences Math´ematiques from the Universit´e Libre de Bruxelles in 1975, the M.S. degree in Engineering-Systems Sci- ence from U.C.L.A. in 1976 and the Ph.D. degree in Applied Mathematics from the University of Kentucky in 1981. In August 1981, he joined the faculty of the Electrical Engineering Depart- ment at the University of Maryland College Park, where he is Professor of Electrical and Com- puter Engineering. He has held a joint appoint- ment with the Institute for Systems Research since its establishment in 1985. Armand Makowski was a C.R.B. Fellow of the Belgian-American Educational Foundation (BAEF) for the academic year 1975-76; he is also a 1984 recipient of the NSF Presidential Young Investigator Award and became an IEEE Fellow in 2006. His research interests lie in applying advanced methods from the theory of stochastic processes to the modeling, design and performance evaluation of engineering systems, with particular emphasis on commu- nication systems and networks.
1512.06915
2
1512
2015-12-24T23:24:39
An Evaluation of Yelp Dataset
[ "cs.SI" ]
Yelp is one of the largest online searching and reviewing systems for kinds of businesses, including restaurants, shopping, home services et al. Analyzing the real world data from Yelp is valuable in acquiring the interests of users, which helps to improve the design of the next generation system. This paper targets the evaluation of Yelp dataset, which is provided in the Yelp data challenge. A bunch of interesting results are found. For instance, to reach any one in the Yelp social network, one only needs 4.5 hops on average, which verifies the classical six degree separation theory; Elite user mechanism is especially effective in maintaining the healthy of the whole network; Users who write less than 100 business reviews dominate. Those insights are expected to be considered by Yelp to make intelligent business decisions in the future.
cs.SI
cs
An Evaluation of Yelp Dataset YAN CUI Columbia University 5 1 0 2 c e D 4 2 ] I S . s c [ 2 v 5 1 9 6 0 . 2 1 5 1 : v i X r a 1. ABSTRACT 3. DATA STORAGE Yelp is one of the largest online searching and review- ing systems for kinds of businesses, including restau- rants, shopping, home services et al. Analyzing the real world data from Yelp is valuable in acquiring the inter- ests of users, which helps to improve the design of the next generation system. This paper targets the evalua- tion of Yelp dataset, which is provided in the Yelp data challenge. A bunch of interesting results are found. For instance, to reach any one in the Yelp social network, one only needs 4.5 hops on average, which verifies the classical six degree separation theory; Elite user mech- anism is especially effective in maintaining the healthy of the whole network; Users who write less than 100 business reviews dominate. Those insights are expected to be considered by Yelp to make intelligent business decisions in the future. 2. DATASET The dataset is collected from real Yelp business and is released for academic purpose [10]. It contains 366K user profiles for a total of 2.9M edges; 1.6M reviews and 500K tips for 61K businesses and aggregated check-ins over time for each of the 61K businesses. To make the dataset diversity, the data of four countries are included (U.S., UK, Germany and Canada). All the data are divided into 5 JSON files, which are business, review, user, checkin and tip. The content of these files are straightforward to understand. Specifically, business file presents the attributes of each business, like the internal unique id of the business, name, geolocation, categories, et al. The checkin file is a complementary attributes for each business. It presents the aggregated checkin time for each business in the grain of each hour in a week. User file contains the basic information for each user, such as yelping time, name, fans and social relationship with other users. Tip and review files are the review of a particular user to a business. The difference of tip and review is that tip is always short to represent a user’s opinion, like ”Don’t waste your time.” or ”Great drink specials!”, while review is long enough to allow users express their feedback. Due to the size of dataset, it is both time consum- ing and inconvenient to analyze the statistics without the help of data storage system. At the same time, it is rather natural to model the network of Yelp using graphs, because users and businesses can be abstracted as nodes with different properties; review to a business and user friendships can be modeled as the relationships between nodes. Thus, the graph database is a great fit for this purpose. For this project, we select Neo4j [7] as the database as it has a great web UI which makes graph visualization possible and a SQL-like query lan- guage (Cypher), which is easy to learn and use. In our graph, there are two kinds of nodes, User and Business. The information used to describe users and businesses are stored as attributes in the node. Three relations ex- ist in the graph, which are knows, used for user friend relationship, tip and review for user and business rela- tionships, respectively. Importing the dataset into Neo4j is all about creating nodes or relationships. However, it is worth to mention two tricks we made. The first one is used when import- ing user friendship data into Neo4j. Each user has zero to many friends. To build up the friendship, what we can do is a straightforward twice scan algorithm. We create each user node without adding the friendship at the first scan, and build up relationship at the second time. To improve the performance of data importing, we adopt a scan-once method. The basic idea is when creating a user node, we build up the friend relation- ship directly. Specifically, for each friend of a user, a look up is performed in the current graph. If a node is found, the user node being established and the found node is connected using knows relationship, otherwise, we create a node with label Person, which means it will become a user in future, but right now its full set of properties are not filled. When trying to create a new user, a look up is also necessary. If there is not such a node, we create a new user, otherwise, the user node exists as a Person, and the full information should be filled into the node. exist as a Person node. Another trick that we used to speedup the dataset importing is 1 Figure 1: Number of Yelp Users against Degree Figure 2: CDF for Number of Hops between Two Nodes to create unique index for both users and businesses be- cause we noticed that the internal user id and business id are unique and there are a lot of queries made based on their ids. Although the use of these tricks, the whole import- ing process is also quite slow. Roughly speaking, it costs us 2 weeks to import all 366K user basic infor- mation and their relationships. Although one can op- timize the graph establish using REST API instead of Cypher, it is left as future work. In order to estab- lish graph quickly and reproduce our experiments re- sults easily, our database is open sourced using Drop- box, along with the graph establish and analysis codes used in this paper (https://github.com/ycui1984/yelp- data-challenge). Readers who are interested to use our database just need to download the database, extract in the proper folder and restart the service. 4. ANALYSIS The benefits of using Neo4j is that it simplifies our analysis process by writing simple Cypher queries. For complex tasks, we created python scripts and used py2neo library to manipulate Neo4j. 4.1 Number of Friends Distribution From the high level, we found that there are 2576179 knows directed friend relationships among 366715 users. So, on average, each user has roughly 7 friends. To in- vestigate into the number of friends distribution for each user, we looked at the number of Yelp users for different degrees, which is shown in Figure 1. In this figure, we ignore 192621 users with no friends. One thing worth to point out is that x and y axises use the log scale. As shown in this figure, the degree distribution exhibits the power law phenomenon, which is expected. In the dataset, the largest degree among all users is 3830. Al- though there is a hard limit for the largest number of friends for a user on Yelp (5000) [12], we did not see any user who hits the limit. 4.2 Hop Length between Users The number of hops between users are investigated in this subsection. A classical conclusion about social net- work is six degrees of separation [8], which means that the average number of hops between every two nodes is no more than 6. To verify this, we randomly selected 10000 node pairs among all nodes and measured length of shortest path. Based on the measurement, the cumu- lative distribution function (CDF) against the number of hops is calculated. Figure 2 presents the experimen- tal results. As we can see, the CDF curve increases with the number of hops, and stabilizes at 8 hops. The proba- bility of two users within 8 hops is 21%. Actually, most of the time (79%), there is no path between selected user nodes. One natural reasoning is that two nodes are selected from two separate connected components when there is no path, otherwise, nodes come from the same connected component. Also, there should be a lot of connected components such that there is no path be- tween two nodes in a high probability. Based on these conclusions, we can see the largest number of hops be- tween any two nodes in the same connected component is 8, which is the diameter of the connected component. The average distance of two nodes in the same con- nected component is calculated to be 4.5, which verifies the six degree separation theory. Note that the aver- age path length is even smaller than most of social net- works including Facebook [2], YoutTube [1], and Live- Journal [1], which implies that the information in Yelp network spreads faster than other networks. 4.3 Connected Components Distribution To verify our reasoning about the structure of Yelp network, this subsection investigates the distribution of 2 1 10 100 1000 10000 1 10 100 1000Number of Yelp UsersDegree 0 0.05 0.1 0.15 0.2 0.25012345678Percentage of Pairs within Hop DistanceHop Distance Figure 3: Connected Components Distribution Figure 5: Number of Friends of Friends Figure 4: Cluster Coefficient and Maximal K-Core connected components. To find all components and the number of nodes in each component, we recorded each subgraph encountered so far. Then, each user node is iterated one by one. For each subgraph, the path ex- istence between the subgraph and the target node was tested. If there exists a path, the user node is included into the subgraph, otherwise, a new subgraph is cre- ated. Figure 3 presents the experimental results. As expected, there is 192621 connected components where single user exists. Except that, most of users belongs to a single large connected component, which includes 168917 users. If we calculate the probability of two user nodes in the same connected component, it is roughly 0.21, which matches the results in the last subsection. 4.4 Clustering Coefficient and Maximal K-Core After understanding the network structure in the high level, the next investigation is how Yelp friends of a par- ticular user interact with each other. We try to answer 3 interesting questions such as how many of your friends are also friends? To this end, we measure the average clustering coefficient for users with different degrees. The clustering coefficient for a graph is calculated by dividing the existing number of knows relationships by the total possible number of relationships. For exam- ple, assume there are 4 nodes in a graph, and there are 2 knows relationships. So, the clustering coefficient is 2/(4∗3/2) = 0.33. Figure 4 (labeled as clustering coeffi- cient) shows the results for users with different degrees. As indicated, the coefficient keeps decreasing with the increasing degree, which suggests that the more friends one has, the more possible ways one’s friends are also friends. Specifically, the total number of relationships is a number of O(n ∗ n), where n is the number of friends for a user, while the actual graph is not dense enough to keep up with the total number. To shed light on the structure of the subgraph formed by all friends of a user, we also measured the average maximal k-core for users with increasing degrees. The k-core of a graph is defined as the maximal subgraph where each node has k degrees at least. The maximal k-core is to look for a k-core which maximizes k. The curve labeled as degeneracy in Figure 4 plots the experimental results. Overall, the trend is the more friends one has, the larger the maximal k-core. For instance, if one has 100 friends, the average maximal k-core is roughly 13, which means there are at least 14 users who knows the other 13 friends of this user. One exception of the curve is the data point when the degree is 1000. It is larger than that when degree is 3830. After examining the results, we found that there is only one user who has degree 1000 and 3830. The exception is considered as statistical errors. If enough users with high degrees exist, the curve is believed to increase continuously. 4.5 Friends of Friends 1 10 100 1000 10000 100000 1 10 100 1000 10000 100000Number of ComponentsComponent Size 0 0.05 0.1 0.15 0.2 10 100 1000 0 10 20 30 40 50Average Clustering CoefficientAverage DegeneracyDegreeClustering CoefficientDegeneracy 0 50000 100000 150000 200000 250000 300000 350000 10 100 1000Number of Friends-of-friendsDegreeUnique Friends-of-friendsNon-unique Friends-of-friendsk2 Figure 6: Average Neighbor’s Degree One important property of social networks is friends of friends. For example, Linkedin recommends people you may know if two users share the same friend. Yelp can also benefit from recommending to a user the busi- nesses that liked by his friends of friends. To this end, the number of unique friends of friends and non-unique friends of friends with increasing number of degrees are counted. Note that unique friends of friends are a dis- tinct set of user nodes one can reach by two hops from a user, while non-unique friends of friends are all user nodes that are reachable by two hops. Figure 5 plots the results. Besides, the k ∗ k curve is also presented for comparison, where k is degree. The common sense is that if one has k friends, then k ∗ k is an estimation of the number of total friends of friends, assuming that each of his friends has k friends. By adding the k ∗ k curve, one can compare with our estimation. From this figure, we can see that the number of unique friends of friends and non-unique friends of friends is larger than our estimation when the degree is smaller than 100 and 200, respectively. Note that the percentage of users whose degree is smaller than 100 is over 90%, which suggests that, for most of users in Yelp network, your friends have more friends than you. To further prove this conclusion, the average neigh- bor’s degree against degree is presented in Figure 6. Note that the figure is drawn in log scale for both x and y axises. As can be seen, the average neighbor’s degree keeps increasing when the degree of a user is relatively small, which verifies that your friends has more friends than you. Once the degree is large enough, the average neighbor’s degree becomes smaller. However, this only happens to a small portion of users. 4.6 User Distribution in Stars, Reviews, Fans and Votes attributes (stars, reviews, fans and votes) are evaluated in this subsection. Before going into the details of the results, we introduce how these attributes are generated in Yelp. Stars are used to evaluate the quality of a busi- ness after a visit. One can give stars from 1 to 5. The more the better; Reviews are comments from a user to a business, users usually write reviews to express their opinions; Fans are used when an user likes reviews or comments from another user (probability because they have similar taste) and wants to receive more recom- mendations from him; Votes are comments to a review from a user. Specifically, user can submit a vote of use- ful or cool or funny to a review. Figure 7a-Figure 7d present the distributions of users for each attribute. The following details the analysis for each attribute. In terms of star distribution, businesses with 4 stars and 5 stars are the most (41% and 38% re- spectively), which means that businesses collaborated with Yelp are high quality and users have positive feed- backs to most of these businesses. Note that the results are highly consistent with the results released in the official website [6]. In terms of review distribution, besides the percent- age of users who do not write any reviews, the percent- age of users who write a particular number range of reviews (in the grain of 100) are also presented. As in- dicated in Figure 7b, the percentage of users who do not write reviews are negligible, although 53% of all users do not have any friends on Yelp, which implies that re- view is a well-regarded feature on Yelp. If we look at the distribution of users who write reviews, it is easy to find that users who write no more than 100 reviews dominate (92%). This number tells us that although most of Yelp user do write reviews, most of them do not write a lot. Figure 7c presents the results for fans. The interest- ing finding is that most of Yelp users (74%) do not have any fans, while users with 0 to 100 fans dominate the remaining percentage. From the results, we know that only a small portion of users actively comment a lot of businesses, which makes them followed by others. Most of users only care about the businesses that they have ever been experienced, which are limited. Figure 7d shows the user breakdown in terms of votes. Similar to Figure 7b, users who vote 0 to 1000 are the largest part (83%). The second largest part are users who do not vote (15%). The total number of votes is also breakdown according to useful, cool and funny. The percentage for each category is 48%, 27% and 25%, respectively. Among these three words, only funny is negative in tone. Thus, most of the time(75%), Yelp users satisfy with the quality of reviews. 4.7 Effectiveness of Elite User Mechanism The distribution of users in terms of four important A famous mechanism used to encourage review writ- 4 1 10 100 1000 1 10 100 1000Neighbor’s Average DegreeDegreeActualDiagonal (a) Star Distribution (b) Review Distribution (c) Fans Distribution (d) Votes Distribution ing on Yelp is elite members [11]. If one becomes elite user successfully, he or she will be invited to many epic parties for free, which are not available for common users. Any Yelp user can apply for a elite user, but there is a community to decide whether the application passes or not. Without doubt, elite users should be very ac- tive in many aspects such as review writing, comment- ing reviews from others and making friends on Yelp, although the internal algorithm to decide elite users are not available to the public. This subsection measures the effectiveness of elite user mechanism, which we be- lieve important to Yelp because if elite users are not much more important than common users, Yelp should stop the investment to elite users as soon as possible to save cost. Before introducing the details of measurement, let us look at the percentage change of elite users against years. Figure 7 presents the experimental results. As shown in the figure, there is an increase of the percent- age in 2005, and the curve keeps decreasing since then. At 2005, the percentage is more than 50%, while it is even smaller than 1% in 2014. Note that Yelp is estab- lished in 2004. The curve suggests that at early stage of Yelp, the company uses this mechanism to engage users. Once the reputation is established, the increase of elite users is much slower than the increase of common users. Next, we start to measure the effectiveness of elite user mechanism. Our methodology is to collect sev- eral metrics of elite users and compare them to average users. The first metric is the average number of fans for elite users, which is calculated to be 16. For all users, the average number of fans is 1.6, which is significantly smaller than 16. Next, we look at the average number of reviews written. The experimental results for elite users and all users are 245 and 32, respectively. Again, the metric for elite users is much better than the average 5 for elite users, which are complementary to their work. Crain et al. analyzed the elite users in terms of the net- work structure, where they found elite users are super- connectors in Yelp [3]. The results are consistent with ours. Besides, a lot more analysis are provided in our work. Tanvi Jindal proposed to find local experts by the use of machine learning [5], while our focus in this paper is to analyze the dataset, find useful insights and be helpful to the design of next generation online review system. 6. CONCLUSION This paper presents analysis results for Yelp dataset. Our main focus is user related data, such as the social network formed by users and attributes in user nodes. We did not investigate the user behaviors of visiting a business and Yelp reviews, which are believed to be valuable. These parts are left in future work. 7. REFERENCES [1] Measurement and Analysis of Online Social Networks. ACM, 2007. [2] The Anatomy of the Facebook Social Graph, 2011. [3] An Analysis of the a AIJElitea A I Users on Yelp.com. course project report, 2014. [4] Multidimensional Characterization of Expert Users in the Yelp Review Network, 2014. [5] Finding Local Experts From Yelp Dataset. master thesis, 2015. [6] An introduction to yelp metrics as of september 30,2015, 2015. http://www.yelp.com/factsheet. [7] Neo4j, 2015. http://neo4j.com/. [8] Six degrees of separation, 2015. https://en.wikipedia.org/wiki/Six_ degrees_of_separation. [9] Understanding Online Reviews: Funny, Cool or Useful? ACM, 2015. [10] Yelp dataset challenge, 2015. http://www.yelp.com/dataset_challenge. [11] Yelp elite squad: La west, 2015. http://www.yelp.com/elite. [12] Yelp places a limit on number of friends = 5000, 2015. http://www.yelp.com/topic/ sacramento-yelp-places-a-limit-on-number-of-friends-5000. Figure 7: The Percentage of Elite Users against Years of all users. The third metric we used is the average number of votes. The number is 1336 for elite users and 122 for all users. Finally, we compare the average degree for elite users. The result is 55, which is much larger than the average(7). From these four metrics, one can find elite users own significantly more fans (10×), write much more reviews (7.6×), comments more than others(10.9×), and has more friends (7.8×). In another word, elite users are much more active in the commu- nity. Next, we try to answer an interesting question. Do elite users give more or less stars for a business, com- pared to common users? Similar to metrics collected, the average of stars given by elite users is 3.78, while the average is 3.72, when considering all users as a whole. Although the value for elite users is higher, it is rather close to the average of all users. This result implies that elite users are famous for their activeness in the community(like the quality of reviews), instead of giv- ing stars which are out of exceptions. Another insight of the measurement to elite users is that Yelp commu- nity can develop a machine learning model by the use of our metrics, which helps to decide whether an appli- cation for elite user passes or not, instead of evaluating it manually. 5. RELATED WORK During the several rounds of Yelp challenge, a lot of interesting works are done to make use of the dataset. For instance, Bakhshi et al. use the dataset to under- stand the difference of review feedbacks including use- ful, cool and funny [9]. Lee et al. targets for a multi- dimensional model, which are used to find expert (elite users) on Yelp [4]. The model uses review text, network structure, and user metadata to find elite users. Their conclusion was the model needs to consider all infor- mation together to improve the accuracy of the model. In this paper, we also find several efficient indicators 6 0 0.1 0.2 0.3 0.4 0.5 0.620042005200620072008200920102011201220132014Percentage of Elite UsersYear
1908.00164
2
1908
2019-08-06T04:12:29
Supervised Learning of the Global Risk Network Activation from Media Event Reports
[ "cs.SI", "physics.soc-ph" ]
The World Economic Forum (WEF) publishes annual reports on global risks which have the high impact on the world's economy. Currently, many researchers analyze the modeling and evolution of risks. However, few studies focus on validation of the global risk networks published by the WEF. In this paper, we first create a risk knowledge graph from the annotated risk events crawled from the Wikipedia. Then, we compare the relational dependencies of risks in the WEF and Wikipedia networks, and find that they share over 50% of their edges. Moreover, the edges unique to each network signify the different perspectives of the experts and the public on global risks. To reduce the cost of manual annotation of events triggering risk activation, we build an auto-detection tool which filters out over 80% media reported events unrelated to the global risks. In the process of filtering, our tool also continuously learns keywords relevant to global risks from the event sentences. Using locations of events extracted from the risk knowledge graph, we find characteristics of geographical distributions of the categories of global risks.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Supervised Learning of the Global Risk Network Activation from Media Event Reports Xiang Niu · Gyorgy Korniss · Boleslaw K. Szymanski 9 1 0 2 g u A 6 ] I S . s c [ 2 v 4 6 1 0 0 . 8 0 9 1 : v i X r a Abstract The World Economic Forum (WEF) pub- lishes annual reports of global risks which have the high impact on the world's economy. Currently, many re- searchers analyze the modeling and evolution of risks. However, few studies focus on validation of the global risk networks published by the WEF. In this paper, we first create a risk knowledge graph from the anno- tated risk events crawled from the Wikipedia. Then, we compare the relational dependencies of risks in the WEF and Wikipedia networks, and find that they share over 50% of their edges. Moreover, the edges unique to each network signify the different perspectives of the experts and the public on global risks. To reduce the cost of manual annotation of events triggering risk ac- tivation, we build an auto-detection tool which filters out over 80% media reported events unrelated to the global risks. In the process of filtering, our tool also con- tinuously learns keywords relevant to global risks from the event sentences. Using locations of events extracted from the risk knowledge graph, we find characteristics of geographical distributions of the categories of global risks. Xiang Niu Department of Computer Science & Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), Troy, NY, USA E-mail: [email protected] Gyorgy Korniss Department of Physics & Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), Troy, NY, USA E-mail: [email protected] Boleslaw K. Szymanski Department of Computer Science & Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), Troy, NY, USA E-mail: [email protected] Keywords Global risk network · Knowledge graph · Auto-detection · Supervised learning 1 Introduction The World Economic Forum publishes annually the list of global risks and their properties. . The global risks are clustered into five categories: Economic, Environmen- tal, Geopolitical, Societal and Technological [1]. These risks affect many aspects of lives of countless people. Economic risks may inflict tremendous damage on in- dividuals, financial institutions, and governments. For example, in 2008, the asset bubble in several countries caused most of the major economies to undergo a reces- sion lasting several years [2]. Environmental risks affect both individuals and infrastructure but their impact is global when thousands of people die or are displaced by hurricanes or earthquakes [3]. Geopolitical risks are mainly caused by a failure of national or global gov- ernance but may result in millions of people suffering from war [4], hunger [5], and poverty [6]. Technological risks are real and often unpredictable consequences of advanced technologies such as cyberattacks [7] and data leaks [8] threatening well-being of individual and corpo- rations. In short, all risks have critical ability to disrupt civilization at diverse levels, ranging from individuals to nations, so there is an is urgent need to develop tools for their discovery, analysis and prediction. The big challenge to progress in this direction is to identify activation of global risks from massive event records in Web media. Therefore, risk-event labeling is a fundamental and necessary preparatory step before any in-depth study of risks, such as risk modeling [9] and control [10], can be attempted. A high-quality dataset combined with the validated models are a foundation for global risks reliable discovery, analysis and predic- 2 Niu, Korniss, Szymanski tion. The first systematic approach for such data collec- tion effort was done and described in [11], in which the researchers manually collected monthly data points for each risk using online event resources such as articles, news, and Wikipedia to annotate events relevant to any global risk activation. The covered period ranged from beginning of year 2000 to the end of year 2016. Con- sidering the inaccuracy and incompleteness of manually labeled risk event records, researchers further improve these aspects of collected data by providing a detailed reason for selecting each risk event [12, 13]. However currently, manual annotation is the only way to label risk events because of the difficulty to automate this operation caused by the unstructured format of event description. Here, we first propose a human-machine interaction model to augment the manual annotation process by precisely filtering out a large number of un- related event. Then, we enhance this process by con- tinuously expanding keyword sets for events using the supervised online-learning. The auto-detection tool helps analysts to detect ev- ery single risk from event descriptions in Web media. However, individual risk analysis is not sufficient be- cause rarely a risk activation happens in isolation. Ac- cording to the annual report from the World Economic Forum, the connectivity among risks is common and complicated. The global risks are clustered into five cat- egories but their links includes both intra-category and inter-categories edges, both types of which are common. Most of the societal risks can activate under influence of economic (profound political and social instability), environmental (rapid and massive spread of infectious diseases) or geopolitical (large-scale involuntary migra- tion) risks. The yearly WEF Global Risk Report is based on the experts' answers to the annual question- naires that ask about each risk probability of activa- tion, such activation costs to global economy and inter- connectivity between risks. This dependence on expert opinions raises one important question: "how well do the experts estimate risk probability of activation, im- pact, and interconnectivity?" followed by another: "are their networks reliable, integrated, and representative?" To partially answer these questions, here, we create an- other risk network based only on the risk events dis- covered in Web media data. Then, we compare the re- sulting network with the WEF global risk network for the same risk nodes to assess both networks correct- ness and authoritativeness. We expect that the network from event risk data will be biased towards risks with high level of public awareness, which tend to be directly related to human lives, such as "Asset bubble" and "Ex- treme weather event". Although the global risks attempt to represent events with impact on global economy and systematic impact on the entire world, most of the time, the risk events occur locally and have regional effects and influence. Thanks to the specific characteristic of the risk-events dataset, we extract local information from each event record and build connections between the locations and related risks. Having collected data for the period from year 2000 to 2014, we illustrate the different regional patterns of five risk categories on the world political maps. 2 Risk detection In [11], authors investigate multiple event resources in- cluding articles, news, Wikipedia. Here, we only focus on the Wikipedia Current Events Portal (WCEP) [14], which comprehensively includes daily summaries of news events edited by crowdsourcing. Because of its popular- ity and completeness, the WCEP has been fully ana- lyzed by comparing it with content written by profes- sional journalists in WikiTimes project [15]. The con- clusion of this project is that the WCEP is a representa- tive source of public news thanks to its stable contribu- tion volumes and crowdsourcing. The WikiTimes [15] also provides specific crawling methods and extracted dataset with over 50k events from the WCEP from the year 2000 to 2014, which are sufficient enough for the risk-event labeling and further studies. In the dataset, each event contains information detailed in Table 1. Fig. 1 shows sample subnetwork of events. The event 4359, with description "Tropical Storm Gaston douses Richmond, Virginia, with up to 14 inches of rain, caus- ing widespread flooding" and entities "Tropical Storm Gaston", "Virginia" and "Mark Warner", are parts of story "2004 Atlantic hurricane season" occurring on Aug. 30, 2004, reported by ABC-NEWS. The event 4571 is described as "At least nine deaths in Florida, two deaths in the Bahamas, and one death in Geor- gia are blamed on the storm. Damage estimates range widely from US$2 to US$15 billion". The event 4622 re- ports "The Cuban government evacuates between 800,000 and 1.3 million people from coastal cities and developed areas". The last two events are parts of the same story about "2004 Atlantic hurricane season". Manual annotation requires a person to go first through the event description word by word and select the risk related keywords, then label the event with risk tags according to the keywords. For example, for the event 4359, two keywords "storm" and "flooding" may be se- lected and then the event will be labeled with tags "storm" and "flood" accordingly. Both tags belong to the same risk "10. Extreme weather events", as shown Supervised Learning of the Global Risk Network Activation 3 Concept Event Story Category Date Entities References Description sentences of a news summary a story in Wikipedia of which the event is part a category to which the event belongs the event date of occurrence a list of entities in the event sentences external sources for the same event Table 1 Structured event information extracted from the WCEP [15]. Fig. 1 An example of risk knowledge graph consisting of three events. Event 4359: "Tropical Storm Gaston douses Richmond, Virginia, with up to 14 inches of rain, caus- ing widespread flooding. (8/30/04)". Event 4571: "At least nine deaths in Florida, two deaths in the Bahamas, and one death in Georgia are blamed on the storm. Damage estimates range widely from US$2 to US$15 billion. (9/7/04)". Event 4622: "The Cuban government evacuates between 800,000 and 1.3 million people from coastal cities and developed ar- eas. (9/13/04)". Table 5 in Appendix. The event 4571 contains two more tags "death" and "economic loss" in addition to "storm". Thus, this event shows the activity of one more risk "11. Failure of climate-change mitigation and adaptation", see Table 5 in Appendix. The event 4622 contains only one tag "evacuation", which belongs to risk "23. Large- scale involuntary migration", as shown in Table 7 in Appendix. Thus, the three events represent the activi- ties of three risks in two risk categories: environmental risks, as seen in Table 5 in Appendix, and societal risks according to Table 7 in Appendix. With the development of modern information soci- ety, there is a large number of news events described all over the internet. Specifically, around three thou- sand new events are generated in the WCEP every year amounting to about 250 per each month and over fifty thousand events in the past 15 years. Given 29 risk labels and around 20 words per event description, an expert would have to go through 3000 × 30 × 20 so nearly two million comparisons to process just one year of events data in the WCEP, which is a heavy workload. Besides, during the labeling, only a few (around two thousand) of the fifty thousand events are relevant to global risks. These observations motivated us to create an auto-detection tool to help analysts by filtering out the irrelevant events, thereby saving time in risk-event labeling. Our risk auto-detection module is depicted in Fig. 2. The detailed processing proceeds according to the following steps: -- Step 1. Initially, an analyst prepares a few key- words and tags for each risk according to the de- scription of 29 risks in Appendix based on [1]. -- Step 2. If the given list of new pairs with keyword k and tag t (cid:104)k, t(cid:105) is empty, processing terminates, otherwise, these pairs are merged into keyword dic- tionary. -- Step 3. For each event e and a list of keywords K, each paired with some tag t, if a keyword k ∈ K appears in the event sentence manually accepted as relevant, the event e is labeled with the tag t as (cid:104)e, t+(cid:105), otherwise, the event e is labeled as (cid:104)e, t−(cid:105). -- Step 4. We use a bag-of-words representation b = (cid:104)w1, c1(cid:105), ..., (cid:104)wn, cn(cid:105) for each event sentence, where wi is the ith word of event sentence in e, ci is the count of appearances of the word wi for n unique words. For each tag t, we have a list of events: (cid:104)e, t+(cid:105) is a positive instance with bag-of-words representa- tion b+ ∈ B+, while (cid:104)e, t−(cid:105) is a negative instance with bag-of-words representation b− ∈ B− in the event sentence. -- Step 5. With random forest classifier given training dataset B+ and B−, we get entropy ranking of fea- tured keywords w1, w2, ..., wm, where m is the total number of unique words in B+ and B−. The words with high rank are important for the classification. -- Step 6. Based on the entropy ranking list, we select meaningful keywords from top a (default a = 5) new ones and create a list of (cid:104)k, t(cid:105). Then, processing restarts at step 2. Tables 4-8 in Appendix show the list of selected tags and keywords of 29 risks with current dataset up to year 2014. With new events data, the module can update the list further and improve the filtering accuracy. In step 3, the events without any keyword k ∈ K or rejected by analysts are filtered out as non-relevant events. 3 Risk network The auto-detection module produces a structured event dataset containing rich independent information such in risk ofin location ofin risk ofat date ofin location ofin risk ofin location ofprior toat date ofin risk ofprior toin risk ofin location ofin location ofin risk ofat date ofevent4571GeorgiaresidentevacuationCuba9/7/04FloridaVirginiaevent4622economic lossby weatherBahamasflood8/30/04death byweatherstorm9/13/04event4359 4 Niu, Korniss, Szymanski Fig. 2 The activity diagram of risk auto-detection module. Fig. 3 The entire risk knowledge graph with small yellow nodes representing events, small purple nodes representing the date, and large nodes representing thirty risks from five colored categories: economic, environmental, geopolitical, so- cietal, and technological. as risk labels, stories, event descriptions, their occur- rence locations, and dates. Based on that, with the specific principal (story) and subordinate (event) rela- tionship, we further build event correlations, see Fig. 1. Any two events are considered related when they be- long to the same story. The knowledge graph includes the following four types of relationships: -- At date of: an event e happened at date d. Any event e has a unique d associated with it. But one date d may correspond to multiple events. -- At location of: an event e happened at location l or at location relevant to l. Any event e may happen (affect) multiple locations, e.g., Fig. 1 event 4571 affected locations at Bahamas, Florida and Geor- gia. One location l may also correspond to multiple events. -- Prior to: an event e1 happened prior to another event e2 when they are in the same story and the date d1 of e1 precedes the date d2 of e2. -- In risk of: an event e is in risk of t after the event sentence is labeled by the tag t by the auto-labeling module, see Fig. 2. Fig. 3 depicts the entire knowledge graph that contains all relationships between any two events, and between two pairs for event e, (e, risk) and (e, date). Here, we group all tags t1, t2, ... belonging to the same risk r into one risk node. For example, in Fig. 1, event 4359 is in risk of "storm" and "flood", which correspond to the same risk "10. Extreme weather event". (cid:83) R2, i (cid:54)= j. Additionally, we extracted the risk network (Wiki in Fig. 4) from the entire knowledge graph (Fig. 3). For each pair of events (e1, e2), when e1 is prior to e2, e1 is in risks of R1 and e2 in risks of R2, we create an edge between each pair of (ri, rj), ri, rj ∈ R1 For example in Fig. 1, event 4359 is in risks of "10. Extreme weather event" r10, event 4571 is in risks of "10. Extreme weather event" r10 and "11. Failure of climate-change mitigation and adaptation" r11, event 4622 is in risks of "23. Large-scale involuntary migra- tion" r23. Thus, we have three connections r10 − r11, r10 − r23 and r11 − r23. To make a comparison of so cre- ated network with the undirected and unweighted risk Supervised Learning of the Global Risk Network Activation 5 Fig. 4 A comparison between two risk networks, one created by the WEF and the other built by us from Wiki events. The first subfigure is the common part extracted from the two networks, the second subfigure contains edges unique to the WEF network and the third one includes relational dependencies unique to the Wiki network. network created by the World Economic Forum (WEF) in report [1], we transform the Wiki network to be also undirected and unweighted, as seen in Fig. 4, where the size of each risk node represents its degree. In general, the two networks are similar in nodes sizes and connec- tions. There are 170 edges in WEF network and 224 edges in Wiki networks, with the number of common edges as high as 121, see Table 2. Specifically, the risk "23. Profound social instability" has the largest number (18) of common related risks between the two networks. We also highlight the different risk dependencies in WEF and in Wiki networks in Fig. 4. For example, in Wiki network, risk "1. Asset bubbles in a major econ- omy" influences and is influenced also by risks "4. Fail- ure/shortfall of critical infrastructure", "22. Large-scale involuntary migration", and etc. The degree differences between the two risk networks arise from the differ- ent views of the risks by experts and the public. The risks with a higher degree in Wiki network tend to be a focus of public concerns, such as "1. Asset bubbles in a major economy", "10. Extreme weather events", "17. Large-scale terrorist attacks", "21. Food crises" and "29. Massive incident of data fraud/theft". Never- theless, the risks with a higher degree in WEF network tend to be a focus of expert concerns, often novel or merely newly arising, such as "2. Deflation in a major economy", "12. Major biodiversity loss and ecosystem collapse", and "26. Adverse consequences of technolog- ical advances". In addition, in Table 2, the common part of the two networks includes most of the intra- group edges. After extracting it from the WEF and the Wiki network, almost no intra-group edges left, espe- cially in Wiki network. Moreover, in Table 3, after ex- tracting the common part, the WEF network becomes Common part:WEF only:Wiki only:191815141716111013128923167451819141516171011121388193254769123456725242726212023222928242526272021222328292928272625242322212018191213101116171415 6 Niu, Korniss, Szymanski Fig. 5 Economic risks heat-map over political map of the world. Fig. 6 Environmental risks heat-map over political map of the world. fragmented with extremely low average clustering coef- ficients in each group and in the entire network. 4 Risk activities heat maps layered over the political maps of the world Using the risk knowledge graph, we extract connections between locations and risks. For any event e in risk r ∈ R that occurred at location l ∈ L, where R is one of five risk categories, L is a country to which location l belongs, we record an occurrence of pair (R, L). After processing all events, we obtain the number of occur- rences of each pair (R, L). For each risk category R, we normalize the number of occurrences in all coun- tries L by taking logarithm of a ratio of number of oc- currence+1 in the given country to 1+the maximum number of occurrences in any country for category R. We show the results as a heat-maps layered over the political maps of the world shown in Figs. 5-9. Each of these figures displays normalized levels of activities of one of the five risk categories. For example, in economic risks, the economic risk-events related to Russia occur 42 times, related to Japan 16 times, to India 6 times, to Italy 2 times. These scores after the normalization become 1, 0.75, 0.52, 0.29, respectively. Most of the economic risks happen in the developed countries or countries with high volume of trading re- sources, industrial products or services, such as Rus- sia (1.00), U.S. (0.95), Malaysia (0.78), Japan (0.75), Mexico (0.72), Cyprus (0.68), Australia (0.61), Greece (0.61). The most impactful story in Russia is "2008 Russian financial crisis", in the U.S. "Subprime mort- gage crisis", in Malaysia "Malaysia Airlines Flight 370", in Japan "Automotive industry crisis of 2008-10", in Fig. 7 Geopolitical risks heat-map over political map of the world. Mexico "Mexican Drug War", in Cyprus "2012-13 Cypriot financial crisis", in Australia "August 2011 stock mar- kets fall", and in Greece "Greek government-debt cri- sis". Those economic risks are related to a failure of financial mechanisms such as stock (Russia, Australia), mortgage (U.S.), banking (Cyprus, Greece), illicit trade, such as smuggling (Mexico), and decreased demand for manufacturing products, such as cars (Japan). The environmental risks usually happen in coastal countries, especially those near Atlantic, Pacific, or In- dian Oceans, such as U.S. (1.00), Philippines (1.00), China (0.97), Japan (0.91), India (0.91), Mexico (0.90), Haiti (0.87), Pakistan (0.83), Cuba (0.71). "Atlantic hurricane season" mainly affects the U.S., Mexico, Haiti, Cuba. "Pacific typhoon season" mainly affects the Philip- pines, China, Japan. "North Indian Ocean cyclone sea- son" mainly affects India. Beyond that, some other dis- 0.00.20.30.50.70.81.0Economic0.00.20.30.50.70.81.0Environmental0.00.20.30.50.70.81.0Geopolitical Supervised Learning of the Global Risk Network Activation 7 Networks Economic Intra Inter Environmental Geopolitical Intra Inter Intra Inter Societal Intra Inter Technological Whole Network Intra Inter Number of edges Common part WEF only WEF Wiki only Wiki 21 4 25 6 27 36 13 49 50 86 4 6 10 0 4 22 14 36 28 50 8 2 10 0 8 29 11 40 34 63 12 2 14 1 13 47 13 60 45 92 3 3 6 0 3 12 13 25 35 47 121 49 170 103 224 Table 2 The number of intra-group and inter-group edges of each risk category and network. WEF represents the network published by the World Economic Forum; Wiki represents the network created by us from Wiki events. Common part represents the edges existing in both networks. WEF only represents the edges unique to the WEF network, while Wiki only includes the edges unique to the Wiki network. Networks Common part WEF only WEF Wiki only Wiki Economic (cid:104)k(cid:105) (cid:104)c(cid:105) 0.6 8.67 2.33 0.0 0.61 11.0 6.89 0.35 0.74 15.56 Environmental Geopolitical (cid:104)k(cid:105) 6.0 5.2 11.2 5.6 11.6 (cid:104)c(cid:105) 0.69 0.31 0.57 0.35 0.81 (cid:104)c(cid:105) 0.49 0.06 0.66 0.42 0.81 (cid:104)k(cid:105) 9.0 3.0 12.0 6.8 15.8 Societal (cid:104)k(cid:105) (cid:104)c(cid:105) 0.59 11.83 0.17 2.83 0.59 14.67 7.83 0.32 0.72 19.67 Technological Whole Network (cid:104)k(cid:105) 4.5 4.75 9.25 8.75 13.25 (cid:104)c(cid:105) 0.47 0.01 0.48 0.22 0.85 (cid:104)c(cid:105) 0.58 0.1 0.59 0.34 0.78 (cid:104)k(cid:105) 8.34 3.38 11.72 15.45 7.1 Table 3 The average degree (cid:104)k(cid:105) and average clustering coefficient (cid:104)c(cid:105) of each risk category and network. WEF represents the network published by the World Economic Forum; Wiki represents the network created by us from Wiki events. Common part includes the edges existing in both networks. WEF only represents the edges unique to the WEF network, while Wiki only includes the edges unique to the Wiki network. Fig. 8 Societal risks heat-map over political map of the world. Fig. 9 Technological risks heat-map over political map of the world. asters also happen in the U.S. "2011 Mississippi River floods", in China "2008 Sichuan earthquake", in Japan "2011 Thoku earthquake and tsunami", in India "2004 Indian Ocean earthquake and tsunami", in Mexico "Deep- water Horizon oil spill", and in Pakistan "2010 Pak- istan floods". The geopolitical risks are most frequent in coun- tries having unstable regime or involved in international conflicts, such as North Korea (1.00), Thailand (0.80), Iran (0.80), U.S. (0.72), Egypt (0.72), Pakistan (0.62), Syria (0.62), Nigeria (0.62), Iraq (0.38). Risk "16. In- terstate conflict with regional consequences" is between the U.S. and Iraq in "Iraq War". Risk "17. Large-scale terrorist attacks" is in Pakistan "Terrorism in Pak- istan" and Nigeria "Islamist insurgency in Nigeria". Risk "18. State collapse or crisis" is in Thailand "Thai coup d'tat", Egypt "Egyptian coup d'tat", and Syria "Syrian civil war". Risk "19. Weapons of mass destruc- tion" is in North Korean "North Korean nuclear test" and Iran "Nuclear program of Iran". Societal risks, are often a consequence of geopolit- ical risks, and usually occur in the same countries as the latter group of risks does, such as Egypt (1.00), Syria (0.98), Yemen (0.80), Libya (0.77), Tunisia (0.77), China (0.76), Russia (0.76), Saudi Arabia (0.73). The most influential story in Egypt is "Egyptian Revolu- 0.00.20.30.50.70.81.0Societal0.00.20.30.50.70.81.0Technological 8 Niu, Korniss, Szymanski tion of 2011", in Syria "Syrian civil war", in Yemen "Yemeni Revolution", in Libya "Libyan civil war", in Tunisia "Tunisian Revolution", in China "2009 rmqi ri- ots", in Russia "Snow Revolution", and in Saudi Arabia "Arab Spring". Technological risks frequently happen either in a sci- entifically developed country such as U.S. (1.00) and U.K. (0.51) or in an unstable nations such as Egypt (0.85), Syria (0.66), Iraq (0.51), Pakistan (0.51), North Korea (0.51). When information technology is highly developed, risk "29. Massive incident of data fraud/theft" is often active because of a massive amount of official and personal data online, such as "United States diplo- matic cables leak" in the U.S. and "News International phone hacking scandal" in the U.K. Related geopolitical risks may also cause other technological risks. For ex- ample, in Egypt, a long-lasting internet blackout and censorship was triggered by "Egyptian Revolution of 2011"; in North Korea, risk "28. Large-scale cyberat- tacks" was caused by "2013 Korean crisis". find that the economic risks arise in countries with high volume of trade. The environmental risks are common in coastal areas. The geopolitical risks are concentrated mainly in the Middle East. Most of the societal risks are the consequences of geopolitical risks and thus oc- cur in the same countries as the former. The technolog- ical risks arise in scientifically developed countries and in the countries in conflict with other nations. Acknowledgment This work was supported in part by the Army Research Office under grant W911NF-16-1-0524 and by the Army Research Laboratory under Cooperative Agreement Num- ber W911NF-09-2-0053 (NS CTA). The views and con- clusions contained in this document are those of the authors and should not be interpreted as representing the official policies either expressed or implied of the Army Research Laboratory or the U.S. Government. 5 Conclusion References Our paper contributes the first event-driven analysis of global risks using the complete Wikipedia Event Por- tal dataset over the years 2000 to 2014. To overcome the limitation of risk-event manual annotation used in the current research [11, 13], here we introduce a novel risk auto-detection module, which filters out over 80% of data about the non-relevant events and reduces sig- nificantly volume of data to be manually labeled. This approach can be used in other machine learning sce- narios when the true negative instances account for a large proportion of the dataset during the super- vised learning classification. With the help from auto- detection tool and sufficient effort devoted to manual la- beling, we created the complete and structured dataset from Wikipedia Event Portal, which can be studied in- depth in the future. This data set contains two thou- sand labeled risk events extracted from over 50 thou- sand events. These labeled risks are structured hierar- chically with events linked to stories, locations, dates, categories, and references creating a knowledge net- work. From this rich dataset, we build a relational net- work, which is surprisingly similar to the network cre- ated by the WEF experts [1]. Moreover, the differences between the two networks reflect the differences in risk views of the expert and the public. The experts show concerns about yet unseen risks that may arise in the fu- ture or have an enormous impact on all humanity, while the public tends to focus on risks that matter more to everyday life. By studying the local effects of risks, we 1. World Economic Forum Global Risks Report. URL https://www.weforum.org/reports/ (2016). the-global-risks-report-2016. Accessed: 2018-07-31 2. D.H. Erkens, M. Hung, P. Matos, Journal of corporate finance 18(2), 389 (2012) 3. R.A. Pielke Jr, J. Gratz, C.W. Landsea, D. Collins, M.A. Saunders, R. Musulin, Natural Hazards Review 9(1), 29 (2008) 4. J. Lee Ray, Conflict Management and Peace Science 20(2), 1 (2003) 5. P.A. Sanchez, Science 295(5562), 2019 (2002) 6. T. Pogge, Ethics & international affairs 19(1), 1 (2005) 7. T. Rid, B. Buchanan, Journal of Strategic Studies 38(1- 2), 4 (2015) 8. L. Harding, The Guardian 5 (2016) 9. X. Lin, A. Moussawi, G. Korniss, J.Z. Bakdash, B.K. Szymanski, Scientific reports 7(1), 6699 (2017) 10. D. Baloi, A.D. Price, International journal of project management 21(4), 261 (2003) 11. B.K. Szymanski, X. Lin, A. Asztalos, S. Sreenivasan, Sci. Rep. 5(10998) (2015) 12. X. Niu, A. Moussawi, N. Derzsy, X. Lin, G. Korniss, B.K. Szymanski, in International Workshop on Complex Net- works and their Applications (Springer, 2017), pp. 1124 -- 1134 13. X. Niu, A. Moussawi, G. Korniss, B.K. Szymanski, Ap- plied Network Science 3(1), 24 (2018) 14. Wikipedia event portal URL https:// en.wikipedia.org/wiki/Portal:Current_events. Ac- cessed: 2019-05-22 (2019). 15. G.B. Tran, M. Alrifai, in Proceedings of the 23rd Inter- national Conference on World Wide Web (ACM, 2014), pp. 511 -- 516 Appendix: Tables 4-8 Supervised Learning of the Global Risk Network Activation 9 ID Risk 1 2 3 4 5 6 7 8 9 Asset bubbles in a major economy Deflation in a major economy Failure of a major financial mechanism or institution Failure/shortfall of critical infrastructure Fiscal crises in key economies High structural unemployment or underemployment Illicit trade Severe energy price shock Unmanageable inflation Tag housing bubble stock bubble commodity bubble asset bubble deflation decline in prices bank failure financial crisis oil/gas network failure water supply failure power grid failure civil flight failure sovereign debt crisis liquidity crisis unemployment drug trade smuggling tax evasion money laundering human trafficking counterfeiting energy price shock inflation rising good price Keyword housing, mortgage, estate share, stock, exchange commodit- liquidity, asset deflation price bank financial pipe pipe power, grid, electricity, blackout flight, airport, airline, plane, aircraft debt, loan, lend liquid employ, job drug smuggl- tax launder trafficking counterfeit price, oil, gas inflation price Table 4 Economic risks and subordinate tags. Each tag corresponds to a list of the roots of keywords. ID 10 11 12 13 14 Risk Extreme weather events Failure of climate-change mitigation and adaptation Major biodiversity loss and ecosystem collapse Major natural disasters Man-made environmental damage and disasters Tag storm blizzard torrential rain flood death missing injury homeless damage economic loss ecosystem collapse biodiversity loss earthquake volcanic activity tsunami landslide natural wildfire radioactive contamination environment contamination urban pollution oil spill manmade wildfire Keyword hurricane, storm, typhoon, cyclone snow, blizzard, hailstone rain flood death, dead, die, toll, kill, corpse missing, disappear injur-, hurt, wound home collaps, damage, destory cost, loss, dollar, usd, euro, $, e ecosystem biodiversity, species, wildlife earthquake, temblor volcan- tsunami slide wildfire radioact- contamin- pollution oil, spill wildfire Table 5 Environmental risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots of keywords. ID 15 16 17 18 19 Risk Failure of national governance Interstate conflict with regional consequences Large-scale terrorist attacks State collapse or crisis Weapons of mass destruction Tag corruption trade war military war terrorist attack military coup civil war nuclear weapon Keyword corruption trade, currency military, invasion, occupation, conflict terror coup civil, war nuclear Table 6 Geopolitical risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots of keywords. Tag urban pollution factory explosion building collapse starvation crop destruction low quality of food rising food price food shortage evacuation refugee flee migration eviction riot unrest demonstration march revolution avian influenza swine influenza equine influenza aids cholera fever diarrhea ebola epidemic Niu, Korniss, Szymanski Keyword pollution factory collapse starv-, hunger, famin- crop, agricult- poison, taint, contaminat-, poultry, meat, pork price shortage, suppl- evacuat-, evacuee refugee, flee migrant, migrate evict riot unrest demonstration march revolution bird, avian, h5n1, h6n1, h7n9 h1n1, swine equine aids, hiv cholera fever diarrhea ebola epidemic, outbreak, pandemic thirst, shortage, deprivat-, suppl- water 10 ID 20 21 Risk Failure of urban planning Food crises 22 Large-scale involuntary migration 23 Profound social instability Rapid and massive spread of infectious diseases 24 25 Water crises water shortage water contamination Table 7 Societal risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots of keywords. ID 26 27 28 Risk Adverse consequences of technological advances Breakdown of critical information infrastructure Large-scale cyberattacks 29 Massive incident of data fraud/theft Tag genetically modified food radioactive contamination pyrotechnics internet blackout satellite break cyberattack malware computer worm software virus trojan horse hacking attack DOS attack online attack data leak hacking data Keyword genetic radioact- pyrotech- internet satellite cyber malware worm virus trojan hack denial online leak, classified, secret hack Table 8 Technological risks and and their corresponding tags. Each tag must match at least one entry in the list of the roots of keywords.
1806.11316
1
1806
2018-06-29T09:36:46
Fake News Identification on Twitter with Hybrid CNN and RNN Models
[ "cs.SI", "cs.CL" ]
The problem associated with the propagation of fake news continues to grow at an alarming scale. This trend has generated much interest from politics to academia and industry alike. We propose a framework that detects and classifies fake news messages from Twitter posts using hybrid of convolutional neural networks and long-short term recurrent neural network models. The proposed work using this deep learning approach achieves 82% accuracy. Our approach intuitively identifies relevant features associated with fake news stories without previous knowledge of the domain.
cs.SI
cs
Fake News Identification on Twitter with Hybrid CNN and RNN Models Deepayan Bhowmik C3Ri Research Institute Sheffield Hallam University United Kingdom [email protected] Shahrzad Zargari C3Ri Research Institute Sheffield Hallam University United Kingdom [email protected] doctored stories on social media including microblogs such as Twitter. All over the world, the growing influence of fake news is felt on daily basis from politics to education and financial markets. This has continually become a cause of concern for politicians and citizens alike. For example, on April 23rd 2013, the Twitter account of the news agency, Associated Press, which had almost 2 million followers at the time was hacked. Figure 1: Tweet allegedly sent by the Syrian Electronic Army from hacked Twitter account of Associated Press The impact may also be severe. The following message was sent, "Breaking: Two Explosions in the White House and Barack Obama is injured" (shown in Figure 1). This message led to a flash crash on the New York Stock Exchange, where investors lost 136 billion dollars on the Standard & Poors Index in two minutes [1]. It would be interesting and indeed beneficial if the origin of messages could be verified and filtered where the fake messages were separated from authentic ones. The information that people listen to and share in social media is largely influenced by the social circles and relationships they form online [2]. The feat of accurately tracking the spread of fake messages and especially news content would be of interest to researchers, politicians, citizens as well as individuals all around the world. This can be achieved by using effective and relevant "social sensor tools" [3]. This need is more important in countries that have trusted and embraced technology as part of their electoral process and thus adopted e-voting. [4] For example, in France and Italy, Oluwaseun Ajao C3Ri Research Institute Sheffield Hallam University United Kingdom [email protected] ABSTRACT The problem associated with the propagation of fake news continues to grow at an alarming scale. This trend has generated much interest from politics to academia and industry alike. We propose a framework that detects and classifies fake news messages from Twitter posts using hybrid of convolutional neural networks and long-short term recurrent neural network models. The proposed work using this deep learning approach achieves 82% accuracy. Our approach features associated with fake news stories without previous knowledge of the domain. intuitively identifies relevant CCS CONCEPTS • Information systems → Social networking sites KEYWORDS Fake News, Twitter, Social Media ACM Reference format: Oluwaseun Ajao, Deepayan Bhowmik, and Shahrzad Zargari. 2018. Fake News Identification on Twitter with Hybrid CNN and RNN Models. In Proceedings of the International Conference on Social Media & Society, Copenhagen, DOI: https://doi.org/10.1145/3217804.3217917 (SMSociety). Denmark 1 1 INTRODUCTION The growing influence experienced by the propaganda of fake news is now cause for concern for all walks of life. Election results are argued on some occasions to have been manipulated through the circulation of unfounded and 1 Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third- party components of this work must be honored. For all other uses, contact the owner/author(s). SMSociety, July 2018, Copenhagen, Denmark © 2018 Copyright held by the owner/author(s). $15.00. DOI: https://doi.org/10.1145/3217804.3217917 SMSociety, July 2018, Copenhagen, Denmark Oluwaseun Ajao, Deepayan Bhowmik and Shahrzad Zargari Table 1: Most Circulated and Engaging Fake News Stories on Facebook in 2016 S/N 1 2 3 4 5 6 7 8 9 10 Fake News Headline Obama Signs Executive Order Banning The Pledge of Allegiance in Schools Nationwide Woman arrested for defecating on boss' desk after winning the lottery Pope Francis Shocks World, Endorses Donald Trump for President, Releases Statement Trump Offering Free One-Way Tickets to Africa & Mexico for Those Who Wanna Leave America Cinnamon Roll Can Explodes Inside Man's Butt During Shoplifting Incident Florida Man dies in meth-lab explosion after lighting farts on fire FBI Agent Suspected in Hillary email Leaks Found Dead in Apparent Murder-Suicide RAGE AGAINST THE MACHINE To Reunite And Release Anti Donald Trump Album Police Find 19 White Female Bodies In Freezers With "Black Lives Matter" Carved Into Skin ISIS Leader calls for American Muslim Voters to Support Hillary Clinton Category Politics Crime Politics Politics Crime Crime Politics Politics Crime Politics even though internet users may not accurately represent the demographics of the entire population, opinions on social media and mass surveys of citizens are correlated. They are both found to be largely influenced by external factors such as news stories from newspapers, TV and ultimately on social media. In addition, there is a growing and alarming use of social media for anti-social behaviors such as cyberbullying, propaganda, hate crimes, and for radicalization and recruitment of individuals into terrorism organizations such as ISIS [5]. A study by Burgess et al. into the top 50 most retweeted stories with pictures of the Hurricane Sandy disaster found that less than 25% were real while the rest were either fake or from unsubstantiated sources [6]. Facebook announced the use of "filters" for removing hoaxes and fake news from the news feed on the world's largest social media platform [7]. The development followed concerns that the spread of fake news on the platform might have helped Donald Trump win the US presidential elections held in 2016 [8]. According to the social media site, 46% of the top fake news stories circulated on Facebook were about US politics and election [9]. Table 1 gives detail of the top ranking news stories that were circulated on Facebook in year 2016. Tambuscio et al proposed a model for tracking the spread of hoaxes using four parameters: spreading rate, gullibility, probability to verify a hoax, and forgetting one's current belief[10]. Many organizations now employ social media accounts on Twitter, Facebook and Instagram for the purposes of announcing corporate information such as earnings reports and new product releases. Consumers, investors, and other stake holders take these news messages as seriously as they would for any other mass media [11]. Other reasons that fake news have been widely proliferated include for humor, and as ploys to get readers to click on sponsored content (also referred to as "clickbait". In this work, we aim to answer the following research questions: • Given tweets about a news item or story, can we determine their truth or authenticity based on the content of the messages? • Can semantic features or linguistic characteristics associated with a fake news story on Twitter be automatically identified without prior knowledge of the domain or news topic? The remainder of the paper is structured as follows: in Section 2, we discuss related works in rumor and fake news detection, Section 3 presents the methodology that we propose and utilize in our task of fake news detection, while the results of our findings are discussed and evaluated in Section 4. Finally, conclusions and future work are presented in Section 5. 2 RELATED WORKS its platform, The work on fake news detection has been initially reviewed by several authors, who in the past referred to it only "rumors", until 2016 and the US presidential election. During the election, the phrase "fake news" became popular with then-candidate, Donald Trump. Until recently, Twitter allowed their users to communicate with 140 characters on to communicate with others. Therefore, users who propagate fake news, rumors and questionable posts have been found to incorporate other mediums to make their messages go viral. A good example happened in the aftermath of Hurricane Sandy, where enormous amounts of fake and altered images were circulating on the internet. Gupta et al used a Decision Tree classifier to distinguish between fake and real images posted about the event[12]. limiting users ability Neural networks are a form of machine learning method that have been found to exhibit high accuracy and precision in clustering and classification of text [13]. They also prove effective in the prompt detection of spatio-temporal trends in content propagation on social media. In this approach, we combine this with the efficiency of recurrent neural networks semantic interpretation of images. Although this hybrid approach in semantic interpretation of text and images is not new [14][15], to the best of our knowledge, this is the first attempt involving the use of a hybrid approach in the detection of the origin and propagation of fake news posts. Kwon et al identified and utilized three hand-crafted feature the detection and (RNN) in Fake News Identification on Twitter types associated with rumor classification including: (1) Temporal features - how a tweet propagates from one time window to another; (2) Structural Features - how the influence or followership of posters affect other posts; and (3) Linguistic Features - sentiment categories of words[16]. Previous work done by Ferrara achieved 97% accuracy in detecting fake images from tweets posted during the Hurricane Sandy disaster in the United States They performed a characterization analysis, to understand the temporal, social reputation and influence patterns for the spread of fake images by examining more than 10,000 images posted on Twitter during the incident[12]. They used two broad types of features in the detection of fake images posted during the event. These include seven user- based features such as age of the user account, followers' size and the follower-followee ratio. They also deduced eighteen tweet-based features such as tweet length, retweet count, presence of emoticons and exclamation marks. Aggarwal et al had identified four certain features based on URLs, protocols to query databases content and followers networks of tweets associated with phishing, which present a similar problem to fake and non-credible tweets but in their case also have the potential to cause significant financial harm to someone clicking on the links associated with these "phishing" messages[17]. Yardi et al developed three feature types for spam detection on Twitter; which includes searches for URLs, matching username patterns, and detection of keywords from supposedly spam messages[18]. O'Donovan et al identified the most useful indicators of credible and non- credible tweets as URLs, mentions, retweets, and tweet lengths[19]. Other works on the credibility and veracity identification on Twitter include Gupta et al that developed a framework and real-time assessment system for validating authors content on Twitter as they are being posted[20]. Their approach assigns a graduated credibility score or rank to each tweet as they are posted live on the social network platform. 3 METHODOLOGY The approach of our work is twofold. First is the automatic identification of features within Twitter post without prior knowledge of the subject domain or topic of discussion using the application of a hybrid deep learning model of LSTM and CNN models. Second the determination and classification of fake news posts on Twitter using both text and images. We posit that since the use of deep learning models enables automatic feature extraction, the dependencies amongst the words in fake messages can be identified automatically [13] without expressly defining them in the network. The knowledge of the news topic or domain being is SMSociety, July 2018, Copenhagen, Denmark discussed would not be necessary to achieve the feat of fake news detection. 3.1 The Deep learning Architectures We implemented three deep neural network variants. The models applied to train the datasets include: for 3.1.1 Long-Short Term Memory (LSTM) LSTM recurrent neural network (RNN) was adopted for the sequence classification of the data. The LSTM [7] remains a popular method learning classification involving text since when they first appeared 20 years ago [22] the deep LSTM with dropout regularization 3.1.2 LSTM with dropout regularization [23] layers between the word embedding layer and the LSTM layer was adopted to avoid over-fitting to the training dataset. Following this approach, we randomly selected and dropped weights amounting to 20% of neurons in the LSTM layer. 3.1.3 LSTM with convolutional neural networks (CNN) We included a 1D CNN [14] immediately after the word embedding layer of the LSTM model. We further added a max pooling layer to reduce dimensionality of the input layer while preserving the depth and avoid over-fitting of the training data. This also helps in reducing computational time and resources in the training of the model. The overall aim is to ultimately improve model prediction accuracy. 3.2 About the Dataset The dataset consisted of approximately 5,800 tweets centered on five rumor stories. The tweets were collected and used in the works by Zubiaga et al[24. The dataset consisted of original tweets and they were labeled as rumor and non-rumors. The events were widely reported in online, print and conventional electronic media such radio and Television at the time of occurrence: • CharlieHebdo • SydneySiege • Ottawa Shooting • Germanwings-Crash • Ferguson Shooting We applied ten-fold cross validation on the entire dataset of 5,800 tweets and performed padding of the tweets (i.e., adding zeros to the tweets for uniform inclusion in the feature vector for analysis and processing). 3.3 Recurrent Neural Network (RNNs) This type of neural network has been shown to be effective in time and sequence based predictions [25]. Twitter posts can be likened to events that occur in time [16] where the intervals between the retweet of one user to another is contained within a time window and treated in sequential modes. Rumors have been examined in the context of SMSociety, July 2018, Copenhagen, Denmark varying time windows [26]. Recurrent Neural Networks were initially limited by the problem associated with the adjustment of weights over time. Several methods have been adopted in solving the vanishing gradient problem but can largely be categorized into two types, namely, the exploding gradient and the vanishing gradient. Solutions adopted for the former include truncated back propagation, penalties and gradient clipping (these resolve the exploding gradient problem), while the vanishing gradient problem has been resolved using dynamic weight initializations, the echo state networks (ESN) and Long-Short Term Memory (LSTMs). LSTMs will be the main focus of this work as they preserve the memory from the last phase and incorporate this in the prediction task of the neural network model. Weights are the long term memories of the neural network. 3.4 Incorporating Convolutional Neural Network Another popular model is the convolutional neural network (CNN) which has been well known for its application in image processing as well as use in text mining [27]. We posit that addition of the hybrid method would improve performance of the model and give much better results for the content based fake news detection. However, the hybrid implementation for this work so far involves a text-only approach. 3.5 Selection of Training Parameters The following hyper-parameters were optimized using a grid search approach and optimal values derived for the following batch size, epochs, learning rates, activation function and dropout regularization rate which is set at 20%. This hybrid method of detecting fake news using this approach complements the natural language semantic processing of text by ensuring that images allow for the disambiguation of posts and making them more enriched in the identification repository. We posit that it would also be interesting to look at users' impact in the propagation of these messages and fake news content on Twitter. The aim of the study is to detect the veracity of posts on law Twitter. Possible applications enforcement agencies the spread and propagation of such messages, especially when they have negative implications and consequences for readers who believe them. include assisting in curtailing 4 EVALUATION, RESULTS AND DISCUSSION Our deep learning model intuitively achieves 82% accuracy on the classification task in detecting fake news posts without prior domain knowledge of the topics being discussed. So far in the experiments completed, it is revealed that the plain vanilla LSTM model achieved the best performance terms of precision, recall and FMeasure and an accuracy of 82% as shown in Table 2. On in Oluwaseun Ajao, Deepayan Bhowmik and Shahrzad Zargari for the reason the network. Another the other hand, the LSTM method with dropout regularization performed the least in terms of the metrics adopted. This is likely a result of under fitting the model, in addition to the lack of sufficient training data and examples within low performance of the dropout regularization may be the depth of the network, as it is relatively shallow, resulting in the drop-out layer being quite close to the input and output layers of the model. This could severely degrade the performance of the method. An alternative to improve model performance could be through Batch Normalization [28], where the input values in the layers have a mean activation of zero and standard deviation of one as in a standard normal distribution; this is beyond the scope of this current work. The LSTM-CNN hybrid model performed better than the dropout regularization model, with a 74% accuracy and an FMeasure of 39.7%. However insufficient training examples for the neural network model led to negative appreciation against the plain-vanilla LSTM model. The precision of 68% achieved by the state of the art PHEME dataset by [24] was still higher than the results obtained so far. However we believe that with the inclusion of more training data from the reactions to the original twitter posts, there will be more significant improvement in model performance. 5 CONCLUSION AND FUTURE WORK We have presented a novel approach for the detection of fake news spread on Twitter from message text and images. We achieved an 82% accuracy performance beating the state of the art on the PHEME Dataset. It is expected that our approach will achieve much better results following incorporation of fake image disambiguation (found in these tweets aimed at making the posts go viral). We leverage on a hybrid implementation of two deep learning models to find that we do not require a very large number of tweets about an event to determine the veracity or credibility of the messages. Our approach gives a boost in the achievement of a higher performance while not requiring a typically associated with deep learning models. We are progressively examining the inference of the tweet geo-locations and origin of these fake news items and the authors that large amount of training data Table 2: Proposed Deep Learning Methods in Fake News Detection Technique LSTM LSTMDrop LSTM-CNN propagate them. It would be interesting if also the training data required in this task was relatively smaller such that F-M 40.59 30.93 39.70 ACC 82.29 73.78 80.38 REC 40.55 29.71 39.53 PRE 44.35 39.67 43.94 SMSociety, July 2018, Copenhagen, Denmark IEEE Conference on Computer Vision and Pattern Recognition. 3128–3137. [15] JiangWang, Yi Yang, Junhua Mao, Zhiheng Huang, Chang Huang, and Wei Xu. 2016. Cnn-rnn: A unified framework for multi-label image classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2285–2294. [16] Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Data Mining (ICDM), 2013 IEEE 13th International Conference on. IEEE, 1103–1108. [17] Anupama Aggarwal, Ashwin Rajadesingan, and Ponnurangam Kumaraguru.2012. Phishari: automatic realtime phishing detection on twitter. In eCrime Researchers Summit (eCrime), 2012. IEEE, 1–12.' [18] Sarita Yardi, Daniel Romero, Grant Schoenebeck, et al. 2009. Detecting spam in a twitter network. First Monday 15, 1 (2009). [19] John O'Donovan, Byungkyu Kang, Greg Meyer, Tobias Hollerer, and Sibel Adalii. 2012. Credibility in context: An analysis of feature distributions in twitter. In Privacy, Security, Risk and Trust (PASSAT), 2012 international conference on and 2012 international conference on social computing (SocialCom). IEEE, 293–301. [20] Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. Tweetcred: Real-time credibility assessment of content on twitter. In International Conference on Social Informatics. Springer, 228–243. [21] Klaus Greff, Rupesh K Srivastava, Jan Koutník, Bas R Steunebrink, and Jürgen Schmidhuber. 2017. LSTM: A search space odyssey. IEEE transactions on neural networks and learning systems 28, 10 (2017), 2222–2232. [22] Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780. [23] Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2014), 1929–1958. [24] Arkaitz Zubiaga, Maria Liakata, and Rob Procter. 2016. Learning Reporting Dynamics during Breaking News for Rumour Detection in Social Media. arXiv preprint arXiv:1610.07363 (2016). [25] Jing Ma, Wei Gao, Zhongyu Wei, Yueming Lu, and Kam-Fai Wong. 2015. Detect rumors using time series of social context information on microblogging websites. In Proceedings of the 24th ACM International Conference on and Knowledge Management. ACM, 1751–1754 Information [26] Sejeong Kwon, Meeyoung Cha, and Kyomin Jung. 2017. Rumor detection over varying time windows. PloS one 12, 1 (2017), e0168344. [27] Shiou Tian Hsu, Changsung Moon, Paul Jones, and Nagiza Samatova. 2017. A Hybrid CNN-RNN Alignment Model for Phrase-Aware Sentence Classification. In Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, Vol. 2. 443–449. [28] Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International conference on machine learning. 448–456. [29] Oluwaseun Ajao, Jun Hong, and Weiru Liu. 2015. A survey of location inference techniques on Twitter. Journal of Information Science 41, 6(2015), 855–864. Fake News Identification on Twitter fake news items can be quickly identified. It would be further beneficial if the origin and location [29] of fake posts were tracked with minimal computational resources. Deep learning models such as CNN and RNN often require much larger datasets, and in some cases multiple layers of neural networks for the effective training of their models. In our case, we have a small dataset of 5,800 tweets. In our ongoing and future work we have collected the reactions of other users to these messages via the Twitter API in the magnitude of hundreds of thousands, with the aim of enriching the size of the training dataset and the model performance. We expect that this will also help to draw more actionable insights for the propagation of these messages from one user to another and how they react- specifically if they embraced or refrained from becoming evangelists and promoters of these messages to other users on the platform. robustness of improving thus the REFERENCES [1] J Keller. 2013. A fake AP tweet sinks the DOWfor an instant. Bloomberg Businessweek (2013). [2] Jure Leskovec and Julian J Mcauley. 2012. Learning to discover social circles in ego networks. In Advances in neural information processing systems. 539–547. [3] Steve Schifferes, Nic Newman, Neil Thurman, David Corney, Ayse Göker, and Carlos Martin. 2014. Identifying and verifying news through social media: Developing a user-centred tool for professional journalists. Digital Journalism 2, 3 (2014), 406–418. [4] Andrea Ceron, Luigi Curini, Stefano M Iacus, and Giuseppe Porro. 2014. Every tweet counts? How sentiment analysis of social media can improve our knowledge of citizens' political preferences with an application to Italy and France. New Media & Society 16, 2 (2014), 340–358. [5] Emilio Ferrara. 2015. Manipulation and abuse on social media by emilio ferrara with ching-man au yeung as coordinator. ACM SIGWEB Newsletter Spring (2015), 4. [6] Jean Burgess, Farida Vis, and Axel Bruns. 2012. Hurricane Sandy: The Most Tweeted Pictures. The Guardian Data Blog, November 6 (2012). [7] BBC. 2017. Facebook to tackle fake news in Germany 2017. (2017). [8] Olivia Solon. 2016. Facebook's failure: Did fake news and polarized politics get Trump elected. The Guardian 10 (2016). from 2016. [9] Craig Silverman. 2016. Here are 50 of the biggest fake news hits on https://www. Facebook buzzfeed.com/craigsilverman/top-fake-news-of-2016 (2016). BuzzFeed, [10] Marcella Tambuscio, Giancarlo Ruffo, Alessandro Flammini, and Filippo Menczer. 2015. Fact-checking effect on viral hoaxes: A model of misinformation spread in social networks. In Proceedings of the 24th International Conference on World Wide Web. ACM, 977– 982. [11] Andreas M Kaplan and Michael Haenlein. 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons 53, 1 (2010), 59–68. [12] Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In Proceedings of the 22nd international conference on World Wide Web. ACM, 729–736. [13] Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J Jansen, Kam-Fai Wong, and Meeyoung Cha. 2016. Detecting Rumors from Microblogs with Recurrent Neural Networks.. In IJCAI. 3818–3824. [14] Andrej Karpathy and Li Fei-Fei. 2015. Deep visual-semantic alignments for generating image descriptions. In Proceedings of the
1702.05379
2
1702
2017-03-16T10:08:20
Why We Read Wikipedia
[ "cs.SI", "cs.DL", "cs.HC" ]
Wikipedia is one of the most popular sites on the Web, with millions of users relying on it to satisfy a broad range of information needs every day. Although it is crucial to understand what exactly these needs are in order to be able to meet them, little is currently known about why users visit Wikipedia. The goal of this paper is to fill this gap by combining a survey of Wikipedia readers with a log-based analysis of user activity. Based on an initial series of user surveys, we build a taxonomy of Wikipedia use cases along several dimensions, capturing users' motivations to visit Wikipedia, the depth of knowledge they are seeking, and their knowledge of the topic of interest prior to visiting Wikipedia. Then, we quantify the prevalence of these use cases via a large-scale user survey conducted on live Wikipedia with almost 30,000 responses. Our analyses highlight the variety of factors driving users to Wikipedia, such as current events, media coverage of a topic, personal curiosity, work or school assignments, or boredom. Finally, we match survey responses to the respondents' digital traces in Wikipedia's server logs, enabling the discovery of behavioral patterns associated with specific use cases. For instance, we observe long and fast-paced page sequences across topics for users who are bored or exploring randomly, whereas those using Wikipedia for work or school spend more time on individual articles focused on topics such as science. Our findings advance our understanding of reader motivations and behavior on Wikipedia and can have implications for developers aiming to improve Wikipedia's user experience, editors striving to cater to their readers' needs, third-party services (such as search engines) providing access to Wikipedia content, and researchers aiming to build tools such as recommendation engines.
cs.SI
cs
Why We Read Wikipedia Philipp Singer∗1, Florian Lemmerich∗1, Robert West†2, Leila Zia3, Ellery Wulczyn3, Markus Strohmaier1, Jure Leskovec4 1GESIS & University of Koblenz-Landau, 2EPFL, 3Wikimedia Foundation, 4Stanford University [email protected], [email protected], [email protected], [email protected] 7 1 0 2 r a M 6 1 ] I S . s c [ 2 v 9 7 3 5 0 . 2 0 7 1 : v i X r a ABSTRACT Wikipedia is one of the most popular sites on the Web, with millions of users relying on it to satisfy a broad range of infor- mation needs every day. Although it is crucial to understand what exactly these needs are in order to be able to meet them, little is currently known about why users visit Wikipe- dia. The goal of this paper is to fill this gap by combining a survey of Wikipedia readers with a log-based analysis of user activity. Based on an initial series of user surveys, we build a taxonomy of Wikipedia use cases along several dimensions, capturing users' motivations to visit Wikipedia, the depth of knowledge they are seeking, and their knowledge of the topic of interest prior to visiting Wikipedia. Then, we quantify the prevalence of these use cases via a large-scale user survey conducted on live Wikipedia with almost 30,000 responses. Our analyses highlight the variety of factors driving users to Wikipedia, such as current events, media coverage of a topic, personal curiosity, work or school assignments, or bore- dom. Finally, we match survey responses to the respondents' digital traces in Wikipedia's server logs, enabling the dis- covery of behavioral patterns associated with specific use cases. For instance, we observe long and fast-paced page sequences across topics for users who are bored or exploring randomly, whereas those using Wikipedia for work or school spend more time on individual articles focused on topics such as science. Our findings advance our understanding of reader motivations and behavior on Wikipedia and can have implications for developers aiming to improve Wikipedia's user experience, editors striving to cater to their readers' needs, third-party services (such as search engines) providing access to Wikipedia content, and researchers aiming to build tools such as recommendation engines. Keywords: Wikipedia; survey; motivation; log analysis 1. INTRODUCTION Wikipedia is the world's largest encyclopedia and one of the most popular websites, with more than 500 million pageviews ∗ † Both authors contributed equally to this work. Robert West is a Wikimedia Foundation Research Fellow. ©2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. WWW 2017, April 3–7, 2017, Perth, Australia. ACM 978-1-4503-4913-0/17/04. http://dx.doi.org/10.1145/3038912.3052716 . per day. It attracts millions of readers from across the globe and serves a broad range of their daily information needs. Despite this, very little is known about the motivations and needs of this diverse user group: why they come to Wikipedia, how they consume the content in the encyclopedia, and how they learn. Without this knowledge, creating more content, products, and services that ensure high levels of user experience remains an open challenge [3, 8, 20, 43]. Background and objectives. A rich body of work has investigated motivations and behavior patterns of users on the Web [11, 21]. Specific attention has been cast on a few major sites including search engines [6, 33, 41], and social networking sites such as Twitter [15, 22] and Facebook [34]. Yet, surprisingly little is known about the motivations, needs, and behaviors of Wikipedia readers, possibly keeping Wikipedia from reaching its full potential. The vast literature on user behavior in Wikipedia (cf. Okoli et al. [30] for an overview) has focused on content production. It mainly investigates editors' motivations [1, 29], patterns of editing behavior [16], and the quality of content [18, 39]. Much less is known about content consumption, even though readers make up the majority of Wikipedia users. The limited work on readers has focused on topics such as content preferences [26, 32, 37], search queries leading to Wikipedia [40], or navigation patterns [23, 31, 36, 42]. In contrast, the present work aims at understanding why we read Wikipedia. Materials and methods. We present a robust taxonomy of use cases for reading Wikipedia, constructed through a series of surveys based on techniques from grounded theory [38]. Initially, we administered a survey to elicit free text responses to the question, Why are you reading this article today? Based on the responses, we designed a taxonomy covering three major dimensions that can be used to characterize the observed use cases. After validating the robustness of our taxonomy, we study the prevalence of use cases as measured by a large-scale multiple-choice survey on English Wikipedia. To correct for various forms of representation bias in our pool of respondents, we use inverse propensity score weighting adjustment. We then enrich the survey data by linking each survey response to the respondent's behavior traces mined from Wikipedia's webrequest logs. An illustration of how both survey and log data are collected can be found in Fig. 1. Finally, we use the joined survey and log data to identify characteristic behavior patterns for reader groups with specific intentions via subgroup discovery [14, 19]. Contributions and findings. The following are our three main contributions: (i) We present a robust taxonomy for characterizing use cases for reading Wikipedia (Sec. 2), which ing on a subset of the 5,000 responses, without discussing any expectations or definitions ahead of time. In the first stage, all researchers worked together on 20 entries to build a common understanding of the types of response. In the second stage, based on the discussions of the first stage, tags were generously assigned by each researcher individually to 100 randomly selected responses, for a total of 500 responses tagged. All 500 tagged responses were reviewed, and four main trends (motivation, information need, context, and source) were identified, alongside tags associated with each response. In the third stage, each researcher was randomly assigned another 100 responses and assessed if they contained information about the four main trends identified in the pre- vious stage and if the trends and tags should be reconsidered. The outcome of these stages revealed the following three broad ways in which users interpreted the question; we use them as orthogonal dimensions to shape our taxonomy: • Motivation: work/school project, personal decision, cur- rent event, media, conversation, bored/random, intrinsic learning. • Information need : quick fact look-up, overview, in-depth. • Prior knowledge: familiar, unfamiliar. Assessing the robustness of the taxonomy. We con- ducted two surveys similar to Survey 1 on the Spanish and Persian Wikipedias which resulted in similar observations and dimensions as above. Additionally, we assessed the ro- bustness of the above taxonomy in two follow-up surveys. First, we ran a survey identical to Survey 1 to validate our categories on unseen data (Survey 2; sampling rate 1:2000, mobile, 3 days, 1,650 responses). No new categories were revealed through hand-coding. Second, we crafted a multiple-choice version of the free- form surveys (Survey 3; sampling rate 1:200, desktop and mobile, 6 days, about 10,500 responses). It comprised three questions with the following answer options in random order (the first two questions also offered "other" as an answer, with the option to enter free-form text): • I am reading this article because. . . : I have a work or school- related assignment; I need to make a personal decision based on this topic (e.g., buy a book, choose a travel destination); I want to know more about a current event (e.g., a soccer game, a recent earthquake, somebody's death); the topic was referenced in a piece of media (e.g., TV, radio, article, film, book); the topic came up in a conversation; I am bored or randomly exploring Wikipedia for fun; this topic is important to me and I want to learn more about it (e.g., to learn about a culture). Users could select multiple answers for this question. • I am reading this article to. . . : look up a specific fact or to get a quick answer; get an overview of the topic; get an in-depth understanding of the topic. • Prior to visiting this article. . . : I was already familiar with the topic; I was not familiar with the topic, and I am learning about it for the first time. Only 2.3% of respondents used the "other" option, and hand-coding of the corresponding free-form responses did not result in new categories. We thus conclude that our categories are robust and use the resulting classification as our taxonomy of Wikipedia readers in the rest of this paper. Figure 1: Example Wikipedia reading session. The user arrives from a search engine and visits the ar- ticle about Oceania; she then navigates to Australia, where she responds to our survey. Afterwards, the reader goes back to the search engine and finally visits the article about Nauru. This paper studies survey responses as well as webrequest logs. captures users' motivations to visit Wikipedia, the depth of information they are seeking, and their familiarity with the topic of interest prior to visiting Wikipedia. (ii) We quantify the prevalence and interactions between users' motivations, information needs, and prior familiarity via a large-scale survey yielding almost 30,000 responses (Sec. 4.1). (iii) We enhance our understanding of the behavioral patterns as- sociated with different use cases by combining survey re- sponses with digital traces recorded in Wikipedia's server logs (Sec. 4.2). Our analysis lets us conclude that there is a variety of motivations bringing readers to Wikipedia, which can be characterized by distinct behavioral patterns. For exam- ple, users visiting Wikipedia out of boredom view multiple, topically different articles in quick succession. While no motivation clearly dominates, it is generally the case that Wikipedia is used for shallow information needs (fact look- up and overview) more often than for in-depth information needs. Also, prior to reading an article, readers are familiar with its topic about as often as not. The outcomes of this research can help Wikipedia's edi- tor and developer communities, as well as the Wikimedia Foundation, to make more informed decisions about how to create and serve encyclopedic content in the future. 2. TAXONOMY OF WIKIPEDIA READERS Our research relies on a taxonomy of Wikipedia readers, something that was previously absent from the literature. We designed and analyzed a series of surveys based on techniques from grounded theory [38] to build a robust categorization scheme for Wikipedia readers' motivations and needs. In this section, we explain the individual steps taken and the resulting taxonomy. Building the initial taxonomy. We started with an ini- tial questionnaire (Survey 1), where a randomly selected subgroup of English Wikipedia readers (sampling rate 1:200, desktop and mobile, 4 days, about 5,000 responses) saw a survey widget while browsing Wikipedia articles. If the reader chose to participate, she was taken to an external site (Google Forms) and asked to answer the question "Why are you reading this article today?" in free-form text (100-charac- ter limit). To arrive at categories for describing use cases of Wikipedia reading, five researchers performed three rounds of hand-cod- Table 1: Features. This table describes all features utilized in this work. Survey features capture responses to our survey questions; request features capture background information about the respondent mined from webrequest logs; article features describe the requested Wikipedia article; and session/activity features are derived from the entire reading session and beyond-session activity. feature motivation information need prior knowledge country continent local time weekday local time hour host referer class article in-degree article out-degree article pagerank article text length article pageviews article topics description Type of motivation for reading an article, as selected by respondent in survey. As multiple responses were allowed, we work with boolean dummy variables for each motivation. Information need for reading an article, as selected by respondent in survey. Prior knowledge about the topic before visiting the article, as selected by respondent in survey. Country code of respondent in survey (e.g., USA) derived from the IP address. Continent of respondent in survey (e.g., North America) derived from the IP address. Local weekday of survey request detected by timezone information (Mon-Sun). Local hour of survey request detected by timezone information (0-24). Requested Wikipedia host: "desktop" (en.wikipedia.org), or "mobile web" (en.m.wikipedia.org). Referer class of request (none, internal, external, external search engine, or unknown). The topological in-degree of an article. The topological out-degree of an article. The unnormalized pagerank of an article; calculated with damping factor of 0.85. The text length of an article as extracted from HTML-number of characters. The sum of pageviews for the article in same time period as survey. Probability vector for 20 topics as extracted by LDA from a bag-of-words representation. Topics were manually labeled as follows: (1) transportation & modern military, (2) biology & chemistry, (3) South Asia, Middle East, (4) mathematics, (5) 21st century, (6) TV, movies, & novels, (7) Britain & Commonwealth, (8) East Asia, (9) Spanish (stubs), (10) war, history, (11) geography (unions, trade), (12) literature, art, (13) education, government, law, (14) 20th century, (15) sports, (16) United States, (17) numbers, (18) technology, energy, & power, (19) music, and (20) geographical entities. We use the probabilistic topic distribution as 20 individual features for each article. Measures the topic specificity of an article from LDA probability vector. The number of requests within the session. Total time spent in the session in minutes. Average time difference between subsequent session requests (i.e., dwelling time). y e v r u s t s e u q e r e l c i t r a y t i v i t c a / n o i s s e s article topic entropy session length session duration avg. time difference avg. pagerank difference Average pagerank difference between subsequent session requests (i.e., stating whether readers move avg. topic distance referer class frequency session article frequency session position num. of sessions num. of requests to periphery or core). Average Manhattan distance between topic distributions for subsequent session requests (i.e., capturing topical changes). For each referer class (see survey features): frequency in session. The number of times requested article for survey response occurs within the session. Relative position inside a session when answering the survey. The total number of sessions for respondent in survey time period. The total number of requests for respondent in survey time period. 3. DATASETS AND PREPROCESSING Here, we describe utilized datasets and preprocessing. 3.1 Survey To quantify the prevalence of the driving factors specified by our taxonomy, we ran an additional large-scale survey on English Wikipedia consisting of the same three questions on motivation, depth of information need, and prior knowledge as Survey 3 (Sec. 2). The survey was run at a sampling rate of 1:50 from 2016-03-01 to 2016-03-08 on all requests to English Wikipedia's mobile and desktop sites. It was not shown on non-article pages (discussion pages, search pages, etc.), on the main page of Wikipedia, and to browsers with Do not Track enabled. Potential survey participants were identified by assigning a token to their browsers and eventually showing a widget with an invitation to participate in the survey. Once shown, the reader could ignore it, dismiss it, or opt in to participate which would take the reader to an external site (Google Forms), where she would see the three questions described in Sec. 2. A unique, anonymous ID was passed to Google Forms for each user, which would later be used to link the survey responses to users' webrequest logs (Sec. 3.2). A privacy and consent statement1 providing details about the 1https://wikimediafoundation.org/wiki/Survey_ Privacy_Statement_for_Schema_Revision_15266417 collection, sharing, and usage of the survey data was shown to all users prior to submitting their responses. Overall, our dataset consists of survey answers from 29,372 participants after basic data cleaning such as removing duplicate answers from the same users. Whenever we write "survey" throughout the rest of this paper, we refer to the survey described here. 3.2 Webrequest logs Ultimately, we aim to to understand how users' motivation, desired depth of knowledge, and prior knowledge (i.e., their answers to our survey) manifest themselves in their reading behavior. The data collected through the survey alone, how- ever, does not provide any information on the respondent's behavior beyond the single pageview upon which the survey was presented. In order to be able to analyze respondents' reading behavior in context, we connect survey responses to the webrequest logs maintained by Wikipedia's web servers, where every access to any Wikipedia page is stored as a record that contains, among others, the requested URL, referer URL, timestamp, client IP address, browser version, and city-level geolocation inferred from the IP address. Since the logs do not contain unique user IDs, we construct approximate user IDs by concatenating the client IP address and browser version; cf. discussion in Sec. 5.2. As the information needs and reading behavior of the same user may change over time, we operate at an intermediate temporal granularity by decomposing a user's entire browsing history into sessions, where we define a session as a contigu- ous sequence of pageviews with no break longer than one hour [12]. To reconstruct the session in which a user took our survey (cf. Fig. 1), we retrieved from the webrequest logs all records with the user's (approximate) ID, ordered them by time, chunked them into sessions according to the aforementioned one-hour rule, and returned the session that contains the record with the specific URL and timestamp of the survey response. 3.3 Wikipedia article data Different articles are consumed in different ways. Hence, the properties of articles viewed by survey respondents play an important role in our analysis. To extract these properties, we utilized the public dump of English Wikipedia released on 2016-03-05,2 such that article revisions closely match those seen by survey participants. The dump contains wiki markup, whereas browsers re- ceive HTML code generated from this markup. Since the markup may contain templates that are expanded only upon conversion to HTML, some page content is not immediately available in markup form. In order to obtain a more complete representation, we retrieved the full HTML of the article contents using Wikimedia's public API. In addition to the textual article content, we extracted the network of articles (5.1M) connected by hyperlinks (370M). 3.4 Features Throughout this work, we study features extracted di- rectly from the survey responses (Sec. 3.1), from underlying webrequest logs of article requests and extracted sessions (Sec. 3.2), and background Wikipedia article data associated with requested articles (Sec. 3.3). We list and describe all features utilized in this work in Table 1. For topic detection, we fit a Latent Dirichlet Allocation (LDA) [4] model on bag-of-words vectors representing arti- cles' textual content (with stopwords removed) using online variational Bayes. To find a balance between complexity and interpretability, we decided to work with 20 topics. We assigned labels to topics by manually inspecting the topics' word distributions and their top Wikipedia articles. 3.5 Correcting survey bias via webrequest logs The goal of this work is to study the motivations and behaviors representative of Wikipedia's entire reader popula- tion. However, deducing properties of a general population from surveying a limited subpopulation is subject to differ- ent kinds of biases and confounders, including coverage bias (inability to reach certain subpopulations), sampling bias (distortions due to sampling procedure), and non-response bias (diverse likelihood of survey participation after being sampled as a participant). Consequently, an important step in our analysis is to account for potential biases in survey responses. Finding suitable adjustments has been a decade-long research effort in the survey methodology community [5]. Since strata methods such as poststratification [9] are less well suited to control for a large number of features, we opt for inverse propensity score 2https://archive.org/details/enwiki-20160305 weighting [2] as an alternative. This technique assigns control weights to each survey response, thus correcting bias with respect to a control group (Wikipedia population). The ratio- nale behind this procedure is that answers of users less likely to participate in the survey should receive higher weights, as they represent a larger part of the overall population with similar features. For determining participation probabilities (propensity scores), we use gradient-boosted regression trees on individual samples to predict if they belong to the survey vs. the control group, using all features of Sec. 3.4. (We provide additional methodological details in the appendix.) By using background features (e.g., country, time) plus digi- tal traces (e.g., sessions), and by building a representative control group, we have an advantage over traditional survey design, which is often limited to few response features such as gender and age, as well as to small control groups. When discussing results in the next section, we shall see (Fig. 2) that our weight adjustment changes the relative shares of survey responses only slightly, with general trends staying intact. Hence, we shall utilize only weighted survey responses for inference on statistical properties from this point on. Additionally, we use the so-called effective sample size (cf. appendix) when calculating standard errors, confi- dence intervals, and statistical tests, in order to account for differing standard errors of weighted estimators. 4. RESULTS: WHY WE READ WIKIPEDIA This section discusses results on why users read Wikipedia. 4.1 Survey results We start with a discussion of the responses to our survey. Survey responses. First, we examine the percentages of survey respondents with specific motivations, information needs, and prior knowledge. We visualize the results in Fig. 2, focusing on the green (right) bars representing weighted survey responses (sorted by popularity). With respect to motivation, we find that Wikipedia is consulted in a large spectrum of use cases and that no clearly dominant motivation can be identified. Prominently, extrin- sic situations trigger readers to visit Wikipedia to look up a topic that was referenced in the media (30%), came up in a conversation (22%), is work or school-related (16%), or corresponds to a current event (13%). At the same time, readers have intrinsic motivations, such as wanting to learn something (25%), being bored (20%), or facing a personal decision (10%). We also find that the "other" option was only rarely selected, further confirming the robustness of the taxonomy of readers introduced in Sec. 2. The results also show that Wikipedia is visited to satisfy different kinds of information needs. Interestingly, shallow information needs (overview [39%] and quick fact-checking [38%]) appear to be more common than deep information needs (21%). As for prior knowledge, we observe nearly identical shares of readers being familiar (50%) vs. unfamiliar (47%) with the topic of interest. Survey response correlations. Next, in Table 2, we study whether certain combinations of motivations, information needs, and prior knowledge occur more frequently than ex- pected, quantified by the lift, i.e., the ratio between observed and expected frequencies. Table 2a suggests that different motivations are coupled with different information depths. Specifically, in-depth in- Figure 2: Survey responses. This figure visualizes the share of answers for the three parts of the user survey: motivation, information need, and prior knowledge. The blue bars (left) reflect the raw unweighted responses, and the green bars (right) depict the bias-corrected weighted responses (propensity score weight adjustment). Error bars visualize the 95% confidence intervals using effective sample size for the weighted responses. In general, results suggest popularity of both extrinsic and intrinsic motivation, as well as high, but balanced, relevance for certain information needs and prior knowledge. The results based on bias-correction weighting reflect minor changes in responses without drastically changing the general direction. Survey responses over time. Next, we study how the prevalence of motivations, information needs, and prior knowl- edge changes over time. For motivations, shown in Fig. 3, we find relatively stable trends over the course of a week or day. Three notable exceptions, however, emerge. First, on weekends (Saturday, Sunday) and at night, there is a higher share of readers who are led to Wikipedia by media coverage; this is potentially due to a higher likelihood of being exposed to media during these time periods. Similarly, conversations play a more important role on Fridays and Saturdays, possibly since people go out, meet with friends, and are involved in conversations that lead to consulting Wikipedia. By contrast, reading an article for work or school reasons has a relatively lower share towards the weekend, but peaks at daytime hours, probably because people work and go to school on working days and during daytime hours. Additionally, results on information need show overall quite stable trends over a week and over a day without clear outliers, also due to larger confidence intervals (results not visualized). For prior knowledge, we identify small upward trends on weekends and evening hours for already being famil- iar with the topic, compared to being unfamiliar. However, error bars are again too large to justify stronger claims. 4.2 Webrequest-log results Our previous results suggest that Wikipedia is visited for a variety of use cases that differ not only in their motivation triggers, but also in the depth of information needs, and readers' prior familiarity with the topic. In this section, we investigate correlations of survey responses with behav- ioral patterns based on request, article, and session features (Sec. 3.4). In doing so, we reveal characteristic differences and develop stereotypes for motivational groups. Methodology. Due to our large set of features at in- terest (Sec. 3.4), we investigate behavioral reader patterns based on rule mining techniques, specifically subgroup discov- ery [14, 19]. The general goal of subgroup discovery is to find descriptions of subsets of the data that show an interesting (i.e., significantly different) distribution with respect to a Figure 3: Motivation day and time. This figure visu- alizes how the relative share of motivation (y-axes) changes over the course of a week and the course of a day (x-axes). Error bars depict the 95% confidence interval with effective sample size. formation needs prevail when readers are driven by intrinsic learning (lift 1.62); quick fact look-ups are associated more strongly with conversation and work/school motivations than one would expect a priori; and gaining an overview of a topic appears to be especially important for readers motivated by media coverage and for the bored. In Table 2b, we find weaker correlations between motiva- tions and levels of prior knowledge, apparent from lifts closer to 1 and a lack of significance. However, certain trends still emerge; e.g., when readers research a topic from the media, they are more likely to be unfamiliar with the topic (lift 1.22). In contrast, readers whose goal is learning are more likely to be familiar with the topic (lift 1.14). As a corollary of the above correlations, we also observe patterns when contrasting prior knowledge with information need (Table 2c). We find that familiar readers are more likely to look up quick facts (lift 1.13) and aim at getting in-depth knowledge about a topic (lift 1.15) than one would expect. Contrarily, unfamiliar readers are more likely to first aim at getting an overview of the topic (lift 1.22) instead of directly going into depth (lift 0.87). mediaintrinsic learningconversationbored/randomwork/schoolcurrent eventpersonal decisionotherno response0.000.050.100.150.200.250.30response percentagemotivationoverviewfactin-depthno response0.00.10.20.30.4response percentageinformation needfamiliarunfamiliarno response0.00.10.20.30.40.5response percentageprior knowledgesurvey responseweighted survey responsemediaintrinsic learningconversationbored/randomwork/schoolcurrent eventpersonal decisionMonTueWedThuFriSatSun0.00.10.20.30.4Weekday0-33-66-99-1212-1515-1818-2121-240.00.10.20.30.4Hour predefined target concept from a large set of candidates. In our scenario, we perform a series of subgroup searches, each using one survey answer option as the target. To create the search space of candidate subgroup descriptions, we use all features described in Sec. 3.4. For the topic features, we consider a topic as present in an article viewed by a user if our topic model provided a probability for this topic above 20%. Other numeric features are binarized in five intervals using equal-frequency discretization. Due to missing values and multiple occurrences of values, bin sizes can significantly deviate from 20% of the dataset for some features. To select the most interesting subgroups, we use the lift as a quality function [10]. This measure is computed as the ratio between the likelihood of a survey answer in the subgroup and the respective likelihood in the overall dataset. As an example, a lift of 1.3 means that the respective survey answer is 30% Table 2: Survey response correlations. Each cell depicts the row-normalized share of responses that have also selected a given column as answer (with- out "other" and non-responses). The bottom rows highlight the overall share of responses for a given column as expectation. Values in brackets reflect the lift ratio of observed vs. expected frequency. The last column indicates significance (*** < 0.001, ** < 0.01, * < 0.05) for the hypothesis test of inde- pendence of observed frequencies (contingency table with row frequencies and complement of all other rows) and expected frequencies (as in the last table row) using a χ2 test using the effective sample size. (a) Motivation vs. information need information need motivation media intrinsic learning conversation bored/random work/school current event personal decision response perc. fact in-depth overview sig. 0.38 (1.00) 0.29 (0.76) 0.43 (1.13) 0.31 (0.83) 0.39 (1.04) 0.36 (0.95) 0.32 (0.85) 0.38 0.19 (0.87) 0.35 (1.62) 0.20 (0.93) 0.23 (1.05) 0.23 (1.09) 0.28 (1.30) 0.29 (1.35) 0.21 0.43 (1.12) 0.35 (0.92) 0.36 (0.94) 0.45 (1.17) 0.36 (0.93) 0.35 (0.92) 0.38 (0.97) 0.39 *** *** *** *** *** *** (b) Motivation vs. prior knowledge prior knowledge motivation media intrinsic learning conversation bored/random work/school current event personal decision response perc. familiar unfamiliar 0.42 (0.83) 0.57 (1.14) 0.49 (0.98) 0.53 (1.07) 0.52 (1.04) 0.52 (1.03) 0.50 (0.99) 0.50 0.58 (1.22) 0.41 (0.87) 0.49 (1.04) 0.45 (0.95) 0.46 (0.97) 0.46 (0.98) 0.48 (1.02) 0.47 sig. *** *** *** (c) Prior knowledge vs. information need information need prior knowledge familiar unfamiliar response perc. fact in-depth overview sig. 0.43 (1.13) 0.34 (0.90) 0.38 0.25 (1.15) 0.19 (0.87) 0.21 0.32 (0.83) 0.47 (1.22) 0.39 *** *** more likely to occur in the subgroup than in the overall data. Additionally, we apply a filter to remove all subgroups that could not be shown to be significant by a χ2 test with a Bonferroni-corrected threshold of α = 0.05. As a result, we obtain a list with the top k interesting subgroups for each survey answer T . For each subgroup S, we can compute various statistics: the (relative) size P (S) of the subgroup, i.e., the share of users that are covered by the subgroup description, the share P (ST ) of subgroup users among those who answered with T in the survey, the target share P (TS) in the subgroup, i.e., the share of users within the subgroup that reported the respective answer, and the lift, which is defined as P (TS)/P (T ) = P (ST )/P (S). Note that the absence of a feature in the discussion does not mean that it was not considered, but that it is not among the most significant subgroups. Motivation. We start with characterizing groups with specific motivations as reported in the survey. In particular, we provide detailed results for two exemplary motivational groups (work/school and bored/random; Table 3) and only shortly summarize results for other motivations. Users who intend to use Wikipedia for work or school are more frequently observed for specific topics of articles, namely war & history, mathematics, technology, biology & chemistry, and literature & arts. For the first two of these topics, users are more than twice as often motivated by work or school tasks as on average. While these topics cover a wide range of different areas, all of them are more related to academic or professional activities than for leisure. Additionally, this type of motivation is more often reported by users accessing Wikipedia's desktop version. This could be expected since many work/school activities are performed in office settings. Furthermore, we can see that this motivation occurs more often for users who are referred by external search engines multiple times in a session, and by users who stay longer on an individual page, which can be seen as a potential indicator for intensive studying. By contrast, users who describe their motivation as bored/random, are more likely to use internal navigation within Wikipedia and to spend only little time on the indi- vidual articles. Also, they tend to switch topics between the individual articles more often (as indicated by the subgroup with a high average topic distance). These are telltales for less focused browsing behavior. Bored users also view more articles on Wikipedia both within the survey session and over- all during the respective week. Finally, this motivation can also be observed more frequently for articles that cover spe- cific topics, such as sports, 21st century, and TV, movies, & novels. Clearly, these topics are more leisure-oriented and are in stark contrast to the previously discussed topics favored by users who use Wikipedia for work or school. Due to limited space, we only outline findings for other motivations: For example, motivation via media is signif- icantly more often observed for the topics TV, movies, & novels (lift 1.37) and 21st century (lift 1.26), for popular articles, i.e., articles with a high number of pageviews (lift 1.17), and for articles in the periphery of the Wikipedia link network according to pagerank (lift 1.14). The motivation of looking up something that came up in a conversation is more frequently reported for users with a single Wikipedia article request within a session (lift 1.08) and for users of the mobile version of Wikipedia (lift 1.08). The current-event motivation is more likely for articles about sports (lift 1.97), Table 3: Top subgroups for the motivations "work/school" and "bored/random". Each table shows the top subgroups with significantly different shares of users with a certain motivation T . For each subgroup S, we display the relative size P (S) of the subgroup (i.e., the share of users covered by the subgroup description), the share P (ST ) of the subgroup among those with motivation T , the target share P (TS) in the subgroup, and the lift measure, defined as P (TS)/P (T ) = P (ST )/P (S). Rows are ranked by lift. The last column indicates significance (*** < 0.001, ** < 0.01, * < 0.05) for the hypothesis test of independence between subgroup and target motivation using a χ2 test with effective sample size and Bonferroni correction. (a) T : "motivation = work/school"; P (T ) = 16.1% (b) T : "motivation = bored/random"; P (T ) = 19.5% Subgroup S topic (mathematics) topic (war, history) topic (technology) topic (biology, chemistry) host = desktop article pagerank ≥ 9.98 avg. time difference ≥ 9.40 avg. pagerank difference < -4.35 topic (literature, art) avg. time difference: [3.60:9.40[ num. (referer=search) ≥ 2 session duration ≥ 6.60 P (S) P (ST ) P (TS) lift 7.9% 17.1% 34.8% 2.17 4.4% 9.6% 34.7% 2.16 13.2% 23.7% 28.8% 1.79 8.6% 14.0% 26.2% 1.63 35.5% 57.8% 26.1% 1.63 20.0% 32.4% 26.1% 1.62 7.7% 11.5% 24.0% 1.50 7.6% 11.2% 23.6% 1.47 10.1% 14.7% 23.5% 1.46 7.7% 11.0% 23.1% 1.44 20.5% 28.5% 22.4% 1.39 18.0% 24.2% 21.6% 1.34 sig. *** *** *** *** *** *** *** *** *** *** *** *** Subgroup S referer class: internal num. of requests ≥ 8 topic (sports) num. (referer=internal) ≥ 1 session position: [0.33:0.75[ avg. topic distance ≥ 1.08 topic (21st century) session length ≥ 3 avg. time difference: [0.68:1.56[ num. (referer=none) ≥ 2 topic (tv, movies, novels) # article pageviews ≥ 63606 P (S) P (ST ) P (TS) lift 9.4% 14.0% 29.0% 1.49 11.8% 16.6% 27.5% 1.41 5.9% 8.0% 26.1% 1.34 17.1% 22.7% 25.9% 1.33 7.5% 9.8% 25.6% 1.31 7.5% 9.8% 25.2% 1.29 25.1% 32.1% 25.0% 1.28 22.2% 28.3% 24.8% 1.27 7.7% 9.7% 24.7% 1.27 9.7% 12.2% 24.5% 1.26 34.1% 41.4% 23.7% 1.21 19.8% 23.5% 23.1% 1.19 sig. *** *** ** *** ** * *** *** * * *** ** 21st century (lift 1.49), and education, government, & law (lift 1.49). It is also more common for articles with many page views (lift 1.68), possibly because articles on current events are trending. Users who aim at intrinsic learning show a topic preference for more scholarly topics such as literature & art (lift 1.30), mathematics (lift 1.24), and technology (lift 1.21). Finally, the geographical origin of a user also has an effect: the motivations personal decision, current event, and intrinsic learning are reported significantly more often for users from Asia (mostly India; lifts 1.46, 1.44, and 1.20). Information need. Overall, the investigated subgroups are more homogeneous with respect to the reported informa- tion need. We can, however, find some notable (anecdotal) exceptions: Users from Asia describe their information needs significantly more often as acquiring in-depth information (lift 1.51). For users who want to obtain an overview of a topic, using the desktop version of Wikipedia is more com- mon than for the average user (lift 1.13) Also, topics play a certain role: fact look-ups, for example, are more often observed for the sports topic (lift 1.08). Session features that describe user behavior across multiple page visits do not lead to any significant differences in information need. Prior knowledge. Regarding readers' prior knowledge, we can observe that users feel familiar with topics that are more spare-time oriented, such as sports (lift 1.21), 21st century (lift 1.08), and TV, movies, & novels (lift 1.07). They also feel more familiar about articles that are popular, i.e., have many pageviews (lift 1.11), are longer (lift 1.10), and are more central in the link network (out-degree, in-degree, or pagerank; lifts 1.11, 1.09, and 1.08). Naturally, the answer "unfamiliar" is more often reported for the exact opposite of these subgroups. Features that describe a user behavior over multiple article views do not lead to significant deviations. 4.3 Summary of results Prevalence of use cases. We have shown that Wikipedia is read in a wide variety of use cases that differ in their motivation triggers, the depth of information needs, and readers' prior familiarity with the topic. There are no clearly dominating use cases, and readers are familiar with the topic they are interacting with as often as they are not. Wikipe- dia is used for shallow information needs (fact look-up and overview) more often than for deep information needs. While deep information needs prevail foremost when the reader is driven by intrinsic learning, and fact look-ups are triggered by conversations, we saw that overviews are triggered by bored/random exploration, media coverage, or the need for making a personal decision. Use cases over time. Motivations appear to be mostly stable over time (days of the week and hours of the day), with a few exceptions: motivations triggered by the media are increased over the weekends and at nights, conversation triggers are increased over the weekends, and work/school triggers are increased on week days and during the day. Behavioral patterns. By connecting survey responses with webrequest logs, we identified certain behavioral patterns: • When Wikipedia is used for work or school assignments, users tend to use a desktop computer to engage in long pageviews and sessions; sessions tend to be topically coher- ent and predominantly involve central, "serious" articles, rather than entertainment-related ones; search engine us- age is increased; and sessions tend to traverse from the core to the periphery of the article network. • Media-driven usage is directed toward popular, entertain- ment-related articles that are frequently less well embedded into the article network. • Intrinsic learning tends to involve arts and science articles with no significant navigational features; conversations bring infrequent users to Wikipedia, who engage in short interactions with the site, frequently on mobile devices. • People who use Wikipedia out of boredom or in order to explore randomly tend to be power users; they navigate Wikipedia on long, fast-paced, topically diverse link chains; and they often visit popular articles on entertainment- related topics, less so on science-related topics. • Current events tend to drive traffic to long sports and politics-related articles; the articles tend to be popular, likely because the triggering event is trending. • When Wikipedia is consulted to make a personal decision, the articles are often geography and technology-related, possibly due to travel or product purchase decisions. 5. DISCUSSION Every day, Wikipedia articles are viewed more than 500 million times, but so far, very little has been known about the motivations and behaviors of the people behind these pageviews. The present study is the first comprehensive at- tempt to help us understand this group of users by combining a survey with a log-based analysis. The work most closely related to ours is by Lehmann et al. [26], who extracted Wikipedia navigation traces from Yahoo! toolbar logs (which may be considered a biased sample of the complete logs we have access to) with the goal of discovering a set of usage patterns according to which articles are consumed. Using clustering techniques, they concluded that there are four types of articles: trending articles, articles read in a focused manner, articles read by exploring users, and articles users just quickly pass through. Lehmann et al.'s work is entirely "unsupervised", in the sense that they have no ground truth of the actual underlying user motivations and needs. We, on the contrary, have elicited the ground truth through our survey and can thus arrive at stronger and more ac- tionable conclusions, which we discuss next. We do so by first highlighting implications and directions for future work (Sec. 5.1), and then reflecting on our methodology and point- ing out its limitations (Sec. 5.2). 5.1 Implications and future directions This research has already had considerable impact within the Wikimedia Foundation, where it has informed several items on the product development agenda, and we hope that it will further inspire Wikimedia developers, academic researchers, and volunteers to build tools for improving the user experience on Wikipedia. Predicting motivation and desired depth of knowl- edge. A tool immediately suggested by our results could involve statistical models for real-time inference of user ses- sion motivations from behavioral traces as captured in the webrequest logs. Such models could be trained in a super- vised fashion with features of Sec. 3.2 as input, and survey responses as output, and could form the basis for products and services for supporting the needs of Wikipedia readers more proactively. For instance, if an editor working on an article could be shown an estimate of the distribution of the motivations and desired depths of knowledge on behalf of the readers of the article, she can take this information into account to tailor the content to the needs of the audience or attempt to change the distribution of the audience's motiva- tion by creating specific types of content in the article. Such a tool could have large impact, considering that, currently, editors contribute to content on Wikipedia without much knowledge of the users who will eventually read it. Similarly, predicting the distribution over depths of knowl- edge sought by the readers of an article could offer oppor- tunities for creating different versions the article, e.g., for those who are interested in quick look-ups vs. in-depth read- ers. This could enhance the usability of Wikipedia articles particularly on mobile devices with smaller screens and low- bandwidth connections. The above task of using digital traces to predict survey responses has been called amplified asking, and it is known to be difficult [35]. This has been confirmed by our preliminary attempts, where we have achieved accuracies only slightly better than simple baselines. This may be partly explained by the fact that user motivations may change during a ses- sion, and while the survey captures the motivations at the article level accurately, it fails to capture possible transitions between motivations during a session. For instance, a session might start with a school or work project in mind, but the user might then transition to procrastinating by exploring Wikipedia randomly, which would not be captured in our current setting. Also, prediction is complicated by the fact that, even for a fixed article, user motivations might vary widely. For instance, of the 222 users taking the survey upon reading the article about Donald Trump, 38% read the article out of boredom, 32% in response to media coverage, 24% because of a conversation, 23% due to current events, 17% because the topic was personally important to them, etc. Despite these difficulties, future work should investigate the problem of predicting user intentions in more depth. 5.2 Methodological limitations We discuss certain limitations of present research next. Survey selection bias. A general caveat with surveys is that one typically cannot guarantee that whether a subject participates or not is a fully random choice. Certain covari- ates may be associated with both participation rates and responses given, leading to biased conclusions. We made a best effort to correct for this bias by adjusting survey re- sponses based on a random sample of all Wikipedia pageviews drawn from Wikipedia's webrequest logs (Sec. 3.5). However, if the bias-inducing covariates are hidden, one cannot fully correct for the bias. For instance, young users might be both more prone to use Wikipedia for work or school and to participate in our survey; this would over-represent the work/school motivation in our raw survey results, and since we have no information about users' age, we could not cor- rect for this bias. Apart from that, survey answers might be biased by social desirability [7]; e.g., even in an anonymous survey, users might be reluctant to admit they are visiting Wikipedia out of boredom. Unique visitors and level of analysis. Wikipedia does not require users to log in, nor does it use cookies in webre- quest logs to maintain a notion of unique clients. Hence, we need to rely on an approximate notion of user IDs based on IP addresses and browser versions (Sec. 3.2), which makes the attribution of pageviews to users and the construction of sessions imperfect. In particular, we might not recognize that two pageviews are by the same user if they use several devices or if their IP address changes for other reasons; and we might conflate several users if they share the same device or IP address (e.g., via a proxy). Currently, we limit the impact of such errors by analyzing the data on a session level and operating at relatively short time scales (an inactivity of more than one hour ends the session being studied). If the attribution of pageviews to unique users becomes more precise in the future, we could study user behavior at longer time scales, which would, e.g., allow us to understand and support long-term learning needs. Also, our current method aims at giving each user session equal weight. An alterna- tive approach would be to analyze the data on a request level, which would put more emphasis on the motivations and needs of power users. Cultural issues. The results discussed here pertain to the English edition of Wikipedia. Even within this limited scope, our behavioral analysis hints at subtle cultural and geographical differences; e.g., the bored/random motivation is particularly frequent in the U.S., whereas current events are a stronger motivator in India. Survey answers might also be influenced by different notions and associations of the survey phrasing across cultures [13]. Since Wikipedia strives to reach beyond cultural and linguistic boundaries, it is important to further investigate these cultural issues. As part of this effort, we are planning to repeat our study in additional language versions of Wikipedia to elicit cultural differences on a larger scale. 6. CONCLUSIONS In this work, we study why users read Wikipedia. We use survey data to develop a taxonomy of Wikipedia usage along three dimensions: motivation, information need, and prior knowledge. In a large-scale survey with almost 30,000 participants, we quantify the share of readership for these driving factors. The bias-corrected survey results reveal a broad range of usage scenarios, interdependencies between survey answers, and temporal trends. Combining the survey responses with webrequest logs allows us to characterize motivational groups with behavioral patterns. The outcomes of this study are currently being discussed in the Wikimedia Foundation as a stimulus for developing specialized tools for readers and editors. APPENDIX: SURVEY BIAS CORRECTION This appendix covers the details of the survey bias correction. Propensity score weight adjustment. We use inverse propensity score weighting to adjust for potential biases in survey response data with respect to control data [2, 27]. Specifically, we want to infer unbiased estimates of survey answers for the whole Wikipedia readership. Thus, we ran- domly sampled a large set of Wikipedia readers (25 times the number of survey responses) from the webrequests logs in the survey period. Then, we proceeded to sample one request for each selected user and marked it as an imagi- nary request reflecting a potential survey response; we also deduced the same set of features as for our survey (except responses). We only sampled requests that are desktop or mo- bile pageviews in English Wikipedia's main namespace and applied bot-filtering in order to match the original survey. The propensity score of a single instance then reflects the probability that an instance with these control features (Sec. 3.4) participated in the survey. We approximate it using our control group. For that, a post-stratification approach [27] is infeasible due to the large number of control features we consider. Instead, we model the group membership (sur- vey participant or control group) using gradient boosted regression trees showing promising results in the past in comparison to traditional approaches like logistic regression [24]. Given the features of an instance x, the model predicts a probability p(x) that x belongs to the survey group. We then set the weight w for instance to 1/p(x). The rationale behind this procedure is that answers of users that are overall less likely to participate in the survey receive higher weights since they represent a larger part of the entire population with similar features. Evaluating weights. To evaluate if applied weighting schemes have the intended correcting effect of making the user survey data more representative for the overall Wikipe- dia, we resort to two scenarios. First, we check that the resulting weights do not contain drastic outliers dominating subsequent results, which would warrant so-called trimming [25]. In that regard, we observe that weights are sufficiently homogeneous distributed with a minimum of 1, a maximum of 190, a mean of 17.6, and a standard deviation of 26.9. Additionally, we evaluate how well we can recover the mean value of features in the overall population from observed survey response features and our weighting scheme. For that purpose, we compute weighted and unweighted averages of the observed values for the survey users and compare them with the mean of a different random sample as a ground truth. As a result, the average of relative errors is reduced by 86%, from 0.556 in the unweighted case to 0.079 in the weighted case. The reduction is strongly significant (p ≤ 0.001 according to a Wilcoxon signed rank test). If weighting is applied, then the mean recovered from the weighted survey is never more than 0.2 standard deviations off compared to the actual feature mean in the sample. Effective sample size. Int this work, we employ a variety of statistical techniques on the survey data. Yet, the introduc- tion of sample weights for correcting bias in survey responses leads to violations of IID assumptions [28]. Thus, standard errors of estimators are estimated as too small, which in turn leads to confidence intervals being too narrow and statistical tests asserting significance too often if standard procedures are applied. The extent to which the sampling error in the survey for some parameter θ deviates from the expected error from an IID sample due to survey design and correction, is known as the design effect (deff) [17]. If the design effect deviates from 1-as it is the case in our survey-then our understanding of sample size for calculating standard errors becomes incorrect. To that end, we consider the effective sample size estimating the required sample size of a random sampling survey for achieving the same error as the weighted sample-it is defined as neff = n/deff. As we cannot directly calculate deff without knowing the expected sampling error, we use Kish's approximation formula with weights wi [17]: (cid:0)(cid:80)n (cid:80)n i=1 wi i=1 w2 i (cid:1)2 neff = For our complete survey data, neff = 8839. We use this effective sample size throughout this article for calculating standard errors, confidence intervals, and statistical tests. Note that this makes reported confidence interval and sta- tistical hypothesis tests overly careful. For further details, please refer to [28]. Acknowledgements. We thank Dario Taraborelli from Wikimedia Foundation who was indispensable to the early phases of the project. We also thank Jonathan Morgan for helping us with the hand-coding; Jon Katz and Toby Negrin for helping us shape the direction of the research and supporting us throughout; Anne Gomez, Jeff Hobson, Bahodir Mansurov, Jon Robson, and Sam Smith for running the surveys on Wikipedia; and Aeryn Palmer for creating the privacy statements for this research. This research has been supported in part by NSF IIS-1149837, ARO MURI, DARPA NGS2, and Stanford Data Science Initiative. References [1] O. Arazy, H. Lifshitz-Assaf, O. Nov, J. Daxenberger, M. Balestra, and C. Cheshire. On the "how" and "why" of emergent role behaviors in Wikipedia. In Conference on Computer-Supported Cooperative Work and Social Computing, 2017. [2] P. C. Austin. An introduction to propensity score methods for reducing the effects of confounding in observational studies. Multivariate Behavioral Research, 46(3):399–424, 2011. [3] A. Basu. Context-driven assessment of commercial web sites. In International Conference On System Sciences, 2003. [4] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet allocation. Journal of Machine Learning Research, 3(Jan):993–1022, 2003. [5] J. M. Brick. Unit nonresponse and weighting adjustments: A critical review. Journal of Official Statistics, 29(3):329–353, 2013. [6] A. Broder. A taxonomy of web search. In ACM SIGIR Forum, 2002. [7] T. J. DeMaio. Social desirability and survey. Surveying Subjective Phenomena, 2:257, 1984. [8] H. A. Feild, J. Allan, and R. Jones. Predicting searcher frustration. In International Conference on Research and Development in Information Retrieval, 2010. [9] A. Gelman and J. B. Carlin. Poststratification and weighting adjustments. In CiteSeerX, 2000. [10] L. Geng and H. J. Hamilton. Interestingness measures for data mining: A survey. ACM Computing Surveys, 38(3):9, 2006. [11] S. Goel, J. M. Hofman, and M. I. Sirer. Who does what on the Web: A large-scale study of browsing behavior. In International Conference on Web and Social Media, 2012. [12] A. Halfaker, O. Keyes, D. Kluver, J. Thebault-Spieker, T. Nguyen, K. Shores, A. Uduwage, and M. Warncke-Wang. User session identification based on strong regularities in inter-activity time. In International Conference on World Wide Web, 2015. [13] J. A. Harkness, F. J. Van de Vijver, P. P. Mohler, et al. Cross-cultural survey methods. Wiley-Interscience Hoboken, 2003. [14] F. Herrera, C. J. Carmona, P. Gonz´alez, and M. J. Del Jesus. An overview on subgroup discovery: Foundations and applications. Knowledge and Information Systems, 29(3):495–525, 2010. [15] A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: Understanding microblogging usage and communities. In Workshop on Web Mining and Social Network Analysis, 2007. [16] D. Jurgens and T.-C. Lu. Temporal motifs reveal the dynamics of editor interactions in Wikipedia. In International Conference on Web and Social Media, 2012. [17] L. Kish. Survey sampling. John Wiley and Sons, 1965. [18] A. Kittur and R. E. Kraut. Harnessing the wisdom of crowds in Wikipedia: Quality through coordination. In Conference on Computer Supported Cooperative Work, 2008. [19] W. Klosgen. Explora: A multipattern and multistrategy discovery assistant. In Advances in Knowledge Discovery and Data Mining, pages 249–271. American Association for Artificial Intelligence, 1996. [20] S. Krug. Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability. New Riders, 2014. [21] R. Kumar and A. Tomkins. A characterization of online browsing behavior. In International Conference on World Wide Web, 2010. [22] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In International Conference on World Wide Web, 2010. [23] D. Lamprecht, D. Dimitrov, D. Helic, and M. Strohmaier. Evaluating and improving navigability of Wikipedia: A comparative study of eight language editions. In International Symposium on Open Collaboration, 2016. [24] B. K. Lee, J. Lessler, and E. A. Stuart. Improving propensity score weighting using machine learning. Statistics in Medicine, 29(3):337–346, 2010. [25] B. K. Lee, J. Lessler, and E. A. Stuart. Weight trimming and propensity score weighting. PloS One, 6(3):e18174, 2011. [26] J. Lehmann, C. Muller-Birn, D. Laniado, M. Lalmas, and A. Kaltenbrunner. Reader preferences and behavior on Wikipedia. In Conference on Hypertext and Social Media, 2014. [27] J. K. Lunceford and M. Davidian. Stratification and weighting via the propensity score in estimation of causal treatment effects: A comparative study. Statistics in Medicine, 23(19):2937–2960, 2004. [28] P. Mukhopadhyay. Complex Surveys: Analysis of Categorical Data. Springer, 2016. [29] O. Nov. What motivates Wikipedians? Communications of the ACM, 50(11):60–64, 2007. [30] C. Okoli, M. Mehdi, M. Mesgari, F. A. Nielsen, and A. Lanamaki. The people's encyclopedia under the gaze of the sages: A systematic review of scholarly research on Wikipedia. SSRN 2021326, 2012. [31] A. Paranjape, R. West, L. Zia, and J. Leskovec. Improving website hyperlink structure using server logs. In International Conference on Web Search and Data Mining, 2016. [32] J. Ratkiewicz, S. Fortunato, A. Flammini, F. Menczer, and A. Vespignani. Characterizing and modeling the dynamics of online popularity. Physical Review Letters, 105(15):158701, 2010. [33] D. E. Rose and D. Levinson. Understanding user goals in web search. In International Conference on World Wide Web, 2004. [34] T. Ryan and S. Xenos. Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Computers in Human Behavior, 27(5):1658–1664, 2011. [35] M. J. Salganik. Bit by Bit: Social Research in the Digital Age. Princeton University Press, 2017. [36] P. Singer, D. Helic, B. Taraghi, and M. Strohmaier. Detecting memory and structure in human navigation patterns using Markov chain models of varying order. PloS One, 9(7):e102070, 2014. [37] A. Spoerri. What is popular on Wikipedia and why? First Monday, 12(4), 2007. [38] A. Strauss and J. Corbin. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage Publications, 1998. [39] B. Stvilia, M. B. Twidale, L. C. Smith, and L. Gasser. Information quality work organization in Wikipedia. Journal of the American Society for Information Science and Technology, 59(6):983–1001, 2008. [40] V. Waller. The search queries that took Australian Internet users to Wikipedia. Information Research, 16(2), 2011. [41] I. Weber and A. Jaimes. Who uses web search for what: and how. In International Conference on Web Search and Data Mining, 2011. [42] R. West and J. Leskovec. Human wayfinding in information networks. In International Conference on World Wide Web, 2012. [43] R. W. White and S. T. Dumais. Characterizing and predicting search engine switching behavior. In Conference on Information and Knowledge Management, 2009.
1601.05283
2
1601
2016-03-07T17:48:18
Marketing Impact on Diffusion in Social Networks
[ "cs.SI", "cs.LO", "math.LO" ]
The paper proposes a way to add marketing into the standard threshold model of social networks. Within this framework, the paper studies logical properties of the influence relation between sets of agents in social networks. Two different forms of this relation are considered: one for promotional marketing and the other for preventive marketing. In each case a sound and complete logical system describing properties of the influence relation is proposed. Both systems could be viewed as extensions of Armstrong's axioms of functional dependency from the database theory.
cs.SI
cs
Marketing Impact on Diffusion in Social Networks Pavel Naumov(cid:63) Jia Tao∗ September 9, 2018 Abstract The paper proposes a way to add marketing into the standard thresh- old model of social networks. Within this framework, the paper studies logical properties of the influence relation between sets of agents in social networks. Two different forms of this relation are considered: one for pro- motional marketing and the other for preventive marketing. In each case a sound and complete logical system describing properties of the influ- ence relation is proposed. Both systems could be viewed as extensions of Armstrong's axioms of functional dependency from the database theory. 1 Introduction 1.1 Social Networks In this paper we study how diffusion in social networks could be affected by mar- keting. Diffusion happens when a product or a social norm is initially adopted by a small group of agents who later influence their peers to adopt the same product. The peers influence their peers, and so on. There are two most com- monly used models of diffusion: the cascading model and the threshold model. In the cascading model [12, 8] the behaviour of agents is random and the peer influence manifests itself in a change of a probability of an agent to adopt the product. In the threshold model [16, 9, 7, 1], originally introduced by Granovet- ter [6] and Schelling [13], the behavior of the agents is deterministic. The focus of this paper is on the threshold model of diffusion of a given product. In this model, there is a threshold value θ(a) associated with each agent a and an influence value w(a, b) associated with each pair of agents a and b. Informally, the threshold value θ(a) represents the resistance of agent a to adoption of the product and the influence value w(a, b) represents the peer pressure that agent a puts on agent b upon adopting the product. If the total the United States, [email protected] (cid:63) Department of Computer Science, Illinois Wesleyan University, Bloomington, Illinois, ∗ Department of Computer Science, The College of New Jersey, Ewing, New Jersey, the United States, [email protected] 1 peer pressure from the set of agents A who have already adopted the product on an agent b is no less than the threshold value θ(b), i.e., w(a, b) ≥ θ(b), (1) (cid:88) a∈A then agent b also adopts the product. 1.2 Influence Relation We say that a set of agents A influences a set of agents B if the social network is such that an adoption of the product by all agents in set A will unavoidably lead to an adoption of the product by all agents in set B. Note that it is not important how original adoption of the product by agents in set A happens. For example, agents in set A can receive and start using free samples of the product. Also, agents in set A can influence agents in set B indirectly. If agents in set A put enough peer pressure on some other agents to adopt the product, who in turn put enough peer pressure on the agents in set B to adopt the product, we still say that set A influences set B. We denote this influence relation by A(cid:3) B. In this paper we focus on universal principles of influence that are true for all social networks. The set of such principles for a fixed distribution of influence values has been studied by Azimipour and Naumov [3], who provided a complete axiomatization of these principles that consists of the following three axioms of influence: 1. Reflexivity: A(cid:3) B, where B ⊆ A, 2. Augmentation: A(cid:3) B → (A, C (cid:3) B, C), 3. Transitivity: A(cid:3) B → (B (cid:3) C → A(cid:3) C), and an additional fourth axiom describing a property specific to the fixed dis- tribution of influence values. In these axioms, A, B denotes the union of sets A and B. The three axioms above were originally proposed by Armstrong [2] to describe functional dependence relation in database theory. They became known in database literature as Armstrong's axioms [5, p. 81]. Vaananen pro- posed a first order version of these principles [14]. Beeri, Fagin, and Howard [4] suggested a variation of Armstrong's axioms that describes properties of multi- valued dependence. Naumov and Nicholls [10] proposed another variation of these axioms that describes a rationally functional dependence. There have been at least two different attempts to enrich the language of Armstring's axioms by introducing an additional parameter to the functional dependence relation. Vaananen [15] studied approximate dependence relation A(cid:3)p B, where p refers to the fraction of "exceptions" in which functional depen- dence does not hold. In our previous work [11], we interpreted relation A(cid:3)p B as "knowing values of database attributes A and having an additional budget p one can reconstruct the values of attributes in set B". In the current paper 2 we interpret A(cid:3)p B as the influence relation in social networks with parame- ter p referring to the available marketing budget to either promote or prevent influence. 1.3 Marketing Impact We propose an extension of the threshold model that incorporates marketing. This is done by representing a marketing campaign as a non-negative spending function s, where s(b) specifies the amount of money spent on marketing the product to agent b. In addition, we associate a value λ(b) with each agent b, which we call the propensity of agent b. This value represents the resistance of agent b to marketing. The higher the value of the propensity is, the more responsive the agent is to the marketing. We modify formula (1) to say that agent b adopts the product if the total sum of the marketing pressure and the peer pressure from the set of agents who have already adopted the product is no less than the threshold value: λ(b) · s(b) + w(a, b) ≥ θ(b). (2) (cid:88) a∈A In the first part of this paper we assume that the goal of marketing is to pro- mote the adoption of the product. In the second part of the paper we investigate marketing campaigns designed to prevent adoption of the product. An example of the second type of campaign is an anti-smoking advertisement campaign. In either of these two cases, the same equation (2) describes the condition under which the product is adopted by agent b. Note that most people would be more likely to buy a product when they are exposed to a promotional marketing campaign. That is, in case of promo- tional marketing, the value of the propensity is usually positive. On the other hand, people are usually less likely to buy a product or to adopt a social norm after being exposed to preventive marketing. In other words, in the preventive marketing setting, the value of the propensity is usually negative. However, our framework is general enough to allow for the propensity value to be either positive or negative in both of these cases. While studying the marketing that promotes adoption of the product, we interpret predicate A(cid:3)p B as "there is a marketing campaign with budget no more than p that guarantees that the set of agents A will influence the set of agents B". As we show, the following three modified Armstrong's axioms give a sound and complete axiomatization of universal propositional properties of this relation: 1. Reflexivity: A(cid:3)p B, where B ⊆ A, 2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C, 3. Transitivity: A(cid:3)p B → (B (cid:3)q C → A(cid:3)p+q C). 3 These axioms are identical to our axioms of budget-constrained functional de- pendence [11]. In the case of marketing that aims to prevent the influence, one would natu- rally be interested in considering relation "there is a marketing campaign with budget no more than p that guarantees that the set of agents A will not influ- ence the set of agents B". Equivalently, one can study the properties of the negation of this relation, or, in other words, the properties of the relation "for any preventive marketing campaign with budget no more than p, the set of agents A is able to influence the set of agents B". We have chosen to study the latter relation because the axiomatic system for this relation is more elegant. In this paper we show that the following four axioms give a sound and complete axiomatization of the latter relation: 1. Reflexivity: A(cid:3)p B, where B ⊆ A, 2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C, 3. Transitivity: A(cid:3)p B → (B (cid:3)p C → A(cid:3)p C), 4. Monotonicity: A(cid:3)p B → A(cid:3)q B, where q ≤ p. The difference between the axiomatic systems for promotional marketing and preventive marketing is in transitivity and monotonicity axioms. Both sys- tems include a form of transitivity axiom, but these forms are different and not equivalent. The system for preventive marketing contains a form of mono- tonicity axiom. For promotional marketing, the following form of monotonicity axiom is true and provable, as is shown in Lemma 7: A(cid:3)p B → A(cid:3)q B, where p ≤ q. Both of the above axiomatic systems differ from Vaananen [15] axiomatization of approximate functional dependence. The paper is organized as follows. In Section 2, we give formal definitions of a social network and of a diffusion in such networks. We also prove basic properties of diffusion used later in the paper. This section of the paper is common to both promotional and preventive marketing. In Section 3, we introduce semantics of promotional marketing, give axioms of our logical system for promotional marketing and prove the soundness and the completeness of this logical system. In Section 4, we do the same for preventive marketing. Section 5 concludes the paper. 2 Social Networks As discussed in the introduction, the threshold model of a social network is specified by a non-negative influence value between any pair of agents in the network and by a threshold value for each agent. Additionally, each agent is 4 assigned a propensity value that specifies the resistance of the agent to mar- keting. The value of the propensity could be positive, zero, or negative. We assume that the set of agents is finite. Definition 1 A social network is a tuple (A, w, λ, θ), where 1. Set A is a finite set of agents. 2. Function w maps A × A into the set of non-negative real numbers. The value w(a, b) represents the "influence" of agent a on agent b. 3. Function λ maps A into real numbers. The value of λ(a) represents the "propensity" of an agent a to marketing. 4. "Threshold" function θ maps A into the set of real numbers. Figure 1 illustrates Definition 1. In this figure, the set of agents is the set {u, v, w, t, x, y, z}. The influence value w(a, b) is specified by the label on the directed edge from a to b. The edges for which the influence value is zero are omitted. Threshold and propensity values are shown next to each agent. Figure 1: A Social Network. We describe a marketing campaign by specifying "spending" on advertise- ment to each agent in the social network. Definition 2 For any social network (A, w, λ, θ), a spending function is an arbitrary function from set A into non-negative real numbers. The following is an example of a spending function for the social network de- picted in Figure 1. This function specifies a marketing campaign targeting exclusively agent t. (cid:40) s(a) = if a = t, 3, 0, otherwise. (3) Definition 3 For any social network (A, w, λ, θ) and any spending function s, let (cid:107)s(cid:107) =(cid:80) a∈A s(a). 5 vuwtxyz1123121313λ = 0, θ = 6λ = 0, θ = 2λ = 0, θ = 5λ = 1, θ = 4λ = 0, θ = 2λ = 0, θ = 0λ = 0, θ = 1 For the spending function defined by equation (3), we have (cid:107)s(cid:107) = 3. Next we formally define the diffusion in social network under marketing campaign specified by a spending function s. Suppose that initially the product is adopted by a set of agent A. We recursively define the diffusion chain of sets of agents A = A0 s ⊆ A1 s ⊆ A2 s ⊆ A3 s ⊆ . . . , s is the set of agents who have adopted the product on or before the where Ak k-th step of the diffusion. Definition 4 For any given social network (A, w, λ, θ), any spending function s, and any subset A ⊆ A, let set An s be recursively defined as follows: 1. A0 s = A, 2. An+1 s = An s ∪(cid:110) b ∈ A λ(b) · s(b) +(cid:80) (cid:111) w(a, b) ≥ θ(b) . a∈An s For example, consider again the social network depicted in Figure 1. Let A be the set {v} and s be the spending function defined by equation (3). Note that the threshold value of agent u in this network is zero and, thus, it will adopt the product without any peer or marketing pressure. For the other agents in this network, the combination of the marketing pressure specified by the marketing function s and the peer pressure from agent v is not enough to adopt the product. s = {v, u}. Once agent v and agent u both adopt the product, their Thus, A1 combined peer pressure on agent w reaches the threshold value of w and agent w also adopts the product. No other agent is experiencing enough pressure to s = {v, u, w}. Next, agent t will adopt the product at this point. Hence, A2 adopt the product due to the combination of the peer pressure from agent w and the marketing pressure specified by the spending function s, and so on. This diffusion process is illustrated in Figure 2. for each social network (A, w, λ, θ), each n, k ≥ 0, s s )k s = An+k s =(cid:83) Corollary 1 (An each set A ⊆ A, and each spending function s. Definition 5 A∗ Corollary 2 A ⊆ A∗ tion s, and each subset A ⊆ A. n≥0 An s . s for each social network (A, w, λ, θ), each spending func- In the rest of this section we establish technical properties of the chain {An s}n≥0 and the set A∗ s that are used later. The first of these properties is a corollary that follows from the assumption of the finiteness of set A in Definition 1. Corollary 3 For any social network (A, w, λ, θ), any subset A of A and any spending function s, there is n ≥ 0 such that A∗ s = An s . Next, we prove that A∗ s is an idempotent operator. 6 Figure 2: Diffusion Chain A1 s ⊆ A2 s ⊆ A2 s ⊆ A4 s. s for each social network (A, w, λ, θ), each spending func- s ⊆ A∗ s)∗ Lemma 1 (A∗ tion s, and each subsets A of A. Proof. By Corollary 3, there is n ≥ 0 such that A∗ there also is k ≥ 0 such that (An s )∗ s )k s = (An (A∗ s)∗ s )∗ s = (An s = (An s by Definition 5. s ⊆ A∗ s)∗ Therefore, (A∗ s = An s . By the same corollary, s . Thus, by Corollary 1, s )k s = An+k . s (cid:2) We now show that any set of agents influences at least as many agents as any of its subsets, given the same fixed spending function. This claim is formally stated as Corollary 4 that follows from the next lemma: Lemma 2 If A ⊆ B, then Ak spending function s, each k ≥ 0, and all subsets A and B of A. s , for each social network (A, w, λ, θ), each s ⊆ Bk s . Let x ∈ Ak+1 Proof. We prove the statement of the lemma by induction on k. If k = 0, then s = A ⊆ B = B0 A0 s by Definition 4. . It suffices to show that x ∈ Bk+1 s ⊆ Bk λ(x)· s(x) +(cid:80) Suppose that Ak . implies that either x ∈ Ak Indeed, by Definition 4, assumption x ∈ Ak+1 s s or w(a, x) ≥ θ(x). When x ∈ Ak When λ(x) · s(x) +(cid:80) s , by the induction hypothesis, s . Thus, x ∈ Bk s . Therefore, x ∈ Bk+1 (cid:88) w(a, x) ≥ θ(x), due to the assumption Ak ⊆ Bk, a∈Ak w(b, x) ≥ λ(x) · s(x) + w(a, x) ≥ θ(x). λ(x) · s(x) + by Definition 4. s ⊆ Bk (cid:88) x ∈ Ak a∈Ak s s s s s b∈Bk s a∈Ak s 7 vuwtxyzA0sA1sA2sA3sA4s Therefore, x ∈ Bk+1 s by Definition 4. (cid:2) Corollary 4 If A ⊆ B, then A∗ each spending function s, and all subsets A and B of A. s ⊆ B∗ s , for each social network (A, w, λ, θ), Next, we establish that the influence of the union of two sets of agents is at least as strong as the combination of the influence of these two sets. Lemma 3 A∗ ing function s, and all subsets A and B of A. Proof. Note that A ⊆ A ∪ B and B ⊆ A ∪ B. Thus, A∗ s ⊆ (A ∪ B)∗ s ⊆ (A ∪ B)∗ s ⊆ (A ∪ B)∗ B∗ s. s, for each social network (A, w, λ, θ), each spend- s by Corollary 4. Therefore, A∗ s ⊆ (A∪B)∗ s ∪ B∗ s and (cid:2) s∪B∗ One might intuitively think that the result of two consecutive marketing campaigns can not be more effective than the combined campaign, or, in other terms, that (A∗ . More careful analysis shows that this claim is true only if all agents have non-negative propensity. However, this property can be restated in the form which is true for negative propensity as well. To do this, we introduce a binary operation ⊕λ on spending functions. ⊆ A∗ s1+s2 )∗ s1 s2 Definition 6 For any two spending functions s1 and s2 and any propensity function λ, let s1 ⊕λ s2 be spending function such that for each agent a, (cid:40) (s1 ⊕λ s2)(a) = s1(a) + s2(a), 0, if λ(a) ≥ 0, otherwise. The desired property, expressed in terms of operation ⊕λ, is stated later as Lemma 6. We start with two auxiliary observations. Lemma 4 λ(b) · s1(b) ≤ λ(b) · (s1 ⊕λ s2)(b) for any social network (A, w, λ, θ), any agent b ∈ A, and any two spending functions s1 and s2. Proof. We consider the following two cases separately: Case I: λ(b) ≥ 0. In this case by Definition 6 and because s2(b) ≥ 0 due to Definition 2, we have s1(b) ≤ s1(b) + s2(b) = (s1 ⊕λ s2)(b). Therefore, λ(b) · s1(b) ≤ λ(b) · (s1 ⊕λ s2)(b) by the assumption λ(b) ≥ 0. In this case by Definition 6 and because s1(b) ≥ 0 due Case II: λ(b) < 0. to Definition 2, we have s1(b) ≥ 0 = (s1 ⊕λ s2)(b). Therefore, λ(b) · s1(b) ≤ λ(b) · (s1 ⊕λ s2)(b) by the assumption λ(b) < 0. (cid:2) Now we prove that the spending function s1 ⊕λ s2 is at least as effective as s1. , for any social network (A, w, λ, θ), any set A ⊆ A, Lemma 5 An any n ≥ 0, any propensity function λ, and any two spending function s1 and s2. s1 ⊆ An s1⊕λs2 8 Proof. We show the lemma by induction on n. tion 4, A0 s1 that An+1 hypothesis, If n = 0, then, by Defini- s1⊕λs2 . We need to show . Indeed, by Definition 4, Lemma 4, and the induction = A = A0 ⊆ An+1 s1⊕λs2 . Suppose that An s1 ⊆ An s1⊕λs2 s1 b ∈ A λ(b) · s1(b) + (cid:88) b ∈ A λ(b) · (s1 ⊕λ s2)(b) + a∈An s1 ∪ w(a, b) ≥ θ(b)  (cid:88) a∈An s1⊕λ s2 An+1 s1 = An s1 ∪ ⊆ An s1⊕λs2 = An+1 s1⊕λs2 .  w(a, b) ≥ θ(b) (cid:2) Finally, we are ready to state and prove that a marketing campaign with spending function s1 ⊕λ s2 is at least as effective as a sequential combination of two marketing campaigns with spending functions s1 and s2. This property is used in Lemma 12 to prove the soundness of Transitivity axiom for promotional marketing. Lemma 6 (A∗ A, any propensity function λ, and any two spending function s1 and s2. Proof. By Corollary 3, there are n1, n2 ≥ 0 such that A∗ and (An1 s1 (An1 s1 , for any social network (A, w, λ, θ), any set A ⊆ ⊆ A∗ = An1 s1 s1⊕λs2 . Thus, )n2 s2 )∗ = s1 )∗ s2 s1 s2 (A∗ s1 )∗ s2 )n2 s2 )n2 s2⊕λs1 )n2 s1⊕λs2 )n2 s2 = (An1 s1 ⊆ (An1 s1⊕λs2 ⊆ (An1 s1⊕λs2 ⊆ (An1 s1⊕λs2 ⊆ An1+n2 s1⊕λs2 ⊆ A∗ s1⊕λs2 by Lemma 5 and Lemma 2 by Lemma 5 by Definition 6 by Corollary 1 by Definition 5. (cid:2) 3 Logic of Promotional Marketing There are two logical systems that we study in this paper. In this section we introduce a logical system for the marketing aiming to promote influence and prove its soundness and completeness. In the next section we do the same for the marketing aiming to prevent influence. 9 3.1 Syntax and Semantics We start by defining the syntax of our logical systems. The logic of promotional marketing and the logic of preventive marketing use the same language Φ(A), but different semantics. Definition 7 For any finite set A, let Φ(A) be the minimum set of formulas such that 1. A(cid:3)p B ∈ Φ(A) for all subsets A and B of set A and all non-negative real 2. ¬ϕ ∈ Φ(A) for all ϕ ∈ Φ(A), 3. ϕ → ψ ∈ Φ(A) for all ϕ, ψ ∈ Φ(A). numbers p, The next definition is the key definition of this section. Its item 1 specifies the influence relation in a social network with a fixed marketing budget. Definition 8 For any social network N with the set of agents A and any for- mula ϕ ∈ Φ(A), we define satisfiability relation N (cid:15) ϕ as follows: 1. N (cid:15) A(cid:3)p B if B ⊆ A∗ 2. N (cid:15) ¬ψ if N (cid:50) ψ, 3. N (cid:15) ψ → χ if N (cid:50) ψ or N (cid:15) χ. s for some spending function s such that (cid:107)s(cid:107) ≤ p, For example, as we have seen in the introduction, for social network N depicted in Figure 1, we have {x, z} ⊆ {v}∗ s, where spending function s is defined by equation (3). Thus, N (cid:15) {v}(cid:3)3 {x, z}. Through the rest of the paper we omit curly braces from the formulas like this and write them simply as N (cid:15) v(cid:3)3 x, z. 3.2 Axioms Let A be any fixed finite set of agents. Our logical system for promotional influence, in addition to propositional tautologies in language Φ(A), contains the following axioms: 1. Reflexivity: A(cid:3)p B, where B ⊆ A, 2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C, 3. Transitivity: A(cid:3)p B → (B (cid:3)q C → A(cid:3)p+q C). We write (cid:96) ϕ if formula ϕ ∈ Φ(A) is derivable in this logical system using Modus Ponens inference rule. We write X (cid:96) ϕ if formula ϕ is derivable using an additional set of axioms X ⊆ Φ(A). 10 3.3 Examples Ponens inference rule. The soundness and the completeness of our logical system will be shown later. In this section we give several examples of formal proofs in our system. We start with a form of the monotonicity statement from the introduction. As the next lemma shows, this statement is provable in our logic of promotional marketing when p ≤ q: Lemma 7 (cid:96) A(cid:3)p B → A(cid:3)q B, where p ≤ q. Proof. By Transitivity axiom, (cid:96) A(cid:3)q−p A → (A(cid:3)p B → A(cid:3)q B). At the same time, (cid:96) A(cid:3)q−p A by Reflexivity axiom. Thus, (cid:96) A(cid:3)p B → A(cid:3)q B by Modus Lemma 8 (cid:96) A(cid:3)p B → (A(cid:3)q C → A(cid:3)p+q B, C). (cid:96) A(cid:3)p B → A(cid:3)p A, B (cid:96) A(cid:3)q C → A, B (cid:3)q B, C. Proof. By Augmentation axiom, and (4) (5) (cid:2) By Transitivity axiom, (cid:96) A(cid:3)p A, B → (A, B (cid:3)q B, C → A(cid:3)p+q B, C). (6) The statement of the lemma follows from statements (4), (5), and (6) by the (cid:2) laws of propositional logic. The next lemma will be used later in the proof of the completeness. Lemma 9 Let X be a subset of Φ(A), m be a non-negative integer number, sets A, B1, . . . , Bm be subsets of A, and p1, . . . , pm be non-negative real numbers. If X (cid:96) A(cid:3)pi Bi for all 1 ≤ i ≤ m, then X (cid:96) A(cid:3)q Suppose that X (cid:96) A(cid:3)q(cid:48)(cid:83)m−1 that X (cid:96) A(cid:3)0 ∅, which is an instance of Reflexivity axiom. q =(cid:80)m due to the assumption of the lemma, by Lemma 8, X (cid:96) A (cid:3)q (cid:83)m i=1 Bi, where q =(cid:80)m i=1 Bi, where q(cid:48) =(cid:80)m−1 i=1 pi. Since X (cid:96) A(cid:3)pm Bm Proof. We prove the lemma by induction on m. If m = 0, then we need to show i=1 Bi, where (cid:2) (cid:83)m i=1 pi. i=1 pi. 3.4 Soundness In this section we prove the soundness of the logic for promotional marketing. Theorem 1 For any finite set A and any ϕ ∈ Φ(A), if (cid:96) ϕ, then N (cid:15) ϕ for each social network N = (A, w, λ, θ). 11 The soundness of propositional tautologies and of Modus Ponens inference rule is straightforward. Below we show the soundness of each of the remaining axioms as a separate lemma. Lemma 10 N (cid:15) A (cid:3)p B, for any social network N = (A, w, λ, θ) and any subsets A and B of A such that B ⊆ A. Proof. Let s be the spending function equal to 0 on each a ∈ A. Thus, (cid:107)s(cid:107) = 0 ≤ p by Definition 3. At the same time, B ⊆ A ⊆ A∗ s by Corol- lary 2. Therefore, N (cid:15) A(cid:3)p B by Definition 8. (cid:2) Lemma 11 If N (cid:15) A (cid:3)p B, then N (cid:15) A, C (cid:3)p B, C, for each social network N = (A, w, λ, θ) and all subsets A, B, and C of A. Proof. Suppose that N (cid:15) A (cid:3)p B. Thus, by Definition 8, there is a spending function s such that (cid:107)s(cid:107) ≤ p and B ⊆ A∗ Thus, B ∪ C ⊆ A∗ s by Lemma 3. Therefore, N (cid:15) A, C(cid:3)p B, C, by Definition 8. Lemma 12 For any social network N = (A, w, λ, θ), if N (cid:15) A(cid:3)p B and N (cid:15) B (cid:3)q C, then N (cid:15) A(cid:3)p+q C. Proof. By Definition 8, assumption N (cid:15) B(cid:3)q C implies that there is a spending function s1 such that (cid:107)s1(cid:107) ≤ q and C ⊆ B∗ Similarly, assumption N (cid:15) A(cid:3)p B implies that there is a spending function s2 such that (cid:107)s2(cid:107) ≤ p and B ⊆ A∗ by Corollary 4. Thus, B∗ by Lemma 6. . At the same time, (cid:107)s1 ⊕λ s2(cid:107) ≤ It follows that C ⊆ B∗ ⊆ A∗ (cid:107)s1(cid:107) + (cid:107)s2(cid:107) ≤ p + q, by Definition 6. Therefore, N (cid:15) A (cid:3)p+q C by Defini- (cid:2) s by Corollary 2. (cid:2) s . Note that C ⊆ C∗ s ∪ C∗ s ⊆ (A∪ C)∗ . Hence, B∗ ⊆ A∗ s1⊕λs2 s1⊕λs2 tion 8. s2 ⊆ (A∗ s2 )∗ s1 s1 . s1 s1 s1 This concludes the proof of the soundness of our logical system for promo- tional marketing. 3.5 Completeness We now show the completeness of our logical system for promotional marketing. This result is formally stated as Theorem 2 in the end of this section. As usual, at the core of the proof of the completeness is a construction of a canonical model. In our case, the role of a canonical model is played by the canonical social network. Let A0 be any finite set and X = {Ai (cid:3)pi Bi}i≤m be any finite set of atomic formulas in language Φ(A0). We now proceed to define the canonical social network NX = (A, w, λ, θ). An example of the canonical network for set X consisting of formula a, c (cid:3)1 d, formula b, c (cid:3)2 a, and formula a, b (cid:3)3 c is 12 Figure 3: The canonical social network NX for set X consisting of formula a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c. depicted in Figure 3. We associate two new agents αi and βi with each formula Ai (cid:3)pi Bi ∈ X. We assume that agents α1, . . . , αm, β1, . . . , βm are distinct and that they do not belong to set A0. Definition 9 A = A0 ∪ {αi}i≤m ∪ {βi}i≤m. In social network NX only agents {αi}i≤m are responsive to promotional marketing. We formally capture this through the following definition of function λ: Definition 10 For any a ∈ A, (cid:40) λ(a) = if a = αi for some i ≤ m, 1, 0, otherwise. We assume that for each i ≤ m, all agents in set Ai as well as agent αi put peer pressure on agent βi once they adopt the product. In addition, upon adopting the product, agent βi puts peer pressure on each agent in set Bi. Besides that, no agent can put peer pressure on any other agent in this network. We formally capture this in Definition 11. Definition 11 w(a, b) = 1, if a ∈ Ai ∪ {αi} and b = βi for some i ≤ m, if a = βi and b ∈ Bi for some i ≤ m, 1, 0, otherwise. Before continuing with the definition of the social network NX , we state and prove a property of this network that follows from Definition 11. We show that in order to put peer pressure of at least Ai + 1 on agent βi, one needs to influence agent αi and all of the agents in set Ai. 13 abcβ3β1β2dα2α3α1A011111111111λ: 1, θ: 21λ: 0, θ: 1λ: 0, θ: 1λ: 0, θ: 1λ: 0, θ: 1λ: 1, θ: 1λ: 1, θ: 3λ: 0, θ: 3λ: 0, θ: 3λ: 0, θ: 3 Lemma 13 If(cid:80) all other a ∈ A. Thus, inequality (cid:80) a∈An s Proof. By Definition 11, w(a, βi) = 1 if a ∈ Ai ∪ {αi} and w(a, βi) = 0 for w(a, βi) ≥ Ai + 1 implies that Ai ∪ {αi} ⊆ An (cid:2) s . Therefore, αi ∈ An s and Ai ⊆ An s . a∈An s w(a, βi) ≥ Ai + 1, then αi ∈ An s and Ai ⊆ An s . We are now ready to define the threshold value function θ for the social network NX . Recall that according to Definition 11 and Definition 10, no agent can put peer pressure on agent αi, but agent αi is responsive to promotional marketing. We set the threshold value θ(αi) to pi so that this agent can only be influenced by a marketing campaign with budget at least pi. We set value θ(βi) high enough to guarantee (see Lemma 13) that agent αi and each agent in set Ai adopt the product before agent βi is influenced. Threshold values of all agents in set A0 are set to 1. Definition 12 θ(a) = pi, Ai + 1, 1, if a = αi for some i ≤ m, if a = βi for some i ≤ m, otherwise. This concludes the definition of the canonical social network NX = (A, w, λ, θ). Recall that Figure 3 depicts the canonical social network NX for set X consisting of formula a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c. Note that formula a, c(cid:3)1 d, formula b, c(cid:3)2 a, and formula a, b(cid:3)3 c are all satisfied in the canonical network depicted in Figure 3. For example, for the formula a, c(cid:3)1 d, let spending function s be such that it spends 1 on agent αi and nothing on all other agents. Thus, {a, c}1 s = {a, c, α1}. Once α1 adopts the product, the total peer pressure on agent β1 becomes 3 and it too adopts the product: {a, c}2 s = {a, c, α1, β1}. Finally, upon adopting of the product, agent β1 alone puts enough s = {a, c, α1, β1, d}. Thus, pressure on agent d to also adopt the product: {a, c}3 formula a, c(cid:3)1 d is satisfied in this network. to a claim that all formulas from set X = {Ai (cid:3)pi Bi}i≤m are satisfied in the Lemma 14 NX (cid:15) Ai (cid:3)pi Bi for each i ≤ m. Proof. Consider any i ≤ m. Let s be a spending function such that The next lemma generalizes the observation made in the previous paragraph canonical network NX . (cid:40) s(a) = pi, 0, if a = αi, otherwise. (7) Then, by Definition 10, Definition 11, and Definition 12, λ(αi) · s(αi) + (cid:88) a∈Ai (cid:88) a∈Ai w(a, αi) = 1 · pi + 14 0 = pi = θ(αi). s by Definition 4. Hence, by Definition 10, Definition 11, and λ(βi) · s(βi) + w(a, βi) ≥ λ(βi) · s(βi) + w(αi, βi) + w(a, βi) Thus, αi ∈ (Ai)1 Definition 12, (cid:88) a∈(Ai)1 s (cid:88) a∈Ai ≥ 0 · 0 + 1 + Ai = 1 + Ai = θ(βi). Thus, βi ∈ (Ai)2 Definition 11, and Definition 12, s by Definition 4. Finally, for each b ∈ Bi, by Definition 10, (cid:88) w(a, b) ≥ 0 · 0 + w(βi, b) = w(βi, b) = 1 = θ(b). λ(b) · s(b) + s a∈(Ai)2 s by Definition 4. Thus, b ∈ (Ai)∗ s by Definition 5 for each s. Note that (cid:107)s(cid:107) = pi due to definition (7). Therefore, (cid:2) Hence, b ∈ (Ai)3 b ∈ Bi. Then, Bi ⊆ A∗ NX (cid:15) Ai (cid:3)pi Bi by Definition 8. s , then αi ∈ An s , for each A ⊆ A0, each i ≤ m, and each Our next important result is the converse of Lemma 14 stated later as Lemma 22. In preparation for its, we make several technical observations about the social network NX . First, we prove that, for each i ≤ m, agent βi can not be influenced without agent αi being influenced as well. Lemma 15 If βi ∈ An n ≥ 0. s . Let k be the smallest integer such that 0 ≤ k ≤ n and Proof. Suppose βi ∈ An βi ∈ Ak s . s = A by Definition 4. Thus, βi ∈ A0 due to the assumption A ⊆ A0, which contradicts the choice of β1, . . . , βm. Therefore, the lemma is vacuously true. Suppose that k > 0. Since k > 0 is the smallest integer such that βi ∈ Ak s , it must be that βi ∈ Ak If k = 0, then βi ∈ A0 . Thus, by Definition 4, s \ Ak−1 λ(βi) · s(βi) + s (cid:88) a∈Ak−1 s w(a, βi) ≥ θ(βi). (cid:88) w(a, βi) ≥ Ai + 1. By Definition 10, λ(βi) = 0. By Definition 12, θ(βi) = Ai + 1. Thus, a∈Ak−1 s Thus, αi ∈ Ak−1 Definition 4 and since k − 1 < k ≤ n. by Lemma 13. Hence, αi ∈ Ak−1 s s . Therefore, αi ∈ An s by (cid:2) The next lemma shows that the only way to influence agent αi is to spend at least pi on promotional marketing to this agent. Lemma 16 If αi ∈ An s , then s(αi) ≥ pi, for each A ⊆ A0. 15 Proof. Suppose that αi ∈ An α1, . . . , αm. Thus, by Definition 4, there is k < n such that w(a, αi) ≥ θ(αi). s . Note that αi /∈ A0 ⊇ A = A0 λ(αi) · s(αi) + (cid:88) s by the choice of a∈Ak s By Definition 11, w(a, αi) = 0 for each a ∈ A. Hence, λ(αi) · s(αi) ≥ θ(αi). By Definition 10, λ(αi) = 1. By Definition 12, θ(αi) = pi. Therefore, s(αi) ≥ (cid:2) pi. a∈An s (cid:83) a∈An s a∈An s \ An s βi∈An+1 s \An s s implies that \ An s , then by Transitivity axiom. λ(βi) · s(βi) + w(a, βi) ≥ θ(βi). s ∩ A0)(cid:3)q w(a, βi) ≥ Ai + 1. Thus, Ai ⊆ An Lemma 17 For each n ≥ 0 and each subset A of A0, if βi ∈ An+1 X (cid:96) (An Proof. By Definition 4, assumption βi ∈ An+1 s ∩ A0)(cid:3)pi Bi. w(a, βi) ≥ θ(βi). Hence, by Defini- s by Lemma 13. Recall that s ∩A0)(cid:3)0 Ai s ∩ A0)(cid:3)pi Bi (cid:88) By Definition 10, λ(βi) = 0. Thus, (cid:80) tion 12,(cid:80) s ∩A0. Then, (cid:96) (An Ai ⊆ A0 by the choice of set X. Hence, Ai ⊆ An by Reflexivity axiom. Recall that Ai (cid:3)pi Bi ∈ X. Thus, X (cid:96) (An Bi, where q =(cid:80) Lemma 18 X (cid:96) (An pi. Proof. The statement of the lemma follows from Lemma 17 and Lemma 9. (cid:2) )∩A0), where q =(cid:80) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) + (cid:88) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) + (cid:88) b ∈ A0  \ b ∈ A0 b ∈ A0 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) b ∈ A0 (cid:88) Lemma 19 X (cid:96) (An for each subset A of A0, each spending function s, and each n ≥ 0. By Definition 10, λ(b) = 0 for all b ∈ A0. By Definition 12, θ(b) = 1 for all b ∈ A0. Thus, s ∩A0)(cid:3)q ((An+2 s   . w(a, b) ≥ θ(b) w(a, b) ≥ θ(b) Proof. By Definition 4, ) ∩ A0 = w(a, b) ≥ 1 ) ∩ A0 = (cid:88) \ An+1 \ An+1 \An+1 s βi∈An+1 s \An s βi∈An+1 s \An s (An+2 s s (An+2 s s a∈An+1 s a∈An s (cid:2) pi, s (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) \  . w(a, b) ≥ 1 a∈An s a∈An+1 s 16 Since α1, . . . , αm, β1, . . . βm /∈ A0, by Definition 11, for each b ∈ A0, we have w(a, b) (cid:54)= 0 only if a = βi and b ∈ Bi for some i ≤ m, in which case w(a, b) = 1. Hence, (An+2 s \ An+1 s ) ∩ A0 = βi∈An+1 s \An s X (cid:96) (An s ∩ A0)(cid:3)q βi∈An+1 s \An s (cid:91) (cid:91) Bi. Bi, Thus, to finish the proof of the lemma, it is sufficient to show that pi, which follows from Lemma 18. (cid:2) s∩A0), for each subset A of A0, each spending function where q =(cid:80) Lemma 20 X (cid:96) A(cid:3)q(A1 βi∈An+1 \An s s Proof. By Definition 4, s ∩ A0 = (A ∩ A0) ∪ A1 s, and each non-negative real number q. (cid:41) w(a, b) ≥ θ(b) . (cid:88) a∈A (cid:41) By Definition 10, λ(b) = 0 for all b ∈ A0. By Definition 12, θ(b) = 1 for all b ∈ A0. Thus, s ∩ A0 = (A ∩ A0) ∪ A1 w(a, b) ≥ 1 . By Definition 11, w(a, b) = 0 for all a ∈ A ⊆ A0 and all b ∈ A0. Thus, the set (cid:40) b ∈ A0 b ∈ A0 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) λ(b) · s(b) + (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:88) (cid:40) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:88) (cid:41) ∩A0), where q =(cid:80) w(a, b) ≥ 1 a∈A a∈A (cid:40) b ∈ A0 is empty. Hence, A1 ivity axiom. s ∩ A0 = A ∩ A0. Therefore, X (cid:96) A(cid:3)q (A1 s ∩ A0) by Reflex- (cid:2) Lemma 21 X (cid:96) A(cid:3)q (An+1 A0, each spending function s, and each n ≥ 0. s βi∈An s pi, for each subset A of Proof. We prove this lemma by induction on n. If n = 0, then the required follows from Lemma 20. Assume now that where q =(cid:80) βi∈An s pi. X (cid:96) A(cid:3)q (An+1 s ∩ A0), 17 (8) Note that An s ⊆ An+1 s by Reflexivity axiom. At the same time, by Lemma 19, s ∩ A0)(cid:3)0 (An s ∩ A0) where r =(cid:80) βi∈An+1 s Then, by Augmentation axiom, X (cid:96) (An+1 s In other words, ) ∩ A0), s s s s \An \ An+1 X (cid:96) (An X (cid:96) (An+1 pi. Thus, by Transitivity axiom, by Definition 4. Hence, (cid:96) (An+1 s ∩ A0)(cid:3)r ((An+2 ∩ A0)(cid:3)r ((An+2 ∩ A0)(cid:3)r ((An+2 ∩ A0)(cid:3)r (An+2 ∩ A0), where q(cid:48) = q + r =(cid:80) X (cid:96) (An+1 \ An+1 \ An+1 ∩ A0). pi. s s s s s s s ∩ A0), (An+1 ) ∩ A0). ) ∩ A0), (An+1 s ∩ A0). (9) s s βi∈An+1 We are now ready to prove the converse of Lemma 14. Therefore, by Transitivity axiom from statement (8) and (9) we can conclude (cid:2) X (cid:96) A(cid:3)q(cid:48) (An+2 Lemma 22 If NX (cid:15) A(cid:3)p B, then X (cid:96) A(cid:3)p B, for each subsets A and B of A0 and each non-negative real number p. Proof. Suppose that NX (cid:15) A(cid:3)p B. By Definition 8, there is a spending function s. Thus, by Corollary 3, there is n ≥ 0 such that s such that (cid:107)s(cid:107) ≤ p and B ⊆ A∗ s ⊆ An+1 B ⊆ An s . By Definition 4, An . Since B is a subset ∩ A0. Hence, (cid:96) (An+1 ∩ A0) (cid:3)0 B by Reflexivity of A0, we have B ⊆ An+1 where q =(cid:80) axiom. Then, from Transitivity axiom and Lemma 21, we have X (cid:96) A (cid:3)q B, pi ≤(cid:80) Note that(cid:80) pi ≤ (cid:88) (cid:88) pi by Lemma 15 and(cid:80) pi ≤ (cid:88) s(αi) ≤(cid:88) s(a) = (cid:107)s(cid:107) ≤ p. Hence, q ≤ p. Then, (cid:96) B (cid:3)p−q B by Reflexivity axiom. Finally, X (cid:96) A(cid:3)q B and (cid:96) B (cid:3)p−q B, by Transitivity axiom, imply that X (cid:96) A(cid:3)p B. by Lemma 16. Thus, taking into account Definition 3, pi ≤ (cid:88) . Thus, B ⊆ An+1 pi ≤(cid:80) pi. βi∈An s(αi)≥pi s(αi)≥pi s(αi)≥pi αi∈An αi∈An αi∈An βi∈An βi∈An a∈A q = (cid:2) We conclude this section by stating and proving the completeness theorem s s s s s s s s s for promotional marketing. Theorem 2 If (cid:48) ϕ, then there exists social network N = (A, w, λ, θ) such that ϕ ∈ Φ(A) and N (cid:50) ϕ. Proof. Suppose that (cid:48) ϕ. Let M be any maximal consistent subset of {ψ,¬ψ ψ is a subformula of ¬ψ} such that ¬ψ ∈ M . Let X be the set of all atomic formulas of the form A(cid:3)p B in set M . To finish the proof of the theorem, we first establish the following lemma: 18 pi Lemma 23 ψ ∈ M if and only if NX (cid:15) ψ for each subformula ψ of ¬ϕ. Proof. We prove the lemma by induction on the structural complexity of formula by Lemma 14. ψ. In the base case, suppose that ψ is A(cid:3)p B. (⇒) If A(cid:3)p B ∈ M , then A(cid:3)p B ∈ X by the choice of set X. Thus, NX (cid:15) A(cid:3)p B (⇐) If NX (cid:15) A (cid:3)p B, then X (cid:96) A (cid:3)p B by Lemma 22. Thus, M (cid:96) A (cid:3)p B. Hence, by the maximality of set M , we have A (cid:3)p B ∈ M since A (cid:3)p B is a subformula of ¬ϕ. and the consistency of set M and Definition 8 in the standard way. The induction step follows from the induction hypothesis, the maximality (cid:2) To finish the proof of the theorem, note that ¬ϕ ∈ M by the choice of set (cid:2) M . Thus, NX (cid:15) ¬ψ by Lemma 23. Therefore, NX (cid:50) ψ by Definition 8. 4 Logic of Preventive Marketing In this section we study the impact of preventive marketing on influence in social networks. Our definition of a social network given in Definition 1 and the language Φ(A) remain the same. As it has been discussed in the introduction, we only modify the meaning of the influence relation A (cid:3)p B to be "for any preventive marketing campaign with budget no more than p, the set of agents A is able to influence the set of agents B". The latter is formally captured in item 1 of Definition 13. Definition 13 For any social network N with the set of agents A and any formula ϕ ∈ Φ(A), we define the satisfiability relation N (cid:15) ϕ as follows: 1. N (cid:15) A(cid:3)p B if B ⊆ A∗ 2. N (cid:15) ¬ψ if N (cid:50) ψ, 3. N (cid:15) ψ → χ if N (cid:50) ψ or N (cid:15) χ. s for each spending function s such that (cid:107)s(cid:107) ≤ p, Note the significant difference between the above definition and the similar Definition 8 for promotional marketing. Item 1 of Definition 13 has a universal quantifier over spending functions and corresponding part of Definition 8 has an existential quantifier over spending functions. 4.1 Axioms Let A be any fixed finite set of agents. Our logical system for influence with preventive marketing, in addition to propositional tautologies in language Φ(A), contains the following axioms: 1. Reflexivity: A(cid:3)p B, where B ⊆ A, 19 2. Augmentation: A(cid:3)p B → A, C (cid:3)p B, C, 3. Transitivity: A(cid:3)p B → (B (cid:3)p C → A(cid:3)p C), 4. Monotonicity: A(cid:3)p B → A(cid:3)q B, where q ≤ p. Just like in the case of promotional marketing, we write (cid:96) ϕ if formula ϕ ∈ Φ(A) is derivable in our logical system using Modus Ponens inference rule. We write X (cid:96) ϕ if formula ϕ is derivable using an additional set of axioms X ⊆ Φ(A). 4.2 Example The soundness and the completeness of our logical system will be shown later. In this section we give two examples of formal proofs in our system. First, we show a preventive marketing analogy of Lemma 8: Proof. By Augmentation axiom, Lemma 24 (cid:96) A(cid:3)p B → (A(cid:3)p C → A(cid:3)p B, C). (cid:96) A(cid:3)p B → A(cid:3)p A, B (cid:96) A(cid:3)p C → A, B (cid:3)p B, C. By Transitivity axiom, and (10) (11) (12) (cid:96) A(cid:3)p A, B → (A, B (cid:3)p B, C → A(cid:3)p B, C). The statement of the lemma follows from statements (10), (11), and (12) by the (cid:2) laws of the propositional logic. Next, we show an auxiliary lemma that is used later in the proof of com- pleteness. Lemma 25 If X (cid:96) B (cid:3)p c for each c ∈ C, then X (cid:96) B (cid:3)p C, where B and C are subsets of A0 and p ≥ 0. Proof. We prove the lemma by induction on the size of set C. Base Case: X (cid:96) B (cid:3)p ∅ by Reflexivity axiom. Induction Step: Assume that X (cid:96) B(cid:3)p C. Let c be any element of A0 \ C such that X (cid:96) B (cid:3)p c. We need to show that X (cid:96) B (cid:3)p C ∪ {c}. By Augmentation Recall that X (cid:96) B (cid:3)p c. Again by Augmentation axiom, X (cid:96) B (cid:3)p B ∪ {c}. Hence, X (cid:96) B (cid:3)p C ∪ {c}, due to (13) and Transitivity axiom. X (cid:96) B ∪ {c}(cid:3)p C ∪ {c}. axiom, (13) (cid:2) 20 4.3 Soundness In this section we prove the soundness of the logic for preventive marketing. Theorem 3 For any finite set A and any ϕ ∈ Φ(A), if (cid:96) ϕ, then N (cid:15) ϕ for each social network N = (A, w, λ, θ). The soundness of propositional tautologies and of Modus Ponens inference rule is straightforward. Below we show the soundness of each of the remaining axioms as a separate lemma. Lemma 26 N (cid:15) A (cid:3)p B, for any social network N = (A, w, λ, θ) and any subsets A and B of A such that B ⊆ A. Proof. Let s be any spending function. By Definition 13, it suffices to show that B ⊆ A∗ s due to the assumption B ⊆ A of the lemma. (cid:2) s by Corollary 2. Therefore, B ⊆ A∗ s. Indeed, A ⊆ A∗ s ∪ C∗ Lemma 27 If N (cid:15) A (cid:3)p B, then N (cid:15) A, C (cid:3)p B, C, for each social network N = (A, w, λ, θ) and all subsets A, B, and C of A. Proof. Suppose that N (cid:15) A (cid:3)p B. Consider any spending function s such that (cid:107)s(cid:107) ≤ p. It suffices to show that B ∪ C ⊆ (A ∪ C)∗ s. Indeed, assumption s by Definition 13. At the same time, C ⊆ C∗ N (cid:15) A(cid:3)p B implies that B ⊆ A∗ by Corollary 2. Therefore, B ∪ C ⊆ A∗ s ⊆ (A ∪ C)∗ s (cid:2) Lemma 28 If N (cid:15) A(cid:3)p B and N (cid:15) B(cid:3)p C, then N (cid:15) A(cid:3)p C, for each social network N = (A, w, λ, θ) and all subsets A, B, and C of A. Proof. Suppose that N (cid:15) A (cid:3)p B and N (cid:15) B (cid:3)p C. Consider any spending function s such that (cid:107)s(cid:107) ≤ p. By Definition 13, it suffices to show that C ⊆ A∗ s. Note that assumption N (cid:15) A (cid:3)p B, by Definition 13, imply that B ⊆ A∗ s. s ⊆ (A∗ s by Corollary 4. At the same time, assumption N (cid:15) B (cid:3)p C s)∗ Thus, B∗ s. Therefore, C ⊆ A∗ s by Definition 13. Hence, C ⊆ (A∗ implies that C ⊆ B∗ s)∗ (cid:2) by Lemma 1. s, by Lemma 3. s Lemma 29 If N (cid:15) A(cid:3)p B, then N (cid:15) A(cid:3)q B, for each q ≤ p, each each social network N = (A, w, λ, θ) and all subsets A and B of A. Proof. Consider any spending function s such that (cid:107)s(cid:107) ≤ q. By Definition 13, it suffices to show that B ⊆ A∗ s. To prove this, note that (cid:107)s(cid:107) ≤ q ≤ p. Thus, B ⊆ A∗ s due to Definition 13 and the assumption N (cid:15) A(cid:3)p B of the lemma. (cid:2) This concludes the proof of the soundness of our logical system for preventive marketing. 21 4.4 Completeness The rest of this section contains the proof of the following result. Theorem 4 If (cid:48) ϕ, then there is a social network N = (A, w, λ, θ) such that ϕ ∈ Φ(A) and N (cid:50) ϕ. Suppose that (cid:48) ϕ. It suffices to construct a "canonical" social network N = (A, w, λ, θ) such that N (cid:50) ϕ. Define P ⊂ R to be the finite set of all subscripts that appear in formula ϕ. Let ε > 0 be such that p1 − p2 > ε for all p1, p2 ∈ P where p1 (cid:54)= p2. Let A0 be the finite set of all agents that appear in formula ϕ and X be a maximal consistent subset of Φ(A0) containing formula ¬ϕ. In Section 2, we have introduced closures Ak s of a set of agents A. Both of these closures are semantic in the sense that they are defined in terms of a given social network. We are about to introduce another closure A+ p that will be used to construct the canonical social network N . Unlike closures Ak s and A∗ p is syntactic because it is defined in terms of provability of certain statements in our logical system. s, closure the A+ s and A∗ Definition 14 A+ any p ≥ 0. Lemma 30 X (cid:96) A(cid:3)p A+ p = {a ∈ A0 X (cid:96) A(cid:3)p a}, for any set of agents A ⊆ A0 and p , for any A ⊆ A0 and any p ≥ 0. Proof. The statement of the lemma follows from Definition 14 and Lemma 25. (cid:2) p = A+ q Generally speaking, it is possible that A+ for some p and q such that p (cid:54)= q. In the construction of the canonical social network N it will be convenient to distinguish closures A+ p for different values of parameter p. In such situations, instead of closure A+ p we consider labeled closure, formally defined as pair (A+ Definition 15 Let L = {(A+ p , p) A ⊆ A0, p ∈ P}. p , p). Next we define the canonical network N = (A, w, λ, θ). Besides agents in set A0, our social network also has two additional agents for each (cid:96) ∈ L. By analogy with the canonical social network NX from the proof of completeness for promotional marking, we call these additional agents α((cid:96)) and β((cid:96)). Definition 16 A = A0 ∪ {α((cid:96)), β((cid:96)) (cid:96) ∈ L}. For any (cid:96) = (A+ p , p), we assume that upon adopting the product agent α((cid:96)) puts peer pressure on agent β((cid:96)), agent β((cid:96)) puts peer pressure on each agent p and each agent in set A0 \ A+ in set A0 \ A+ p , in turn, puts peer pressure on agent β((cid:96)). The peer pressure structure is illustrated in Figure 4. Note that the same agent a ∈ A0 can belong to set A0 \ A+ p for several different values of p. Such agent a could experience (or put) peer pressure from (on) several different agents β((cid:96)). The structure is formally specified in Definition 17. 22 Figure 4: Towards the definition of the influence function in the canonical social network. Definition 17 For any a, b ∈ A,  w(a, b) = if a = α((cid:96)) and b = β((cid:96)) for some (cid:96) ∈ L, if a ∈ A0 \ A+ if a = β(A+ otherwise. p , p) ∈ L, p , p) ∈ L and b ∈ A0 \ A+ p , p and b = β(A+ 1, 1, 1, 0, We assume that only agents {α((cid:96)) (cid:96) ∈ L} are responsive to preventive marketing. This is formally captured in the definition of the propensity function below. Definition 18 For any a ∈ A, (cid:40)−1, 0, λ(a) = if a = α((cid:96)) for some (cid:96) ∈ L, otherwise. To finish the definition of canonical social network N = (A, w, λ, θ), we only need to define threshold function θ(a) for each a ∈ A. There are three different cases to consider: a = α((cid:96)) for some (cid:96) ∈ L, a = β((cid:96)) for some (cid:96) ∈ L, and a ∈ A0. Recall that by Definition 17 and Definition 18, agent α((cid:96)) is not responsive to peer pressure of any other agent. It is only responsive to the marketing pressure with propensity −1. We set the threshold value of this agent to ε − p, where (cid:96) = (A+ p , p). Thus, if an amount at least p is spent on the preventive marketing to this agent, it will not adopt the product. either agent α((cid:96)) or any of the agents in the set A0 \ A+ then agent β((cid:96)) will also adopt the product. We set threshold value of agent β((cid:96)) to 1. Thus, for each (cid:96) = (A+ p , p), if p adopts the product, 23 α((cid:361))β((cid:361))A0\ A+pA+p1111111 Finally, recall from Definition 17 that agent a ∈ A0 can experience peer pressure from any agent β(A+ p . There are exactly p } such β-agents. We set the threshold value θ(a) p , p) ∈ L a ∈ A0 \ A+ {(A+ high enough so that it adopts the product only if all of these β-agents adopt the product. p , p) such that a ∈ A0 \ A+ The next definition captures the three cases discussed above. Definition 19 For any a ∈ A, ε − p, 1, {(A+ θ(a) = p , p) ∈ L a ∈ A0 \ A+ p }, if a = α(A+ if a = β(A+ if a ∈ A0. p , p), p , p), For any c ∈ A0, we have chosen θ(c) to be equal to the number of β(A+ p , p) such that c ∈ A0 \ A+ p . Thus, if all such β-agents adopt the product, then the total peer pressure on agent c would reach θ(c) and agent c also would adopt the product. This observation is formalized by the next lemma. Lemma 31 Let c be an agent in A0, set B be a subset of A0, and s be an p , p) ∈ L at arbitrary spending function for the social network N . If for each (A+ s , then c ∈ B∗ least one of the following is true: (i) c ∈ A+ s . s for some n ≥ 0. Thus, by the assumption of Proof. By Corollary 3, B∗ p , p) ∈ L at least one of the following is true: (i) c ∈ A+ this lemma, for each (A+ p , (ii) β(A+ (cid:88) (cid:88) s . In other words, {β(A+ p , p) ∈ Bn p , p) c ∈ A0 \ A+ p , p) ∈ B∗ p } ⊆ Bn p , (ii) β(A+ s . Hence, s = Bn w(b, c) ≥ w(β((cid:96)), c). b∈Bn s (cid:96)∈{(A+ p ,p)∈L c∈A0\A+ p } Thus, by Definition 17, w(b, c) ≥ (cid:88) b∈Bn s (cid:96)∈{(A+ p } p ,p)∈L c∈A0\A+ 1 = {(A+ p , p) ∈ L c ∈ A0 \ A+ p }. (cid:88) (cid:88) b∈Bn s At the same time λ(c) = 0 by Definition 18. Hence, λ(c) · s(c) + w(b, c) ≥ {(A+ p , p) ∈ L c ∈ A0 \ A+ p }. Then, by Definition 19, λ(c) · s(c) + (cid:88) b∈Bn s w(b, c) ≥ θ(c). s Thus, c ∈ Bn+1 by Definition 4. Therefore, c ∈ B∗ s by Definition 5. Referring back to Figure 4, note that if an agent in set A0 \ A+ p adopts the product, then it will put enough pressure on β(A+ p , p) also adopts the product. We formally state this observation as the lemma below. p , p) so that agent β(A+ (cid:2) 24 p , p) ∈ B∗ s , p , p) ∈ L, set B is a subset of A0, and s is an arbitrary spending s such that b0 ∈ A0 \ A+ p , then β(A+ Lemma 32 If there is b0 ∈ B∗ where (A+ function for the social network N . Proof. By Corollary 3, B∗ Definition 17, assumption b0 ∈ A0 \ A+ s = Bn s for some n ≥ 0. At the same time, by p , p)) = 1. Thus, p implies that w(b0, β(A+ w(b, β(A+ p , p)) = 1, p , p)) ≥ w(b0, β(A+ (cid:88) w(b, β(A+ since b0 ∈ B∗ s = Bn p , p)) · s(β(A+ λ(β(A+ p , p)) + b∈Bn s s . Note that λ(β(A+ p , p)) = 0 by Definition 18. Hence, (cid:88) b∈Bn s p , p)) ≥ w(b0, β(A+ p , p)) = 1. Thus, by Definition 19, λ(β(A+ p , p)) · s(β(A+ p , p)) + (cid:88) b∈Bn s w(b, β(A+ p , p)) ≥ θ(β(A+ p , p)). p , p) ∈ B∗ p , p) ∈ Bn+1 s Hence, β(A+ tion 5. by Definition 4. Therefore, β(A+ Recall that we have set the threshold value of agent α(A+ s by Defini- (cid:2) p , p) to be ε − p, so that by spending at least p on preventive marketing one would prevent an adoption of the product by agent α(A+ p , p). At the same time, spending no more than p − ε will result in α(A+ p , p) adopts the product, it will put enough pressure on agent β(A+ p , p) to adopt the product as well. This observation is formally stated below. p , p) ∈ B∗ p , p) ∈ L, Lemma 33 If s(α(A+ set B is a subset of A0, and s is an arbitrary spending function for the social network N . p , p) adopting the product. Once agent α(A+ p , p)) ≤ p − ε, then β(A+ s , where (A+ Proof. Suppose that s(α(A+ Definition 18 and w(b, α(A+ p , p)) ≤ p − ε. Note that λ(α(A+ p , p)) = 0 for each b ∈ A by Definition 17. Thus, p , p)) = −1 by (cid:88) p , p)) + 0 = −s(α(A+ p , p)) + b∈B0 s w(b, α(A+ p , p)) p , p)) ≥ ε − p. λ(α(A+ p , p)) · s(α(A+ = −1 · s(α(A+ Thus, by Definition 19, λ(α(A+ p , p)) · s(α(A+ p , p)) + w(b, α(A+ p , p)) ≥ θ(α(A+ p , p)). (cid:88) b∈B0 s 25 Hence, α(A+ Definition 17, p , p) ∈ B1 (cid:88) b∈B1 s s by Definition 4. Since w is a non-negative function, by w(b, β(A+ p , p)) = w(α(A+ p , p), β(A+ p , p)) + w(b, β(A+ p , p)) (cid:88) b∈B1 s\{α(A+ p ,p)} (cid:88) b∈B1 s w(b, β(A+ p , p)) ≥ 1. w(b, β(A+ p , p)) ≥ θ(β(A+ p , p)). ≥ w(α(A+ p , p), β(A+ p , p)) = 1. Note that λ(β(A+ p , p)) = 0 by Definition 18. Thus, λ(β(A+ p , p)) · s(β(A+ p , p)) + Hence, by Definition 19, λ(β(A+ p , p)) · s(β(A+ p , p)) + (cid:88) b∈B1 s p , p) ∈ B2 Thus, β(A+ tion 5. s by Definition 4. Therefore, β(A+ p , p) ∈ B∗ s by Defini- (cid:2) The next lemma states that if we do spend at least p on preventive marketing to agent α(A+ p , p), then this agent will never adopt the product. Lemma 34 For every (A+ p, then α(A+ p , p) /∈ A∗ s. p , p) ∈ L and every spending function s, if s(α(A+ p , p)) ≥ p , p) /∈ Ak s for each k ≥ 0. Proof. By Definition 5, it suffices to show that α(A+ We prove this statement by induction on k. Base Case: By Definition 4, we have A0 nition 15, (A+ p , p) /∈ A0 α(A+ Induction Step: Suppose that α(A+ Definition 4, p , p) ∈ L implies that A ⊆ A0. Hence, A0 s by Definition 16. s and α(A+ s = A. At the same time, by Defi- s ⊆ A0. Therefore, p , p) ∈ Ak+1 s . Thus, by λ(α(A+ p , p)) · s(α(A+ p , p)) + w(b, α(A+ p , p)) ≥ θ(α(A+ p , p)). p , p) /∈ Ak (cid:88) b∈Ak s Hence, by Definition 18, Definition 17, and Definition 19, 1 · s(α(A+ p , p)) + 0 ≥ ε − p. Thus, s(α(A+ tradicts the assumption s(α(A+ p , p)) ≤ p − ε. Therefore, s(α(A+ p , p)) ≥ p of the lemma. p , p)) < p since ε > 0. This con- (cid:2) As we have seen in the previous lemma, spending at least p on preventive p , p) prevents it from adopting the product. We now p , p) prevents all agents in set A0\A+ p marketing to agent α(A+ show that spending at least p on agent α(A+ from adopting the product. See Figure 4. 26 s ∩ A0 ⊆ A+ Lemma 35 A∗ function such that s(α(A+ p , where (A+ p , p)) ≥ p. p , p) ∈ L and s is an arbitrary spending p , p) ∈ L and s be an arbitrary spending function such that Proof. Let (A+ s(α(A+ p for each k ≥ 0. Instead, we prove the following two statements simultaneously by induction on k: p , p)) ≥ p. By Definition 5, it suffices to show that Ak s ∩ A0 ⊆ A+ (cid:40) s ∩ A0 ⊆ A+ Ak p , p , p) /∈ Ak β(A+ s . s. Thus, a ∈ A by Definition 4. Hence, (cid:96) A(cid:3)p a p by Definition 14. Assume now that p , p) ∈ A ⊆ A0 by Definition 4 and Definition 15, p , p) /∈ A0 by the choice of α((cid:96)) and β((cid:96)). Base Case: Suppose that a ∈ A0 by Reflexivity axiom. Therefore, a ∈ A+ β(A+ which is a contradiction with β(A+ s. Thus, β(A+ p , p) ∈ A0 Induction Step: Assume that(cid:40) (cid:40) We need to show that s ∩ A0 ⊆ A+ Ak p , p , p) /∈ Ak β(A+ s . To prove the first statement, suppose that there is a ∈ A0 such that a ∈ Ak+1 p . Note that a /∈ Ak A+ s s by the induction hypothesis. Thus, by Definition 4, \ (14) s Ak+1 β(A+ s ∩ A0 ⊆ A+ p , p , p) /∈ Ak+1 . (cid:88) b∈Ak s λ(a) · s(a) + w(b, a) ≥ θ(a). Hence, by Definition 18 and Definition 19, w(b, a) ≥ {(A+ 0 · s(a) + q , q) ∈ L a ∈ A0 \ A+ q }. (cid:88) b∈Ak s Therefore, by Definition 17, (cid:88) (cid:96)∈{(A+ q ,q)∈L a∈A0\A+ q ,β((cid:96))∈Ak s} Hence, again by Definition 17,(cid:88) (cid:96)∈{(A+ q ,q)∈L a∈A0\A+ q ,β((cid:96))∈Ak s} w(β((cid:96)), a) ≥ {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. 1 ≥ {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. Thus, {(A+ q , q) ∈ L a ∈ A0 \ A+ q , β((cid:96)) ∈ Ak s} ≥ {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. 27 q , β((cid:96)) ∈ Ak s} ⊆ {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. At the same time, {(A+ q , q) ∈ L a ∈ A0 \ A+ Then it must be the case that q , q) ∈ L a ∈ A0 \ A+ {(A+ q , β((cid:96)) ∈ Ak s} = {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. Hence, β((cid:96)) ∈ Ak β(A+ s for all (cid:96) ∈ {(A+ q , q) ∈ L a ∈ A0 \ A+ q }. p , p) ∈ Ak To prove the second statement from (14), suppose that β(A+ In particular, p , p) ∈ Ak+1 . s due to the induction hypothesis. Thus, by Definition 4, s , which is a contradiction to the induction hypothesis. p , p) /∈ Ak p , p)) · s(β(A+ p , p)) ≥ θ(β(A+ w(b, β(A+ p , p)) + λ(β(A+ p , p)). Note that β(A+ s (cid:88) (cid:88) b∈Ak s b∈Ak s Hence, by Definition 18 and Definition 19, 0 · s(β(A+ p , p)) + w(b, β(A+ p , p)) ≥ 1. Thus, there must exist at least one b ∈ Ak Definition 17 and Lemma 34, this implies that b ∈ A0 \ A+ diction to the first part of the induction hypothesis, i.e. Ak s such that w(b, β(A+ p , p)) > 0. By p , which is a contra- s ∩ A0 ⊆ A+ (cid:2) p . s . The latter, by Lemma 32, implies that B∗ Thus, by Lemma 31, there exists (A+ p , p) /∈ B∗ Lemma 36 For each B, C ⊆ A0 and each q ∈ P , if B (cid:3)q C ∈ X, then N (cid:15) B (cid:3)q C. Proof. Consider any spending function s such that (cid:107)s(cid:107) ≤ q. By Definition 13, it s . Suppose that there is c0 ∈ C such that c0 /∈ B∗ suffices to show that C ⊆ B∗ s . p and p ) = ∅. β(A+ s ∩ A0 ⊆ A+ Hence, (B∗ by Definition 4 and Definition 5. We next consider the following two cases: Case I: p ≤ q. In this case, assumption B (cid:3)q C ∈ X, by Monotonicity axiom, implies that X (cid:96) B (cid:3)p C. At the same time, by Reflexivity axiom, B ⊆ A+ implies that (cid:96) A+ p (cid:3)p C by Transitivity axiom. Again by Reflexivity axiom, we have (cid:96) C (cid:3)p c0. Hence, X (cid:96) A+ p (cid:3)p c0 by Transitivity axiom. Thus, X (cid:96) A (cid:3)p c0 by Lemma 30 and Transitivity axiom. Therefore, c0 ∈ A+ p , which is a contradiction with the choice of set A. Case II: p > q. Then, p − ε > q by the choice of ε. Hence, p , p) ∈ L such that c0 /∈ A+ s ∩ (A0 \ A+ p (cid:3)p B. Thus, X (cid:96) A+ p . Thus, B ⊆ B∗ p = ∅. Then, B∗ s ∩ A0 ⊆ A+ s ∩ A0) \ A+ p p s(α(A+ p , p)) ≤ (cid:107)s(cid:107) ≤ q < p − ε. Therefore, β(A+ of set A. p , p) ∈ B∗ s by Lemma 33, which is a contradiction with the choice (cid:2) 28 X. Lemma 37 For each B, C ⊆ A0 and each q ∈ P , if N (cid:15) B(cid:3)q C, then B(cid:3)q C ∈ Proof. Suppose that B (cid:3)q C /∈ X. Thus, by Lemma 25 and the maximality of set X, there is c0 ∈ C such that X (cid:48) B(cid:3)q c0. Hence, c0 /∈ B+ Consider spending function s such that q by Definition 14. (cid:40) s(a) = if a = α(B+ q, 0, otherwise. q , q), Note that (cid:107)s(cid:107) = q. Thus, C ⊆ B∗ Hence, c0 ∈ B∗ c0 ∈ C ⊆ A0. s . This together with c0 /∈ B+ s by the assumption N (cid:15) B(cid:3)q C of the lemma. q contradicts with Lemma 35 and (cid:2) Lemma 38 ψ ∈ X iff N (cid:15) ψ, for each ψ ∈ Φ(A0). Proof. We prove the lemma by induction on the structural complexity of formula ψ. The base case follows from Lemma 36 and Lemma 37. The induction step follows from Definition 13 and maximality and consistency of set X in the (cid:2) standard way. To finish the proof of Theorem 4 note that ¬ϕ ∈ X due to the choice of the set X. Thus, ϕ /∈ X due to consistency of set X. Therefore, N (cid:50) ϕ by Lemma 38. 5 Conclusion In this paper we have suggested a way of adding marketing to the standard threshold model of diffusion in social networks. The model is general enough to simulate both promotional and preventive marketing. We have also defined formal logical systems for reasoning about influence relation in social networks with marketing of these two types. Both systems are based on Armstrong's axioms from the database theory. The main technical results of the paper are the completeness theorems for these two systems. A possible extension of this work is an analysis of the computational complexity of this model. References [1] Krzysztof R Apt and Evangelos Markakis. Social networks with competing products. Fundamenta Informaticae, 129(3):225 -- 250, 2014. [2] W. W. Armstrong. Dependency structures of data base relationships. In Information processing 74 (Proc. IFIP Congress, Stockholm, 1974), pages 580 -- 583. North-Holland, Amsterdam, 1974. [3] Sanaz Azimipour and Pavel Naumov. Lighthouse principle for diffusion in social networks. arXiv preprint arXiv:1601.04098, 2016. 29 [4] Catriel Beeri, Ronald Fagin, and John H. Howard. A complete axiomatiza- tion for functional and multivalued dependencies in database relations. In SIGMOD '77: Proceedings of the 1977 ACM SIGMOD international con- ference on Management of data, pages 47 -- 61, New York, NY, USA, 1977. ACM. [5] Hector Garcia-Molina, Jeffrey Ullman, and Jennifer Widom. Database Sys- tems: The Complete Book. Prentice-Hall, second edition, 2009. [6] Mark Granovetter. Threshold models of collective behavior. American journal of sociology, pages 1420 -- 1443, 1978. [7] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data min- ing, pages 137 -- 146. ACM, 2003. [8] David Kempe, Jon Kleinberg, and ´Eva Tardos. Influential nodes in a diffu- sion model for social networks. In Automata, languages and programming, pages 1127 -- 1138. Springer, 2005. [9] Michael W Macy. Chains of cooperation: Threshold effects in collective action. American Sociological Review, pages 730 -- 747, 1991. [10] Pavel Naumov and Brittany Nicholls. Rationally functional dependence. Journal of Philosophical Logic, 43(2-3):603 -- 616, 2014. [11] Pavel Naumov and Jia Tao. The budget-constrained functional dependency. arXiv preprint arXiv:1507.05964, 2015. [12] Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. Prediction of in- formation diffusion probabilities for independent cascade model. In Ignac Lovrek, Robert J. Howlett, and Lakhmi C. Jain, editors, Knowledge-Based Intelligent Information and Engineering Systems, volume 5179 of Lecture Notes in Computer Science, pages 67 -- 75. Springer Berlin Heidelberg, 2008. [13] Thomas Schelling. Micromotives and Macrobehavior. Norton, 1978. [14] Jouko Vaananen. Dependence logic: A new approach to independence friendly logic, volume 70. Cambridge University Press, 2007. [15] Jouko Vaananen. The logic of approximate dependence. arXiv preprint arXiv:1408.4437, 2014. [16] Thomas W Valente. Social network thresholds in the diffusion of innova- tions. Social networks, 18(1):69 -- 89, 1996. 30
1903.02650
2
1903
2019-08-12T16:59:13
Learning Graphs from Noisy Epidemic Cascades
[ "cs.SI", "cs.LG", "stat.ML" ]
We consider the problem of learning the weighted edges of a graph by observing the noisy times of infection for multiple epidemic cascades on this graph. Past work has considered this problem when the cascade information, i.e., infection times, are known exactly. Though the noisy setting is well motivated by many epidemic processes (e.g., most human epidemics), to the best of our knowledge, very little is known about when it is solvable. Previous work on the no-noise setting critically uses the ordering information. If noise can reverse this -- a node's reported (noisy) infection time comes after the reported infection time of some node it infected -- then we are unable to see how previous results can be extended. We therefore tackle two versions of the noisy setting: the limited-noise setting, where we know noisy times of infections, and the extreme-noise setting, in which we only know whether or not a node was infected. We provide a polynomial time algorithm for recovering the structure of bidirectional trees in the extreme-noise setting, and show our algorithm almost matches lower bounds established in the no-noise setting, and hence is optimal up to log-factors. We extend our results for general degree-bounded graphs, where again we show that our (poly-time) algorithm can recover the structure of the graph with optimal sample complexity. We also provide the first efficient algorithm to learn the weights of the bidirectional tree in the limited-noise setting. Finally, we give a polynomial time algorithm for learning the weights of general bounded-degree graphs in the limited-noise setting. This algorithm extends to general graphs (at the price of exponential running time), proving the problem is solvable in the general case. All our algorithms work for any noise distribution, without any restriction on the variance.
cs.SI
cs
Learning Graphs from Noisy Epidemic Cascades Jessica Hoffmann, Constantine Caramanis August 13, 2019 Abstract We consider the problem of learning the weighted edges of a graph by observing the noisy times of infection for multiple epidemic cascades on this graph. Past work has considered this problem when the cascade information, i.e., infection times, are known exactly. Though the noisy setting is well motivated by many epidemic processes (e.g., most human epidemics), to the best of our knowledge, very little is known about when it is solvable. Previous work on the no-noise setting critically uses the ordering information. If noise can reverse this -- a node's reported (noisy) infection time comes after the reported infection time of some node it infected -- then we are unable to see how previous results can be extended. We therefore tackle two versions of the noisy setting: the limited-noise setting, where we know noisy times of infections, and the extreme-noise setting, in which we only know whether or not a node was infected. We provide a polynomial time algorithm for recovering the structure of bidirectional trees in the extreme-noise setting, and show our algorithm almost matches lower bounds established in the no-noise setting, and hence is optimal up to log-factors. We extend our results for general degree-bounded graphs, where again we show that our (poly-time) algorithm can recover the structure of the graph with optimal sample complexity. We also provide the first efficient algorithm to learn the weights of the bidirectional tree in the limited-noise setting. Finally, we give a polynomial time algorithm for learning the weights of general bounded-degree graphs in the limited-noise setting. This algorithm extends to general graphs (at the price of exponential running time), proving the problem is solvable in the general case. All our algorithms work for any noise distribution, without any restriction on the variance. 1 Introduction Epidemic models accurately represent (among other processes) the spread of diseases, information (ru- mors, viral videos, news stories, etc.), the spread of malevolent agents in a network (computer viruses, malicious apps, etc.), or even biological processes (pathways in cell signaling networks, chains of activation in the gene regulatory network, etc.). We focus on epidemics that spread on an underlying graph [30], as opposed to the fully mixed models introduced in the early literature [4]. Most settings assume we know the underlying graph and aim to study properties of the spread. Much work has been done in detection [2, 3, 27, 26, 25, 24, 21], where the goal is to decide whether or not there is indeed an infection. This problem is of importance in deciding whether or not a computer network is under attack, for instance, or whether a product gets sold through word-of-mouth or thanks to the advertisement campaign (or both [28]). More specifically, the problem of source detection [32, 33, 31, 34, 35] or obfuscation [11, 13, 12] has been extensively studied. On the other side of the spectrum, both experimental and theoretical work has tackled the problem of modeling [7, 36, 17], predicting the growth [6, 38], and controlling the spread of epidemics [9, 10, 18, 14]. In this work, we take the opposite approach: assuming we know some properties of the spread, can we recover the underlying graph? The early works on this subject proposed a few heuristics and experimentally proved their effectiveness [16, 19]. Netrapalli et al. [29] established the first theoretical guarantees for this problem for discrete-time infections. They proved one can recover the edges of any graph with correlation decay, with access to the times of infection for multiple cascades spreading on the graph. They introduced a likelihood, proved it decouples into convex subproblems, and demonstrated 1 Table 1: Notations G = (V, E) N T m i nm i (cid:48)m i = T m i + nm T i I m i pij Graph G, V set of nodes, E set of edges. Number of nodes in the graph. Random variable for the actual time of infection of node i during cascade m. Noise of node i during cascade m. Random variable for the noisy time of infection of node i during cascade m. Random boolean variable. (I Weight of edge (i, j), corresponding to the probability that i infects j. i = T rue ⇔ node i was infected during cascade m). (cid:48)m that the edges of the graph can therefore be obtained efficiently. They also proved a sample complexity lower bound and showed their method is within a log factor of it. Abrahao et al. [1] also introduced a method of solving this problem, this time for a more realistic, continuous-time infection model, through learning only the first edge of each cascade. Zarezade et al. [37] proposed a first experimental attempt to tackle the case of correlated cascades using Hawkes processes. Khim et al. [22] extended the theoretical results to the case where the the cascades spreading on the graph are not independent, which required completely new machinery involving martingales and weighted P´olya urns. All the results above assume we have perfect knowledge of the properties of the spread we use to reconstruct the graph. For most of the literature, those are the times of infection for all nodes for each cascade. This assumption may hold for online epidemics, as information is usually dated (for instance, posts or retweets on social networks have time stamps). For human networks, however, this assumption is often unrealistic: official diagnosis (and hence recording by any tracking entity such as the CDC) may come days, weeks, or in important examples such as HIV, years after the actual moment of infection. Moreover, this can be highly variable from person to person, hence the infector is often diagnosed after the infectee. Similar issues arise with biological networks: we only know the expression of a gene when a measure is taken, which can happen after a typically arbitrary delay. We therefore develop a method for learning the graph of epidemics with noisy times of infection. We demonstrate that past approaches are unusable, due to the fact that even small levels of noise are typically enough to cause order-of-diagnosis to differ from order-of-infection. We develop new techniques to deal with this setting, and prove our algorithm can reliably learn the edges of a tree in the limited-noise setting, for any noise distribution. We also show we can learn the structure of any bounded degree graph from a very weak observation model, in an sample-optimal fashion (up to log-factors). We finally provide an algorithm which learns the weights of any bounded-degree graph in the limited-noise setting. 1.1 Model We observe epidemics spreading on a graph, and aim to reconstruct the graph structure from noisy estimates of the times of infection. In this section, we specify the exact propagation model, the noisy observation model, and the two learning tasks this work tackles. Propagation model: We consider a particular variant of the independent cascade model, close to the one-step model introduced by [15] and further studied by [20]. The epidemic spreads in discrete time on a weighted directed graph G = (V, E), where parents can infect their children with probability equal to the weight of the edge between them, but children cannot infect their parents. We allow bidirectional edges: it is possible that both (i, j) ∈ E and (j, i) ∈ E, possibly with different weights. For each edge (i, j) ∈ E, the corresponding weight pij is such that 0 < pmin ≤ pij ≤ pmax < 1. This process is an instance of a Susceptible → Inf ected → Removed (SIR) process. Each node starts out in the susceptible state. As in [1], each cascade m starts at a positive time 1 on a unique node source node, picked uniformly among the nodes of the graph. Once the source becomes infected, it is removed 1Most of the literature considers the initial time of infection to be 0. This is because when we have access to the exact times of infection, we can make this assumption without loss of generality. In our case, it would imply we know exactly when an outbreak started, which is usually not the case. 2 (a) At t=0, node 1 is the source, in the in- fected state. It can pos- sibly infect node 2, 3 and 4, all in the suscep- tible state. (b) At t=1, nodes 3 and 4 are infected. Node 3 can infect node 5, in the susceptible state. Node 4 can infect node 2, in the susceptible state, but not node 1, since node 1 is now removed. (c) At t=2, node 2 is infected. All its neigh- bors are in the removed state, so new node can be infected. (d) At t=3, the cascade stops, even if node 5 re- mains in the susceptible state. Figure 1: A complete cascade. from the graph, and if it has children, each is infected at the next time step independently according to a probability specified by the weight of the edge shared with the source. The process ends when there are no newly infected nodes (either because no infection happened during the previous time step, in which case some nodes may never be infected, or because all the nodes of the graph are removed). One realization of this process from start to finish is called a cascade. If two nodes are infected during the same cascade, we say that they are co-infected for this cascade. This process is illustrated in Figure 1. Observation model: Let T m during cascade m, and let tm have tm i = ∞). We introduce three observation models. i be a random variable corresponding to the time of infection of node i i be its realization (if i stays in the susceptible state during cascade m, we In the no-noise setting, we have access to the exact times of infection T m In the limited-noise setting, we never get to observe the exact times of infection T m . i (cid:48)m i = T m noisy version T added to the T m i that it cannot have infinite value (i.e., t been infected or not). . We assume nm i i + nm i (with realization t , but only a i are i.i.d., and represent the noise follows a known distribution D. The only restriction we put on D is i = ∞, and we know for a fact when nodes have (cid:48)m i ), where all the nm i = ∞ ⇔ tm (cid:48)m i i . We know I m i < ∞ ⇔ I m (cid:48)m i = T rue if i was infected during cascade m, and I m In the extreme-noise setting, we take the previous setting to the extreme, and we assume that (cid:48)m , we only have access to the infection status instead of having access to the noisy times of infection T i of the nodes I m i = F alse otherwise. Note that T i = T rue, so we can always deduce the infection status from the noisy times of infection. However, we cannot guess the noisy times of infection from the infection status: the (noisy) times of infections contain strictly more information than the infection status. the no-noise setting, this is the extended-integer vector {tm extended-integer vector {t the realization of {I m i }i∈V . We also use the notation T (cid:48) = {T for the matrix representing the random variable (respectively the realizations) of all the samples. In i }i∈V . In the limited-noise setting, this is the i }i∈V . In the extreme-noise setting, this is the boolean vector corresponding to (cid:48)m i }m=1...M (cid:48)m ) For these three settings, we call a sample the vector of all observations for the cascade m. (respectively t(cid:48) = {t i∈V i }m=1...M (cid:48)m i∈V Learning tasks: We focus on two different learning tasks. When we learn the structure of a graph, it means that for any two nodes i and j, we can decide whether or not there exists an edge between these two nodes (whatever its direction). When we learn the weights of the graph, it means that for every two nodes i and j, we learn the exact value2 of both pij and pji up to precision . 2When (i, j) /∈ E, we have pij = 0. 3 Figure 2: Possible scenarios which could have led to T this implies Ti = 2, Tj = 3, Tk = 4, and there is only one possible infection pattern. (cid:48) k = 4. In the no-noise setting, (cid:48) i = 2, T (cid:48) j = 3 and T 1.2 Why is it a hard problem? 1.2.1 Counting approaches Most approaches in the no-noise setting relate to counting. In our setting, for instance, a natural (and consistent) estimator for pij is to count how often an infection occurred along an edge, and divide it by how often such an infection could have happened: pij = Number of times j becomes infected one time step after i Number of times i was infected before j . In the no-noise setting, j could only have been infected by a node signaling exactly one time step before j. However, in the limited-noise setting, j signaling its infection one time step after i could stem from a variety of scenarios: • i could have indeed infected j: cases a), b) and c) of Figure ?? above. • j could have infected i, but the noise flipped the order of signaling: cases d), e) and f). • No infection happen between i and j, and the probability of infectin depends mainly on another node k: cases g), e) and f). This could happen for any other node k in the graph. The natural estimator introduced earlier is therefore not consistent anymore; instead, it tends to a quantity which depends on pij, but also pji, and pik, pki, pjk, pkj as well, for all the other nodes k in the graph. By counting the number of times j became infected one time step after i, we are not counting the number of infections along the edge (i, j) anymore, but instead a mixture of all the scenarios described above, which not only include the cases where j infected i, but also events in which the cascade spread through another node k, and the edge (i, j) was irrelevant to the process. Using this estimator, or any obvious (to us) extension of it, would not only imply learning the wrong weights for the edges, but also learning edges when there are no edges. Our first contribution is therefore to design a new set of estimators, from which we can deduce the value of pij (Sections 2.3 and 3.2). Adding noise in the time of infection not only reverses the cascade chronology, it also exponentially increased the number of possible infection patterns that could have happened. Bounding the realm of possibilities is therefore our second step towards solving the problem (Section 2.1). 1.2.2 Max-likelihood approaches Another common approach is to use likelihood-based methods. For instance, in [29], the authors develop a max-likelihood-based approach to learn the edges of the graph. They prove the log-likelihood has it decouples into only one local problem for each node, and this local problem is desirable properties: 4 (a) T n 2 0 1 2 2 2 (d) T n 1 1 0 3 2 2 (g) T n 2 0 1 2 1 3 i j k i j k i j k (b) T n 2 0 1 2 3 1 (e) T n 1 1 0 3 3 1 (h) T n 1 1 2 1 0 4 i j k i j k i j k (c) T n 1 1 2 1 4 0 (f) T n 0 2 1 2 4 0 (i) T n 0 2 3 0 1 3 i j k i j k i j k (cid:48) Figure 3: Possible scenarios which could have led to T l = Tl + nl. In the limited-noise setting, there are nine possible infection patterns (many more scenarios with the same infection pattern, but different noise values, are not shown). (cid:48) k = 4. We have T (cid:48) i = 2, T (cid:48) j = 3 and T 5 convex (up to the change of variable θij = − log(1 − pij)):  1 N (cid:18) 1 N (1 − pji) ·  (cid:89) (cid:124) (cid:88) j;tj <ti−1 (cid:123)(cid:122) 1≤i≤N · (cid:89) (cid:19) N(cid:88) + i=1 j;tj <ti−1 Probability that i was not infected before t(cid:48) i. log(1 − pji) +  (cid:125)   (cid:125) (1 − pji) 1 − (cid:89) (cid:124) (cid:123)(cid:122) (cid:88) j;tj =ti−1 j;t(cid:48) j =t(cid:48) i−1 Probability that i was infected at t(cid:48) i. log(1 − pji) L(T, Pij) = log L(T, Pij) = log In our setting, the log-likelihood has none of these properties. It is not convex, and it is unclear any method other than brute force could find its maximum. Moreover, it does not decouple anymore, and even computing the log-likelihood itself takes exponential time. (t1,...,tN )≤(t(cid:48) 1−1,...,t(cid:48) N−1) · N  1 (cid:124)  (cid:89) (cid:124) (cid:19) (cid:18) 1 · + log N j;tj <ti−1 (cid:88) (cid:123)(cid:122) This is the root of the difficulty. · (1 − pji)  (cid:125) (cid:123)(cid:122)  (cid:88) n(t(cid:48) Noise at node i − ti. i is t(cid:48) 1≤i≤N · (cid:89) (cid:32) (cid:124) (cid:125) 1 − (cid:89) (cid:123)(cid:122) (cid:124) (cid:89) j;tj =ti−1 (cid:33) i − ti) (cid:125) (cid:123)(cid:122)   (cid:125)  (cid:89) (1 − pji) L(T, Pij) = log = log Probability that i was not infected before t(cid:48) i. Probability that i was infected at t(cid:48) i. (t1,...,tN )≤ 1−1,...,t(cid:48) (t(cid:48) N−1) 1≤i≤N n(t(cid:48) i − ti) (1 − pji) j;tj <ti−1  · 1 − (cid:89) j;tj =ti−1 (1 − pji)   When dealing with hidden variables, a common technique would be to use the Expectation-Maximization t(cid:48) algorithm [8]. However, in our setting, the number of hidden states is i, which can be as large as (N − 1)N . This prohibits any realistic use of the Expectation-Maximization algorithm for networks with more than twelve nodes. Moreover, except for the recent contributions [23], very little is known about the theoretical convergence of the Expectation-Maximization algorithm. i=1 N(cid:89) 1.3 Contributions The contributions of this article are multiple: • To the best of our knowledge, we are the first to tackle the problem of learning the edges of a graph from noisy times of infection, a simple but natural extension of a well-known problem. • We provide the first efficient algorithm for learning the structure and weights of a bidirectional tree in this setting. We also establish a tree-specific lower bound which shows that our algorithm is sample-optimal (up to log-factors) for learning the structure of the tree (Section 2). 6 • We prove it is possible to learn the structure of any bounded-degree graph in the extreme setting for which we only have access to the infection status (i.e., whether or not a node was infected). Moreover, we can do so with almost optimal sample complexity, according to the bound established in [29]. • We provide polynomial algorithms for learning the weights of bounded degree graphs. • Finally, we extend the results from bounded-degree graphs to general graphs. This proves the problem is solvable under any noise distribution, although the exponential sample complexity and running time prohibits any use of this algorithm in practice (Section 3.2). 2 Learning bidirectional trees The bidirectional tree is the simplest example which illustrates some of the difficulties of the noisy setting. Indeed, for a directed tree, the true sequence of infections can be reconstructed, and we can use techniques from the no-noise setting. For a bidirectional tree, those techniques cannot be extended. However, the uniqueness of paths in the bidirectional tree still makes this problem considerably easier than the general setting. We therefore start by presenting a solution for the bidirectional tree. The key ideas here generalize to the neighborhood-based decomposition we introduce below, which forms our key conceptual approach for the general problem. This section contains three contributions. First, we show how to learn the structure of a tree using only the infection status, i.e., what we call the extreme-noise setting (Section 2.1). For each cascade, we only know which nodes were infected. We show this contains enough information to learn the structure of bidirectional tree. Second, we establish a lower bound for the no-noise setting, and show our algorithm has the same dependency in the number of nodes N as this lower bound (up to log-factors). In other words, for the task of learning the structure of any tree, an optimal algorithm in the no-noise setting would need as many cascades as our algorithm needs in the extreme-noise setting (up to log-factors). Finally, we show how we can leverage this learned structure to learn the weights of the tree, this time when we have noisy access to the times of infection, i.e., the limited-noise setting (Section 2.3). We provide sample complexity for this task. 2.1 Tree structure As illustrated in Section 1.2, the number of edges that could exist is much higher in the limited-noise setting than the number of actual edges in the tree. Our first key contribution is therefore to introduce a new estimator, hij, which keeps track of the fraction of cascades for which i and j were both infected. This estimator can therefore be computed only with the infection status in the extreme-noise setting. Using this estimator, we show that in the specific case where the graph is a tree, we learn the structure of this tree, i.e. whether or not both pij = pij = 0. Our algorithm for learning the edges of the tree relies on one central observation: hi,j achieves a kind of local maximum if there is an edge between i and j (Lemma 1). This observation relies heavily on the fact that there is uniqueness of paths on a tree. Let us now dive into the proof. Definition 1. Let hi,j be the fraction of cascades in which both i and j became infected. We have: hi,j →M→∞ P(I m i & I m j ) := hi,j. We now show that the limit hi,j of the estimator hi,j satisfies a local maximum property on the edges of the tree: Lemma 1. If i and j are not neighbors, let (u0, u1, . . . , ud) be the path between them, with u0 = i, ud = j, and d > 1. Then: ∀r ∈ {0, d − 1}, hi,j < hur,ur+1. 7 Proof. We consider the case in which both i and j have been infected. There is a unique source of infection and a unique path between i and j. Therefore, all the nodes on the path from i to j must have been infected as well. In particular, both ur and ur+1 were infected. This shows I m , so P(I m ), and therefore hi,j ≤ hur,ur+1. j ) ≤ P(I m j ⇒ I m i & I m i & I m & I m ur+1 & I m ur+1 ur What's more, every time ur and ur+1 became infected, at least one more infection along an edge must have occurred in order for j to become infected as well. This occurred with probability at most pmax < 1. Therefore, hi,j = P(I m ) = pmax · hur,ur+1. We conclude hi,j < hur,ur+1. j ) ≤ pmax · P(I m i & I m & I m ur+1 ur ur This simple lemma allows us to design Algorithm 1. Indeed, suppose we have access to all the limits hi,j. By ordering them in decreasing order, we can deduce the structure of the tree by greedily adding every edge unless it forms a cycle3. Algorithm 1 Learn the undirected edges of the tree. 1: procedure LearnTree({hi,j}i,j∈V ) pairs h edge ← [(hi,j, (i, j)) for 1 ≤ i ≤ j ≤ nnodes] Sort(pairs h edge) by decreasing order edges tree ← [] for (∼ , potential edge) ∈ pairs h edge do 2: 3: 4: 5: 6: 7: if Adding potential edge to edges tree does not create a cycle then Add potential edge to edges tree return edges tree (cid:46) hi,j limit of hi,j. We show that if we have access to the limits hi,j of the estimators hi,j, the algorithm above correctly find the structure of the tree. Lemma 2. Algorithm 1 correctly finds all the N − 1 pairs (i, j) such that there exists at least one directed edge between i and j. Proof. We show that in the for-loop at line 5, we add an edge to edges tree if and only if this edge was a real edge in the original tree. We prove it by induction on the elements of the sorted list pairs h edge. Suppose now that t elements of pairs h edge have been examined so far. Let (∼, (i, j)) be the t + 1th element. Two cases arise: When no element has been selected, the proposition is trivially true. 1. i and j are not neighbors. Let (u0, . . . , ud) be the path between them, with u0 = i and ud = j. In this case, using Lemma 1, ∀r, hur,ur+1 > hi,j. In other words, all the pairs (ur, ur+1) have already been considered by the algorithm. By induction, we have kept all of them in edges tree. Therefore, adding the pair (i, j) would form a cycle. This pair is not kept in edges tree, which is what we wanted since it is not an edge in the original tree. 2. i and j are neighbors. Suppose that adding this pair forms a cycle. Then there is a sequence (v0 = i, . . . , vd = j) of nodes such that hvk,vk+1 were all bigger than hi,j, and the pairs (vk, vk+1) were kept by the algorithm for all k. However, by uniqueness of paths in a tree, there exists a pair (va, va+1) such that the path connecting va and va+1 in the original tree goes through (i, j). Using Lemma 1, this means hi,j > hva,va+1 , which is a contradiction. Therefore, adding this pair in edges tree does not form a cycle. This pair is kept in edges tree. Therefore, this algorithm keeps all the edges, and only the edges of the tree, so it recovers the tree structure. 3This algorithm is very similar in spirit to Kruskal's algorithm for finding the maximum spanning tree [] 8 We next quantify how many cascades M are needed for Algorithm 1 to be correct if we replace the {hi,j}i,j∈V by their estimates {hi,j}i,j∈V . We note that we do not require hi,j to be close to their limit, but only need the order of the hi,j to be the same as the order of the hi,j. We identify events which guarantee that the order is the same (Corollary 1): Definition 2. Let H3 := {(i, j, k) ∈ {1, . . . , N}3, pij + pji > 0 & pjk + pjk > 0} be the set of triplets of nodes such that at least one directed edge exists between the first and the second node, as well as between the second and the third node. Proposition 1. If: ∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k, then for all paths (u0, . . . , ud) in the tree, with d > 1, we have: ∀r ∈ {0, . . . , d − 1}, hur,ur+1 > hu0,ud . Proof. For r ∈ {0, . . . , d − 2}, we have by hypothesis hur,ur+1 > hur,ur+2 . Now, we recall that hu0,ud is the number of cascades for which both u0 and ud were infected. By uniqueness of paths in the tree, every time both u0 and ud were infected, both ur and ur+2 must have been infected as well. This shows that hu0,ud ≤ hur,ur+2. Notice that this is a deterministic property, not an asymptotic property. Therefore, hur,ur+1 > hur,ur+2 ≥ hu0,ud . For r = d − 1, we follow an identical reasoning, but with hur,ur+1 > hur−1,ur+1. Corollary 1. If: ∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k, then the correctness of Algorithm 1 is preserved when given h as input instead of h. In other words, Algorithm 1 outputs a correct set of undirected edges with finite samples. Proof. According to Proposition 1, for all paths (u0, . . . , ud) in the tree, with d > 1, we have that ∀r ∈ {0, . . . , d − 1}, hur,ur+1 > hu0,ud . As shown in the proof of Lemma 2, this is the only property of the input needed in order to yield the correct output. Proposition 2. With M = N(log( 1 δ )+2 log(N )) cascades, with probability at least 1 − δ, we have: pmin(1−pmax) ∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k. Proof. Let us consider one triplet (i, j, k) in H3. We recall that hi,k is the number of cascades for which both i and k were infected. Since the only path from i to k is through j, we always have that hi,j ≥ hi,k and hj,k ≥ hi,k. We notice that to obtain hi,j > hi,k, we only need one cascade for which both i and j got infected, but not k. We lower bound the probability Ptriplet identified of this cascade happening. For each cascade m, we have: Ptriplet identified = P(I m i & I m j & Not(I m k )) ≥ P(i was a source, i infected j, j did not infect k) + P(j was a source, j infected i, j did not infect k) The probability that this event never occurs during the M cascades is upper bounded by: P(hi,j = hi,k) ≤ 1 − 1 N pmin(1 − pmax) (cid:19)M ≥ 1 N ≥ 1 N · pij · (1 − pjk) + pmin(1 − pmax). 1 N · pji · (1 − pjk) (cid:18) 9 Now, there are N − 1 edges in a tree, therefore H3 ≤ (N − 1)2 < N 2. By union bound: N pmin(1−pmax) ≤ e− M ≤ δ N 2 .  ≤ (cid:88) (i,j,k) ∈ H3)  (cid:91) P (i,j,k) ∈ H3 hi,j = hi,k P(hi,j = hi,k) < N 2 · δ N 2 ≤ δ. Notice that H3 contains both (i, j, k) and (k, j, i). We have therefore proven that with probability at least 1 − δ, when considering M = cascades, we have ∀(i, j, k) ∈ H3, hi,j > hi,k and hj,k > hi,k. pmin(1−pmax) δ )+2 log(N )) N(log( 1 Putting together Proposition 2 and Corollary 1, we obtain our first theorem for learning the undirected edges with finite samples: cascades, with probability at least 1 − δ, we can learn the Theorem 1. With M = structure of a any bidirectional tree in the extreme-noise setting, i.e., when we only have access to the infection status of the nodes. pmin(1−pmax) δ )+2 log(N )) N(log( 1 2.2 Lower bound In this section, we prove a lower bound for trees in the no-noise setting. With very minor adjustments, we adapt the lower bound of [29]. Since for a general tree, the max degree can be up to N − 1, we design a lower bound which is independent from the max-degree. Let G be a tree drawn uniformly from G, the set of all possible trees on N nodes, and G be the reconstructed graph from the times of infection. G ↔ T ↔ G therefore forms a Markov chain. We have: H(G) = I(G; G) + H(G G) (data processing inequality) ≤ I(G; T ) + H(G G) (independent cascades) ≤ M · I(T 1; T (I(X, Y ) ≤ H(X)) = M · N(cid:88) (Fano's inequality) ≤ M · N(cid:88) i=1 H(T 1 (cid:48)1) + H(G G) i ) + H(G G) H(T 1 i ) + (1 + Pe log(G)) i=1 Since G is drawn uniformly from G, H(G) = log(G). There are N N−2 trees on N nodes, according to Cayley's formula [5], so H(G) = (N − 2) · log(N ). In conclusion: M ≥ (1 − Pe)(N − 2) log(N ) − 1 N · H(T 1 i ) = Ω Using the same kind of techniques as in [29], we can assume H(T 1 (cid:18) log(N ) (cid:19) H(T 1 i ) i ) ∼ log(N ) N . Therefore: Theorem 2. In the no-noise setting, we need M = Ω (N ) cascades to learn the tree structure. In our extreme-noise setting, when we have only access to the infection status of the nodes, we can learn the tree structure with the same sample complexity (up to log-factors) as the no-noise setting! 10 2.3 Tree weights In this section, we assume we are in the limited-noise setting, and we have access to the times of infection. We also assume we have already learned the structure of the tree. (cid:48)m and T j Once we have reduced the set of possible edges by learning the structure of the bidirectional tree, (cid:48)m learning the weights of the edges is still non-trivial. Indeed, from T , it is still impossible to i know whether this sample is useful for estimating pij (case when i infected j), or whether we should use this sample for estimating pji instead (case when j infected i). What is more, we only get one sample per node and per cascade, so it is impossible to know what really happened during that cascade. However, knowing the distribution of the noise, it is possible to compute the probability that the noise maintained the order of infections. Using this information and the reduced set of known undirected edges, we can compute two sets of N (N − 1) estimators, from which it is possible to infer the weights of all edges in the tree. We introduce these two sets of N (N − 1) estimators, or, in other words, two estimators for each directed edge. These estimators tend to multivariate polynomials of the weights of most edges of the tree. Thus in general these polynomials have exponentially many terms; however, when i and j are neighbors, it is possible to express them concisely using a quantity PCj(→ i), which we define formally below. This succinct representation is the key idea we exploit to solve the resulting system of equations. Once we know the structure of the bidirectional tree, we can consider the four estimators for each undirected edge (two estimators for each directed edge). They form a system of four equations and four unknowns, which we solve to obtain the weights of the edges. Definition 3. PCi(→ j) is the probability that j became infected before any node on the path from j to i, including i, became infected. We now introduce the estimators: Definition 4. We introduce 2 sets of N (N − 1) estimators: fi<j = Fraction of infections for which i and j got infected, and i reported before j. gi,Cj = Fraction of infections for which i got infected, but j did not. By the law of large numbers, as the number of cascades scales, fi<j tends to fi<j and gi,Cj to gi,Cj, where := P(T := P(T j < ∞), (cid:48)m (cid:48)m i < T i < ∞, T (cid:48)m j = ∞). (cid:48)m fi<j gi,Cj We now compute the exact values of these two quantities. Let us assume the (unique) path between i and j has length d. We call (u0, . . . , ud) the set of nodes on the path from i to j, with u0 = i and ud = j. We then have: Lemma 3. Recall fi<j and gi,Cj are the expectation of the estimators defined above. We have: fi<j = PCj(→ i) · pi→j · s−d+1 + PCi(→ j) · pj→i · sd+1 PCi,Cj(→ ul) · pul→i · pul→j · s2l−d+1. d−1(cid:88) l=1 + gi,Cj = PCj(→ i) · (1 − pi→j) + PCi,Cj(→ ul) · pul→i · (1 − pul→j). d−1(cid:88) l=1 What's more, when i and j are neighbors (which implies d = 1), the expressions simplify to: fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2 gi,Cj = PCj(→ i) · (1 − pij). 11 Proof. fi<j = P(T (cid:48)m i < T j < ∞) (cid:48)m = P(i got infected before any nodes on the path from i to j, then infected j, and the noise did not flip the times of infection) + P(j got infected before any nodes on the path from i to j, then infected i, and the noise flipped the times of infection) + P(One node on the path from i to j got infected before i and j, then infected both i and j, but i reported before j) = PCj(→ i) · pi→j · s−d+1 + PCi(→ j) · pj→i · sd+1 d−1(cid:88) PCi,Cj(→ ul) · pul→i · pul→j · s2l−d+1. + l=1 This expression is involved in general. However, if i and j are neighbors, then there are no nodes ul on the path between i and j, other than i and j themselves. What's more, pi→j = pij, and d = 1. Therefore: fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2. Let us now focus on gi,Cj: i < ∞, T j = ∞) (cid:48)m (cid:48)m gi,Cj = P(T = P(i got infected before any nodes on the path from i to j, but j did not get infected) + P(One node on the path from i to j got infected before i and j, then infected i but not j) = PCj(→ i) · (1 − pi→j) d−1(cid:88) l=1 + PCi,Cj(→ ul) · pul→i · (1 − pul→j). As before, this expression is complex in general, but simplifies if i and j are neighbors, in which case: gi,Cj = PCj(→ i) · (1 − pij). Using the simplified expression only for when i and j are neighbors, we obtain: Proposition 3. If we know (i, j) is an edge in the original tree, then the probability of infection along this edge is given by: pij = gi,Cj · (s2 fi<j · s0 − fj<i · s2 0 − s2 2) + fi<j · s0 − fj<i · s2 . Proof. According to Lemma 3, we had four second-order equations, with 4 unknowns: pij, pji, PCj(→ i) and PCi(→ j). We solve it, and obtain the wanted result. See Appendix A for details. Combining all the pieces, we obtain our first theorem for infinite samples: Theorem 3. It is possible to learn the weights of a bidirectional tree in the limited-noise setting. Now that we have proven the problem is solvable, we establish the number of samples needed to learn the weights with the method above. 12 2 log(cid:0) 6 δ Lemma 4. With M = N 2 have: (cid:1) ((s2 0−s2 2+s0+s2)pmax+s0+s2)2 2)2 0−s2 (s2 pij − pij ≤ . samples, with probability at least 1 − δ, we Proof. Using Hoeffding's inequality: P( fi<j − fi<j > 1) ≤ 2e−2M 2 1, P( fj<i − fj<i > 1) ≤ 2e−2M 2 1, P(gi,Cj − gi,Cj > 1) ≤ 2e−2M 2 1. (cid:1), we have that with probability at least 1 − δ, all the following hold: log(cid:0) 6 δ Choosing M = 1 2 1 fi<j − fi<j ≤ 1, fj<i − fj<i ≤ 1, gi,Cj − gi,Cj ≤ 1. Hence, with probability at least 1 − δ, we have (see Appendix A for details): pij − pij ≤ 1 0 − s2 (s2 gi,Cj · (s2 0 − s2 0 − s2 gi,Cj · (s2 2 + s0 + s2)pmax 2) + fi<j · s0 − fj<i · s2 2) + fi<j · s0 − fj<i · s2 s0 + s2 + 1 + o(1). We use the results from Lemma 3 to bound the denominator by s2 0−s2 N . In the end, we obtain: 2 pij − pij ≤ 1N 0 − s2 (s2 2 + s0 + s2)pmax + s0 + s2 + o(1). 0 − s2 s2 2 2 log(cid:0) 6 δ 0−s2 (s2 (cid:1) ((s2 We choose 1 =  N With M = N 2 pij ≤ . 0−s2 s2 2 . Therefore: 2+s0+s2)pmax+s0+s2 0−s2 2+s0+s2)pmax+s0+s2)2 0−s2 (s2 2)2 samples, with probability at least 1 − δ, we have pij − By a union bound on all the weights of the tree, knowing there are at most 2N (N − 1) < 2N 2 directed edges in a directed tree, we obtain the following sample complexity: cascades, with probability 1 − δ, we Theorem 4. With M = N 2 can learn all the weights of the edges of a bidirectional tree in the limited-noise setting, i.e., when we only have access to the noisy times of infection. 2+s0+s2)pmax+s0+s2)2 0−s2 (s2 2 log 2)2 δ (cid:16) 12N 2 (cid:17) ((s2 0−s2 3 Bounded-degree graphs In the previous section, the algorithm presented relies heavily on the uniqueness of paths. This property implies that we can deduce the edges from the nodes which are co-infected the most often. However, this is not true for a general bounded-degree graph. In Figure 4, we can see that the two nodes i and j would be co-infected frequently despite not sharing an edge. This makes the task of finding the structure much more challenging than for the bidirectional tree. In this section, we show how the main ideas for learning the structure of the bidirectional tree can be extended for learning the structure of general bounded-degree graphs, in the extreme-noise setting, with almost optimal sample complexity. The framework for learning the weights of the edges in the limited-noise setting is - to the best of our knowledge - not extendable to general bounded-degree graphs; we therefore develop a new algorithm to learn the weights for general bounded-degree graphs. 13 Figure 4: Two nodes can be co-infected frequently without sharing an edge. 3.1 Bounded-degree structure In the previous section, we introduced the estimator hi,j, which records the fraction of cascades for which both i and j are infected. From a local maximum property of this estimator, we deduced the structure of the tree, in a sample efficient fashion. Indeed, if there exists a path between i and k, and the first edge on this path is (i, j), then if i and k are infected, j must have been infected as well. We want to build on this idea for a bounded-degree graph of maximum degree d. However, for such a graph, there may be multiple paths leading from i to j, and we cannot guarantee a single node will be infected each time. However, if i is a node, Ni is its neighborhood, and k /∈ Ni is another node of the graph, we can guarantee that if both i and k are infected, there exists a node in Ni which is infected. Moreover, Ni is the set of smallest size for which at least one node is infected at the same time as i the most frequently. This leads us to a new set of estimators: Definition 5. Let i be a node of the graph, and let S be a set such that S < d and i /∈ S. We define a new set of estimators: hi,S = Fraction of cascades for which i is infected, and at least one node of S is infected. Let us assume that for each pair (i, S), we have access to the limit hi,S of hi,S. We now introduce an algorithm showing how to leverage these limits to learn the structure of any bounded-degree graph. Algorithm 2 Learn the undirected edges of any graph of maximum degree d. 1: procedure LearnGraph({hi,S}S≤d i∈V ) edges ← [] for i = 1 . . . nnodes do 2: 3: 4: 5: 6: S max i ← set such that hi,S max i is maximal, and such that Size(S max i) is minimal. for nj in S max i do Add edge (i, nj) to edges return edges We show this algorithm is correct. Lemma 5. Algorithm 2 correctly finds the neighborhood of each node. 14 Proof. Let us recall that hi,S is the probability that node i and at least one node of S are co-infected. To prove the correctness of this algorithm, it suffices to prove: ∀i ∈ V,∀S s.t.S ≤ d, hi,S ≥ hi,Ni =⇒ Ni ⊆ S Let pick a set S such that Ni \ S (cid:54)= ∅, and let k be a node in Ni \ S. We know hi,S∪{k} ≥ hi,S + P(i and k are the only infected nodes). Since i and k are neighbors, P(i and k are the only infected nodes) > 0, and therefore hi,S∪{k} > hi,S. Following this line of reasoning, if Ni \ S (cid:54)= ∅, S we can always increase the value of hi,S by adding a node of Ni. are co-infected, we know one node of Ni is also infected. Therefore, the algorithm is correct. However, it is impossible to increase the value of hi,Ni, because if i and any other node of the graph Unfortunately, we do not have direct access to hi,S. We therefore study how many samples are needed to replace hi,S by its estimate hi,S while preserving the correctness of the algorithm. Just like in Section 2.1, we notice that we do not need the {hi,S}S≤d to be close to their limit, we only need the indexes of i∈V their ordering to be the same. We notice that the neighborhood Ni of i is the set of smallest size which is the most often infected at the same time as i is (Ni = arg max hi,R). Therefore, we must have that for R≤d every set S, hi,S ≤ hi,Ni. However, some other sets might achieve the same value if we do not observe enough cascades. This could happen in two cases: • Not all the nodes of the neighborhood were infected, and therefore a subset T1 ⊂ Ni of the neigh- borhood is such that hi,T1 = hi,Ni. Since T1 < Ni, the algorithm would return T1 and not Ni, which would be a failure case. • Some other node k is always infected every time a specific node j ∈ Ni is infected. The set T2 = Ni \ {j} ∪ {k} will therefore be such that hi,T2 = hi,Ni, and the algorithm would not know which maximum to pick. This is a failure case as well. We identify events which guarantee that the failure cases above cannot arise. Let Em and j were the only infected nodes during cascade m. Ei,j = i,j be the event that i i,j is therefore the event that there Em (cid:91) 1≤m≤M exists a cascade for which only i and j were infected. If such a cascade exists, the set Smax = arg max R≤d hi,R must contain j. If the event Ei,j happens for every node j in the neighborhood of i, we can therefore guarantee Algorithm 2 is correct. We characterize the sample complexity needed for this below. Proposition 4. Let i be a node, and let j be one of its neighbors. Let S be a set of size S ≤ d, such that i /∈ S and j /∈ S. With probability at least 1 − δ cascades, there exists a cascade in which i and j are infected, but no nodes of S are infected. (d+2)·N log(N )+N log( d δ ) pmin(1−pmax)2(d−1) d·N d+2 , among M = Proof. We notice that if, during cascade m, the only infected nodes are i and j, no nodes of S are infected. This is exactly the event Em i,j defined above. P(Em i,j) = P(i and j are the only infected nodes during cascade m) ≥ P(cascade started at i, j was the only infected neighbor of i, and j did not infect any nodes) ≥ 1 N · pmin · (1 − pmax)2(d−1). The probability that this never happens during M cascade is exactly the complement of the event Ei,j defined above: (cid:18) P(Not(Ei,j)) ≤ (cid:19)M 1 − 1 N · pmin · (1 − pmax)2(d−1) 15 N ·(1−pmax)2(d−1) ≤ e−M· pmin ≤ d · N d+2 . δ cascades, Algorithm (d+2)·N log(N )+N log( d δ ) pmin(1−pmax)2(d−1) Lemma 6. With probability at least 1− δ, if we observe M = 2 is correct, and has running time O(M · N d+2) = O(d · N d+3 log(N )). Proof. Let S = {S ∈ P(V ),S ≤ d} be the set of sets of nodes of size at most d, let SCi = {S ∈ S, i /∈ S} be the set of sets of S which do not contain i, and let Ni = {j, (i, j) ∈ E} be the neighborhood of i. We pick a set S ∈ S, such that S (cid:54)= Ni. We first prove that hi,S ≤ hi,Ni. Since the neighborhood of i separates i from the rest of the graph, and infected nodes are connected, we can conclude that every time i and another node of S are infected, one node in the neighborhood Ni of i is infected as well. Therefore, we cannot increase hi,S without also increasing hi,Ni . In particular, this means that even if S > Ni (for instance if Ni ⊂ S), we have hi,S ≤ hi,Ni . We therefore know that Ni ∈ arg max Ci We now prove that with probability at least 1 − δ, Ni is the set of arg max Ci hi,R of minimal size. To do so, we notice that if there exists a cascade such that i and j ∈ Ni are infected, but no node of S is infected, then this implies hi,S < hi,Ni. Indeed, as shown above, every time we increase hi,S, we also increase hi,Ni, and we know there exists one cascade for which we increased hi,Ni without increasing hi,S. We now calculate the probability Pfailure that such a cascade does not exist for all nodes i in the graph, all nodes j in their neighborhood, and all sets S which do not include i or j. hi,R. R∈S R∈S Pfailure ≤ P(∃i ∈ V,∃j ∈ Ni,∃S ∈ SCi,Cj, every time i and j are infected, a node of S is also infected) P(every time i and j are infected, a node of S is also infected). ≤(cid:88) i∈V (cid:88) (cid:88) j∈Ni S∈S Ci,Cj We use Proposition 4 to bound this quantity: Pfailure ≤(cid:88) (cid:88) (cid:88) δ d · N d+2 δ d · N d+2 i∈V j∈Ni S∈S Ci,Cj ≤ N · d · N d+1 · ≤ δ. hi,R < hi,Ni. We now know that with probability at least 1 − δ: SCi,Cj, This implies that no set of(cid:83) j∈Ni ∀R ∈ (cid:91) SCi,Cj can belong in arg max R∈S Ci j∈Ni SCi \ (cid:91) In particular, this means that Ni is the only set of SCi \(cid:83) probability at least 1− δ, Ni is the set of arg max Ci j∈Ni R∈S SCi,Cj = {S ∈ S,Ni ⊆ S}. hi,R. However, we have: SCi,Cj of minimal size. This shows that with hi,R of minimal size. This proves Algorithm 2 is correct, j∈Ni 16 and that we can learn the structure of any graph of maximum degree d with M = cascades. N d+1 · M ), which is what we wanted to prove. Since we do at most one operation by pair of (node, set) and by cascade, the running time is O(N · (d+2)·N log(N )+N log( d δ ) pmin(1−pmax)2(d−1) This leads to our theorem for learning the structure of any bounded-degree graph. Theorem 5. With probability at least 1 − δ, in the extreme-noise setting, we can learn the structure of any graph of maximum degree d with M = O cascades in polynomial time. δ ) (cid:18) d·N log( N pmin(1−pmax)2d (cid:19) Let us now assume that pmax ∼ 1 d . This assumption is reasonable when you expect a constant number of infections by time step. For instance, it makes sense for real diseases, for which carriers have to meet to transmit it (we can only meet a constant number of people each day). It would not make sense for social networks, in which it is possible to reach many followers with each post. Corollary 2. With probability at least 1 − δ, in the extreme-noise setting, if we assume pmax ∼ 1 pmin constant, we can learn the structure of any graph of maximum degree d with M = O(cid:0)d · N log(cid:0) N (cid:1)(cid:1). d and δ This sample complexity is optimal up to log-factors, and almost matches the lower bound established in the no-noise setting. Proof. We need at least O (d · N log (N )) samples to learn the structure of a bounded-degree graph with maximum degree d, according to the lower bound in [29]. 3.2 Bounded-degree weights For the remainder of this paper, we state results in the limited-noise setting. If we consider cascades of size k, the exact probability of infection between two nodes is a multivariate polynomial of degree N on N (N − 1) variables (the variables here would be the weights of the graph), terms. If the graph has more than five nodes, the resulting polynomial with a sum of up to 2· k(cid:88) (N − 2)! (N − k)! l=1 is of degree more than five. For our algorithm, we therefore only use cascades of size 1 or 2. This is a waste of the data, since we simply discard cascades of larger size. However, we are not aware of techniques on how to utilize larger cascades in the limited-noise setting. Cascades of size 1 or 2 are simple enough that we can write explicitly their probability. This allows use to: 1. Design estimators for which we can calculate the exact limit. 2. Combine these estimators to transform a polynomial system of degree N to a polynomial system of degree 2. 3. Solve this system exactly and obtain the probabilities of infection. 3.3 Estimators We start by designing a few estimators: Definition 6. We introduce two sets of N (N − 1) estimators and one set of N estimators. These estimators can be computed even if we only have access to the noisy times of infection. h2 i,j = Fraction of cascades for which only i and j are infected. i<j = Fraction of cascades for which only i and j are infected, and t(cid:48) f 2 e1 i = Fraction of cascades for which only i is infected. i < t(cid:48) j. 17 To simplify the coming notations, let us introduce sk, which is the probability that the noise on j has delay at least k relative to the noise on i. Since the noise is i.i.d., this value is independent from i and j: sk = P(nj −ni ≥ k)4. For instance, if i infected j during cascade m, the probability that the noise did not j ) is P(nj ≥ ni) = s0. In the reverse case, the probability that flip the order of infection (i.e. T i + ni) = P(1 + nj < ni) = P(ni − nj ≥ 2) = s2. (cid:48)m the noise flipped the order of infection is P(T m (cid:48)m i < T m j + nj < T We now compute the limits of those estimators. Proposition 5. As the number of cascades M goes to infinity, the estimators introduced above tend to the following limit: i,j →M→∞ h2 i<j →M→∞ f 2 i →M→∞ e1 1 N 1 N 1 N (1 − pij) (cid:89) k(cid:54)=i,j (cid:89) (cid:89) k(cid:54)=i,j k(cid:54)=i,j (1 − pik). (pij + pji) (1 − pik)(1 − pjk), (pij · s0 + pji · s2) (1 − pik)(1 − pjk), Proof. The proof is very similar to 3. See details in Appendix B.2. 3.4 Solving the system The limit of these estimators, as seen as a function of the probabilities of infection, is a complex polynomial on up to 2(N − 1) variables. The crux of our algorithm is to combine those estimators in order to cancel out most of these variables, and create N − 1 systems of two equations of degree 2 and two unknowns, which we then solve. Proposition 6. Let Vij = only depends on the variables pij and pji : i,j +N·e1 h2 i ·e1 j f 2 i<j . Then the limit of Vij as the number of cascades M goes to infinity Vij →M→∞ pij · s0 + pji · s2 1 + pij · pji . Proof. Since all the estimators converge towards a constant, we can use Slutsky's lemma to find the limit (1 − pik)(1 − pjk) parts of Vij. Let Vij be the limit of Vij as M goes to infinity. We notice that the (cid:89) k(cid:54)=i,j  cancel each other out: Vij = = (cid:32) 1 − (1 − q)1−min(0,k) (cid:33) 2 − q q)max(0,k) f 2 i<j i,j + N · e1 h2 i · e1 j 1 N (pij · s0 + pji · s2) (cid:16) 1 k(cid:54)=i,j N (pij + pji) + N (1−pij )(1−pji) N 2 (cid:89) (cid:17)(cid:89) k(cid:54)=i,j (1 − pik)(1 − pjk)  (1 − pjk)(1 − pjk) tj−k(cid:88) ∞(cid:88) . tj =max(0,k) ti=0 18 4For instance, for geometric noise of parameter q, we have: sk = (1 − q)ti+tj = (1 − (pij · s0 + pji · s2) 1 + pij · pji . = We can therefore use this equality to deduce the weights of all the edges of the graph: Theorem 6. For any graph, for any noise distribution having finite values, we can learn the weights of all the edges of the graph. In particular, we can compute a quantity which converges to the true weight of each edge: pij = 0 − s2 (s2 2) + 0 − s2 (s2 2( Vjis2 − Vijs0) 2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0) . (cid:113) Proof. We present a sketch of the proof here. The details can be found in Appendix B.1. We know Vij tends to Vij = pij·s0+pji·s2 1+pij·pji . Using both Vij and Vji, we can establish this second-degree equation: Vjis2 − Vijs0 +(cid:0)s2 0 − s2 2 (cid:1) pij + (Vijs2 − Vjis0) p2 ij = 0 We recall that by definition, s0 ≥ s2. We also notice that if pij = q1 and pji = q2 is a pair of solutions of this system, then pij = 1 forms the other pair of solution, which implies there is uniqueness q2 of solutions in [0, pmax]. Since the real probabilities of infection satisfy this system, we also know the (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). The only solution of this system in solution exists. Let ∆ =(cid:0)s2 and pji = 1 q1 0 − s2 2 [0, pmax] is then: pij = 2(Vjis2 − Vijs0) 0 − s2 (s2 ∆ 2) + √ . 3.5 Sample complexity We establish the sample complexity needed to estimate pij with precision . To do so, we start by estimating Vij. Note that we only consider the pair of nodes i and j if, among the M samples, there exists a cascade of size 2 in which i and j are the only infected nodes (i.e. h2 i,j > 0). Otherwise, we set pij = pji = 0 as our estimate for pij. Proposition 7. With probability 1 − δ N 2 , with M = samples, we can estimate Vij with precision V . Proof. We present a sketch of the proof; the details can be found in Appendix B.2. As in Proposition 4, we use Hoeffding's inequality: P( f 2 P(h2 i<j − f 2 i,j − h2 P(e1 i − e1 j − e1 P(e1 i<j > 1) ≤ 2e−2M 2 1, i,j > 1) ≤ 2e−2M 2 1, i > 1) ≤ 2e−2M 2 1, j > 1) ≤ 2e−2M 2 1. We use this to bound above Vij: Vij ≤ Vij (cid:34) (cid:35) 1 + 1 f 2 i<j + 1 1 + N (e1 h2 i,j + N e1 i + e1 j ) i e1 j + o(1) By bounding below the denominators and bounding above the numerator, we finally obtain: Vij − Vij ≤ 1 4N pmins2(1 − pmax)2d + o(1). 19 Therefore, by union bound, and by choosing 1 obtain: With M = 1 mins2 2 p2 at least 1 − δ V N 2 . 16N 2 2(1−pmax)4d 2 log(3N )−log(δ) 2 4N pmins2(1−pmax)2d = V , and setting 2e−2M 2 3N 2 , we samples, we can guarantee Vij − Vij ≤ V with probability 1 = δ Indeed, let ∆ =(cid:0)s2 Lemma 7. Let ∆ =(cid:0)s2 Once we have estimated Vij with precision V , estimating pij is unfortunately still not an easy task. −(s2 2(Vij s2−Vjis0) , which means that ∆ has to be positive for this quantity to be defined. However, for general values of Vij and Vji, ∆ can be negative. We therefore use the framework of constrained optimization to bound ∆ away from 0. (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have pij = (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have: 0 − s2 0−s2 2)+ √ ∆ 0 − s2 2 2 ∆ ≥ (s2 0 − s2 2)2 (1 − pmax)2 1 + p2 max . Proof. We find the lower bound on ∆ by reformulating the problem as a constrained optimization problem, and introducing the corresponding Lagrangian multipliers. The details can be found in Appendix B.1. Now that we have established this bound on ∆, we can give the sample complexity needed to estimate pij. Proposition 8. Assuming we can estimate Vij within precision V , then we can estimate pij within precision  = 6V (1+p2 max) 0−s2 (s2 2)2(1−pmax)2 . Proof. This is a simple derivation which can be found in Appendix B.2. We finally piece everything together, and use a union bound on all the pij to obtain the final sample complexity of our algorithm for learning the weights of general bounded-degree graphs. Theorem 7. In the limited-noise setting, with probability at least 1−δ, with M = O(cid:16) e4pmax(d+1) N 2 2 log(cid:0) N δ (cid:1)(cid:17) p2 mins2 2(s2 0−s2 2)4 samples, we can learn the weights of any bounded-degree graph up to precision epsilon. Proof. We obtain the desired bound by combining Proposition 7 and Proposition 8. See details in Appendix B.2. Once again, if we assume pmax ∼ 1 Corollary 3. In the limited-noise setting, with probability at least 1−δ, if pmax ∼ 1 can learn the weights of any bounded-degree graph up to precision epsilon with M = O(cid:16) d and pmin constant, we obtain the following sample complexity: d and pmin constant, we 2 log(cid:0) N N 2 δ (cid:1)(cid:17) 1 0−s2 s2 2(s2 2)4 samples. 4 General graphs In the limited-noise setting, we notice that nothing prevents us from using the algorithm for learning bounded-degree weights for general graph. This proves this problem is solvable for any graph, and any noise distribution. As explained in Section 1.2, this is not an obvious result. However, if we do not assume pmax ∼ 1 Theorem 8. In the limited-noise setting, with probability at least 1−δ, it is possible to learn all the weights of any graph, for any noise distribution, with finite (but potentially exponential) sample complexity. N , the sample complexity is now exponential. 20 5 Discussion and Future work In this paper, we presented the first results to learn the edges of a graph from noisy times of infection. We showed we learn the structure of any bidirectional tree or any bounded-degree graph (note that not all trees are bounded-degree graphs) with optimal sample complexity (up to log-factors). However, our results are not tight for learning the weights of bidirectional trees or bounded-degree In the no-noise setting, [29] proves this can be achieved with O(d2N log(N )) for graphs of graphs. maximum degree d with correlation decay. Our results have sample complexity O(N 2 log(N )) without any assumption of correlation decay. It is an open problem to understand whether it is possible to achieve a sample complexity of O(d2N log(N )) in the limited-noise setting, and whether assuming correlation decay is necessary to obtain such a result. Moreover, for learning the weights of a general bounded-degree graph, we only use cascades of size 1 or 2. If we are given an infinite number of cascades of size bigger than 2, our current algorithm cannot learn the weights of the graph. Future work could develop an algorithm without such a weakness. All our results for learning the weights of the edges are in the limited-noise setting. Whether or not it is possible to learn the noise in the extreme-noise setting is an other question of interest for future work. Finally, we have made no restriction on the distribution of the noise we add, other than it is finite. It would be interesting to study whether stronger restrictions on the noise (for instance Gaussian noise) would lead to stronger results. It would also be interesting to allow infinite noise, and develop algorithms which are robust to errors in the infection status of a node (our current algorithms can return wrong graph structure with only one adversarially chosen false positive). 21 References [1] Bruno Abrahao, Flavio Chierichetti, Robert Kleinberg, and Alessandro Panconesi. Trace complexity of network inference. Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '13, page 491, 2013. [2] Ery Arias-castro, Emmanuel J Cand`es, and Arnaud Durand. Detection of an anomalous cluster in a network. The Annals of Statistics, 39(1):278 -- 304, 2011. [3] Ery Arias-castro and S T Nov. Detecting a Path of Correlations in a Network. pages 1 -- 12. [4] Daniel Bernoulli and Sally Blower. An attempt at a new analysis of the mortality caused by smallpox and of the advantages of inoculation to prevent it. Reviews in medical virology, 14:275 -- 288, 2004. [5] A. Cayley. A theorem on trees. In Collected Mathematical Papers Vol. 13, pages 26 -- 28. Cambridge University Press, 1897. [6] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon Kleinberg, and Jure Leskovec. Can Cascades be Predicted? In Proceedings of the 23rd international conference on World wide web (WWW' 14), 2014. [7] Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H. Eugene Stanley, and Walter Quattrociocchi. The spreading of misinformation online. Proceedings of the National Academy of Sciences, page 201517441, 2016. [8] A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal ofthe Royal Statistical Society, 39(1):1 -- 38, 1977. [9] Kimon Drakopoulos, Asuman Ozdaglar, and John N. Tsitsiklis. An efficient curing policy for epi- demics on graphs. arXiv preprint arXiv:1407.2241, (December):1 -- 10, 2014. [10] Kimon Drakopoulos, Asuman Ozdaglar, and John N. Tsitsiklis. A lower bound on the performance of dynamic curing policies for epidemics on graphs. (978):3560 -- 3567, 2015. [11] Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, and Pramod Viswanath. Rumor source obfuscation on irregular trees. In Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science (SIGMETRICS' 16 ), pages 153 -- 164. ACM, 2016. [12] Giulia Fanti, Peter Kairouz, Sewoong Oh, Kannan Ramchandran, and Pramod Viswanath. Hiding the Rumor Source. IEEE Transactions on Information Theory, 63(10):6679 -- 6713, 2017. [13] Giulia Fanti, Peter Kairouz, Sewoong Oh, and Pramod Viswanath. Spy vs. Spy: Rumor Source Obfuscation. Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS' 14), pages 271 -- 284, 2015. [14] Mehrdad Farajtabar, Jiachen Yang, Xiaojing Ye, Huan Xu, Rakshit Trivedi, Elias Khalil, Shuang Li, Le Song, and Hongyuan Zha. Fake News Mitigation via Point Process Based Intervention. In Proceedings of the 34th International Conference on Machine Learning (ICML' 17), 2017. [15] Ken Goldberg, Theresa Roeder, Dhruv Gupta, and Chris Perkins. Eigentaste: A Constant Time Collaborative Filtering Algorithm. Information Retrieval, 4(2):133 -- 151, 2001. [16] Manuel Gomez-rodriguez, Jure Leskovec, and Andreas Krause. Inferring Networks of Diffusion and Influence. In ACM Transactions on Knowledge Discovery from Data (TKDD' 12), volume 5, 2012. [17] Manuel Gomez-Rodriguez, Jure Leskovec, and Bernhard Scholkopf. Structure and Dynamics of Information Pathways in Online Media. In 6th International Conference on Web Search and Data Mining (WSDM 2013), 2013. 22 [18] Jessica Hoffmann and Constantine Caramanis. The Cost of Uncertainty in Curing Epidemics. Pro- ceedings of the ACM on Measurement and Analysis of Computing Systems (SIGMETRICS' 18), 2(2):11 -- 13, 2018. [19] Tomoharu Iwata, Amar Shah, and Zoubin Ghahramani. Discovering Latent Influence in Online Social Activities via Shared Cascade Poisson Processes. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD' 13), 2013. [20] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '03, 2003. [21] Justin Khim and Po-Ling Loh. Permutation Tests for Infection Graphs. pages 1 -- 28, 2017. [22] Justin Khim and Po-Ling Loh. A theory of maximum likelihood for weighted infection graphs. pages 1 -- 47, 2018. [23] Jeongyeol Kwon, Wei Qian, Constantine Caramanis, Yudong Chen, and Damek Davis. Global Convergence of the EM Algorithm for Mixtures of Two Component Linear Regression. XX:1 -- 57, 2019. [24] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. Cost-effective Outbreak Detection in Networks. Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '07), page 420, 2007. [25] Eli A. Meirom, Chris Milling, Constantine Caramanis, Shie Mannor, Ariel Orda, and Sanjay Shakkot- tai. Localized epidemic detection in networks with overwhelming noise. pages 1 -- 27, 2014. [26] Chris Milling, Constantine Caramanis, Shie Mannor, and Sanjay Shakkottai. Network Foren- sics : Random Infection vs Spreading Epidemic. In Proceedings of the 12th ACM SIGMET- RICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (SIGMETRICS' 12), 2012. [27] Chris Milling, Constantine Caramanis, Shie Mannor, and Sanjay Shakkottai. Local detection of infections in heterogeneous networks. Proceedings - IEEE INFOCOM, 26:1517 -- 1525, 2015. [28] Seth Myers, Chenguang Zhu, and Jure Leskovec. Information Diffusion and External Influence in Networks. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD' 12), pages 33 -- 41, 2012. [29] Praneeth Netrapalli and Sujay Sanghavi. Learning the Graph of Epidemic Cascades. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems (SIGMETRICS' 12), pages 211 -- 222, 2012. [30] M. E. J. Newman. Networks: An Introduction, volume 23. 2014. [31] Devavrat Shah and Tauhid Zaman. Detecting sources of computer viruses in networks: theory and experiment. In ACM SIGMETRICS Performance Evaluation Review, volume 38, pages 203 -- 214. ACM, 2010. [32] Devavrat Shah and Tauhid Zaman. Rumors in a Network : Who ' s the Culprit ? IEEE Transactions on information theory, 57(8):1 -- 43, 2010. [33] Devavrat Shah and Tauhid Zaman. Rumor centrality: a universal source detector. In ACM SIG- METRICS Performance Evaluation Review, volume 40, pages 199 -- 210. ACM, 2012. [34] Sam Spencer and R Srikant. On the impossibility of localizing multiple rumor sources in a line graph. ACM SIGMETRICS Performance Evaluation Review, 43(2):66 -- 68, 2015. 23 [35] Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, and Chee Wei Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. In ACM SIGMETRICS Performance Evaluation Review, volume 42, pages 1 -- 13. ACM, 2014. [36] Liang Wu and Huan Liu. Tracing Fake-News Footprints: Characterizing Social Media Messages by How They Propagate. In (WSDM 2018) The 11th ACM International Conference on Web Search and Data Mining, 2018. [37] Ali Zarezade, Ali Khodadadi, Mehrdad Farajtabar, Hamid R Rabiee, and Hongyuan Zha. Correlated Cascades : Compete or Cooperate. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17), pages 238 -- 244, 2017. [38] Qingyuan Zhao, Murat A. Erdogdu, Hera Y. He, Anand Rajaraman, and Jure Leskovec. SEISMIC: A Self-Exciting Point Process Model for Predicting Tweet Popularity. Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '15 ), 2015. 24 A Bidirectional tree We include here the full calculations for learning the weights of the bidirectional tree. Proposition 9. If we know (i, j) is an edge in the original tree, then the probability of infection along this edge is given by: pij = gi,Cj · (s2 fi<j · s0 − fj<i · s2 0 − s2 2) + fi<j · s0 − fj<i · s2 . Proof. According to Lemma 3, we have: fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2 gi,Cj = PCj(→ i) · (1 − pij) fj<i = PCi(→ j) · pji · s0 + PCj(→ i) · pij · s2 gj,Ci = PCi(→ j) · (1 − pji). We have 4 second-order equations, with 4 unknowns: pij, pji, PCj(→ i) and PCi(→ j). We solve it: fi<j + fj<i = (PCj(→ i) · pij + PCi(→ j) · pji) · (s0 + s2) fi<j − fj<i = (PCj(→ i) · pij − PCi(→ j) · pji) · (s0 − s2) (cid:18) fi<j + fj<i (cid:19) =⇒ PCj(→ i) · pij = fi<j − fj<i s0 − s2 2 = s0 + s2 0 − s2 s2 1 + 2 fi<j · s0 − fj<i · s2 PCj(→ i) = gi,Cj + PCj(→ i) · pij 0 − s2 s2 PCj(→ i) · pij PCj(→ i) fi<j · s0 − fj<i · s2 gi,Cj · (s2 0 − s2 fi<j · s0 − fj<i · s2 =⇒ pij = = gi,Cj + pij = 2 2) + fi<j · s0 − fj<i · s2 . samples, with probability at least 1 − δ, we Lemma 8. With M = N 2 have: 2 log(cid:0) 6 δ (cid:1) ((s2 0−s2 2+s0+s2)pmax+s0+s2)2 2)2 0−s2 (s2 pij − pij ≤ . Proof. Using Hoeffding's inequality: P( fi<j − fi<j > 1) ≤ 2e−2M 2 1, P( fj<i − fj<i > 1) ≤ 2e−2M 2 1, P(gi,Cj − gi,Cj > 1) ≤ 2e−2M 2 1. (cid:1), we have that with probability at least 1 − δ, all the following hold: log(cid:0) 6 δ Choosing M = 1 2 1 fi<j − fi<j ≤ 1, fj<i − fj<i ≤ 1, gi,Cj − gi,Cj ≤ 1. 25 Hence, with probability at least 1 − δ, we have: 2) + (fi<j − 1) · s0 − (fj<i + 1) · s2 0 − s2 2 + s0 + s2) pij = ≤ = fi<j · s0 − fj<i · s2 gi,Cj · (s2 0 − s2 (gi,Cj − 1) · (s2 0 − s2 gi,Cj · (s2 1 − 2) + fi<j · s0 − fj<i · s2 (fi<j + 1) · s0 − (fj<i − 1) · s2 0 − s2 fi<j · s0 − fj<i · s2 + 1(s0 + s2) 2) + fi<j · s0 − fj<i · s2 − 1(s2 1 0−s2 2)+fi<j·s0−fj<i·s2 1(s2 0−s2 2+s0+s2) ·(s2 g = pij + 1 i,Cj (cid:32) gi,Cj · (s2 0 − s2 = pij + 1 1 + gi,Cj · (s2 gi,Cj · (s2 0 − s2 0 − s2 (s2 gi,Cj · (s2 0 − s2 0 − s2 gi,Cj · (s2 + 1 (cid:33) s0 + s2 + o(1) s0 + s2 0 − s2 2) + fi<j · s0 − fj<i · s2 2 + s0 + s2) 2) + fi<j · s0 − fj<i · s2 1(s2 0 − s2 2) + fi<j · s0 − fj<i · s2 2 + s0 + s2)pmax 2) + fi<j · s0 − fj<i · s2 2) + fi<j · s0 − fj<i · s2 s0 + s2 + o(1) + o(1). pij − pij ≤ 1 Using the results from Lemma 3, we have: fi<j = PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2, gi,Cj = PCj(→ i) · (1 − pij). We use it to simplify the denominator: denominator = gi,Cj · (s2 = 0 − s2 (cid:17) · (s2 2) + fi<j · s0 − fj<i · s2 (cid:16)PCj(→ i) · (1 − pij) (cid:16)PCj(→ i) · pij · s0 + PCi(→ j) · pji · s2 −(cid:16)PCi(→ j) · pji · s0 + PCj(→ i) · pij · s2 0 − s2 2) + (cid:17) · s0 (cid:17) s2 0 − s2 2) = PCj(→ i) · (s2 ≥ s2 0 − s2 N 2 . Plugging back above: pij − pij ≤ 1 0 − s2 (s2 gi,Cj · (s2 0 − s2 0 − s2 gi,Cj · (s2 0 − s2 (s2 2 + s0 + s2)pmax 2 + s0 + s2)pmax 2) + fi<j · s0 − fj<i · s2 2) + fi<j · s0 − fj<i · s2 s0 + s2 + 1 ≤ 1N 0 − s2 s2 2 + 1N s0 + s2 0 − s2 s2 2 + o(1). + o(1) By symmetry, we obtain: pij − pij ≤ 1N 0 − s2 (s2 2 + s0 + s2)pmax + s0 + s2 + o(1). 0 − s2 s2 2 26 2 log(cid:0) 6 δ 0−s2 (s2 (cid:1) ((s2 By choosing 1 =  N With M = N 2 pij ≤ . samples, with probability at least 1 − δ, we have pij − 0−s2 s2 2 2+s0+s2)pmax+s0+s2 0−s2 2+s0+s2)pmax+s0+s2)2 0−s2 (s2 2)2 , we therefore have: B Bounded-degree graphs B.1 Solving the system Lemma 9. Let ∆ =(cid:0)s2 (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). We have: 0 − s2 2 ∆ ≥ (s2 0 − s2 2)2 (1 − pmax)2 1 + p2 max . Proof. Finding a lower bound for ∆ can be achieved through minimizing ∆, or maximizing (Vjis2 − Vijs0)(Vijs2 − Vjis0). We want to solve: maximize Vij ,Vji (Vjis2 − Vijs0)(Vijs2 − Vjis0) , , subject to Vij = pijs0 + pjis2 1 + pijpji pjis0 + pijs2 1 + pijpji Vji = pij ≥ 0, pmax − pij ≥ 0, pji ≥ 0, pmax − pji ≥ 0. To do so, we introduce Lagrangian multipliers. By replacing Vij and Vji with their actual value, the optimization problem above only has affine constraints, so it satisfies the linearity constraint qualification for the Karush-Kuhn-Tucker conditions. In other words, all the partial derivatives of the Lagrangian are equal to 0 for an optimal point. L = L(Vij, Vji, pij, pji, λ1, λ2, µ1, µ2, µ3, µ4) = (Vjis2 − Vijs0)(Vijs2 − Vjis0) − λ1(vij(1 + pijpji) − pijs0 + pjis2) − λ2(vji(1 + pijpji) − pjis0 + pijs2) − µ1pij − µ2(pmax − pij) − µ3pji − µ4(pmax − pji). We calculate the gradients of L. ∂L ∂Vij ∂L ∂Vji ∂L ∂pij ∂L ∂pji = Vji(s2 0 + s2 = Vij(s2 0 + s2 2) − 2Vijs0s2 − λ1(1 + pijpji), 2) − 2Vjis0s2 − λ2(1 + pijpji), = −λ1(Vijpji − s0) − λ2(Vjipji − s2) − µ1 + µ2, = −λ1(Vijpij − s2) − λ2(Vjipij − s0) − µ3 + µ4. 27 From now on, we find the set X 0 of points for which all the partial derivatives are null. We know the solution of the maximization problem is the point of X 0 which maximizes the objective function. Let us assume an interior point solution exists. For this point, all the gradients of L are equal to 0. Since it is an interior point, we also have µ1 = µ2 = µ3 = µ4 = 0 by complementary slackness. Solving this system, we obtain: λ1 = (s2 λ2 = (s2 0 − s2 2) 0 − s2 2) pjis0 − pijs2 (1 + pijpji)2 , pijs0 − pjis2 (1 + pijpji)2 . ∂pij = 0 becomes pijpji(1 − pji) = 0. However, this is impossible Plugging this in above, the condition ∂L for an interior point, since 0 < pij, pji < pmax < 1. Therefore, the extrema of ∆ are attained when at least one constraint is active. We notice that if the conditions pij = 0 or pji = 0 are active, then (Vjis2 − Vijs0)(Vijs2 − Vjis0) = 0. Let us suppose (without loss of generality, by symmetry of the problem) that we have pij = pmax. The objective function is then increasing in pji. Therefore, ∆ is minimized when pij = pji = pmax, which implies vij = Vji = pmax(s0+s2) . In this case: 1+p2 max (cid:19)2 ∆ ≥ (s2 ≥ (s2 ≥ (s2 ≥ (s2 (cid:18) pmax(s0 + s2) ij(s0 − s2)2 (cid:21) 2)2 − 4V 2 0 − s2 (cid:20) 2)2 − 4 0 − s2 0 − s2 2)2 2)2 (1 − pmax)2 0 − s2 1 − 4 1 + p2 pmax 1 + p2 max max . 1 + p2 max (s0 − s2)2 This expression is always positive, which is what we wanted. Theorem 9. For any graph, for any noise distribution having finite values, we can learn the weights of all the edges of the graph. In particular, we can compute a quantity which converges to the true weight of each edge: (cid:113) 2( Vjis2 − Vijs0) 2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0) . 0 − s2 (s2 pij = 0 − s2 (s2 2) + Proof. := pji = We can plug this in Vji: Vij →M→∞ Vij pij · s0 + pji · s2 1 + pij · pji Vij − pij · s0 s2 − Vij · pij 1 + pij · pji Vij − pij · s0 s2 − Vij · pij After some shuffling around, we obtain the second-degree equation: (cid:20) 1 + pij · Vij − pij · s0 s2 − Vij · pij Vjis2 − Vijs0 +(cid:0)s2 pji · s0 + pij · s2 (cid:21) (cid:1) pij + (Vijs2 − Vjis0) p2 Vji = 0 − s2 Vji = 2 · s0 + pij · s2 ij = 0 28 and pji = 1 q1 0 − s2 We recall that by definition, s0 ≥ s2. We also notice that if pij = q1 and pji = q2 is a pair of solutions of this system, then pij = 1 forms the other pair of solution, which implies there is uniqueness q2 of solutions in [0, pmax]. Since the real probabilities of infection satisfy this system, we also know the solution exists. Let ∆ =(cid:0)s2 −(cid:0)s2 (cid:0)s2 (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0). The only solution of this system in (cid:1) + (cid:1)2 −(cid:0)s2 (cid:1)2 − 4(Vjis2 − Vijs0)(Vijs2 − Vjis0) √ ∆ 2(Vijs2 − Vjis0) 0 − s2 [0, pmax] is: 0 − s2 0 − s2 pij = 2 2 2 2 (cid:16) 0 − s2 (s2 2) + (cid:17) √ ∆ = = 2(Vjis0 − Vijs2) √ 2(Vjis2 − Vijs0) 0 − s2 (s2 ∆ 2) + B.2 Sample complexity Proposition 10. As the number of cascades M goes to infinity, the estimators below tend to the following limit: (pij + pji) (1 − pik)(1 − pjk) (pij · s0 + pji · s2) (1 − pik)(1 − pjk) i,j →M→∞ h2 i<j →M→∞ f 2 i →M→∞ e1 1 N 1 N 1 N (1 − pij) (cid:89) k(cid:54)=i,j (cid:89) (cid:89) k(cid:54)=i,j k(cid:54)=i,j (1 − pik) Proof. Using the law of large numbers: i<j →M→∞ E[ f 2 f 2 (cid:89) (cid:89) k(cid:54)=i,j pij = i<j] = P(i source, infects j, no other infections, delay 0) + P(j source, infects i, no other infections, delay 2) 1 N (1 − pjk) · s0 (1 − pik) + pji (1 − pjk) 1 N (pij · s0 + pji · s2) k(cid:54)=i,j (1 − pik) · s2 (1 − pik)(1 − pjk). k(cid:54)=i,j (cid:89) (cid:89) (cid:89) k(cid:54)=i,j k(cid:54)=i,j = 1 N In the same vein, we have: i,j →M→∞ E[h2 h2 i,j] = P(i source, infects j, no other infections) + P(j source, infects i, no other infections) 1 N (1 − pik)(1 − pjk) (pij + pji) = (cid:89) k(cid:54)=i,j i →M→∞ E[e1 e1 i ] 29 = P(i source, no other infections) (cid:89) = = 1 N 1 N (1 − pik) k(cid:54)=i (1 − pij) (cid:89) k(cid:54)=i,j (1 − pik). Proposition 11. With probability 1 − δ N 2 , with M = samples, we can estimate Vij with precision V . Proof. As in Proposition 4, we use Hoeffding's inequality: P( f 2 P(h2 i<j − f 2 i,j − h2 i − e1 P(e1 P(e1 j − e1 i<j > 1) ≤ 2e−2M 2 1, i,j > 1) ≤ 2e−2M 2 1, i > 1) ≤ 2e−2M 2 1, j > 1) ≤ 2e−2M 2 1. We use this to bound above Vij: Vij = ≤ = Vij 1 + We bound below the denominators: 1 f 2 i<j + 1 1 + N (e1 h2 i,j + N e1 i + e1 j ) i e1 j f 2 i<j i,j + N · e1 h2 i · e1 j f 2 i<j + 1 i,j + 1 + N · (e1 h2 (cid:34) 1 + 1 f 2 i<j 1+N 1(e1 i,j +N e1 h2 1 + i +e1 j ) i e1 j = Vij i + 1) · (e1 j + 1) (cid:35) + o(1) i<j ≥ 1 f 2 N (pijs0 + pjis2)(1 − pmax)2d ≥ pmins2 j ≥ 1 i e1 N ≥ 1 N (1 − pmax)2d N (1 + pijpji)(1 − pmax)2d (1 − pmax)2d h2 i,j + N e1 We bound above the numerator: N (e1 i + e1 i ) = N (1 − pik) + (1 − pjk)   1 (cid:18) 1 N N (cid:89) k(cid:54)=i 1 N + (cid:19) ≤ N ≤ 2. 1 f 2 i<j + 1 1 + N (e1 h2 i,j + N e1 i + e1 j ) i e1 j 30 (cid:89) k(cid:54)=j 1 N (cid:35) + o(1) Plugging in above: (cid:34) Vij = Vij 1 + (cid:20) 1 + ≤ Vij Using Vij ≤ 1, and by symmetry: (cid:21) + o(1) . Vij − Vij = 1 pmins2 1 N (1 − pmax)2d + (cid:20) N (1 − pmax)2d 1(1 + 2) 1 N (1 − pmax)2d (cid:21) (cid:20) 1 + 3pmins2 pmins2 + 3 1 (cid:21) =≤ 1 ≤ 1 N (1 − pmax)2d pmins2(1 − pmax)2d + o(1). pmins2 4N + o(1) + o(1) Therefore, by union bound, and by choosing 1 obtain: With M = 1 mins2 2 p2 at least 1 − δ V N 2 . 16N 2 2(1−pmax)4d 2 log(3N )−log(δ) 2 4N pmins2(1−pmax)2d = V , and setting 2e−2M 2 3N 2 , we samples, we can guarantee Vij − Vij ≤ V with probability 1 = δ Proposition 12. Assuming we can estimate Vij within precision V , then we can estimate pij within precision  = 6V (1+p2 Proof. If we know Vij − Vij < V and Vji − Vji < V : 2)2(1−pmax)2 . 0−s2 (s2 max) 2( Vjis2 − Vijs0) 2)2 − 4( Vjis2 − Vijs0)( Vijs2 − Vjis0) ≤ pij = 0 − s2 (s2 0 − s2 (s2 2) + 2(Vjis2 − Vijs0) + 2V (s0 + s2) (cid:113) 2)2 +(cid:112)∆ − 4V (s0 + s2)2(Vij + Vji) We recall s0 + s2 ≤ 1, Vij ≤ 1, pij ≤ 1, and 1 + p2 ∆(cid:112)1 − 8 V pij ≤ 2(Vjis2 − Vijs0) + 2V (cid:16) 1 +  + 0 − s2 (s2 0 − s2 (s2 ≤ pij 2)2 + (cid:17) √ √ √ ∆ 4V 0 − s2 (s2 ∆ 2)2 + ∆ . max ≤ ∆ ≤ 1 (Lemma 7). Hence: 2V 0 − s2 2)2 + (s2 √ ∆ + o(V ) ≤ pij + 6V ∆ . max) 0−s2 (s2 2)2(1−pmax)2 . By symmetry, and using the bound on ∆ stated above, we conclude that if we know Vij and Vji up to precision V , we know pij up to precision  = 6V (1+p2 Theorem 10. In the limited-noise setting, with probability at least 1−δ, with M = O(cid:16) e4pmax (d+1) p2 mins2 samples, we can learn the weights of any bounded-degree graph up to precision epsilon. Proof. With probability at least 1 − δ 2 log(3N )−log(δ) M = 1 2 V least 1 − δ samples, we can guarantee Vij − Vij ≤ V with probability at 0−s2 6(1+p2 2)2(1−pmax)2 . This gives us a sample complexity of: p2 mins2 N 2 samples, knowing 1 V 16N 2 2(1−pmax)4d N 2 , using 0−s2 max) 2(s2 (s2 2)4 N 2 = 2 2 log(cid:0) N δ (cid:1)(cid:17) (cid:20) (cid:21)2 (cid:18) 9N 2 (cid:19) 4 pmins2 log δ M ≥ 18 2(s2 0 − s2 2)4(1 − pmax)4(d+1) N 2 31 ≥ 1152 · e4pmax(d+1) (cid:18) e4pmax(d+1) 0 − s2 mins2 p2 2)4 = O 2(s2 mins2 p2 2(s2 0 − s2 2)4 N 2 2 log N 2 2 log (cid:18) 9N 2 (cid:19) (cid:18) N (cid:19)(cid:19) δ . δ 32
1510.06124
3
1510
2015-10-26T18:31:03
Hierarchy of knowledge translation: from health problems to ad-hoc drug design
[ "cs.SI", "cs.DL" ]
An innovative approach to analyze the complexity of translating novel molecular entities and nanomaterials into pharmaceutical alternatives (i.e., knowledge translation, KT) is discussed. First, some key concepts on the organization and translation of the biomedical knowledge (paradigms, homophily, power law distributions, hierarchy, modularity, and research fronts) are reviewed. Then, we propose a model for the knowledge translation (KT) in Drug Discovery that considers the complexity of interdisciplinary communication. Specifically, we address two highly relevant aspects: 1) A successful KT requires the emergence of organized bodies of inter-and transdisciplinary research, and 2) The hierarchical and modular topological organization of these bodies of knowledge. We focused on a set of previously-published studies on KT which rely on a combination of network analysis and computer-assisted analysis of the contents of scientific literature and patents. The selected studies provide a duo of complementary perspectives: the demand of knowledge (cervical cancer and Ebola hemorrhagic fever) and the supply of knowledge (liposomes and nanoparticles to treat cancer and the paradigmatic Doxil, the first nanodrug to be approved).
cs.SI
cs
Hierarchy of knowledge translation: from health problems to ad-hoc drug design David Fajardo Doctorado en Ciencias Medicas y de la Salud Universidad Nacional Autonoma de Mexico Victor M. Castano Centro de Fisica Aplicada y Tecnologia Avanzada Universidad Nacional Autonoma de Mexico Abstract An innovative approach to analyze the complexity of translating novel molecular entities and nanomaterials into pharmaceutical alternatives (i.e., knowledge translation, KT) is discussed. First, some key concepts on the organization and translation of the biomedical knowledge (paradigms, homophily, power law distributions, hierarchy, modularity, and research fronts) are reviewed. Then, we propose a model for the knowledge translation (KT) in Drug Discovery that considers the complexity of interdisciplinary communication. Specifically, we address two highly relevant aspects: 1) A successful KT requires the emergence of organized bodies of inter-and transdisciplinary research, and 2) The hierarchical and modular topological organization of these bodies of knowledge. We focused on a set of previously-published studies on KT which rely on a combination of network analysis and computer-assisted analysis of the contents of scientific literature and patents. The selected studies provide a duo of complementary perspectives: the demand of knowledge (cervical cancer and Ebola hemorrhagic fever) and the supply of knowledge (liposomes and nanoparticles to treat cancer and the paradigmatic Doxil, the first nano- drug to be approved). Keywords: Biomedical knowledge, translational hubs, trading zones, scientific cultures. 1. Introduction “From bench to bedside” is the motto of Translational Science (TS).[1] The fundamental idea behind TS is ultimately to translate the basic science discoveries into a better health status for the population.[2] Particularly, TS in Drug Discovery consists in transforming the knowledge on biomolecular entities -like small molecules, nucleic acids or proteins- and their interactions into drug therapies.[3] This translation of biomolecular knowledge into therapies is becoming an increasingly difficult and complex task. A productivity crisis in pharmaceutical research and development (R&D) has been extensively reported.[4] This crisis consists, among other things, of a decline in the number of New Molecular Entities approved, and an increase of the attrition of R&D projects, development times and R&D expenditures.[4] According to Pammolli, Magazzini and Riccaboni, the explanation of this innovation crisis is that the R&D efforts are concentrated in areas with a potential of very high sales per year but with the lowest probability of success. [4] These areas with a low probability of success are aimed to develop new drugs through unexploited biomolecular mechanism to treat complex diseases like cancer and obesity.[4] These innovation trends could be boosting the increase in size and complexity of biomedical literature, making it difficult to translate the basic knowledge in innovations. The difficulty of translating the biomedical knowledge into treatments also could be observed in the unbalance between the huge quantity of published papers and the shortage of new approved drugs.[5] Moreover, the increasing complexity of the biomedical information could be tackling the construction of meaningful ideas and their transformation into innovations. That is, knowledge translation in Drug Discovery is becoming a big data problem.[6, 7] In previous investigations, we have shown how the combination of biomedical-bioinformatics and scientometrics could be useful to handle the complexity of biomedical knowledge and its translation into innovations.[8-11] These two fields have different approaches on the information. On the one hand, biomedical bioinformatics processes, organizes, structures, integrates and represents data in order to obtain meaningful and useful information that could be used, for example, to discover new drugs, make medical decisions or improve health care quality.[12] On the other hand, scientometrics focuses on quantifying the communication of scientific information.[13] Differently, our approach focuses on the communication of biomedical information among researchers and simultaneously organizes, structures and represents the communicated information using bioinformatics tools.[8-11] Particularly, knowledge translation is understood as a communication process between the basic and the clinical research levels.[14] In this process, a new interdisciplinary or translational language emerges.[14] We propose that the translational language and the intellectual community that produce it are both fundamentally necessary for the transformation of the huge mass of data obtained from the experimental basic research into the longed pharmaceutical treatments. Therefore, this new approach pays special attention to the organization, structure and representation of the knowledge. The bioinformatics component of our research strategy allows us to analyze the emergence of this new interdisciplinary language. In this paper, we extensively discuss this new approach. In the second section, key concepts like scientific cultures, some network properties and interdisciplinary communication are briefly reviewed. In the section 3, a model for KT in Drug Discovery as a complex process of interdisciplinary communication is presented. In section 4, we will discuss four previously studied instances of knowledge translation processes. Two of these studies analyze the knowledge translation process of the research on specific health problems: cervical cancer[8] and Ebola[11]. The other two studies analyze this process since the perspective of the R&D of medical technologies. One study compares the NT process in two types of nanotechnologies to treat cancer: liposomes versus metal nanoparticles.[9] The other study focuses in the development of Doxil,[10] the first approved nanodrug.[15] 2. A brief review of some key concepts to the study of KT in Drug Discovery 2.1 Paradigms as scientific cultures As defined by Thomas Kuhn, a paradigm is a scientific achievement that have two characteristics: 1) It is so relevant that a community of adherents is organized around it and 2) It leave an important quantity of unsolved problems to be worked by this community.[16] Importantly, the paradigms set a system of standards for scientific practices to be followed by the members of a particular scientific community.[16] Moreover, the paradigmatic standards determine what is to be observed, how the observations should be performed, how questions should be asked and how the results should be interpreted.[16] The kuhnian paradigm is a polysemic concept. It includes simultaneously the achievement, the standards and the community.[17] Paradigms are particular types of intellectual cultures[17] and, importantly, they are associated with specialized language.[18] These specific languages determine the way the information is communicated, presented and interpreted inside a community of researchers. [18] Moreover, knowledge translation can be understood as a communication process where a new interdisciplinary language is built.[14] That is, scientific languages represent a coherent system of meanings, commitments and grammar rules that defines the membership in the communities. When two or more scientific cultures interact with each other, a sub-system of communication must be established, i.e., a trading zone.[17] These sub-systems are territories that belong to neither of the interacting communities but allow the exchange of concepts, methodologies, tools and evidence.[17] So, trading zones would allow the interdisciplinary communication without the need to altering the fundamentals of each culture. Paradigms are important for the study of KT in drug discovery because they determine the way that NT actually takes place. For example, the discovery of the human papillomavirus (HPV) as the necessary cause of cervical cancer led the NT process toward the development of vaccines and HPV tests[8]. This example is discussed more extensively in section 4. 2.2. Key concepts: Homophily, power laws, hierarchy, modularity and research fronts in literature networks Scientific journals are still the most important media of communication for the scientific community. The papers published in these journals build a complex citation network that shows both the organization and evolution of the scientific community and the knowledge itself.[19] That is why the analysis of literature networks is fundamental to the understanding of the knowledge translation process. Similarly, networks of patents provide relevant information about the development of technologies.[20] In this sub-section some relevant properties of these kinds of complex literature networks are briefly reviewed. The review of these properties is aimed to introduce the conceptual basis of the research fronts which are understood as the convergence of clusters of papers, specialized community of researchers and jargon. Research fronts are particularly important to the analysis of NT as a communication process, as it is discussed below. Homophily is the trend of certain nodes (the objects represented in a network: persons, proteins, papers, etc) to preferentially establish connections with others nodes of similar features.[21] People tend to build relationship almost exclusively with people that are economically, socially and culturally akin.[21] Scientific literature and scientist coauthor networks are not different. Scientists preferentially collaborate with colleagues that belong to the same scientific culture.[22] Papers normally cite other manuscripts with very similar content. Importantly, according to McPherson, Smith-Lovin and Cook “The pervasive fact of homophily means that cultural, behavioral, genetic, or material information that flows through networks will tend to be localized. Homophily implies that distance in terms of social characteristics translates into network distance”.[21] Therefore, homophily is the fundamental property that allows us to map the KT process. That is, basic and clinical research tends to be located in a well defined regions in the citation networks.[8-11, 23] Translational research would occupy an in-between topological position in the network connecting the basic with the clinical research.[8-11, 23] Similarly, papers that are in the same observation scale (molecular, cellular, organism, population) tend to stick together.[11] Moreover, it is completely feasible to identify research communities that work on common problems with similar approaches using network analysis tools like those based in the Newman's modularity.[8-11, 20] The distribution of citations and information among the papers and patents follows a power law function (were a variable is the power of other).[24] In the case of citations, a power law distribution implies that a very few number of papers (or patents) receive a huge quantity of citation and the most of manuscripts are few or never cited. In the case of information, the power law distribution means that there are few ideas, methodologies or scientific achievements that are constantly mentioned in the scientific literature and a huge diversity of new ideas, methodologies or results that are poorly mentioned in the literature.[24] The power law distribution of citations and information has important methodological implications to the analysis of the KT as a communication process. The analysis of top cited (or with the highest degree) papers and their citation network can provide the most relevant information about how a research area is organized and evolves and how the research levels are inter-communicated.[8-11, 19 20, 23, 25-27] Some authors arbitrarily choose the 45 or 100 most frequently cited papers.[25, 26] While others authors perform the main path analysis to identify the putative path with the broadest flow of information.[27] In our previous research, we have chosen the 20% most frequently cited papers. This quantity of top cited papers guarantees to get the most of the communication process through the citation networks and the most of the communicated information. Moreover, the power law distribution of citations and information in the scientific literature (including patents) are strongly related to the idea of paradigms. Generally, the most cited papers are related to 1) methodologies and research tools that establish the standards of scientific practices of the research areas[28] and 2) the scientific achievement that comprise the paradigmatic explanation of a problem.[19] Therefore, the network of top cited papers in a particular research area is strongly related to its paradigmatic research structure. Modularity is another important property of complex networks that refers to the strength of the division of a network in modules or clusters.[29] Clusters (modules) are groups of nodes highly connected each other but poorly connected to those nodes that belong to other groups.[29] Interestingly, modularity and homophily are related: the nodes in a cluster share some properties and information that are not common to the nodes belonging to other clusters. That is, clusters are functional, meaningful and identifiable parts of the network. For example, metabolic networks are divided in modules related to different pathways like carbohydrate metabolism or amino-acid metabolism.[30] Moreover, modules of papers (research fronts) are related to communities of researchers that share in some measure common research interests, objects of study, jargon and standards of scientific practices.[31-32] That is, research fronts could be related to certain scientific cultures or sub-cultures. Importantly, a culture focused in a very specific object of study could be embedded in a particular paradigm (a broader culture) and a paradigm in turn could be part of a research style (a very general way of practicing science), forming a hierarchy. In this regard, a useful concept is the network hierarchy proposed by Albert, Ravasz, and Barabási to explain the coexistence of modularity and the power law distribution of links in complex networks.[33] This model consists of assembling of network modules in larger modules that are in turn forming bigger modules and so on.[33] However, the way that modules are assembled is restricted according a scaling law wherein the clustering coefficient of a node is inversely proportional to its degree (number of links).[33] That is, modules are inter-communicated by nodes with a very high degree and a small clustering coefficient.[33] These classes of nodes are named hubs. By combining hierarchy and homophily a model of interdisciplinary communication can be glimpsed. In this model, the scientific cultures embodied in research fronts or clusters of research fronts are connected by interdisciplinary hubs. We above mentioned that homophily means that the knowledge that flows along the literature networks is located. Therefore, the knowledge that pass through the hubs does not belonged to any of the cultures. Instead, a negotiation process (trading zones) between the cultures would take pace in these hubs. This process is discussed in the following section. 2.3 The KT inside and outside the biomedical field Our approach considers three levels of KT. The first level communicates the biomedical knowledge with the clinical knowledge. These are two completely distinct scientific cultures. The biomedical knowledge has a strong focus on the diseases and its argumentation is accumulative (like building blocks) while clinical knowledge is centered on the patient and its argumentation is competitive (For example, to establish which would be the most suitable health intervention for a particular case).[34] The second level of KT communicates the constituent disciplines of the biomedical knowledge. Five major disciplines have been proposed to make up the biomedical field: Epidemiology, clinical trials, diagnosis (includes screening), therapy development and pathogenesis.[34] This proposal has been partially supported by an analysis of the co-citation network of the 100 top most cited papers on cancer. This analysis showed that the leading cancer research is organized in six clusters: namely, epidemiology, clinical trials, diagnosis, molecular etiology, microarrays and targeted therapies.[23] Our previous studies on the structure of cervical cancer and Ebola research show a similar disciplinary division as we describe below. A third level of KT occurs in the development of specific treatments. At this scale of observation the KT is the connection among the stages of invention (wherein the scientific and technological basis of a product are established), innovation (i.e., the development of a new treatment) and imitation (the development of products strongly based in the original). The KT in Drug Discovery (the transformation of chemical substances into drug therapies) particularly under the paradigm of the rational design, is a process that fundamentally takes place inside the biomedical field. That is, in order to get a newly approved drug in the market, the knowledge on the substances must go through four of these major disciplines of the biomedical science, from basic knowledge of the causes and mechanisms of diseases (etiology and pathogenesis), to the development of drug therapies or tools for diagnosis or screening. Then, the Investigacional New Drug should be evaluated in the different phases of clinical trials in order to get the approval. Finally, it is necessary to evaluate the impact of the new treatment (also, diagnosis tools) in the population level (epidemiology). 3. A model of KT as a communication process among research fronts Two are the central elements of the proposed model of KT: Research fronts and translational hubs. Research fronts are identifiable by clustering the networks of scientific literature.[31, 32] They are related to scientific cultures like biomedical disciplines ( epidemiology, therapy development, pathogenesis, etc.), therapeutic approaches (gene therapy, induced hyperthermia, drug therapy) or communities working on the development of a specific product.[8, 9, 11, 19, 23] Moreover, clustering can identify the stages of invention, innovation and imitation.[10] Importantly, these research fronts are hierarchically organized similarly to the Russian dolls (Figure 1). That is, at the highest level there are the clinical knowledge and the biomedical knowledge. Inside of the biomedical knowledge there are located the fundamental biomedical disciplines like molecular etiology, diagnosis, therapy development or diagnosis. In turn, the molecular etiology can be organized in small communities aimed to the study of specific molecular mechanism. Also, inside of the drug development discipline could be found different therapeutic approaches. Finally, within a specific therapeutic approach or inside of the development of a product line it is possible to identify communities of inventors, innovators and imitators. Translational hubs are regions in the literature network that connect the research fronts at different scales (Figure 1). These regions are highly hierarchical and because of the homophily they contain a sort of a mix of the information contained by the communicated fronts. However, the dynamics inside the translational hub are much more complex. Translational hubs are the topological location of the trading zones, which implies the emergence of a transdisciplinary language and a negotiation process. When two or more research fronts (scientific cultures) interact each other, they interchange terms, data, arguments, tools, etc. The interchanged objects are frequently used and understood differently by the giver and the receiver research fronts according to their respective discursive structures. This interchange of atomized elements -and commonly alienated of their original meanings- is what define the multidisciplinary collaboration among research fronts. On the other hand, the emergence of any language requires an hierarchical articulation of the communicated elements. [35] That is, the interchanged elements are combined to form more sophisticated concepts, and then arguments or conceptual relationships, and so on until a new interdisciplinary narrative and language is built. Moreover, the construction of a new interdisciplinary language implies a negotiation process among the scientific cultures to establish what elements are to be shared and how the conceptual relationship, the argumentation and the methodologies should be articulated. [17] The importance of the negotiation process for the KT is that the former partially deters what molecular mechanism or pathological process will inform the development of therapies; what therapeutic approach is going to be tested in the clinical trials, or what screening tools will be developed. In the next sections the two key elements of the proposed model of KT (research fronts and translational hubs) are illustrated through the revision of five studied cases.[8-11] This instances represent different levels in the knowledge hierarchy: 1) cervical cancer research and Ebola research as examples at the biomedical knowledge level); 2) liposomes and metal nanoparticles to treat cancer as examples of therapy development), and 3) liposomal doxorubicin as an example of a sub-system of products. There are some variations in the methodology used to study the previously mentioned instances, particularly between the study on the KT process in cervical cancer research and the others. However, this approach is consistent in the next four essential aspects: 1) A citation network model of the top cited papers is built, 2) in order to map the distribution of basic, translational and clinical papers in the model the proportion of clinical terms versus basic terms is calculated for every paper, 3) a clustering analysis is performed in order to identify the research fronts, and 4) The content of each identified cluster is analyzed. The methodology produces a map of the research on a specific health problem, discipline or the development of a certain drug. This map identifies the main research fronts (scientific cultures or sub- cultures) and the structural relationships among them. Importantly, this model identifies where and how the KT process takes place. 4. Knowledge translation since the perspective of the biomedical knowledge of health problems 4.1 The context of Ebola and cervical cancer Cervical cancer and Ebola represent two opposite classes of diseases: the chronic diseases (that persist over time) and the acute diseases (rapid onset, a short course, or both) respectively. This is important for the study of knowledge translation because the treatment of chronic disease over the time would require a deeper and more complex knowledge on the patient in comparison to the acute diseases. However, cervical cancer and Ebola share some features as health problems. First, both diseases mainly affect unprotected population in developing countries.[35, 36] Secondly, the affected persons are racially stigmatized in the case of Ebola fever[37, 38] and a there is a sexist stigma in the case of cervical cancer patients who commonly are irrationally accused of sexual misconduct.[39] The stigmas and the unprotected condition of the patients could be negatively impacting the development of a diversity of strategies to prevent or treat these diseases.[8, 11] 4.2 The structure of KT in cervical cancer research and Ebola research The structure of the knowledge on these two health problems is simpler than the general proposed model depicted in the figure 1 (Compare fig. 1 with fig. 2). That is, not all the biomedical disciplines are enough developed to be identified as research fronts.[8, 11] Probably, it is due to their context, which is similar to the situation of the neglected diseases. A clear division between the biomedical (disease centered) knowledge and the clinical (patient centered) knowledge is observed in cervical cancer research.[8] Furthermore, there is a very poor communication (inter-citation) between these two fundamental research styles.[8] Moreover, the biomedical knowledge on cervical cancer comprises mainly three disciplines, namely, molecular etiology, epidemiology and screening. [8] The translational hub is fundamental for the structure of cervical cancer research. This hub communicates the molecular ethology of the disease with the epidemiology and the development of screening tolls (Fig 2). [8] But more importantly, this hub is intrinsically related to the research community that discovered that some variants of the human papillomavirus (HPV) are the necessary cause of the cervical cancer.[8] On the other hand, there is not an identifiable body of clinical knowledge on Ebola.[11] Probably, this is due to the extreme acute and lethal nature of the disease not providing chance to produce knowledge on the ill patient.[11] Interestingly, the structure of biomedical Ebola research is highly reductionist.[11] That is, the molecular etilogy of the disease is represented by three research fronts specialized in three respective viral proteins: VP35, VP40 and the glycoprotein.[11] As a matter of fact, the research on the viral glycoprotein is the biggest front and it strongly influence the development of therapies.[11] The reductionism in Ebola research could be partially explained by a combination of its social context with the fact that Ebola research is strongly militarized and affected by a national security approach in the United States.[11] The general structure of Ebola research is schematically represented in Figure 2. Besides the fronts focused in viral proteins there are fronts related to the disciplines of pathogenesis, epidemiology and therapy development. [11] The translational hub in Ebola research is located in the interaction among the glycoprotein research front, pathogenesis and drug development.[11] This hub is fundamentally aimed to the development of immunotherapies targeting the viral glycoprotein.[11] 5. Knowledge translation since the perspective of the therapy development 5.1 Liposomes and metal nanostructures to treat cancer Liposomes and metal nanostructures are relevant examples of nanoscale technologies aimed to treat cancer. Liposomes are nanoscopic bubbles of lipid bilayer.[40] While, metal nanostructures (MN) are a plethora of different metal (mainly gold) nanoscale particles like nanorods, nanosell or nanocage.[41] Liposomes are broadly versatile drug delivery systems that help to avoid the harmful side effects of drugs and increase the accumulation in the target tissue.[40] They can be combined with small drugs, antibodies or nucleic acids.[40] On the other hand, the extraordinary optical properties of MN in terms of light absorption, light scattering and fluorescence allow their use in imaging and photothermal therapy (the destruction of cancerous tissues by heating with light) to treat cancer.[41] Importantly, these two types of cancer nanotechnologies are related to different explanatory models of cancer. Liposomes are comparatively more akin to the dominant paradigm of cancer as a diseases caused by an accumulative malfunctioning of the molecular machinery of the cells. That is, liposomes tend to be integrated in therapeutic strategies intended to impact or take advantage of the biomolecular dynamic of the cancerous cells. On the other hand, MN are relatively more independent of the biomolecular paradigm of cancer and more close to an explanation of cancer as a disruption in the structure of the tissues. That is, what is important in the use of MN is to reach the cancerous tissues and to physically destroy them. The affinity to different explanatory models of cancer could affect the KT process in these two cancer nanotechnologies being MN a much more radical technology than liposomes. 5.2 The structure of KT in these two types of cancer nanotechnologies The research on liposomes and cancer is organized in six meaningful research fronts.[9] Two of the research fronts are focused on the combination of liposomes with doxorubicin (a small molecule), one of these front is aimed to the development of the drug while the other front consists of clinical trials testing the liposomal doxorubicin.[9] The other research fronts are related to different therapeutic approaches: gene therapy, induced hyperthemia, small interfering RNA, and drug therapy.[9] Moreover, the KT in liposomes and cancer research only occurs for liposomal doxorubicin while the other therapeutic approaches are still basic research.[9] This is strongly related to the development of Doxil (pegylated liposomal doxorubicin) which was the first nanodrug approved by the Food and Drug Administration of the United States.[9] On the other hand, MN and cancer research do not display a KT process, i.e., it is sill basic research.[9] Also, the research on this cancer nanotechnology is not clustered, i.e., it consists of a single research front. [9] The differences in terms of structure and knowledge translation between liposomes and MN applied to cancer could be explained by two factors. First, MN represent a more radical invention in comparison with liposomes with would be relatively a more incremental or conservative technology.[9] Second, liposomes are a complementary technology that can be combined with different class of objects while MN are themselves the therapeutic element.[40] 6 Knowledge translation at the scale of a sub-system of products: the liposomal doxorubicin formulations The liposomal doxorobucin formulations (LDF) represent an example of a sub-system of products. That is a set of products that follow a dominant design, i.e., a set of core features that are established as de facto standards.[42] A design becomes dominant when its features are so appealing that attract an important segment of the market and force the competitors to imitate the design.[42] In this case Doxil (PEGylated liposomal doxorubicin) is the dominant design for this type of formulations.[10] Importantly, LDF is also a subset of liposomes and cancer research. Therefore, the map of LDF research is the zoom in view of the two research fronts related to doxorubicin in the map of liposomes and cancer research above discussed. The network model showed that LDF research is organized in fronts related to communities of inventors, innovators and imitators.[10] There was identified a research front of basic research wherein the technological and scientific basis of this type of formulations were established (the invention stage).[10] A second front is related to the research community that developed Doxil (the innovation stage) and it is connected to a third research front of clinical trials.[10] This clinical trials were aimed to firstly obtain the FDA approval to treat the Kaposi sarcoma and secondly to extend the use of Doxil to treat other cancers.[10] Following these fronts there are others that are related to 1) the combination of Doxil with others therapies[10] and 2) the improvement of liposomal doxorubucin formulation by mean of the use of thermosensitive liposomes and antibodies.[10] This last follower fronts constitute the imitation stage. The front related to the development of Doxil represents the translational hub that connects the basic research (invention stage) with the clinical trials.[10] Interestingly, the innovators constitute an international community of collaborators aimed to integrate three different technological solutions: 1) nano-sized liposomes, 2) Use of pH or ammonium ion gradients for loading of the drug in the nanoliposomes, ans 3) the stealthness technology in order to avoid the reticuloendothelial system.[10, 15] 7. Conclusions In this manuscript we propose an alternative to the linear model (the pipeline model, see [1]) of KT. Our model considers that KT is a hierarchical multiscale phenomenon that can be traced through a combination of network analysis and content analysis (text mining plus the study of the distribution of Medical Heading Subjects and Gene Ontology terms). Clustering analysis can identify research front at different scales ranging from research styles (biomedical knowledge and clinical knowledge) to molecular mechanism or a systems of products like the liposomal doxorubicin formulations. Moreover, KT can be located at specific region of the network model, namely translational hubs. We provided a few examples of KT at different observation scales. However, further research is required. Particularly, we consider that analysis the structure of KT in big health problems like cancers, obesity, or depression at different scales (health problems, biomedical disciplines, therapeutic strategies and so on) can provide fundamental information to a cleared understanding of KT as a complex communication process. Conflict of interest The authors confirm that this article content has no conflict of interest. Acknowledgment David Fajardo-Ortiz is partially supported by the CONACYT PhD scholarship. Figure 1. Hierarchical model of the knowledge translation. Each rounded rectangle represent a research front. They are hierarchically organized in four levels (L1 to L4). The Clinical knowledge and the biomedical knowledge are at the highest level of the organization of knowledge (L1). Inside the biomedical knowledge (L2) there are six of the main biomedical disciplines: Clinical trials, epidemiology, molecular etiology, pathogenesis, screening-diagnosis and therapy development. At the level 3 there are research fronts that could be specialized in certain molecular mechanisms or in specific therapeutic approaches. Inside a therapeutic approach (L4) it is possible to identify communities of inventors, innovators and imitators. The ovals with the TH acronym represent the translational hubs. Figure 2. Structure of the KT in cervical cancer research and Ebola research. References 1. Drolet BC, Lorenzi NM. Translational research: understanding the continuum from bench to bedside. Transl Res. 2011 Jan;157(1):1-5. doi: 10.1016/j.trsl.2010.10.002. Epub 2010 Nov 13. 2. Kon AA. The Clinical and Translational Science Award (CTSA) Consortium and the translational research model. Am J Bioeth. 2008 Mar;8(3):58-60; discussion W1-3. Doi: 10.1080/15265160802109389. 3. Nijhara R, Balakrishnan K. Bringing nanomedicines to market: Regulatory challenges, opportunities, and uncertainties. Nanomedicine 2006; 2(2): 127-36. 4. Pammolli F, Magazzini L, Riccaboni M. The productivity crisis in pharmaceutical R&D. Nat Rev Drug Discov 2011; 10(6): 428-38. 5. Venditto VJ, Szoka FC Jr. Cancer nanomedicines: so many papers and so few drugs! Adv Drug Deliv Rev. 2013 Jan;65(1):80-8. doi: 10.1016/j.addr.2012.09.038. Epub 2012 Oct 1. 6. Chute CG, Ullman-Cullere M, Wood GM, Lin SM, He M, Pathak J. Some experiences and opportunities for big data in translational research. Genet Med. 2013 Oct;15(10):802-9. doi: 10.1038/gim.2013.121. Epub 2013 Sep 5. 7. Holzinger A, Dehmer M, Jurisica I. Knowledge Discovery and interactive Data Mining in Bioinformatics--State-of-the-Art, future challenges and research directions. BMC Bioinformatics. 2014;15 Suppl 6:I1. doi: 10.1186/1471-2105-15-S6-I1. Epub 2014 May 16. 8. Fajardo-Ortiz D, Ochoa H, García L, Castaño V. [Translation of knowledge on cervical cancer: is there a gap between research on causes and research on patient care?]. Cad Saude Publica. 2014 Feb;30(2):415-26. doi: 10.1590/0102-311X00168512. Spanish. 9. Fajardo-Ortiz D, Duran L, Moreno L, Ochoa H, Castaño VM. Liposomes versus metallic nanostructures: differences in the process of knowledge translation in cancer. Int J Nanomedicine. 2014 May 26;9:2627-34. doi: 10.2147/IJN.S62315. ECollection 2014. 10. Fajardo-Ortiz D, Duran L, Moreno L, Ochoa H, Castaño VM. Mapping knowledge translation and innovation processes in Cancer Drug Development: the case of liposomal doxorubicin. J Transl Med. 2014 Sep 3;12:227. doi: 10.1186/s12967-014-0227-9. 11. Fajardo-Ortiz D, Ortega-Sánchez-de-Tagle J, Castaño VM. Hegemonic structure of basic, clinical and patented knowledge on Ebola research: a US army reductionist initiative. J Transl Med. 2015 Apr 19;13:124. doi: 10.1186/s12967-015-0496-y. 12. Merelli I, Pérez-Sánchez H, Gesing S, D'Agostino D. Managing, analysing, and integrating big data in medical bioinformatics: open problems and future perspectives. Biomed Res Int. 2014;2014:134023. doi: 10.1155/2014/134023. Epub 2014 Sep 1. 13. Leydesdorff L. The challenge of scientometrics: The development, measurement, and self- organization of scientific communications. Universal-Publishers, 2001. 14. Stevenson DK, Shaw GM, Wise PH, Norton ME, Druzin ML, Valantine HA, McFarland DA; March of Dimes Prematurity Research Center at Stanford University School of Medicine. Transdisciplinary translational science and the case of preterm birth. J Perinatol. 2013 Apr;33(4):251-8. doi: 10.1038/jp.2012.133. Epub 2012 Oct 18. 15. Barenholz Y. Doxil® — The first FDA-approved nano-drug: Lessons learned. J Control Release. 2012 Jun 10;160(2):117-34. doi: 10.1016/j.jconrel.2012.03.020. Epub 2012 Mar 29. 16. Kuhn T. The Structure of Scientific Revolutions. University of Chicago Press. 1962. 17. Winther R. Evo-Devo as a trading zone. In Conceptual Change in Biology; Love A Ed., Springer Netherlands, 2015; pp. 459-482. 18. Kagan J. The three cultures: Natural sciences, social sciences, and the humanities in the 21st century. Cambridge University Press, 2009. 19. Chaomei C, Cribbin T, Macredie R, Morar S. Visualizing and tracking the growth of competing paradigms: Two case studies. Journal of the American Society for Information Science and Technology. 2002; 53(8): 678-689. 20. Fajardo-Ortiz, David, and Víctor M Castano. Patenting Networking and Knowledge Translation in Liposomes for Cancer Therapy. Recent Patents on Nanomedicine 2014;4(2): 121-128. 21. McPherson M, Smith-Lovin L, Cook J. Birds of a feather: Homophily in social networks. Annual review of sociology. 2001; 415-444. 22. Ding Y. Scientific collaboration and endorsement: Network analysis of coauthorship and citation networks.J Informetr. 2011 Jan 1;5(1):187-203 23. Jones DS, Cambrosio A, Mogoutov A. Detection and characterization of translational research in cancer and cardiovascular medicine. J Transl Med. 2011 May 11;9:57. doi: 10.1186/1479-5876-9-57. 24. Clauset, Aaron, Cosma Rohilla Shalizi, and Mark EJ Newman. Power-law distributions in empirical data. SIAM review. 2009; 51(4): 661-703. 25. Bhavnani SK, Wilson C.S Information scattering. Encyclopedia of Library and Information Sciences. 2010; 2564-2569. DOI: 10.1081/E-ELIS3-120043255. 26. Baltussen A, Kindler CH. Citation classics in critical care medicine. Intensive Care Med. 2004 May;30(5):902-10. Epub 2004 Feb 24. 27. Hennessey K, Afshar K, Macneily AE. The top 100 cited articles in urology.Can Urol Assoc J. 2009 Aug;3(4):293-302. 28. Van Noorden R, Maher B, Nuzzo R. The top 100 papers. Nature. 2014 Oct 30;514(7524):550-3. doi: 10.1038/514550a. 29. Newman ME. Fast algorithm for detecting community structure in networks. Phys Rev E Stat Nonlin Soft Matter Phys. 2004 Jun;69(6 Pt 2):066133. Epub 2004 Jun 18. 30. Guimerà R, Nunes Amaral LA. Functional cartography of complex metabolic networks. Nature. 2005 Feb 24;433(7028):895-900. 31. Anegón F, Contreras E, Corrochano M. Research fronts in library and information science in Spain (1985–1994). Scientometrics. 1998; 42(2):229-246. 32. Shibata N, Kajikawa Y, Takeda Y, Matsushima K. Detecting emerging research fronts based on topological measures in citation networks of scientific publications. Technovation. 2008;28(11):758- 775. 33. Ravasz E, Barabási AL. Hierarchical organization in complex networks. Phys Rev E Stat Nonlin Soft Matter Phys. 2003 Feb;67(2 Pt 2):026112. Epub 2003 Feb 14. 34. Nederbragt H. The biomedical disciplines and the structure of biomedical and clinical knowledge. Theor Med Bioeth. 2000 Nov;21(6):553-66. 35. Gakidou E, Nordhagen S, Obermeyer Z. Coverage of cervical cancer screening in 57 countries: low average levels and large inequalities. PLoS Med. 2008 Jun 17;5(6):e132. doi: 10.1371/journal.pmed.0050132. 36. MacNeil A, Rollin PE. Ebola and Marburg hemorrhagic fevers: neglected tropical diseases? PLoS Negl Trop Dis. 2012;6(6), e1546. Doi:10.1371/ journal.pntd.0001546. Epub 2012 Jun 26. 37. Colhoun D. How xenophobia is driving the Ebola narrative. Columbia J Rev. 2015. Available at http://www.cjr.org/behind_the_news/racialized_ebola_narrative.php?page=all. 38. Murdocca C. When Ebola came to Canada: Race and the making of the respectable body. Atlantis. 2003;27(2):24–31. 39. Braun V, Gavey N. “Bad girls” And “Good girls”? sexuality and cervical cancer. In Women's studies international forum. 1999; 22(2):203-213. 40. Samad A, Sultana Y, Aqil M. Liposomal drug delivery systems: an update review. Curr Drug Deliv. 2007 Oct;4(4):297-305. 41. Huang X, Jain PK, El-Sayed IH, El-Sayed MA. Gold nanoparticles: interesting optical properties and recent applications in cancer diagnostics and therapy. Nanomedicine (Lond). 2007 Oct;2(5):681-93. 42. Murmann J. Frenken K. Toward a systematic framework for research on dominant designs, technological innovations, and industrial change. Research Policy. 2006;35(7):925-952.
1912.07403
1
1912
2019-12-16T14:31:54
REM beyond dyads: relational hyperevent models for multi-actor interaction networks
[ "cs.SI", "stat.AP" ]
We introduce relational hyperevent models (RHEM) as a generalization of relational event models to events occurring on hyperedges involving any number of actors. RHEM can specify time-varying event rates for the full space of directed or undirected hyperedges and can be applied to model, among others, meetings, team assembly, team performance, or multi-actor communication. We illustrate the newly proposed model on two empirical hyperevent networks about meetings of government ministers and co-authoring of scientific papers.
cs.SI
cs
REM beyond dyads: relational hyperevent models for multi-actor interaction networks∗ Jurgen Lerner University of Konstanz Mark Tranmer University of Glasgow [email protected] [email protected] John Mowbray University of Glasgow Marian-Gabriel Hancean University of Bucharest [email protected] [email protected] Abstract We introduce relational hyperevent models (RHEM) as a generalization of relational event models to events occurring on hyperedges involving any number of actors. RHEM can specify time-varying event rates for the full space of directed or undirected hyperedges and can be applied to model, among others, meetings, team assembly, team performance, or multi-actor communication. We illustrate the newly proposed model on two empirical hyperevent networks about meetings of government ministers and co-authoring of scientific papers. Keywords: social network analysis, statistical network models, dynamic networks, hypergraphs, rela- tional hyperevent models, team assembly, team performance 1 Introduction Relational event models (REM) (Butts 2008; Brandes et al. 2009; Lerner et al. 2013a; Stadtfeld and Block 2017) are a general framework for modeling networks of time stamped interaction events. REM specify time- varying event rates associated with dyads comprising a source (the sender of the event) and a target (the receiver of the event). The source and target nodes are often "elementary" units representing, for instance, individuals or objects but can also represent predefined subsets of elementary nodes (Butts 2008), such as a whole school class which may receive broadcast messages from the teacher (DuBois et al. 2013). Yet, in many situations interaction events can occur on arbitrary subsets of nodes, that is, on hyperedges rather than on edges with exactly two endpoints (Kim et al. 2018). For instance, meetings may involve any number of persons, scientific papers may be written by any number of authors, emails may be sent to any number of recipients. Treating such hyperedges as collections of independent (dyadic) edges is invalid in general (Chodrow 2019). The predominant approach to model the rate (or probability) of directed or undirected hyperevents seems to be to specify dyadic event rates and let hyperedges assemble as a function of these dyadic event rates (Guimera et al. 2005; Kim et al. 2018). This approach could overestimate or underestimate the true event rates associated with hyperedges involving more than two nodes. For instance, Alice may frequently send emails to her friend Bob and may also send many emails to her boss Charlie; yet the probability that Alice sends the same email to both, Bob and Charlie, may be close to zero. Such higher-order dependencies cannot be expressed by models restricted to specifying dyadic event rates. ∗We thank participants of the EUSN Satellite Meeting on Relational Event Models, 6 -- 7 September 2019, ETH Zurich for helpful comments on a preliminary version of RHEM. We acknowledge financial support from Deutsche Forschungsgemeinschaft (DFG Grant Nr. LE 2237/2-1), Economic and Social Research Council (grant number ES/R009236/1), and Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI grant, code PN-III-1.1-TE-2016-0362). 1 To overcome limitations of previous models, this paper makes the following methodological contributions: 1. We propose relational hyperevent models (RHEM) as a general framework for networks of undirected and directed relational hyperevents. RHEM, which are defined as a straightforward generalization of REM, can specify event rates on the full space of all possible hyperedges. 2. We apply well-established approximation methods to overcome the prohibitive runtime for evaluating the full likelihood function, which grows exponentially in the number of nodes. By doing so we succeed in reliably estimating RHEM parameters from a co-authoring network comprising hundreds of thousands of nodes and hyperevents. 3. We propose and discuss a range of hyperedge statistics that characterize how arbitrary subsets of nodes are embedded into the network of past events and that shape the rate of future hyperevents. These hyperedge statistics express hypothetical effects in hyperevent networks which can be tested with empirical data. 4. We discuss differences between models that condition on the observed size of hyperevents and models that control for the size of hyperevents. Moreover, we propose a restriction of RHEM to repeated events and discuss why this restriction seems necessary and appropriate when modeling extremely sparse hyperevent networks. 5. We illustratively apply RHEM to two empirical hyperevent networks -- where events represent meetings and co-authored papers, respectively -- and make suggestions for best practices in modeling relational hyperevent networks of varying size. 6. We propose relational outcome models (ROM) which explain outcome of relational hyperevents (rather than the occurrence of events) and apply them to model team performance in a co-authoring network. RHEM are introduced in Sect. 2, applied to empirical data on meetings in Sect. 3 and to co-author networks in Sect. 4. We discuss methodological insights in Sect. 5 and further related work in Sect. 5.1. We end with concluding remarks and an outline of future work. 2 Relational hyperevent models (RHEM) 2.1 Background and notation: hypergraphs and relational hyperevents As a generalization of graphs, hypergraphs contain hyperedges which can connect any number of nodes; see, e. g., Bretto (2013) for a general treatment of hypergraphs. We recall that an undirected hypergraph is a pair G = (V, H), where V is a finite set of nodes and H ⊆ 2V = P(V ) = {V (cid:48) ⊆ V } is a set of undirected hyperedges. An undirected hyperedge h ⊆ V is a set of any number of nodes from V and the size or cardinality of an undirected hyperedge h ∈ H, denoted by h, is its number of elements. An undirected, loopless graph can be seen as an undirected hypergraph in which every hyperedge has size two. A directed hypergraph is a triple G = (U, V, H), where U and V are finite sets of nodes (which may be identical) and H ⊆ 2U × 2V is a set of directed hyperedges. Each directed hyperedge is a pair h = (a, b) ∈ H where a ⊆ U is a set of any number of source nodes and b ⊆ V is a set of any number of target nodes. A directed hyperedge is a loop if its set of sources has a non-empty intersection with its set of targets. The size or cardinality of a directed hyperedge h = (a, b) is the pair of integers h = (a,b) giving the number of sources and the number of targets, respectively. A directed graph can be seen as a directed hypergraph in which every hyperedge has size (1, 1). Given a set of nodes V , an undirected hyperevent is a tuple where he ⊆ V is an undirected hyperedge giving the participants of the event, te is the time of the event, xe is the type and/or weight of the event, and ye is a relational outcome of the event. Types, weights, and/or e = (he, te, xe, ye) , 2 relational outcome may be absent in some settings. The difference between xe and ye lies purely in the time order: the type xe may have an influence on the occurrence of the event, whereas the relational outcome ye is a result of the event. To illustrate this, assume that we are given hyperevents representing teams of actors jointly performing a given task. In this setting, the type of an event could be the type of the task which can determine that the event is more likely to occur on one set of participants than on another (actors may have a preference to perform certain types of tasks). In the same setting, an example of a relational outcome would be given by the success or performance of the team work. The success cannot have an influence on team assembly (that is, on the hyperedge of the event) since the success is unknown at the time when team members are selected. Conversely, the team selection (that is, the hyperedge of the event) can have an influence on the success as some teams may have a higher performance than others. We further note that the relational outcome of an event at time t may have an influence on the selection of the hyperedge of a future event occurring at time t(cid:48) > t since, for instance, actors may be inclined to collaborate with others that have a history of prior success. The definition of directed hyperevents is very similar: given two sets of nodes U and V (which may be identical), a directed hyperevent is a tuple e = (he, te, xe, ye) , where he = (ae, be) is a directed hyperedge with ae ⊆ U and be ⊆ V giving the sources and targets of the event, te is the time of the event, xe is the type and/or weight of the event, and ye is a relational outcome of the event. The size or cardinality of a hyperevent is the size of the underlying hyperedge. The size of hyperevents may be constrained in some application settings. For instance, email communication events typically have exactly one sender and an unconstrained number of receivers. A set of nodes h(cid:48) is called a sub-hyperedge of an undirected hyperedge h if h(cid:48) is a subset of h, that is, if h(cid:48) ⊆ h. A pair of sets of nodes h(cid:48) = (a(cid:48), b(cid:48)) is called a sub-hyperedge of a directed hyperedge h = (a, b) if a(cid:48) ⊆ a and b(cid:48) ⊆ b. We denote the set of all sub-hyperedges of a (directed or undirected) hyperedge h by Sub(h),1 the set of all sub-hyperedges of size k of an undirected hyperedge h by Sub(k)(h), and the set of all sub-hyperedges of size (k, l) of a directed hyperedge h by Sub(k,l)(h). Sub-hyperedges are important for specifying RHEM because if a hyperevent occurs on some hyperedge h, then the actors in every sub- hyperedge h(cid:48) ⊂ h experience a common event (although not exclusively), which in turn may influence the probability that h(cid:48) is included in the hyperedge of a future event -- potentially with other co-participants. 2.2 General model specification Let E = (e1, . . . , eN ) be a sequence of (undirected or directed) hyperevents, given in non-decreasing order in time. We propose two types of model frameworks for specifying the probability (density) of E: the first framework, which is a straightforward generalization of REM (Butts 2008), explains the occurrence of events and the second explains the relational outcome. We defer the description of relational outcome models to Sect. 2.8 and introduce in this section models explaining the occurrence of hyperevents. The definition of the model framework is almost identical for directed and undirected hyperevents; however, differences become more pronounced when we define concrete statistics for hyperevents. For a time point t let Rt denote the risk set that is the set of hyperedges on which a hyperevent could happen at time t. For instance, the risk set may contain all subsets of a given set of nodes. Let G[E; t] denote the network of past events (Brandes et al. 2009) at time t which is a function of E<t = {e ∈ E ; te < t} that is of all events that happen strictly before t (and potentially exogenously given covariates). For a hyperedge h ∈ Rt and a point in time t, let T be the random variable for the time of the next event on h. The event rate (also denoted as hazard rate or intensity) on h at time t, given the network of past 1For an undirected hyperedge h, we might also use the established notation for the power set P(h) or 2h, i. e., the set of all subsets of h. We prefer to denote sub-hyperedges by Sub(h) since it provides a unified notation for undirected and directed hyperedges. 3 events is defined by λ(h; t; G[E; t]) = lim ∆t→0 P rob(t ≤ T ≤ t + ∆t t ≤ T ; G[E; t]) ∆t . (1) The probability (density) of the sequence of hyperevents E can be speficied in various ways. In this paper we specify the likelihood function based on the Cox proportional hazard model (Cox 1972) -- corresponding to the "ordinal" model of Butts (2008) -- which explains relative event rates. Several alternatives for modeling time-to-event data exist (Lawless 2003). Following the Cox proportional hazard model, we decompose the event rate λ into a time-varying base- line rate λ0(t), which is the same for all hyperedges, and a relative event rate λ1(h; t; θ; G[E; t]) which is proportional to the probability that the event at time t occurs on the hyperedge h, rather than on any other hyperedge in the risk set: λ(h; t; θ; G[E; t]) = λ0(t) · λ1(h; t; θ; G[E; t]) , λ1(h; t; θ; G[E; t]) = exp (θ · s(h; t; G[E; t])) . (2) (3) In the equations above, s(h; t; G[E; t]) is a vector of statistics characterizing how the hyperedge h is embedded into the network of past events and θ is a vector of parameters. The baseline rate λ0 is typically left unspecified, or estimated by non-parametric methods, and the partial likelihood based on the observed event sequence E is (cid:89) e∈E (cid:80) L(θ) = λ1(he; te; θ; G[E; te]) h∈Rte λ1(h; te; θ; G[E; te]) . (4) We emphasize how close this framework for relational hyperevents is to REM (Butts 2008; Perry and Wolfe 2013; Vu et al. 2015). Virtually the only difference is that separate event rates are specified for all hyperedges in the risk set, that is, potentially for all subsets of a given set of nodes. This difference, however, has strong implications for the computational complexity to evaluate the likelihood function and for the range of possibilities to define statistics for hyperedges. 2.3 Model estimation and case-control sampling Given the values of the statistics s(h; te; G[E; te]) for all elements of the risk sets Rte at the event times te, maximum likelihood estimates for Eq. (4) can be computed with standard statistical software, such as the R survival package2 (Therneau and Grambsch 2013). The problem in doing so is the prohibitive size of the risk set which scales exponentially with the number of nodes. In our first empirical case study presented in Sect. 3 we analyze data on some 800 meeting events potentially involving any subset of a fixed set of 23 persons. The risk set size is 223 ≈ 8 million which might still be manageable -- although the computational effort seems excessive for such a small network. In the second case study presented in Sect. 4, we analyze data on more than 300 000 papers (corresponding to hyperevents) written by authors from a pool of more than 500 000 researchers. The maximum number of authors per paper is 100, which was chosen as a limit. Even with the limit on the size of hyperedges, we get a prohibitive risk set size of more than(cid:0)500 000 (cid:1) subsets. The problem arising from the size of the risk set is much more severe for relational hyperevent models than for REM. In the latter, the risk set grows quadratically in the number of nodes which might already result in an infeasible runtime for larger networks. Butts (2008) proposed to mitigate such problems by sampling from the risk set, Vu et al. (2015) applied case-control sampling (Borgan et al. 1995) in which for each event ("case") a fixed number of "controls" (non-events from the risk set) are sampled, Lerner and Lomi (2019) performed an experimental reliability study of case-control sampling in the estimation of dyadic REM, found that models can be fitted to data with a risk set size of more than 30 trillion, and proposed to experimentally assess the parameter variability by repeated sampling. 100 2https://CRAN.R-project.org/package=survival 4 Encouraged by these results, we propose to also apply case-control sampling when estimating relational hyperevent models. Note that the risk set size of our first empirical study is much smaller than the one considered in Lerner and Lomi (2019) but the size in the second study is larger by a huge factor. For a fixed number m of controls per event, we consider for each event e ∈ E a sampled risk set Rte which contains the hyperedge he plus m additional hyperedges uniformly and independently drawn at random from Rte without replacement. The sampled likelihood L is obtained by replacing the full risk sets in Eq. (4) by the sampled risk sets: L(θ) = λ1(he; te; θ; G[E; te]) h∈ Rte λ1(h; te; θ; G[E; te]) . (5) (cid:89) e∈E (cid:80) Lerner and Lomi (2019) propose to additionally sample from the observed events, which can be a strategy to scale models to even more events. 2.4 Network effects Network effects are specified via hyperedge statistics which are real-valued functions characterizing how hyperedges at a given time t are embedded into the network of past events G[E; t]. These statistics are used in the specification of the relative event rate in Eq. (3) and therefore determine the distribution of future events. Possibilities to define hyperedge statistics are abundant. In the following we describe in a modular way (1) how past events and/or exogenous covariates are aggregated into hyperedge attributes and (2) how hyperevent statistics are defined as a function of hyperedge attributes. Many variants exist for each step which often can be freely combined. 2.4.1 Hyperedge attributes For an undirected hypergraph with an underlying node set V , a hyperedge attribute is a partial function att: Sub(V ) → R defined on hyperedges among the nodes from V . For a directed hypergraph with an underlying set U of possible senders and a set V of possible receivers, a hyperedge attribute is a partial function att: Sub((U, V )) → R defined on hyperedges connecting some or all senders from U to some or all receivers from V . Hyperedge attributes are partial functions since they may be defined only on a subset of these hyperedges, for instance, only on hyperedges of a given size. Hyperedge attributes encode the state of the network of past events G[E; t] at a given time t. They can be functions of exogenously given covariates or can be functions of past events. For the latter kind we mention two types of hyperedge attributes that are particularly important and whose definition is identical for undirected and directed hyperevents. Hyperedge activity gives for a hyperedge h and a point in time t the number of hyperevents on h that happen strictly before t. hyperedge.activity(h; t; E) = χ(h = he) . (The function χ(·) is the indicator function that is one if the argument is true and zero else.) (cid:88) e∈E<t (cid:88) e∈E<t Hyperedge degree gives for a hyperedge h and a point in time t the number of hyperevents on any superset of h that happen strictly before t. hyperedge.degree(h; t; E) = χ(h ⊆ he) . (6) For instance, for a one-element hyperedge h = {v}, with v ∈ V , the hyperedge degree at time t is the number of past hyperevents in which v participated. For a two-element hyperedge h = {u, v}, with u, v ∈ V , the hyperedge degree at time t is the number of past hyperevents in which u and v co-participated. In general, for a set of nodes h ⊆ V , the hyperedge degree at time t is the number of past hyperevents in which all 5 nodes from h co-participated. Statistics based on the hyperedge degree operationalize effects in which events are partially repeated in the sense that some, but not necessarily all, co-participants of past events jointly experience future events, potentially with other co-participants. The difference between hyperedge activity and hyperedge degree is that hyperedge activity requires past hyperevents to happen exactly on the focal hyperedge h, without any further participants outside of h. In contrast, the definition of hyperedge degree counts past hyperevents in which all participants of the focal hyperedge h co-participated, but allows that these hyperevents involved further participants outside h. Variations. Rather than summing up the number of past hyperevents, hyperedge attributes may also take into account (functions of) the type, weight, or relational outcome of past events, may be dichotomized, or may decay the contribution of past events over time, similar as this has been suggested for dyadic events (Lerner et al. 2013a). A further variant for the hyperedge degree involves down-weighting co-participation in large events. For example, for two actors u and v, the experience to co-participate in an event h might be stronger if h is small (since then it is a rather "exclusive" event) than if h is large (in which case u and v might not even be aware that they co-participate in the same event). Down-weighting the impact of large events on the hyperedge degree can, for instance, be done by dividing the terms in Eq. (6) by the size of the hyperedge he. 2.4.2 Hyperedge statistics The relative event rate in Eq. (3) has been specified as a parametric function of hyperedge statistics s(h; t; G[E; t]), characterizing how the hyperedge h is embedded into the network of past events G[E; t]. In the following, we define a list of hyperedge statistics, most of which are inspired by related statistics which are typically used in REM (Butts 2008; Brandes et al. 2009; Lerner et al. 2013a; Stadtfeld and Block 2017). Hyperedge size. For undirected hyperedges, the statistic size gives the number of participants. size(h; t; G[E; t]) = h . For a directed hyperedge h = (a, b), the size is characterized by two values, the number of sources and the number of targets. num.sources(h; t; G[E; t]) = a num.targets(h; t; G[E; t]) = b . If the risk sets Rt contain hyperedges of varying size (for instance, all hyperedges among a given set of nodes), the size of hyperedges often has a very strong impact on the event rate and therefore it is important to control for the effect of size. In our first empirical application, presented in Sect. 3, we find a curvilinear, U-shaped effect of size on the event rate: small hyperevents but also large hyperevents are over-represented while events occuring on hyperedges of intermediate size are relatively rare. Such a U-shaped effect can be specified by including the size and the squared size in the model statistics. Hyperedge size is one of the few hyperedge statistics that have no related statistic in dyadic REM. Repetition models the tendency to repeat hyperevents involving the identical set of participants (or identical sets of sources and targets, respectively) and is formally defined by repetition(h; t; G[E; t]) = hyperedge.activity(h; t; E) . The definition is identical for undirected and directed hyperevents. 6 In the case of undirected hyperevents, sub-repetition of order p models the Sub-repetition (undirected). tendency of sets of p nodes to repeatedly experience joint events, potentially within larger sets of participants. It is formally defined by sub-repetition(p)(h; t; G[E; t]) = (cid:1) (cid:88) h(cid:48)∈Sub(p) 1(cid:0)h p hyperedge.degree(h(cid:48); t; E) . (h) The statistic as defined above takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ h of size p. For p = 1 it gives the average number of previous hyperevents involving the individual participants of h, for p = 2 it gives the average number of previous joint events of all dyads among the participants of h, for p = 3 it considers previous joint events of all triads contained in h, and so on. The definition above counts a past hyperevent e occurring on a hyperedge he as often as there are p- Rather than the average we might also use other functions to aggregate values on all sub-hyperedges, such as the minimum, maximum, sum, or standard deviation. For instance, taking the standard deviation would give the dispersion of the hyperedge degree over the sub-hyperedges of h. (cid:1) times. This may put too much weight on element subsets of the intersection he ∩ h, that is, precisely(cid:0)he∩h (cid:88) hyperevents having large intersections with the focal hyperedge h. An alternative definition of sub-repetition -- denoted by shared prior events of order p -- is to count past hyperevents only once if their intersection with h has at least p elements; in formulas: p shared.prior.events(p)(h; t; G[E; t]) = χ(he ∩ h ≥ p) . e∈E<t Variations of this alternative definition can take type, weight, or relational outcome of past events into account, may decay the impact of past events over time, or may normalize the statistic by the size of the hyperedge h. Sub-repetition (directed). In the case of directed hyperevents, sub-repetition of order (p, q) models the tendency of a set of p sources (potentially together with other source nodes) to repeatedly send events to a set of q targets (and potentially other target nodes). For a hyperedge h = (a, b), it is formally defined by (cid:0)a (cid:1) ·(cid:0)b 1 p q (cid:1) (cid:88) h(cid:48)∈Sub(p,q) hyperedge.degree(h(cid:48); t; E) . (h) sub-repetition(p,q)(h; t; G[E; t]) = This statistic takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ h of size (p, q). That is, it takes the average over the combinations of all subsets a(cid:48) ⊆ a of p sources with all subsets b(cid:48) ⊆ b of q targets. As in the undirected case, we might also use other functions to aggregate values on all sub-hyperedges, such as the minimum, maximum, sum, or standard deviation, or we might count shared prior events of order (p, q) only once. General sub-hyperedge characteristics. We note that the approach to aggregate values over all sub- hyperedges (or all sub-hyperedges of a given size) is not restricted to hyperedge degrees but can be applied to any hyperedge attribute, irrespective of whether this attribute represents exogenous covariates or is a function of past events. For instance, assuming that we are given node-level attributes -- that is, attributes defined on hyperedges of size one -- representing, for instance, age or past performance of actors, we can characterize a hyperedge by the average (or any other function of) attribute values of its participants. Reciprocation models, in the case of directed hyperevents, the tendency to reciprocate events, that is, the tendency that the former set of targets becomes the set of sources, sending events directed to the former set of sources. For a directed hyperedge h = (a, b) reciprocation is formally defined by reciprocation(h; t; G[E; t]) = hyperedge.activity((b, a); t; E) . 7 Reciprocation is only defined in one-mode hyperevent networks, where the set of potential sources is identical with the set of potential targets. The same comment applies also to the other variants of reciprocation defined below. Sub-reciprocation. In the case of directed hyperevents, sub-reciprocation of order (p, q) models the ten- dency of sets a(cid:48) of p former sources to receive events from sets b(cid:48) of q former targets to which the nodes from a(cid:48) (potentially together with other sources) have previously sent events (potentially within larger sets of targets). For a directed hyperedge h = (a, b), it is formally defined by (cid:0)b (cid:1) ·(cid:0)a 1 p q (cid:1) (cid:88) h(cid:48)∈Sub(p,q) hyperedge.degree(h(cid:48); t; E) . ((b,a)) sub-reciprocation(p,q)(h; t; G[E; t]) = This statistic takes the average hyperedge degree over all sub-hyperedges h(cid:48) ⊆ (b, a) of size (p, q) of the reverse hyperedge (b, a). We note that the parameters p or q in directed sub-repetition or sub-reciprocation can also be zero. Concretely, sub-repetition(p,0) models a generalized repetition effect in which the same set of p nodes re- peatedly initiates events towards any set of targets and sub-repetition(0,q) models a generalized repetition effect in which the same set of q nodes repeatedly receives events from any set of sources. Similarly, sub-reciprocation(p,0) models a generalized reciprocation effect in which a set of p nodes that have jointly sent events to any set of targets receives common events from any set of sources and sub-reciprocation(0,q) models a generalized reciprocation effect in which a set of q nodes that have received common events from any set of sources jointly sends events to any set of targets. Switch reciprocation. In the case of directed hyperevents, switch reciprocation is related to -- but more permitting than -- reciprocation. Switch reciprocation models patterns in which a part of former targets become sources and send events to former sources and former targets. Switch reciprocation is characterized by a number l giving the number of nodes switching the role of source and target. Switch reciprocation is typical, for instance, in email communication where the "reply-to-all" functionality enables one former target (i. e., an actor among the receivers of a past email) to send an email to the former source (sender of that past email) and to all the other targets. This reply-to-all pattern is captured by switch reciprocation of order 1. For a positive integer l, we first define the operator switch(l) mapping a directed hyperedge h = (a, b) to the set of all hyperedges obtained from h by interchanging l elements from a with l elements from b. For simplicity we define switch reciprocation only for loopless hypergraphs. Formally the operator switch(l) is defined by (cid:26) switch(l)(h) = h(cid:48) = (a(cid:48), b(cid:48)) ; ∃a(cid:48)(cid:48) ∈ , b(cid:48)(cid:48) ∈ (cid:18)a (cid:19) (cid:0)a (cid:1) ·(cid:0)b 1 l l l : a(cid:48) = a ∪ b(cid:48)(cid:48) \ a(cid:48)(cid:48) ∧ b(cid:48) = b ∪ a(cid:48)(cid:48) \ b(cid:48)(cid:48)(cid:27) (cid:18)b (cid:19) (cid:1) · (cid:88) hyperedge.degree(h(cid:48); t; E) . l h(cid:48)∈switch(l) (h) Switch reciprocation of order l is formally defined by switch-reciprocation(l)(h; t; G[E; t]) = Closure (undirected). Triadic closure refers to patterns in which events on a hyperedge h depend on previous events in which subsets of the nodes in h have co-participated with common third actors. Triadic closure in hyperevent networks is characterized by a triple of positive integers (p, q, l) where p and q give the sizes of two disjoint subsets h1, h2 ⊂ h and l gives the size of a set of nodes V (cid:48) ⊂ V \ (h1 ∪ h2) which may (but does not have to) be disjoint from h and with which nodes in h1 and in h2 co-participated in common events. For a triple of positive integers (p, q, l) and an undirected hyperedge h from a given set of nodes V , we define the operator Sub(p,q,l)(h) by Sub(p,q,l)(h) = {(h1, h2, V (cid:48)) ; h1 = p, h2 = q, V (cid:48) = l, h1, h2 ⊂ h, V (cid:48) ⊂ V, h1 ∩ h2 = h1 ∩ V (cid:48) = h2 ∩ V (cid:48) = ∅} 8 Closure of order (p, q, l) is formally defined by closure(p,q,l)(h; t; G[E; t]) = (cid:1) ·(cid:0)h−p (cid:1) ·(cid:0)V −(p+q) (cid:0)h (cid:88) 1 p q l (cid:1) × min[h.deg(h1 ∪ V (cid:48); t; E), h.deg(h2 ∪ V (cid:48); t; E)] , where we write h.deg as an abbreviation for hyperedge.degree. (h1,h2,V (cid:48))∈Sub(p,q,l) (h) Closure (directed). Closure in directed hyperevent networks is similar but has more variants. As in the case of dyadic relational events, we can distinguish the four variants: transitive closure, cyclic closure, shared senders, and shared receivers. Due to the simple observation that there are no triangles in two-mode networks, we define triadic closure in directed hyperevent networks only for one-mode networks where the set of potential senders U is equal to the set of potential receivers V and, for simplicity, we restrict the definition to loopless hypergraphs. For a triple of positive integers (p, q, l) and a directed hyperedge h = (a, b) from a given set of nodes V , we define the operator Sub(p,q,l)(h) by Sub(p,q,l)(h) = {(a(cid:48), b(cid:48), V (cid:48)) ; a(cid:48) = p, b(cid:48) = q, V (cid:48) = l, a(cid:48) ⊆ a, b(cid:48) ⊆ b, V (cid:48) ⊂ V, a(cid:48) ∩ V (cid:48) = b(cid:48) ∩ V (cid:48) = ∅} The four variants of triadic closure are formally defined by: min[h.deg((a(cid:48), V (cid:48)); t; E), h.deg((V (cid:48), b(cid:48)); t; E)] min[h.deg((V (cid:48), a(cid:48)); t; E), h.deg((b(cid:48), V (cid:48)); t; E)] min[h.deg((a(cid:48), V (cid:48)); t; E), h.deg((b(cid:48), V (cid:48)); t; E)] transitive.closure(p,q,l)(h; t; G[E; t]) = cyclic.closure(p,q,l)(h; t; G[E; t]) = shared.receivers(p,q,l)(h; t; G[E; t]) = shared.senders(p,q,l)(h; t; G[E; t]) = (cid:0)a p (cid:0)a p (cid:0)a p (cid:0)a p (a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l) q q 1 1 (h) (cid:1) ·(cid:0)b (cid:1) ·(cid:0)V −(p+q) (cid:1) × (cid:88) (cid:1) ·(cid:0)V −(p+q) (cid:1) ·(cid:0)b (cid:1) × (cid:88) (cid:1) ·(cid:0)b (cid:1) ·(cid:0)V −(p+q) (cid:1) × (cid:88) (cid:1) ·(cid:0)b (cid:1) ·(cid:0)V −(p+q) (cid:1) × (cid:88) (h) (h) 1 1 q q l l l l (a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l) (a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l) min[h.deg((V (cid:48), a(cid:48)); t; E), h.deg((V (cid:48), b(cid:48)); t; E)] (a(cid:48),b(cid:48),V (cid:48))∈Sub(p,q,l) (h) 2.5 Dependencies implied by statistics Different hyperedge statistics imply dependencies among subsets of different order. To illustrate this for the statistics sub-repetition and repetition, assume that, in the context of a co-author network, there are three different groups, each containing three actors, denoted by {Ai, Bi, Ci} for i = 1, 2, 3. Moreover, assume that each of the three actors in Group 1 has published two single-author papers, that the actors in Group 2 have published three pairwise co-authored papers (that is, three papers authored by {A2, B2}, {A2, C2}, 9 and {B2, C2}, respectively), and that the third group has jointly published one three-author paper and, in addition, each of its actors has published one single-author paper. Given these histories of past interaction, the future event rate to publish a joint three-author paper for the three hyperedges {A1, B1, C1}, {A2, B2, C2}, {A3, B3, C3} depends on which hyperedge statistics are included in the model. A first model depending only on sub-repetition of order one would assign the same rate to all three hyperedges. After all, each of the nine actors has published two previous papers and, thus, has the same degree (that is, the same number of previous events). This model would miss that the authors of Group 2 and Group 3 have collaborated before, but those of Group 1 did not. A second model depending on sub-repetition of order one and sub-repetition of order two would recognize the difference between Group 1 and Group 2 (the actors of Group 1 have never collaborated before, but those of Group 2 did) but would fail to distinguish between Group 2 and Group 3 in which each single author has authored the same number of papers (namely two) and each pair of authors has co-authored the same number of papers (namely one). A third model depending on sub-repetition of order one, two, and three could also distinguish between Group 2 and Group 3, since the hyperedge {A3, B3, C3} has experienced a common event before but the hyperedge {A2, B2, C2} did not. Finally, a fourth model depending only on the repetition statistic could assign different event rates to the third group {A3, B3, C3} than to Groups 1 and 2 (since Group 3 previously experienced a common event, but Groups 1 and 2 did not) but could not distinguish between {A1, B1, C1} and {A2, B2, C2} (since neither of these two hyperedges experienced any previous event. p ≥ 3 introduce dependencies that cannot be expressed in models specifying only dyadic event rates. The discussion above also illustrates that the statistic repetition and the statistics sub-repetition of order 2.6 Conditioning on hyperedge size As it will become apparent in the empirical applications, sequences of observed hyperevents often have a very different distribution of hyperedge sizes than hyperedges randomly sampled from the set of all subsets. As a consequence of this, the hyperedge size often has a very strong impact on event rates and model fit. Seen from a different angle, defining the risk sets Rt to be the entire set of all hyperedges among a given set of nodes returns an abundance of hyperedges that have an unrealistic size. For these reasons, it might be a valuable alternative to restrict the risk sets associated with observed events e to those hyperedges having the same size as e. In other words, we also consider models that condition on the size of the observed hyperedges. It turns out in our empirical analysis that models conditioning on the event size can produce different findings than unconstrained models. We will discuss in Sect. 3 how these different results can be interpreted with respect to each other. 2.7 New events vs. repeated events The probability that a hyperedge h experiences any event is typically by many orders of magnitude smaller than the conditional probability that h experiences a repeated event, given that there has been at least one event on h before. Especially in larger networks, the marginal probability of new events is negligible compared to the conditional probability of repeated events. This observation, which is rooted in the enormous size of the risk set, can lead to numerical instability when estimating the effect of the repetition statistic -- but it also raises the conceptual question whether "first events" (that is, events happening on a hyperedge that has never experienced any event before) are influenced by the same network effects than repeated events. For these reasons, we consider the alternative to analyze first events on any hyperedge by a different model than repeated events. We note that repeated events, that is, events occurring on a hyperedge that has experienced at least one event before, is not the only possibility to identify a subset from the risk set that has a much higher event rate than the average rate over the unconstrained risk set. Another possibility would be, for instance, to consider only those hyperedges in which all subsets of a given order (such as, all pairs of nodes) experienced at least one event before, potentially within a larger set of participants. We discuss the rationale for modeling new events and repeated events separately in more detail in Sects. 4 and 5. 10 2.8 Relational outcome models Relational outcome models (ROM) explain the outcome ye of a relational hyperevent e = (he, te, xe, ye), given that the event e occurs. In settings in which hyperevents represent tasks solved by teams, a relational outcome can measure, for instance, the performance of the team on this given task. In many settings, the basic model for the outcome variable falls into the family of generalized linear models (GLM). For instance, a numeric success indicator might be modeled by linear regression or a binary indicator distinguishing between success and failure might be modeled by logistic regression. With this in mind, ROM seem to add little over the basic statistical toolbox. However, the contribution of ROM is that -- in contrast to GLM -- they can cope with certain forms of non-independence among observations. For instance, the success probability of a given hyperedge h (that is, of a given team of actors) at a hyperevent at time t is likely to depend on prior success of the same team h -- but is also likely to depend on prior success of the individual actors in h, on prior shared success of dyads or triads of actors in h, and so on. ROM can model relational outcome dependent on the history of previous events, in the same way as RHEM model event rates dependent on the history of previous events, We assume that we have chosen a distribution f (y) for the variable y giving relational outcomes of hyperevents. ROM specify the likelihood of an observed sequence of relational events E, by assuming conditional independence of relational outcomes, given the network of previous events: (cid:89) e∈E L(θ) = f (ye he; te; xe; θ; G[E; te]) . (7) The distribution f (ye he; te; xe; θ; G[E; te]) is specified as a function of parameters θ and statistics that are functions of the network of past events G[E; te], as the ones defined in Sect. 2.4.2. 3 Case study I: Meetings The first empirical case study that we consider in this paper is about a sequence of meeting events involving any number of participants from a relatively small set of actors. 3.1 Setting and data The data for this case study are sourced from the engagement diaries of former UK Prime Minister (PM) Margaret Thatcher (Margaret Thatcher Foundation 2019). Diary entries list the dates, times, and partici- pants of scheduled meetings undertaken by the PM on a day-to-day basis. Here, we focus on the hyperevents (i. e., meetings) involving one, several, or all cabinet ministers (n = 23) between 5th May 1979 and 31st De- cember 1980 -- i. e., the beginning of Thatcher's first term as PM.3 Although other actors often participated in these meetings, they were removed from the data in order to focus explicitly on the PM's interactions with cabinet colleagues. In total we analyze 886 meeting events, which are listed by the minute and do not overlap. As the PM was present at each of the meetings -- and therefore her participation rate does not vary -- the underlying hyperedges comprise only of cabinet ministers, excluding the PM. Accordingly, event sizes range from 1 to 23. The size distribution of observed hyperevents -- and that of the non-event hyperedges sampled from the unconstrained risk set -- is given in Fig. 1. This shows that small events and large events are over- represented, while events of intermediate size are relatively rare -- especially when compared to the high frequency of intermediate hyperedge sizes in the risk set. Note that the binomial distribution f (k) = (cid:0)n (cid:1) assumes a maximum at the integer k closest to n/2. There are no types, weights, or relational outcome variables associated with these meeting events. k 3The official cabinet contained 21 ministers. However, Michael Jopling (Chief Whip) and Norman Fowler (Minister for Transport) participated in weekly cabinet meetings during the time period in focus, and their presence is represented in the data. 11 Figure 1: PM meetings data. Histogram of sizes of observed hyperevents (top) and histogram of sizes of sampled non-event hyperedges (bottom). 12 hyperedge size of observed eventshyperedge sizeFrequency05101520250200400600hyperedge size of sampled controlshyperedge sizeFrequency051015202504001000 3.2 Model specification When analyzing data from the first case study we want to tackle three issues which are mostly of method- ological interest to increase our understanding of RHEM: (1) to find out whether there is any higher-order dependence in emprical hyperevent data (compare the discussion in Sect. 2.5), (2) to assess the impact of the hyperedge size (or functions of it) on the event rate, and (3) to compare models considering unconstrained risk sets with models conditioning on the observed event sizes. To tackle these questions we first estimate a family of twelve models obtained by systematically adding the following types of hyperedge statistics in the Cox-proportional hazard models given in Eq. (5). We consider models with and without the repetition statistic and with and without the two statistics giving the size of the hyperedge and the squared size of the hyperedge. (Note that Fig. 1 suggests a curvilinear, U-shaped effect of event size on event rates, which might be reproduced by considering a polynomial of order two of the hyperedge size.) For each of the four resulting combinations, we consider a family of three models successively including sub-repetition of order one, two, and three, respectively. Results of these models are reported in Table 1. Besides the estimated parameters, their standard errors, and significance levels, we also report the AIC as a measure of model fit (recall that lower AIC points to better model fit). We estimate a second family of six different models that condition on the size of observed hyperevents, as it has been discussed in Sect. 2.6. That is, the risk set associated with an observed hyperevent e = (he, te) is defined to be Sub(he)(Vte ), that is the set of all subsets of size he of the set of actors Vte , where the latter set comprises all cabinet ministers participating in any event at or before te. When we condition on the size of the observed hyperevent, we cannot use hyperedge size (or any function of it) as an explanatory variable since it is identical for the event and all associated non-event hyperedges. We therefore consider six models, with and without the repetition statistic and successively including sub-repetition of order one, two, and three, respectively. Results of these models are reported in Table 2. 3.3 Results Unconstrained risk set. Table 1 reports estimated models considering the unconstrained risk set. Dis- cussing first the model fit indicator (AIC), we find that including the size and squared size of hyperevents brings the biggest improvement in model fit, followed by the improvements implied by the repetition statistic. The model fit assesses how well the model can distinguish between events and non-events from the set of observations, in the sense that "better" models assign higher rates to event hyperedges and lower rates to non-event hyperedges. Looking at Fig. 1 it seems very plausible that the size and squared size of hyperedges serve this purpose very well: an observation with a size close to the minimum or close to the maximum is more likely to be an event, while an observation with a size close to the median is more likely to be a non-event. This makes it plausible why including the two statistics dependent on size improve the AIC to such a large extent. The parameter associated with the square of the hyperedge size is positive (pointing to a U-shaped quadratic function that takes larger values at the extremes) and the parameter associated with the size of the hyperedge is negative -- shifting the minimum of this polynomial to the positive numbers. Including the repetition statistic brings the second-largest improvement to the model fit. The parameter associated with repetition is consistently positive, so that the event rate on a hyperedge h is typically higher the more previous events happened on the identical hyperedge h. In particular, we consistently find higher-order dependence -- going beyond purely dyadic event rates -- among hyperevents. The effect of sub-repetition of order one is consistently positive, implying that actors that have been more active in the past (i. e., that have participated in more events) are more likely to be included among the participants of the next event. From another point of view, a hyperedge has a higher event rate if it is composed of participants that have been more active before. Adding sub-repetition of order two or three on top of the other effects has an inconsistent effect on model fit and yields parameters that strongly depend on whether or not repetition or the statistics dependent on event size are included. Considering the block of the first three models we find that adding sub-repetition of order two and three to models not controlling for repetition or event size brings a modest improvement in the model fit. Parameters associated with sub-repetition of order two and three are negative in models neither 13 3.77 (0.15)∗∗∗ 2789.68 4.13 (0.43)∗∗∗ 23.12 (1.74)∗∗∗ 675.59 10.02 (0.51)∗∗∗ 10.60 (0.49)∗∗∗ −5.08 (0.27)∗∗∗ −2.63 (0.40)∗∗∗ −2.18 (0.30)∗∗∗ 1723.40 6.21 (0.84)∗∗∗ −1.93 (0.61)∗∗ 19.47 (1.97)∗∗∗ 1646.03 8.77 (1.65)∗∗∗ 3.88 (1.90)∗ −8.18 (1.38)∗∗∗ 13.98 (1.79)∗∗∗ 665.56 511.42 repetition.order.1 repetition.order.2 repetition.order.3 AIC repetition.order.1 repetition.order.2 repetition.order.3 repetition AIC repetition.order.1 repetition.order.2 repetition.order.3 meeting.size meeting.size.squared AIC repetition.order.1 repetition.order.2 repetition.order.3 repetition meeting.size meeting.size.squared AIC ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05 8.22 (0.77)∗∗∗ 8.40 (1.52)∗∗∗ −0.09 (0.72) 7.21 (1.49)∗∗∗ −1.35 (0.62)∗ 1.91 (0.53)∗∗∗ −1.56 (0.17)∗∗∗ −1.56 (0.18)∗∗∗ −1.68 (0.19)∗∗∗ 1.72 (0.16)∗∗∗ 1.67 (0.15)∗∗∗ 1.67 (0.15)∗∗∗ 214.79 216.78 209.21 5.99 (1.42)∗∗∗ 9.81 (3.04)∗∗ −2.29 (2.42) −0.49 (1.34) 4.59 (0.97)∗∗∗ 4.38 (0.87)∗∗∗ −2.18 (0.34)∗∗∗ −2.24 (0.35)∗∗∗ −2.23 (0.35)∗∗∗ 1.11 (0.16)∗∗∗ 1.13 (0.16)∗∗∗ 9.47 (2.88)∗∗∗ −2.50 (2.00) 4.54 (0.95)∗∗∗ 1.14 (0.16)∗∗∗ 99.76 100.28 102.11 Table 1: PM meetings data analyzed by RHEM with unconstrained event size. All models have been estimated on 886 events and 9,727 observations. (Note that the number of observations is the number of events plus the number of sampled non-event hyperedges.) 14 repetition.order.1 repetition.order.2 repetition.order.3 AIC repetition.order.1 repetition.order.2 repetition.order.3 repetition AIC ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05 3350.83 0.85 (0.09)∗∗∗ 1.24 (0.06)∗∗∗ 0.29 (0.05)∗∗∗ 3324.65 0.92 (0.06)∗∗∗ 2.14 (0.16)∗∗∗ 3083.56 0.19 (0.11) 2.24 (0.16)∗∗∗ 0.50 (0.06)∗∗∗ 0.93 (0.06)∗∗∗ 0.98 (0.16)∗∗∗ 2.17 (0.27)∗∗∗ 3000.43 0.37 (0.11)∗∗∗ 1.32 (0.18)∗∗∗ 1.82 (0.28)∗∗∗ 0.38 (0.07)∗∗∗ 3019.10 2967.39 Table 2: PM meetings data analyzed by conditional-size RHEM. All models have been estimated on 886 events and 8,961 observations. controlling for hyperedge size nor for repetition. We claim that these negative parameters are spurious effects that result from the failure to control for hyperedge size. Indeed, we find that 483 events (that is more than half of all events) have a hyperedge size equal to one. If a hyperedge has a non-zero value in sub-repetition of order two or three, it is a signal that this hyperedge cannot have size one. Thus it cannot be among those observations that have the the highest event rates -- explaining why sub-repetition of order two or three has a seemingly negative effect on event rates in models not controling for event size. We conclude that if sizes of observed events and sizes of sampled non-event hyperedges have different distributions -- as those shown in Fig. 1 -- relational hyperevent models necessarily have to control for hyperedge size. Failure to do so may lead to spurious results due to correlations of explanatory variables with (functions of) hyperedge size. We further find that, once we control for repetition, size, and square size of hyperedges, sub-repetition of order two and three have no significant effect on event rates and including them actually decreases model fit. The model with the highest model fit is the one with AIC=99.76, including sub-repetition of order one (i. e., past activity of individual participants), repetition (i. e., past activity of the exact same hyperedge), size of hyperedges, and squared size of hyperedges. The event rate on a given hyperedge h is higher if the size of h is either close to the minimum or close to the maximum, if the actors in h participated individually in many previous events, and/or if the exact same hyperedge experienced many previous events. On top of these effects, the number of previous shared events of dyads or triads contained in h has no further effect on the event rate. We may wonder whether the quadratic function of hyperedge size captures the effect of size on event rates sufficiently well. We experimented with estimating fixed effects for all possible meeting sizes. This, however, resulted in a non-convergent model due to the fact that some possible meeting sizes are not realized by any event in our empirical data. We leave it to future work to develop more sophisticated models for the effect of size on event rates. Conditional-size models. One way to circumvent the question how to best control for the effect of hyper- edge size is to consider the observed sizes as given (rather than random) and model event rates conditional on these event sizes, as it has been discussed in Sect. 2.6. That is, conditional size models define the risk set associated with an observed hyperevent e = (he, te) to be the set of all subsets of size he of the set of actors Vte . Table 2 reports findings on these kind of models (in which we do not have to -- and actually cannot -- control for the effect of hyperedge size). In conditional-size models we find that the effects of all statistics are very consistent across models and every statistic improves the model fit when added to any baseline model. The best-fitting model, thus, is the model including repetition and sub-repetition of order one, two, and three. This model suggests that the event rate on a given hyperedge h -- compared to other hyperedges of the same size as h -- is typically higher if (1) the members of h individually participated in many previous events, (2) each pair composed of 15 two members of h co-participated dyadwise in many common previous events, (3) each triad composed of three members of h co-participated triadwise in many common previous events, and (4) all members of h co-participated in many common previous events, without any further participants. In particular, we find higher-order dependence in hyperevents also with conditional-size models. How can we interpret the partially different findings resulting from unconstrained models and conditional- size models? One way to find an interpretation is to assume hypothetical modifications of an hyperedge h -- transforming it into a hyperedge h(cid:48) -- and discuss by which factor the event rate on h(cid:48) is different from the event rate on h, according to the fitted model. For the unconstrained models we may compare any possible hyperedge h(cid:48) with h. For instance, h(cid:48) may result from adding any number of actors to h, from removing any number of actors to h, or from combinations of adding and removing actors. We may for instance, consider how the event rate changes when we add a single new participant, or a set of new participants, to h. In conditional-size models only transformations that leave the number of participants unchanged are allowed. Thus, we may for instance consider how the event rate changes when we add a new participant v (cid:54)∈ h to the hyperedge h, at the expense of another actor v(cid:48) ∈ h that is removed at the same time as v is added. Similarly we may consider how the event rate changes when we add a set of k new actors to the hyperedge h at the expense of removing another set of k actors from h. Thus, conditional-size models take the point of view that individual actors -- or sets of actors of the same size -- compete for participation in events. Specifically, assume that an actor v (cid:54)∈ h has more previous common events with other members of the hyperedge h than another actor v(cid:48) ∈ h. The conditional-size models reported in Table 2 suggest that the hyperedge h∪{v}\{v(cid:48)} (containing v instead of v(cid:48)) has a higher event rate than the hyperedge h (containing v(cid:48) instead of v). That is, actor v has a higher probability to experience a common event with the other participants of h than actor v(cid:48). If the other participants of h were the ones deciding about the composition of the next event, they would be inclined to include v at the expense of v(cid:48). The interpretation of the revealed effects in unconstrained models is more ambiguous since not only substitution of (sets of) actors by others are allowed but also modifications that increase or decrease hyperevent sizes. Thus, the validity of effects revealed by unconstrained models hinges on the assumption that the effect of hyperedge size on event rates is perfectly captured by the model. Failure to control for size effects can lead to spurious findings. We observe that model fit indicators of models not constraining hyperedge size are much lower than those of the conditional-size models. We emphasize, however, that it would be invalid to conclude that unconstrained models are "better" models than conditional-size models in any sense. Model fit indicators such as the AIC can compare different models estimated on the same data -- but it is invalid to compare the AIC of two models that have been estimated on different data. (Note that conditional-size models are indeed estimated on different data since the non-event hyperedges associated with every observed hyperevent are drawn from a restricted set.) The reason why unconstrained models achieve a lower AIC is that the task to identify events (or non-events) out of all given observations is much simpler when we do not condition on the size of hyperedges. As discussed above, in unconstrained models we can apply the very simple but effective criterion that observations whose size is close to the minimum or close to the maximum are more likely to be events while observations with intermediate hyperedge sizes are more likely to be non-events. From another point of view, the non-events in unconstrained models have a totally implausible distribution of event sizes, as is apparent from Fig. 1, and can therefore be assigned low event rates, leading to good model fit. This simple criterion no longer works for conditional-size models, where events and sampled non-events have the identical distribution of hyperedge sizes by design. From another point of view, the non-events resulting from conditional-size models have a very plausible distribution of hyperedge sizes and are therefore harder to recognize as non-events. 4 Case study II: Team assembly and team performance in co- author networks The second empirical case study that we consider analyzes a co-author network. Hyperevents correspond to published papers, where the underlying hyperedge is given by the set of authors and the event time is 16 Figure 2: Histogram of sizes of observed hyperevents in the co-author data. Hyperevent size is the number of authors of published papers. the year of publication. In this data we have a relational outcome variable associated with events giving the (normalized) number of citations received by the respective paper. We analyze processes explaining team assembly (i. e., which authors tend to publish papers together) and team performance (i. e., what is the impact of papers published by different teams). Previous work has analyzed team assembly (Guimera et al. 2005) and team performance (Ahmadpoor and Jones 2019) in publication networks with different methods. 4.1 Setting and data We have data on 315 238 scientific papers among 523 152 authors published from 1965 to 2019. The papers have been chosen by selecting from the set of EU-based researchers publishing in the social sciences the 1,200 that are most productive in terms of the number of publications ("seed authors"). Then we included all papers of these 1,200 seed authors and all papers published by any of their co-authors -- including those papers published by co-authors without any of the seed authors. We restrict the number of authors of any paper to 100 (if a paper exceeds this limit, we consider only the first 100 authors). With this cut-off, the average number of authors per paper is 7.95 and the average number of papers per author is 4.79. The histogram of the number of authors per paper (that is, of the hyperevent size) is given in Fig. 2 which suggests that small events have a distribution of hyperedge sizes resembling a binomial distribution but also that large events are over-represented and few events have sizes far exceeding the average. Thus, the distribution of event sizes seems to be a mixture of binomial with a heavy-tailed distribution. Hyperevents in this data have an associated relational outcome which is the number of citations that the paper has received by the time of data collection in 2019. The number of citations is heavily right-skewed with a median of eight, a mean equal to 25.7, maximum of 10 687, and standard deviation equal to 87.7. We normalize this count by subtracting the average number of citations of papers published in the same year. The resulting performance, thus, gives the excess number of citations. It is a positive number if the paper attracted more citations than the average paper published in the same year and it is negative if it attracted less citations than expected, given the year of publication. Citing papers may be published at any time until the time of data collection. In this case study, we consider the excess number of citations as an indication of performance of the team of authors and assume that this performance (that is, the quality or excellence of the paper) is transparent to other actors in the year following the publication of the paper so that it might, for instance, influence team selection of papers published afterwards. We leave a more refined model which considers also the timing of citations to future work. Publication data, as the example we consider in this case study, usually comes with a relative coarse 17 Histogram of number of authorsnumber of authorsFrequency02040608010002000040000 time granularity given by the year. Thus, necessarily many events happen simultaneously, that is, they have the same time stamp. In this case study we assume that simultaneous events are conditionally independent of each other, given the history of previous events. Thus, event rates (or relational outcome variables) on given hyperedges may depend on previous events on the same or other hyperedges, but are assumed to be conditionally independent of the occurrence or non-occurrence of simultaneous events. Previous work has shown that the validity of the assumption of conditional independence in periodically observed dynamic networks depends on the spacing of observation times (Lerner et al. 2013b). We leave it to future work to develop a model that can cope with mutual dependence among simultaneous events. 4.2 Model specification In this case study we are interested in effects explaining team assembly and team performance. More specifically, we first want to analyze how team assembly depends on familiarity and prior performance on various levels. Among the familiarity effects we test whether actors have the tendency to repeat collaboration dyadwise, triadwise, or within the identical team. Dependence on prior performance would induce actors to seek collaboration with others who individually performed well in the past, or with whom they have a history of prior shared success -- dyadwise, triadwise, or within the identical team. Secondly, within the family of relational outcome models, we seek to explain team performance (that is, the excess number of citations received by papers) by familiarity and prior performance on various levels. In particular, we are interested in whether effects explaining team assembly and team performance are "consistent" in the sense that actors have a preference to collaborate within teams that are likely to produce high-impact work. Team assembly is modeled with Cox-proportional hazard models given in Eq. (5) and team performance is modeled with relational outcome models given in Eq. (7) where the distribution f of team performance is chosen to be the normal distribution, leading to linear regression (that is, ordinary least squares). Statistics operationalizing assumed effects of familiarity on team assembly and team performance are identical with the effects considered in the previous case study on meetings: repetition, sub-repetition of order one, two, and three, as well as the hyperedge size (though in the co-author model we do not use the square of the hyperedge size). Statistics operationalizing assumed effects of prior (shared) performance on team assembly and team performance are similar but take relational outcome (that is, excess number of citations) of previous events into account. Specifically, we define two attributes for hyperedges h. The first measures aggregated performance resulting from previous events occuring on the identical hyperedge: hyperedge.performance(h; t; E) = ye · χ(h = he) , where ye is the relational outcome of the hyperevent e and χ(·) is the indicator function that is one if the argument is true and zero else. The second attribute measures performance resulting from previous events occuring on any hyperedge containing h: sub-hyperedge.performance(h; t; E) = Based on these attributes, we define the statistic ye · χ(h ⊆ he) . prior.hyperedge.success(h; t; G[E; t]) = hyperedge.performance(h; t; E) hyperedge.activity(h; t; E) , to assess the average prior success of events occuring on the identical hyperedge and for p = 1, 2, 3 we define (cid:88) e∈E<t (cid:88) e∈E<t prior.sub-hyperedge.success(p)(h; t; G[E; t]) = (cid:80) (cid:80) h(cid:48)∈Sub(p) (h) h(cid:48)∈Sub(p) sub-hyperedge.performance(h(cid:48); t; E) hyperedge.degree(h(cid:48); t; E) (h) , to assess the average prior success of events in which all members of any sub-hyperedge of order p (and potentially further actors) jointly participated.4 4We resolve 0 0 = 0 in both definitions. 18 In this much larger network, we do not consider unconstrained models that sample from the full space of hyperedges of all possible sizes. Indeed, such models would produce samples of non-events that have hyperedge sizes by many orders of magnitude larger than that of observed events. (A random hyperedge drawn uniformly from all subsets of the set of authors would have on average more than 250 000 participants. Thus, the full risk set would have an absurd distribution of hyperedge sizes which is totally different from the distribution of observed event sizes.) We explore two model variants whose risk sets have a plausible distribution of event sizes: (1) conditional-size models, which have been already applied in the previous case study in Sect. 3 and (2) models analyzing only repeated events and therefore restrict the risk set at time t to those hyperedges that have experienced at least one event before t. The second type of models, restricting the analysis to repeated events, is complemented by conditional-size models restricted to first events, that is, restricted to events occurring on hyperedges that have never experienced an event before. as zero compared to the more than (cid:0)500 000 100 The need to analyze first events and repeated events separately, becomes apparent from a preliminary, exploratory analysis. If we try to fit conditional-size models that include the repetition statistic to all events (first events and repeated events) we typically make the experience that model estimation does not converge and that during the course of the estimation the repetition parameter diverges towards infinity. This observation becomes understandable when we look at some characteristics of the co-author data. We find that about 11.6% of all events are repeated events, that is they occur on hyperedges h with repetition(h; t; E) > 0. From another point of view, even though the repeated events are not distributed uniformly, a hyperedge that has experienced at least one event has a non-negligible probability to experience another event in the future. On the other hand, a randomly chosen hyperedge of moderately large size that has never experienced an event before has a probability numerically indistinguishable from zero to ever experience any event in the future. For instance, the total number of hyperevents (which is about 300 000) is numerically as good (cid:1) hyperedges of size 100. Thus, the simple binary indicator χ(repetition(h; t; E) > 0) increases the event rate on hyperedges by a factor that is numerically as good as infinity -- which is why model estimation either does not converge or, if it converges, is very unreliable and typically has a high variability over different samples. This problem seems to be related with -- but is much more severe than -- the unreliability of estimating the repetition parameter in large dyadic event networks reported in Lerner and Lomi (2019). We recall that the risk set size in the hyperevent network considered in this section is by orders of magnitude larger than the risk set size considered in Lerner and Lomi (2019). We emphasize that the issue sketched in the preceding paragraph is not just a technical problem of model estimation, but rather points to a conceptual problem. Even if we were given unlimited computational power, could compute the full likelihood function without case-control sampling given in Eq. (4), and could represent numbers with arbitrarily many digits, the rate-increase implied by χ(repetition(h; t; E) > 0) would still be practically as good as infinity and could potentially mask or distort other -- much weaker, but still significant and relevant -- effects in hyperevent networks. Based on our current limited experience with RHEM, it seems that we have to accept that first events and repeated events are generated by different processes and therefore have to be analyzed by separate models in networks whose size exceeds a moderate number of nodes. 4.3 Results Team assembly. Table 3 reports estimated parameters of models explaining team assembly, that is, the relative event rate on hyperedges. As discussed above, we estimate two separate models, one explaining first events on any hyperedge and the second explaining repeated events. The first model does not include the statistics repetition and past performance of the exact hyperedge (since these statistics are constantly zero on all instances considered in this model) and does not include the number of authors (since the model conditions on the size of observed hyperevents). To construct the sampled likelihood given in Eq. (5), we sample one control (non-event hyperedge) for every observed event. Following recommendations from Lerner and Lomi (2019) we repeat sampling ten times and fit models separately to the different samples. Findings are very reliable across samples in the sense that all parameters that are significantly different from zero in Table 3 have the identical sign across all ten samples. We find that in most cases actors have a tendency to repeat established collaboration, that is, to choose In particular, the rate of first events (that is, familiar actors as team members for future publications. 19 repetition.order.1 repetition.order.2 repetition.order.3 repetition prior.sub-hyperedge.success.order.1 prior.sub-hyperedge.success.order.2 prior.sub-hyperedge.success.order.3 prior.hyperedge.success number.of.authors AIC Num. events Num. obs. ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05 Repeated events First events (conditional size) 0.371 (0.001)∗∗∗ −0.060 (0.007)∗∗∗ 0.039 (0.006)∗∗∗ 0.058 (0.001)∗∗∗ −0.004 (0.001)∗∗ 0.087 (0.005)∗∗∗ 0.099 (0.004)∗∗∗ −0.223 (0.004)∗∗∗ −0.132 (0.009)∗∗∗ 0.035 (0.012)∗∗ 0.028 (0.001)∗∗∗ 0.040 (0.001)∗∗∗ 0.016 (0.008) 0.006 (0.009) −2.169 (0.027)∗∗∗ 570139.996 36,708 63,860 5558056.916 278,527 566,601 Table 3: Estimated parameters of RHEM modeling the relative rate of co-author events (that is, publication rates) on hyperedges. Left: analysis restricted to first events, that is, events whose exact hyperedge has never experienced an event before. Risk set associated with event e are all hyperedges of the same size as he that have never experienced an event before. Right: analysis restricted to repeated events, that is, events whose exact hyperedge has experienced at least one previous event. The risk set associated with event e contains all hyperedges that have experienced an event before te. publications whose authors have never published a paper with the identical set of authors before) on a hyperedge h typically gets higher with the average number of previous publications of all individual authors in h and the average number of dyadwise co-authored papers of all pairs of authors in h but it typically decreases with the average number of triadwise co-authored papers of all triads of authors in h (although the latter effect is rather small). When analyzing repeated events (that is, publications whose authors have published at least one paper with the identical set of authors before), we find that the rate of repeated events on a hyperedge h typically gets higher with growing numbers of dyadwise and triadwise co-authored papers and also gets higher with a growing number of previous papers involving the identical set of authors h. In contrast, we find that the average number of previous publications of all individual authors in h tends to decrease the rate of repeated events. Thus, actors seem to have a preference for repeating collaboration with familiar others, but -- controlling for these patterns -- there seems to be a saturation effect on individual publication activity. When analyzing repeated events, we find that larger hyperedges (that is, hyperedges with more authors) have smaller publication rates -- controlling for all other effects. Regarding the effect of prior success (received citations of previously published papers) on publication rates, we find that the publication rate on a hyperedge h decreases with growing average prior success of the individual members of h in both models (that is, for first events and repeated events). Thus, previously successful authors seem to publish less in the future -- controlling for all other effects. In contrast to this pattern, we find that the rate of first events on hyperedges h tends to increase with prior dyadwise and triadwise shared success, while the rate of repeated events is only increased by prior dyadwise shared success but not significantly influenced by prior triadwises shared success. The effect of prior shared success of the hyperedge h is also not significant for the publication rate on the identical hyperedge h. Team performance. How do the same characteristics that influence team assembly (publication rates on hyperedges) impact the performance of future publications? Table 4 reports estimated parameters of relational outcome models that explain the performance (excess number of citations of papers, given the year of publication) by the same statistics used in models for team assembly. We find (with few exceptions) a rather consistent pattern that the number of citations of a published paper typically gets larger with growing prior success of individual authors as well as with growing prior 20 (Intercept) repetition.order.1 repetition.order.2 repetition.order.3 repetition prior.sub-hyperedge.success.order.1 prior.sub-hyperedge.success.order.2 prior.sub-hyperedge.success.order.3 prior.hyperedge.success number.of.authors R2 Adj. R2 Num. obs. RMSE ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05 First events Repeated events −8.033 (0.311)∗∗∗ 1.059 (0.163)∗∗∗ −0.389 (0.205) 1.646 (0.375)∗∗∗ −1.116 (0.441)∗ 1.151 (0.321)∗∗∗ −4.757 (0.299)∗∗∗ 1.520 (0.363)∗∗∗ 0.529 (0.355) 7.214 (0.185)∗∗∗ 0.130 (0.436) 28.176 (0.630)∗∗∗ 4.940 (0.236)∗∗∗ 9.013 (0.221)∗∗∗ −12.166 (0.430)∗∗∗ 17.901 (0.468)∗∗∗ −0.923 (0.326)∗∗ 8.276 (0.184)∗∗∗ 0.274 0.051 0.051 0.274 36,708 278,527 59.663 86.159 Table 4: Modeling the relational outcome ("success") of co-authored papers, that is, the difference between the number of citations of the paper and the expected number of citations, given the year of publication. Left: analysis restricted to first events, that is, events whose exact hyperedge has never experienced an event before. Right: analysis restricted to repeated events, that is, events whose exact hyperedge has experienced at least one previous event. shared success of dyads, triads, and the identical team of authors. An exception is the negative effect of triadwise prior shared success on the success of repeated events; prior performance of individual authors is non-significant for the success of repeated events. In contrast to prior (shared) success, familiarity of authors seems to have a less consistent impact on publication success. The previous number of publications of individual members of the hyperedge tends to increase the number of received citations of repeated events but is insignificant for the success of first events. The number of previously dyadwise co-authored papers has a positive effect on the expected success of first events but a negative effect on the success of repeated events. This pattern is reversed for the effect of triadic familiarity. In the model for repeated events we find that the number of previous publications of the identical team of authors has no significant impact on team performance. The number of authors of a paper (that is, the team size) positively impacts the success of first events but is slightly negative for the success of repeated events. In summary, team assembly seems to be mostly explained by familiarity so that the event rate on a hyperedge h tends to be higher if the participants of h have collaborated before. In contrast, team performance seems to be mostly explained by prior shared success of participants. Models discussed in this section also reveal higher-order dependence in empirical co-author networks which cannot be modeled by purely dyadic publication rates. 5 Discussion In this section we first discuss general methodological insight derived from the two empirical case studies and then provide a detailed discussion of previous work that is most related to our model in Sect. 5.1. From a high-level view, RHEM that model the rate of hyperevents compare hyperedges experiencing events at given points in time ("cases") with hyperedges from the risk set that could potentially have experienced an event at that time but did not ("controls," "alternatives," or "non-events"); see for instance Eq. (5). Models seek to distinguish the event hyperedges from the alternative hyperedges by assigning high event rates to the former and low event rates to the latter. A recurrent insight from the empirical case studies -- which also seems to point to a major challenge in further developing and understanding RHEM -- 21 is the importance of defining plausible alternative hyperedges for observed events. One of the most crucial aspects influencing the plausibility that hyperedges might experience events -- although not the only one -- is their size. Our first case study revealed that models that neither constrain the size of alternative hyperedges nor control for the effect of size on event rates (such as the first three models reported in Table 1) are completely useless. The distribution of hyperedge size in the unconstrained risk set is extremely different from that of the observed events (compare Fig. 1). Failure to control for the effect of size on the event rate can lead to spurious effects for any statistic correlating with (functions of) size. In the first case study we considered two model variants to deal with the effect of hyperedge size: (1) including size and the squared size among the model statistics (which was motivated by the observed U-shaped distribution of the size of observed events) and (2) conditioning on hyperedge size, that is, comparing each hyperedge experiencing an event only with alternatives of the same size. The empirical case study from Sect. 3 could not answer conclusively which of the two possibilities is preferable in general. However, in the given study, conditional-size models produced more consistent results and also turned out to be interpretable in a more straightforward way. In general, analysts face a trade-off between constraining the risk set not enough and constraining it too much. An unconstrained risk set could yield implausible alternative hyperedges while a risk set that is too heavily constrained might lead to models conditioning on some aspects of hyperevents that in reality result from an endogenous process (for example, hyperedge size results from the choice to include actors in hyperevents). The second case study revealed that conditioning on hyperedge size might still be insufficient in larger hyperevent networks. Indeed, given many actors nearly every randomly drawn hyperedge is an "implausible" alternative candidate for the next hyperevent (see the discussion in Sect. 4.2). In such models we can often find very simple criteria (such as the property of having previously experienced at least one event) that increase the event rate on hyperedges by factors which are numerically indistinguishable from infinity. Based on our current limited experience with RHEM, we recommend to partition the whole population of hyperedges along such criteria that have a dramatic (and typically obvious) effect on event rates. In the concrete case study from Sect. 4, we specify separate models for first events (considering hyperedges that have never experienced any event before) and for repeated events (considering hyperedges that have experienced at least one event before). In general, other criteria might additionally be used to split the population of hyperedges into more homogeneous subsets. Such criteria might, for instance, distinguish hyperedges in which every pair of actors have experienced at least one common event, hyperedges in which every pair of actors have co-participated in an event with at least one common other third actor, or hyperedges that are homogeneous with respect to an exogenously given covariate, e. g., institutional affiliation. 5.1 Related work In this section we discuss some of the most-related previous work in detail. In particular, we emphasize differences between models proposed in previous work and RHEM. Guimera et al. (2005) propose a model in which teams consisting of any number of actors -- representing for instance, the set of co-authors of a scientific paper -- are randomly assembled by including team members one by one. The probability of an actor A to be included in team T can depend (1) on characteristics of the actor A, such as being an incumbent or a newcomer and (2) on the existence of previous collaboration of A with actors who have previously been selected into the growing team T . Thus, this model can incorporate dyadic dependence, but no higher-order dependence. For instance, assume a situation in which actor A has frequently collaborated with actors B and C, but never with both together -- perhaps because A's papers co-authored with B are from a different area than A's papers co-authored with C. In this situation we could expect an increased probability that teams contain the dyad {A, B} and an increased probability that teams contain the dyad {A, C} -- but at the same time a decreased probability that a team contains the triad {A, B, C}. Such a higher-order dependence, however, cannot be specified in the model from Guimera et al. (2005). Indeed, in their model B and C would both be more likely to be in a team with A and thus -- by chance alone -- the triad {A, B, C} would be over-represented. Butts (2008) discussed the possibility to represent several senders or receivers by new dummy nodes representing sets of actors: 'To treat simultaneous joint action by multiple senders and/or receivers, we simply 22 create one or more "virtual" senders and/or receivers that represent subsets of the original sender/receiver set.' (Butts 2008, p.159). Examples of such virtual receivers include "broadcast" actors representing, for instance, a whole school class which may receive broadcast messages from the teacher (DuBois et al. 2013). It is easy to see that the strategy to represent sets of senders or receivers by dummy nodes is only possible for a limited number of predefined sets of actors. Creating these dummy nodes for all subsets would result in a prohibitively huge graph with an exponential number of nodes in which most nodes never participate in any event. Moreover, the inclusion relation among these virtual nodes representing subsets would have to be incorporated somehow in the model. Indeed if some set of actors S receives a message then all subsets S(cid:48) ⊂ S are also receiving that message -- which may influence the future rate of events to or from S(cid:48). Kim et al. (2018) propose the hyperedge event model (HEM) for directed events that have exactly one sender but can have any number of receivers (or conversely any number of senders and exactly one receiver). Their model specifies for every possible sender-receiver pair (i, j) an intensity function λij. These dyadic intensity functions then stochastically determine (1) who is the sender of the next event and (2) which is the set of receivers, given the chosen sender. The difference to the RHEM proposed in our paper is that in the model from Kim et al. (2018) the intensities are defined for dyads, while RHEM can define intensities (event rates) for hyperedges of any size. Assume, for instance, that A has often send emails to B and to C in the past, but never the same email to B and C -- perhaps because B is a work colleague of A but C is a friend. Due to many past events, the dyadic intensities λAB and λAC would be high and, in the model from Kim et al. (2018), by chance alone, B and C would have an increased probability to be in the receiver set of an email send by A -- although in reality they would have a very low probability to jointly receive the same email from A. Related work from the area of machine learning. Machine learning considers the task of subset prediction (or sequential subset prediction) which seems to be strongly related to modeling hyperevents. Subset prediction seeks to predict, for instance, baskets of items that a particular customer is likely to select in the next purchase. We note that prediction (which is a common objective in machine learning) is a different goal than explanation (Breiman et al. 2001; Shmueli 2010). Data modeling often seeks to identify and/or test effects that explain aspects of the data. (For instance, in this paper we want to assess if and how prior shared success impacts team assembly in co-authoring networks.) Machine learning, on the other hand, typically seeks to predict data out-of-sample, such as "which basket of items will a customer most likely buy in the future." The number of parameters in models applied in machine learning is typically by several orders of magnitude larger than in explanatory modeling and models applied in machine learning often use dedicated estimation techniques that prevent overfitting. The resulting models perform more like "black boxes": they make good predictions but do not reveal specific effects in the data generating process. RHEM proposed in this paper have been designed with the goal of explaining data (rather than predicting data) in mind. Having these differences in mind, we overview related work on subset predictions since the two areas might nevertheless learn from each other. Benson et al. (2018a) propose a model in which the "utility" of a subset is composed of (1) the sum of the utilities of the individual items of the subset plus an additional "corrective" utility, positive or negative, which may be specified for a given budget of k subsets. Thus, this model can in principle express dependence of arbitrarily high order -- but only for a predefined set of subsets. Benson et al. (2018b) propose a model to predict the next set in a sequence of sets. To predict the next set Sk+1, given the preceding sets S1, . . . , Sk, their model conditions on the size of the next set and takes the union of random subsets of the preceding sets Si for i = 1, . . . , k until the newly constructed set is of the given size. When selecting subsets of the preceding sets Si, i = 1, . . . , k, the more recent sets typically have a higher probability to be partially repeated. More precisely, they propose to select a subset of the set Si with probability proportional to a "recency weight" wk−i+1, where these recency weights are learned to maximize predictive performance. The model from Benson et al. (2018b) can express dependencies of event rates on subset of any order and is -- from a certain point of view -- related to RHEM specified by including sub-repetition of any feasible order. Differences include that free parameters in such a RHEM are associated with subset size, while parameters in the model from Benson et al. (2018b) are associated with lags in the 23 sequence of sets. 6 Conclusion and future work In this paper, we introduce relational hyperevent models (RHEM) as a generalization of relational event models (REM) to multi-actor interaction. RHEM can specify event rates on the full space of directed or undirected hyperedges involving any number of actors. We illustratively apply RHEM in two empirical case studies on meetings of government ministers and co-authored scientific papers. These case studies provide evidence for dependencies in hyperevent networks that cannot be modeled by purely dyadic event rates but that involve hyperedges of higher order. Besides RHEM explaining event rates on hyperedges, we also define relational outcome models (ROM) explaining outcome or success resulting from given hyperevents. For instance, in a study of co-author networks, RHEM can analyze team assembly, explaining which teams of authors publish together, and ROM can analyze team performance, explaining the impact of published papers. The computational intractability of the full likelihood function, which scales exponentially in the number of nodes, can be tackled by applying established sampling techniques. Applying case-control sampling, we succeeded in reliably estimating RHEM parameters from a network comprising hundreds of thousands of nodes and hyperevents. From a high-level view, RHEM compare hyperedges experiencing events at given points in time ("cases") with hyperedges from the risk set that could potentially have experienced an event at that time but did not ("controls," "alternatives," or "non-events"). Models seek to distinguish the event hyperedges from the alternative hyperedges by assigning high event rates to the former and low event rates to the latter. One of the major challenges in the future development of RHEM is to find appropriate definitions for plausible alternative hyperedges for observed events. Considering the full unconstrained risk set of all hyperedges of any size leads to "straw man" alternatives which are completely different from any event hyperedge and can easily be recognized as non-events by the simplest of models. A minimal requirement seems to be that models control for -- or condition upon -- the size of hyperedges. In larger networks, however, conditioning on hyperedge size might still be insufficient to produce plausible alternatives. The set of all hyperedges of a given size is often extremely inhomogeneous with respect to event rates. Simple indicators, like the criterion whether a hyperedge has experienced any previous event, imply an increase in the event rate which is practically or numerically as good as infinity. Such extremely strong (and typically fairly obvious) effects could potentially mask or distort other effects of interest. Moreover, it is likely that different network effects explain events on such incomparable instances. In this paper, we therefore suggest to split the population of hyperedges along indicators that have an extreme impact on the event rate. For instance, we suggest to specify and fit separate models for new events and for repeated events. Future work is needed to better understand, and/or find alternative ways to cope with, extreme inhomogeneity over the space of hyperedges. Another avenue for future work is to better understand hyperedge statistics and the interpretation of associated parameters. Hyperedge statistics proposed in this paper are inspired by statistics commonly ap- plied in the specification of REM, such as repetition, reciprocation, degree effects, triadic closure, or covariate effects. However, possibilities to define hyperedge statistics are much more numerous since many statistics can be parameterized by the order of subsets involved in their definition. Some families of statistics, such as sub-repetition of various order, are nested and interrelated by design which renders the joint interpretation of associated parameters difficult. More experience in applying and interpreting RHEM in different application settings is needed. References Ahmadpoor, M. and Jones, B. F. (2019), "Decoding team and individual impact in science and invention," Proceedings of the National Academy of Sciences, 201812341. 24 Benson, A. R., Kumar, R., and Tomkins, A. (2018a), "A discrete choice model for subset selection," in Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, ACM, pp. 37 -- 45. Benson, A. R., Kumar, R., and Tomkins, A. (2018b), "Sequences of sets," in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, ACM, pp. 1148 -- 1157. Borgan, Ø., Goldstein, L., and Langholz, B. (1995), "Methods for the analysis of sampled cohort data in the Cox proportional hazards model," The Annals of Statistics, 1749 -- 1778. Brandes, U., Lerner, J., and Snijders, T. A. (2009), "Networks Evolving Step by Step: Statistical Analy- sis of Dyadic Event Data," in Proc. 2009 Intl. Conf. Advances in Social Network Analysis and Mining (ASONAM), IEEE, pp. 200 -- 205. Breiman, L. et al. (2001), "Statistical modeling: The two cultures," Statistical science, 16, 199 -- 231. Bretto, A. (2013), Hypergraph theory, Cham: Springer. Butts, C. T. (2008), "A relational event framework for social action," Sociological Methodology, 38, 155 -- 200. Chodrow, P. S. (2019), "Configuration Models of Random Hypergraphs and their Applications," arXiv preprint arXiv:1902.09302. Cox, D. (1972), "Regression Models and Life-Tables," Journal of the Royal Statistical Society. Series B (Methodological), 34, 87 -- 22. DuBois, C., Butts, C. T., McFarland, D., and Smyth, P. (2013), "Hierarchical models for relational event sequences," Journal of Mathematical Psychology, 57, 297 -- 309. Guimera, R., Uzzi, B., Spiro, J., and Amaral, L. A. N. (2005), "Team assembly mechanisms determine collaboration network structure and team performance," Science, 308, 697 -- 702. Kim, B., Schein, A., Desmarais, B. A., and Wallach, H. (2018), "The Hyperedge Event Model," arXiv preprint arXiv:1807.08225. Lawless, J. F. (2003), Statistical Models and Methods for Lifetime Data, Wiley. Lerner, J., Bussmann, M., Snijders, T. A., and Brandes, U. (2013a), "Modeling Frequency and Type of Interaction in Event Networks," Corvinus Journal of Sociology and Social Policy, 4, 3 -- 32. Lerner, J., Indlekofer, N., Nick, B., and Brandes, U. (2013b), "Conditional independence in dynamic net- works," Journal of Mathematical Psychology, 57, 275 -- 283. Lerner, J. and Lomi, A. (2019), "Reliability of relational event model estimates under sampling: how to fit a relational event model to 360 million dyadic events," Network Science, (to appear) available online: https://doi.org/10.1017/nws.2019.57. Margaret Thatcher Foundation (2019), Large scale document archive, retrieved from https://www. margaretthatcher.org/archive. Perry, P. O. and Wolfe, P. J. (2013), "Point process modelling for directed interaction networks," Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75, 821 -- 849. Shmueli, G. (2010), "To explain or to predict?" Statistical science, 25, 289 -- 310. Stadtfeld, C. and Block, P. (2017), "Interactions, Actors, and Time: Dynamic Network Actor Models for Relational Events," Sociological Science, 4, 318 -- 352. 25 Therneau, T. M. and Grambsch, P. M. (2013), Modeling survival data: extending the Cox model, Springer Science & Business Media. Vu, D., Pattison, P., and Robins, G. (2015), "Relational event models for social learning in MOOCs," Social Networks, 43, 121 -- 135. 26
1609.04880
2
1609
2016-10-16T19:28:53
Die-out Probability in SIS Epidemic Processes on Networks
[ "cs.SI", "physics.data-an", "physics.soc-ph" ]
An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed. The formula contains only three essential parameters: the largest eigenvalue of the adjacency matrix of the network, the effective infection rate of the virus, and the initial number of infected nodes in the network. The die-out probability formula is compared with the exact die-out probability in complete graphs, Erd\H{o}s-R\'enyi graphs, and a power-law graph. Furthermore, as an example, the formula is applied to the $N$-Intertwined Mean-Field Approximation, to explicitly incorporate the die-out.
cs.SI
cs
Die-out Probability in SIS Epidemic Processes on Networks Qiang Liu and Piet Van Mieghem Abstract An accurate approximate formula of the die-out probability in a SIS epi- demic process on a network is proposed. The formula contains only three essential parameters: the largest eigenvalue of the adjacency matrix of the network, the ef- fective infection rate of the virus, and the initial number of infected nodes in the network. The die-out probability formula is compared with the exact die-out proba- bility in complete graphs, Erdos-R´enyi graphs, and a power-law graph. Furthermore, as an example, the formula is applied to the N-Intertwined Mean-Field Approxima- tion, to explicitly incorporate the die-out. 1 Introduction The SIS epidemic process models spreading phenomena of information or viruses on networks [7]. In a network, each node has two states: susceptible and infected. A Bernoulli random variable X j(t) ∈ {0,1} denotes the state of each node, where X j(t) = 0 means that node j is susceptible and X j(t) = 1 indicates that node j is infected at time t. An infected node can infect its susceptible neighbors with a in- fection rate b by changing the susceptible neighbor nodes into infected nodes, and each infected node is cured and becomes a susceptible node with a curing rate d . If the infection and curing processes are Poisson processes, the SIS epidemic model is Markovian, where the sojourn times in the infected and susceptible state are ex- ponentially distributed. The governing equation of a node j in the Markovian SIS epidemic process in an unweighted and undirected network with N nodes, repre- sented by an N × N symmetric adjacency matrix A, is [10, p. 449] Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology, P.O Box 5031, 2600 GA Delft, The Netherlands e-mail: {Q.L.Liu, P.F.A.VanMieghem}@TuDelft.nl 1 2 Qiang Liu and Piet Van Mieghem dE[X j(t)] dt = −d E[X j(t)] + b N(cid:229) k=1 ak jE[Xk(t)] − b N(cid:229) k=1 ak jE[X j(t)Xk(t)] (1) The epidemic threshold t c of the SIS epidemic process implies that, if the effec- tive infection rate t = b /d > t c, the virus will spread over the network for a very long time, and if t < t c, the number of infected nodes decreases exponentially fast after sufficiently long time [7, 11]. There is an approximate value [14] and lower c = 1/l 1, where l 1 is the largest bound [13] of the epidemic threshold t c > t (1) eigenvalue of the adjacency matrix A. In this paper, the threshold t (1) is referred c to as the N-Intertwined Mean Field Approximation (NIMFA) threshold, where the superscript (1) in t (1) refers to the fact that NIMFA is a first order mean-field ap- c proximation [13]. The structure of this paper is organized as follows. Section 2 introduces the re- lation between the prevalence (2) and the average fraction of infected nodes con- ditioned to the survival of the virus. Clearly, the virus die-out probability plays a key role. Section 3 proposes an accurate approximate formula (6) for the die-out probability in the metastable state of the SIS epidemic process. Figure 1 and Fig. 2 demonstrate the accuracy and the limitation of (6) in complete graphs, Erdos-R´enyi graphs, and power-law graphs. Finally, we apply formula (6) to correct the NIMFA prevalence (8) as shown in Fig. 3. 2 The Prevalence and the Die-out Probability The prevalence y(t) of a SIS epidemic process is the expected fraction of infected nodes at time t, (cid:229) N y(t) = E[S(t)] (2) where S(t) = 1 j=1 X j(t) is the fraction of infected nodes. The prevalence in the N exact Markovian epidemic process after infinitely long time tends to zero, where the absorbing state is reached. Before the virus dies out, virus may exist in networks for a very long time [2, 9]. In the metastable state, the prevalence y(t) changes very slowly and there is a balance between the infection and curing processes. We con- fine ourselves to the time region [0,tmax] that the prevalence y(tmax) 6= 0, and the prevalence is approximately equal at every time t ∈ [tm,tmax], where tm is the time that the SIS process reaches metastable state. However, for one realization of the epidemic process, we cannot expect that the fraction of infected nodes oscillates around the level of the prevalence y(t) with time t, because the prevalence y(t) is the average over all possible realizations including the die-out realizations. In real observed diseases, the virus has not died out yet, so that the fraction of infected pop- ulation is positive. So, there are actually two kinds of average: the average over all possible realizations (prevalence), and the average over the realizations conditioned to the survival of the virus. To prevent confusion, the faction of infected nodes un- der the condition that the virus survives at time t is denoted by a random variable Die-out Probability in SIS Epidemic Processes on Networks 3 S(t) in this paper. Consequently, we have Pr[ S(t) = i/N] = Pr[S(t) = i/NS(t) 6= 0] for S(t) ∈ {1/N,2/N, · · · ,1} while S(t) ∈ {0,1/N,2/N, · · · ,1}. The removal of the absorbing state [3] or the assumption that the virus survives is associated with the quasi-stationarity or metastability of the SIS process [8]. The expectation of S(t) of an epidemic process in a network with N nodes is E[ S(t)] = N(cid:229) i=1 i N Pr[ S(t)] = N(cid:229) i=1 i N With the definition of the conditinal probability, Pr(cid:20) S(t) = i N(cid:12)(cid:12)(cid:12)(cid:12) S(t) 6= 0(cid:21) = = i S(t) 6= 0(cid:21) Pr(cid:20) S(t) = N(cid:12)(cid:12)(cid:12)(cid:12) Pr(cid:2)(cid:8)S(t) = i N(cid:9) ∩ {S(t) 6= 0}(cid:3) Pr(cid:2)S(t) = i N(cid:3) provided i > 0 Pr[S(t) 6= 0] Pr [S(t) 6= 0] we have E[ S(t)] = 1 Pr[S(t) 6= 0] N(cid:229) i=0 i N Pr(cid:20)S(t) = i N(cid:21) = E[S(t)] Pr[S(t) 6= 0] Since Pr[S(t) 6= 0] = 1 − Pr[S(t) = 0], the prevalence can be written as y(t) = y(t) (1 − Pr[S(t) = 0]) (3) where y(t) = E[ S(t)]. Equation (3) shows the relation between the prevalence y(t) and the average fraction y(t) of infected nodes under the condition that the virus survives, where the die-out probability Pr[S(t) = 0] is essential. Both the prevalence y(t) and the virus die-out probability Pr[S(t) = 0] are difficult to compute analyti- cally in general graphs. The Markovian SIS epidemic process on the complete graph KN is a birth-and- death process [3, 10]. The states {0,1, · · · ,N} of the birth-and-death process are the number of infected nodes, where 0 is the absorbing state or overall-healthy state. Therefore, the die-out probability Pr[S(t) = 0] can be obtained by solving the birth- and-death process, = sT (t)Q (4) (cid:0)s′(t)(cid:1)T where Q is the infinitesimal generator of the birth-and-death Markov chain, and sT (t) = [s0(t), · · · ,sN(t)] is the state probability vector with each element si(t) = Pr[S(t) = i/N] for 0 ≤ i ≤ N, and s0(t) = Pr[S(t) = 0]. The die-out probability Pr[S(t) = 0] of SIS epidemic process in complete graphs also equals the gambler's ruin probability [10, p. 231] as shown in the Appendix, m n = j!t j (cid:229) N−n−1 j=0 j=0 j!t j (cid:229) N−1 (5) 4 Qiang Liu and Piet Van Mieghem Different from solving (4), Eq. (5) only applies to the metastable state and cannot be used to calculate the die-out probability at an arbitrary time t. As demonstrated in the Appendix, Eq.(5) upper bounds the actual die-out probability, because (5) assumes that the virus wins only when it infects all N nodes in a finite time before dying out. 3 The Die-out Probability: an Accurate Approximation Apart from solving (4) or employing the gambler's ruin formula (5), in this sec- tion we propose a novel approximate formula of the virus die-out probability in the metastable state. We assume that the prevalence y(t) is approximately constant in the metastable state. Relation (3) then indicates that the die-out probability is also approximately constant. In the metastable state, we then find that the virus die-out probability in a sufficiently large graph is approximately Pr[S(tm) = 0] ≈ 1 xn , with x ≥ 1 (6) where S(tm) denotes the fraction of infected nodes of the SIS epidemic process in the metastable reached at time tm, x = t /t (1) c = l 1t is the normalized effective infection rate of the virus, and n is the number of initially infected nodes. The situation x < 1 is not considered, because the infection rate is below the threshold and the SIS process dies out before reaching the metastable state. In addition, 1/x > 1 cannot represent a probability. As the first order NIMFA threshold t (1) c = 1/l 1 is a lower bound of the actual threshold t c, the prevalence y(t) decreases exponentially fast for sufficiently large time [11] when x ≤ 1, and the virus die-out probability tends to 1. Also, the accuracy of formula (6) is related to the accuracy of the NIMFA threshold c = 1/l 1. For example, if the effective infection rate is below the real threshold t (1) and t (1) c < t < t c, formula 1/xn < 1, but the virus dies out within finite time with the probability tending to 1. In the Appendix, an analytically approach to (6) from the gambler's ruin probability (5) in complete graphs is presented. By introducing the normalized effective infection rate x = t /t (1) 1 into (6), the network topology -- the largest eigenvalue of the adjacency matrix l 1 -- is re- flected. Formula (6) is simple, and only three essential parameters are involved: the spectral radius l 1, the virus spreading ability t , and the initially infected number of nodes n. If a few nodes are infected and the infection rate is above the thresh- old x > 1, then formula (6), which is equivalent to Pr[S(tm) = 0] ≈ e−n logx, shows that the network will experience a disease outbreak, because the die-out probability decreases exponentially fast with n above the epidemic threshold (logx > 0). c = tl In the sequel, we compare (6) and the die-out probability Pr[S(t) = 0] obtained via simulations. The curing rate of all the calculations and simulations below is d = 1. Die-out Probability in SIS Epidemic Processes on Networks 5 3.1 Complete Graphs After solving the epidemic process (4) in the complete graph K126 with effective infection rate t = 0.016, Fig. 1(a) shows the prevalence y(t) and the die-out prob- ability Pr[S(t) = 0] as an example. The metastable state is reached approximately at time t = 10 and hereafter, and the prevalence y(t) keeps steady. Also, the die- out probability Pr[S(t) = 0] becomes approximate constant earlier from t = 5. The prevalence y(t) decreases slowly to 0 after an infinitely long time [2, 9], and corre- spondingly, the die-out probability increases to 1. At t = 45 in the metastable state, the number of die-out realizations of the SIS epidemic simulation and the solution of the Markov chain Eq. (4) are recorded and shown in Fig. 1(b), 1(c), and 1(d). The simulation results in Fig. 1(b) and 1(c) are obtained by the SSIS simulator [1] which applies a Gillespie-like algorithm [4], and 106 realizations of the Markovian epidemic process are simulated. By counting the number of realizations which have zero infected nodes at t = 45, the die-out probability is obtained. Figure 1(b) and 1(c) illustrate that, our simulation results match with the compu- tation of the birth-and-death process (4). To avoid redundancy, we omit the simula- tion results in Fig. 1(d). From Fig. 1(b), the die-out probability at t = 45 is approxi- mately 1 corresponding to formula (6), when the normalized effective infection rate x = 1. Also, if x = 1, the infection rate is below the threshold, and no matter how many nodes are infected initially, the prevalence y(t) decreases exponentially fast for sufficiently large time. The mean-field approximations are usually not accurate around threshold [6], which is also verified by Eq. (3) when x = 1 and the die-out probability Pr[S(tm) = 0] = 1. For a different number of initially infected nodes n, Fig. 1 shows that the virus die-out probabilities converge to the concise formula (6) fast with the network size N. Furthermore, the larger the normalized effective infection rate x is, the faster the probabilities convergence towards (6). 3.2 General Graphs For general graphs, it is infeasible to obtain the virus die-out probability by solving the differential equations of Markov chain, because the number of equations is 2N. However, it is still possible to obtain the virus die-out probability efficiently by simulation. We construct three Erdos-R´enyi (ER) graphs Gp(N) with the network size N = 100 and the link generation probability p = 0.9, 0.5, and 0.1, respectively. The epidemic process is simulated on the ER graphs by randomly choosing the initially infected nodes. For every normalized infection rate x and every number of initially infected nodes n, 104 realizations are simulated. Fig. 2(a), 2(b), and 2(c) give the the comparison between the die-out probabilities and formula (6) for the number of initially infected nodes n = 1,2,3. Formula (6) is accurate in the general ER graphs, especially when the normalized effective infection rate x is large. The accuracy of formula (6) decreases with decreasing link generation probability p in ER graphs Gp(N). 6 y t i l i b a b o r p t u o - e i d s u r i v e h t d n a e c n e l a v e r P 0.5 0.4 0.3 0.2 0.1 0.0 0 Slowly decreases to 0 Complete graph K126 the normalized effective spreading rate x=2 Virus die-out probability Prevalence Slowly increases to 1 Qiang Liu and Piet Van Mieghem x=1 Complete graph, 1 node infected initially Solution of Markov chain equation Simulation x=1.5 x=2 x=3 x=4 1/xn=1/1.5 1/xn=1/4 1/xn=1/2 1/xn=1/3 y t i l i b a b o r p t u o - e i d s u r i V 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 10 Normalized time (when d=1 ) 20 30 40 50 20 40 100 Number of nodes N in complete graphs 80 60 120 (a) The virus die-out probability and the prevalence of epidemic process in complete graph K126. Initially 3 nodes are infected. This figure shows a clearly metastable state region. Complete graph, 2 nodes infected initially Solution of Markov chain equation Simulation x=1.5 1/xn=1/22 1/xn=1/1.52 1/xn=1/32 1/xn=1/42 x=2 x=3 x=4 y t i l i b a b o r p t u o - e i d s u r i V 1.0 0.8 0.6 0.4 0.2 0.0 (b) The die-out probabilities from simulation of the SIS epidemic process and calculation of the birth-and-death process are shown with 1 initially infected node. With the increase of network size N, the die-out probabilities con- verge to the simple formula: 1/xn. Complete graphs, 3 nodes infected initially Solution of Markov chain equation x=1.5 1/xn=1/1.53 1/xn=1/23 1/xn=1/33 x=3 x=2 x=4 1/xn=1/43 y t i l i b a b o r p t u o - e i d s u r i V 1.0 0.8 0.6 0.4 0.2 0.0 40 20 Number of nodes N in complete graphs 100 80 60 120 20 40 60 80 100 120 Number of nodes N in complete graph (c) With 2 nodes infected initially, this figure verifies (6) as Fig. 1(b) with simulation and calculation results. (d) With 3 nodes infected initially, this figure shows the calculation results of (4) as Fig. 1(b) and 1(c). Fig. 1 The virus die-out probability in complete graphs. The die-out probability of the SIS epidemic process in a power-law graph is presented in Fig. 2(d) with 105 realizations, and formula (6) shows its limitation. The power law graph has N = 1000 nodes, and the degree distribution is Pr[k] ∼ k−2.6. Fig. 2(d) exhibits that the die-out probability is almost 1 when the normalized effective rate is around 2, which also indicates that the real epidemic threshold in the power-law graph is much larger than the NIMFA threshold 1/l 1. The inaccuracy of formula (6) is affected by the inaccuracy of the NIMFA threshold as mentioned above. The simulations seem to indicate that formula (6) is always smaller than the ac- tual die-out probability, which may be attributed to the fact that the NIMFA thresh- old always lower bounds the actual threshold in any network. Die-out Probability in SIS Epidemic Processes on Networks 7 y t i l i b a b o r p t u o - e i D 0.8 0.6 0.4 0.2 ER graph with link generating probability 0.9 Die-out probability Formuale 1/xn 1 node 2 nodes 1.0 0.8 0.6 0.4 0.2 y t i l i b a b o r p t u o - e i D ER graph with link generating probability 0.5 Die-out probability Formuale 1/xn 1 node 2 nodes 3 nodes 3 nodes 1.5 2.0 2.5 3.0 3.5 4.0 1.5 2.0 2.5 3.0 3.5 4.0 Normalized effective infection rate x Normalized effective infection rate x (a) The virus die-out probability of the SIS epidemic process in an ER graph with the link generation probability 0.9. The virus spreads starts from 1, 2, or 3 nodes initially. (b) The die-out probability of the SIS epi- demic process in another ER graph with the link generation probability 0.5. 1.0 0.8 0.6 0.4 0.2 y t i l i b a b o r p t u o - e i D ER graph with link generating probability 0.1 Die-out probability Formuale 1/xn 1 node 2 nodes 3 nodes 1.5 2.0 2.5 3.0 3.5 4.0 Normalized effective infection rate x (c) The die-out probability of the SIS epi- demic process in another ER graph with the link generation probability only 0.1. y t i l i b a b o r p t u o - e i D 1.0 0.8 0.6 0.4 0.2 0.0 2 the number of initially infected nodes increses from 1 to 3 Power-law graph, Pr[k]~k-2.6 Die-out probability Formula 1/xn 4 6 8 10 12 14 Normalized effective infection rate x (d) The die-out probability of the SIS epi- demic process in a power-law graph. Fig. 2 The virus die-out probability in ER graphs and a power-law graph with different number of initially infected nodes. 3.3 NIMFA: Corrected for Die-out The mean-field approximation methods are usually not accurate when the initial number of infected nodes is small, because the prevalence obtained by mean-field approximations will generally converge to fixed value due to the existence a steady state, no matter what the initial condition is. When a small number of nodes is initially infected, the die-out probability is relatively large. In this section, we will discuss the accuracy of NIMFA as an example. Previously, the accuracy of NIMFA has been studied from a network topology viewpoint [12], but in this section, we focus on the influence of the initial condition. NIMFA [13] reduces the computation complexity of a Markovian epidemic pro- cess by assuming independency between the state X j(t) of node j and the state Xk(t) of node k, which closes the governing Eq. (1) 8 Qiang Liu and Piet Van Mieghem dv j(t) dt = −d v j(t) + b N(cid:229) k=1 ak jvk(t) − b N(cid:229) k=1 ak jv j(t)vk(t) (7) where v j(t) denotes the NIMFA infection probability of node j at time t. The NIMFA prevalence is similarly derived as y(1)(t) = 1 N N(cid:229) j=1 v j(t) (8) The NIMFA prevalence y(1)(t) decreases exponentially fast to 0 when the infection rate is below the NIMFA threshold t ≤ t (1) . If the initial condition y(1)(0) 6= 0, c the NIMFA prevalence y(1)(t) converges to a non-zero value when t > t (1) , which c is proved in [5]. Thus, NIMFA is conditioned to the case where the virus in the epidemic process will not die-out, and the absorbing state is removed when y(1)(0) 6= 0. Based on (6), we propose an approximate virus surviving probability function at the time t as f (t) = 1 − 1 xn + 1 xn e−l 1t (9) Equation (9) is motivated as follows. At time t = 0 and y(1)(t) 6= 0, the virus surviv- ing probability is 1 and f (0) = 1, because a curing event happens with zero proba- bility, when the time interval is 0. Next, simulations seem to indicate that the virus die-out probability decreases exponentially fast to 1/xn in metastable state with a rate l 1. To incorporate the die-out, the NIMFA prevalence can be corrected by applying (3) y(t) ≈ y(1)(t) f (t) (10) Figure 3 presents the prevalence and the approximation (10) of the SIS epidemic process in the complete graph K50 and the random generated ER graph in Sec 3.2. Starting from one or two infected nodes, NIMFA fails to predict the prevalence. The steady state of NIMFA is independent of the initial conditions. Fortunately, (10) seems a good approximation at the initial stage of the SIS epidemic process. 4 Conclusion In this paper, we discuss the virus die-out probability, which is the probability that the SIS Markovian epidemic process reaches the absorbing state. The importance of the virus die-out probability lies in that it connects the virus spreading phenomena omitting die-out and the exact Markovian model with an absorbing state. Further- more, we propose an approximate formula (6) of the virus die-out probability, which only contains three essential parameters: the largest eigenvalue of adjacency matrix l 1 (the topology parameter), the effective infection rate t (the spreading ability pa- rameter), and the number of initially infected node n (the initial condition parame- Die-out Probability in SIS Epidemic Processes on Networks 9 e c n e l a v e r P 0.8 0.6 0.4 0.2 0.0 0 2 nodes 1 node ER graph N=50 l 1=20.8521 Prevalence y(t) NIMFA Prevalence y(1)(t) y(1)(t)*f(t) 1 2 3 4 Normalized time t (a) SIS epidemic process in ER graph with net- work size N = 50. The effective infection rate is t = 0.25 e c n e l a v e r P 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 2 nodes 1 node Complete graph K50 Prevalence y(t) NIMFA prevalence y(1)(t) y(1)(t)*f(t) 0 1 2 3 4 5 6 7 Normalized time t (b) SIS epidemic in complete graph K50 with ef- fective infection rate t = 0.06 Fig. 3 Comparison of NIMFA and the prevalence. The normalized time is the time scale when the curing rate d = 1 and the prevalence is obtained by averaging 106 realizations. ter). If a few nodes are infected, then formula (6) indicates that the virus will almost surely cause a disease outbreak when the infection rate is above the threshold, irre- spective of the network size N. However, the accuracy of formula (6) also depends on the accuracy of the NIMFA epidemic threshold 1/l 1. Based on formula (6), an approximate virus surviving probability function (9) is proposed. We also discuss the correction for NIMFA. Acknowledgements Q. Liu would like to thank the support from China Scholarship Council. Appendix In the gambler's ruin problem, the goal of the virus is to infect a certain number of nodes and to successfully reach the metastable state. If the virus cannot achieve the goal, the virus loses the game and dies out in the network. The analytic solution of the gambler's ruin probability of a birth-and-process, which gives the probability m n that the virus dies out before infecting all N nodes in a finite time starting from an arbitrary number of infected nodes n, equals [10, p. 231], m n = (cid:229) N−1 k=n 1 + (cid:229) N−1 k=1 k m=1 k m=1 1 (N−m)t 1 (N−m)t (11) First, we evaluate the expression (11). Since (cid:213) (cid:213) 10 Qiang Liu and Piet Van Mieghem k(cid:213) m=1 1 (N − m)t = (N − k − 1)! (N − 1)! 1 t k 1 we have that N−1 k(cid:213) k=n m=1 1 (N − m)t = N−1 k=n (N − k − 1)! t k (N − 1)! Let j = N − k − 1, then 0 ≤ j ≤ N − n − 1 so that a change of variable results in N−1 k=n (N − k − 1)! t k 1 t N−1 = N−n−1 j!t j j=0 Combining all yields (5), it is m n = j!t j (cid:229) N−n−1 j=0 j=0 j!t j = (cid:229) N−1 pN−n−1 (t ) pN−1 (t ) j!z j which is a fraction of two polynomials of the type pm (z) = (cid:229) m j=0 j!z j = 1 + z + 2!z2 + · · ·+m!zm with positive coefficients (all derivatives are positive). Thus, pm (z) is rapidly increasing for z > 0 and possible real zeros are negative. The ratio ( j−1)!z j−1 = jz of two consecutive terms in the polynomial pm (z) in- dicates that, if jz > 1 holds for all 1 ≤ j ≤ m, the terms are increasing, while if jz < 1 for all j, the terms are decreasing. Hence, if jt < 1 for all 1 ≤ j ≤ N − 1, which is satisfied if t < 1 N−1 , then the terms in pN−1 (t ) as well as in pN−n−1 (t ) are decreasing and both pN−1 (t ) and pN−n−1 (t ) tend to each other so that m n → 1. In the other case, for t > 1 N−1 and for sufficiently large N, the polynomial pN−1 (z) will be dominated by the largest term and m n is approximately equal to m n ≈ = (N − n − 1)!t N−n−1 (N − 1)!t N−1 ((N − 1)t )n(cid:0)1 − 1 If n << N, then we arrive at formula (6) N−1(cid:1)(cid:0)1 − 2 N−1(cid:1) · · ·(cid:0)1 − n−1 N−1(cid:1) = (N − n − 1)! (N − 1)! 1 t n = 1 1 (N − 1)(N − 2). . . (N − n) 1 t n m n ≈ 1 ((N − 1)t )n because x = t t (1) c = l 1t = (N − 1)t for the complete graph KN as l 1 (KN) = N − 1. (cid:229) (cid:229) (cid:229) (cid:229) Die-out Probability in SIS Epidemic Processes on Networks 11 References 1. van de Bovenkamp, R.: Epidemic processes on complex networks: modelling, simulation and algorithms. Ph.D. thesis, Delft University of Technology, The Netherlands (2015) 2. van de Bovenkamp, R., Van Mieghem, P.: Survival time of the Susceptible-Infected- Susceptible infection process on a graph. Physical Review E 92(3), 032,806 (2015). DOI 10.1103/PhysRevE.92.032806 3. Cator, E., Van Mieghem, P.: Susceptible-Infected-Susceptible epidemics on the complete graph and the star graph: exact analysis. Physical Review E 87(1), 012,811 (2013). DOI 10.1103/PhysRevE.87.012811 4. Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions. The Journal of Physical Chemistry 81(25), 2340 -- 2361 (1977). DOI 10.1021/j100540a008 5. Khanafer, A., Baar, T., Gharesifard, B.: Stability properties of infected networks with low In: 2014 American Control Conference, pp. 3579 -- 3584 (2014). DOI curing rates. 10.1109/ACC.2014.6859418 6. Li, C., van de Bovenkamp, R., Van Mieghem, P.: Susceptible-infected-susceptible model: A comparison of N-intertwined and heterogeneous mean-field approximations. Physical Review E 86(2), 026,116 (2012). DOI 10.1103/PhysRevE.86.026116 7. Pastor-Satorras, R., Castellano, C., Van Mieghem, P., Vespignani, A.: Epidemic processes DOI Reviews of Modern Physics 87(3), 925 -- 979 (2015). in complex networks. 10.1103/RevModPhys.87.925 8. Sander, R.S., Costa, G.S., Ferreira, S.C.: Sampling methods for the quasistationary regime of epidemic processes on regular and complex networks. arXiv:1606.00036 (2016) 9. Van Mieghem, P.: Decay towards the overall-healthy state in SIS epidemics on networks. arXiv:1310.3980 (2013). ArXiv: 1310.3980 10. Van Mieghem, P.: Performance analysis of complex networks and systems. Cambridge Uni- versity Press, Cambridge (2014) 11. Van Mieghem, P.: Approximate formula and bounds for the time-varying susceptible-infected- Physical Review E 93(5), 052,312 (2016). DOI susceptible prevalence in networks. 10.1103/PhysRevE.93.052312 12. Van Mieghem, P., van de Bovenkamp, R.: Accuracy criterion for the mean-field approximation in susceptible-infected-susceptible epidemics on networks. Physical Review E 91(3), 032,812 (2015). DOI 10.1103/PhysRevE.91.032812 13. Van Mieghem, P., Omic, J., Kooij, R.: Virus Spread in Networks. IEEE/ACM Transactions on Networking 17(1), 1 -- 14 (2009). DOI 10.1109/TNET.2008.925623 14. Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an In: 22nd International Symposium on Reliable Distributed Systems, eigenvalue viewpoint. 2003. Proceedings, pp. 25 -- 34 (2003). DOI 10.1109/RELDIS.2003.1238052
1902.07432
1
1902
2019-02-20T07:26:55
Seed Selection and Social Coupon Allocation for Redemption Maximization in Online Social Networks
[ "cs.SI" ]
Online social networks have become the medium for efficient viral marketing exploiting social influence in information diffusion. However, the emerging application Social Coupon (SC) incorporating social referral into coupons cannot be efficiently solved by previous researches which do not take into account the effect of SC allocation. The number of allocated SCs restricts the number of influenced friends for each user. In the paper, we investigate not only the seed selection problem but also the effect of SC allocation for optimizing the redemption rate which represents the efficiency of SC allocation. Accordingly, we formulate a problem named Seed Selection and SC allocation for Redemption Maximization (S3CRM) and prove the hardness of S3CRM. We design an effective algorithm with a performance guarantee, called Seed Selection and Social Coupon allocation algorithm. For S3CRM, we introduce the notion of marginal redemption to evaluate the efficiency of investment in seeds and SCs. Moreover, for a balanced investment, we develop a new graph structure called guaranteed path, to explore the opportunity to optimize the redemption rate. Finally, we perform a comprehensive evaluation on our proposed algorithm with various baselines. The results validate our ideas and show the effectiveness of the proposed algorithm over baselines.
cs.SI
cs
Seed Selection and Social Coupon Allocation for Redemption Maximization in Online Social Networks Tung-Chun Chang∗‡, Yishuo Shi†, De-Nian Yang† and Wen-Tsuen Chen‡ ∗Research Center for Information Technology Innovation, Academia Sinica, Taiwan †Institute of Information Science, Academia Sinica, Taiwan ‡Department of Computer Science, National Tsing Hua University, Taiwan 9 1 0 2 b e F 0 2 ] I S . s c [ 1 v 2 3 4 7 0 . 2 0 9 1 : v i X r a Email: [email protected], [email protected], [email protected], [email protected] Abstract -- Online social networks have become the medium for efficient viral marketing exploiting social influence in information diffusion. However, the emerging application Social Coupon (SC) incorporating social referral into coupons cannot be efficiently solved by previous researches which do not take into account the effect of SC allocation. The number of allocated SCs restricts the number of influenced friends for each user. In the paper, we investigate not only the seed selection problem but also the effect of SC allocation for optimizing the redemption rate which represents the efficiency of SC allocation. Accordingly, we formulate a problem named Seed Selection and SC allocation for Redemption Maximization (S3CRM) and prove the hardness of S3CRM. We design an effective algorithm with a performance guarantee, called Seed Selection and Social Coupon allocation algorithm. For S3CRM, we introduce the notion of marginal redemption to evaluate the efficiency of investment in seeds and SCs. Moreover, for a balanced investment, we develop a new graph structure called guaranteed path, to explore the opportunity to optimize the redemption rate. Finally, we perform a comprehensive evaluation on our proposed algorithm with various baselines. The results validate our ideas and show the effectiveness of the proposed algorithm over baselines. I. INTRODUCTION Online social networks (OSNs), e.g., Facebook, Twitter, have fostered efficient diffusion of information and advertise- ment. Social influence [1] is the cornerstone of viral marketing and draws a wide spectrum of research, such as influence maximization (IM) [2] -- [16] (identifying the k seed users for maximizing the total influence spread) and profit maximization (PM) [17] -- [23] (maximizing the total benefit from influ- enced users subtracted by the total expense). Recently, Social Coupon (SC) [24], [25], emerges to incorporate social referral into coupons [24], [25]. Real examples include Dropbox1, which offers free space to a user that shares cost-effective deals to Facebook friends. The user will acquire 500 MB free space after any friend accepts the deal (up to 16 GB for each user). Airbnb2 allows users to invite their Facebook friends to sign up and completes the first trip, whereas $29 and $18 travel credits will be rewarded to the invitee and the inviter (up to $5000 for each user), respectively. Similarly, Booking.com3 encourages social referral (up to 10 friends for each user). To efficiently facilitate SC, new start-up companies (e.g., ReferralCandy and Extole4) develop a customized SC system for e-commerce websites of clients. However, SC has drawn much less research attention, and currently the efficiency of SC is usually low (0.8% and 15.9% for offline and online SC), because resources are not properly allocated to valuable users [26]. The research of IM blossoms from Kempe et al. [2] that introduced the basic formulation, propagation models and the corresponding approximation algorithm, and many follow-up studies improve the efficiency for massive social networks [3] -- [16]. PM [17] -- [23] addresses the trade-off between the seed cost and the benefit of influenced users. However, SC is different to IM and PM due to the following reasons. 1) For SC, not only the seeds but also the internal nodes in an influence spread are required to be selected and allocated resources. In contrast, IM and PM target on only the seeds. 2) For SC, each internal node is associated with an SC constraint, which limits the maximum number of friends that can be referred and receive SC (i.e., influenced by SC and then redeem it). For example, at most 32 (16 GB/500 MB) friends can receive SC from each Dropbox user. On the contrary, each internal node in IM and PM can influence an arbitrary number of friends since no resource is allocated. Therefore, the shape of a spread can be controlled more precisely by SC (e.g., broader or deeper) by carefully selecting internal nodes and allocating different resources to each of them. Moreover, each internal node is more inclined to be activated due to the reward from social referral. In this paper, therefore, we make the first attempt to explore seed selection with SC allocation. Simultaneously selecting and allocating resources to both seeds and internal nodes raise the following new research challenges. The first one is a benefit and total cost trade-off between the benefit of influenced users and the total cost of seeds and SCs. Unlike previous works, SC needs to allocate difference resources to activate seeds 1https://www.dropbox.com/referrals 2https://www.airbnb.com/invite, https://www.airbnb.com/help/article/2269/ airbnb-referral-program-terms-and-conditions 3https://www.booking.com/content/referral-faq.en-gb.html 4https://www.referralcandy.com, https://www.extole.com directly and internal nodes through SCs. It is important to carefully examine the benefit of activating users by SCs or delegating them as seeds. The second one is investment trade- off between the investment in seeds and internal nodes due to a limited budget. Seeds start the influence spread while internal nodes sustain it, and the activation of seeds is usually more expensive. Thus, it is important to carefully allocate the resource to derive an efficient spread. The third one is SC allocation trade-off between allocating SCs to users near seeds and users with high benefit but far from seeds. Allocating SCs to users near seeds can strengthen the influence spread from its root, i.e., increase the number of expected redeemed SCs, while allocating SCs to high benefit users can improve the efficiency of the investment. To address the above challenges, we formulate a new optimization problem, named Seed Selection and SC alloca- tion for Redemption Maximization (S3CRM). In contrast to selecting only seeds to maximize the influence [2] -- [16] or profit [17] -- [23], S3CRM aims to select seeds and internal nodes and allocate SCs to users such that the redemption rate is maximized. The redemption rate is the ratio of the expected benefit of influenced users to the total cost (i.e., the sum of seed cost and SC cost). It is important to choose a proper seed set and internal nodes to start and shape the influence spread. Moreover, it is crucial to balance the investment in seeds and SCs, and meanwhile the total cost must be ensured within the investment budget. We first prove the NP-hardness for S3CRM and then devise an approximation algorithm, named Seed Selection and SC allocation Algorithm (S3CA). For the benefit and total cost trade-off, S3CA introduces marginal redemption to measure the extra benefit obtained by activating a seed or allocating an SC. For investment trade-off, S3CA deploys the resource by iteratively investing a new seed or an SC to an acti- vated user with the highest marginal redemption to balance the investment in seeds and SCs. For SC allocation trade- off, S3CA first constructs guaranteed paths to identify all possibly influenced inactive users for each seed under the budget constraint. Moreover, S3CA introduces amelioration index and deterioration index to evaluate the improvement and deterioration of the maneuver of the previous deployed SCs to optimize the redemption rate. Finally, we evaluate S3CA with real datasets, and the simulation results show that S3CA can effectively improve the redemption rate up to 30 times comparing to the baselines. The rest of this paper is organized as follows. Section II reviews the related works. The problem formulation and the hardness analysis are given in Section III. We present the algorithm design in Section IV, and the performance analysis is described in Section V. The experimental results are shown in Section VI. Finally, Section VII concludes this paper. II. RELATED WORK Influence maximization focuses on the pinpoint of the k most influential users in an OSN, and the identified users are delegated to start the influence propagation. The studies of influence maximization blossom from Kempe et al. [2] introducing the basic formulation and propagation models. Furthermore, submodularity exhibits when the influence dif- fuses with the models, and thus they proposed a (1 − 1/e) -- approximation algorithm. After the algorithm is proposed, many studies followed up to improve the efficiency [3] -- [16] for massive OSNs. However, these works are not applicable to the SC scenario since they consider only seed selection without the SC allocation of internal nodes. Tang et al. [17] state that the optimal profit cannot be derived from influence maximization since the influential users are probably expensive for activation, which results in a trade- off between the expense and the benefit of propagation. Thus profit maximization emerges, and profit is defined as the ben- efit from influenced users subtracted by the cost of activating seeds in [17]. Tang et al. [18] take the cost of activating non- seed users into consideration, which is a constant number for each user. However, it is not applicable to the SC scenario where the cost of non-seed users depends on the number of their allocated SCs. Zhu et al. [19] and Zhang et al. [20] find the profits of activating users for the competitive environment and multiple products, respectively. Khan et al. [21] formulated a revenue maximization problem from the perspective of the host of OSNs. Furthermore, Lu et al. [22] and Zhu et al. [23] maximize the profit, where people are not influenced unless the price meets their expectation. These works [19] -- [23] are complementary to S3CRM. III. OSN MODEL AND PROBLEM FORMULATION For the SC scenario, independent cascade (IC) model5 [2] is extended by imposing an SC constraint to each user as follows. The influence propagation starts from the selected seeds, and then the seeds switch to the active state and try to activate their friends with the influence probability. Moreover, for each vi ∈ V , the maximum number of activated friends is restricted by the SC constraint (i.e., no more than ki). The activation starts from the friend with the highest to the lowest influence probability, since in reality the friend with the highest influence probability is most likely to redeem the SC. Each user can be activated only once, and the activation process stops when no more user can be activated. For convenience, we have summarized all notations in Table I. The definitions of notations are explained as fol- lows. Users V of the OSN and their relationships E form a weighted directed graph G = {V, E}, where each edge e(i, j) ∈ E between vi and vj ∈ V has a weight P (e(i, j)), and b(vi), cseed(vi), and csc(vi) are the benefit, seed cost, and SC cost of vi, respectively. ki ∈ [0,N (vi)] ∈ N is the SC constraint for each vi, where N (vi) is the number of vi's friends. Moreover, S and I are the seed set and the internal node set, respectively. K(I) = {ki∀vi ∈ I} is the SC allocation. Let Cseed(S) be the total cost of S. vi∈I,vj∈N (vi) E[ki, csc(vj)], where vj is vi's friend with the j-th highest influence probability and Let Csc(K(I)) = (cid:80) 5Since the SC is usually redeemed solely, the linear threshold is not suitable. TABLE I NOTATIONS OF S3CRM AND S3CA is formulated as follows. ) Notation in Problem N (vi) cseed(vi), csc(vi), b(vi) ki ∈ [0, N (vi)] ∈ N S ⊂ V , I ⊂ V K(I) = {ki∀vi ∈ I} Cseed(S), Csc(K(I)) E[Ki, csc(vj )] B(S, K(I)) E[S, K(I), b(vi)] Binv Notation in Algorithm τ vi,γi S, I g(s, vi) U l s K(I) (cs,vl i Ia(g(s, vi)) m (M) ∆vj (k) Id(∆vj (k)) βm,M∗ g(s,vi) (B,C) δK bM j Bm,M g(s,vi) (Cm,M g(s,vi)) Notation in Proof V k b cref , Copt C1 (C2) Csort eref (ec) b0 (c0) e∗ t O(M ) (cM j ) Definition number of vi's friends (out-neighbors) seed cost, SC cost, benefit of vi SC constraint of vi seed set, internal node set SC allocation total seed cost, expected SC cost of K(I) expected SC cost (vi distributes an SC to vj) expected benefit of the influence propagation expected benefit of vi with S and K(I) investment budget Definition MR of selecting vi as seed (allocate coupon) the GP from seed s to user vi l-th level set of visited siblings from seed s SC allocation (cost) for each g(s, vl i) marginal ratio of g(s, vi) single (set) maneuver operation retrieve k SCs from vj ratio of benefit loss to retrieved SC cost the maneuver (benefit,cost) gap difference of total allocated SCs number denote the benefit (cost) gain based on M benefit (cost) gap after m maneuver operation Definition top k highest influence users in Vb reference cost, optimal cost set the first (second) largest cost in Copt sorted cost set from the smallest to the largest reference (corresponding candidate) edge set ratio of benefit (cost) variation of users. maximum benefit edge of OP T time of evaluating the expected benefit E[ki, csc(vj)] is the expected SC cost to distribute an SC to vj. If j ≤ ki, E[ki, csc(vj)] = csc(vj)P (e(i, j)); otherwise j > ki, E[ki, csc(vj)] = csc(vj)P (e(i, j))P ( ¯ki) , where P ( ¯ki) is the probability that at most ki − 1 friends vj ∈ (cid:80) N (vi), j < j success to redeem the SC. Let B(S, K(I)) = vi∈I E[S, K(I), b(vi)] be the expected benefit of the in- fluence propagation, where E[S, K(I), b(vi)] is the expected benefit of vi with the seed set S and SC allocation K(I). Finally, the investment budget is Binv. Consider Dropbox as an example. Users distribute SCs (post the invite link) to their Facebook friends. Once a friend vi receives the SC (installs Dropbox through the link), 500 MB of free space is rewarded (i.e., csc(vi)). For each vi ∈ V , the maximum number of friends receiving the reward is restricted by the number of allocated SCs (i.e., ki = 32). S3CRM problem: Given an OSN, a propagation model, and the benefit, SC cost, and seed cost for each user, S3CRM is to identify of a seed set S, the internal node set I, and the SC allocation K(I), to maximize the redemption rate, which is the ratio of the benefit from activated users to the sum of seed costs and SC costs, under an investment budget constraint Binv. S3CRM arg max S⊂V,I⊂V,K(I) B(S, K(I)) Cseed(S) + Csc(K(I)) , (1a) subject to Cseed(S) + Csc(K(I)) ≤ Binv. (1b) The redemption rate has been widely adopted as an effective measure for coupons in marketing research [25], [26], because the redemption rate considers not only the total benefit but also the marginal benefit of the budget (e.g., the additional benefit to spend the last 10% budget). Considering a simple example G = (V, E) with two vertices, where V = {u, v}, E = ∅, and Binv = 1. For the two users, coupon costs are cseed(u) =  and cseed(v) = 1 − , and the benefit for them are 1 −  and , respectively, where  is an arbitrarily small constant. The maximum benefit is 1 by selecting both vertices, but the maximum redemption rate is 1−  by choosing only u as the seed. User v is not selected since the additional benefit  generated by choosing v is tiny, but a large budget (i.e., 1− ) is required. Therefore, the redemption rate is widely adopted by marketing research to achieve the best performance/cost ratio. Special cases: We first give two commonly used coupon strategies, and then we show the strategies and IM are special cases of S3CRM as follows. 1) Limited coupon strategy is applied by Dropbox, Airbnb, Booking.com, etc., where ki of each user is an identical constant number, e.g., ki = 32 with Dropbox. Thus, it is a special case of S3CRM with a prede- termined SC allocation K(I), which selects only seeds under the remaining budget (i.e., Binv − Csc( K(I))). 2) Unlimited coupon strategy allocates unlimited SCs to users, which im- plies that the SC cost is marginal (i.e., csc(vi) = 0, ∀vi ∈ V ), and is adopted by Uber6, Lyft7, and Hotel.com8. Thus, it is a special case of S3CRM, which is arg maxS⊂V Cseed(S), such that Cseed(S) ≤ Binv. Since the SC constraint is removed, the propagation model reduces to the IC model. Similarly, IM is a special case of S3CRM with the SC cost equals to 0 and the SC constraint is unlimited for each user (detail later). Comparison example: Fig. 1 compares IM, PM, and S3CRM with the default parameters (not presented in the figure) as follows. For each user vi, both cseed(vi) and csc(vi) are 1, and b(vi) = 3. The investment budget Binv is 3.5. Moreover, for the results, the users allocated with SCs and the users within the influence spread are marked in yellow and green, respectively. Since IM and PM do not consider SC allocation, unlimited coupon strategy is applied. For simplicity, we restrict the example of selecting only one seed and allocating two SCs. Fig. 1(a) shows the result of IM applying unlimited coupon strategy. For selecting v3 as a seed (i.e., k3 = N (v3) = 2), the expected benefit is 3 + 3∗ 0.7 + 3∗ 0.5 = 6.6 and the total B(S) 6https://help.uber.com/h/27ecd6af-4929-4c53-a81c-f9fbf2432fd4 7http://get.lyft.com/invites 8https://refer.hotels.com/friends/us?traffic source=mWebHP i ∈ Vb and va b ∈ Va, let b(vb i ∈ Vb, vb i connects to only the counterpart va S3CRM. The special case is given as follows. For the OSN G = {V, E}, the set of users V = {vu ∪ Va ∪ Vb} includes an unique user vu and two identical set of users Va and Vb. For i ∈ Va each user vb with the weight of 1. Let V k b denote the set of users in Vb, who have the top k highest influence. The unique user vu connects to each user in V k b with a weight of 1. The seed cost of vu is k while the seed costs of users in Va and Vb are arbitrarily large, i ∈ and thus vu is the only candidate of seed. For each user vb i ) = ε, where ε is an arbitrarily small constant. For Vb, let csc(vb i ∈ Va, let csc(va i ) = 0 which implies that if the each user va counterpart vb i is activated by vu, it is activated simultaneously, and then the influence spread of users in Va is unlimited by the SC constraint (reduces to the IC model). Let b(vu) = ε, and for each user vb i ) = 0 and i ) = 1, respectively. Moreover, let Binv = k + kε, which b(va implies that the seed vu can be allocated with at most k SCs. For the solution of the special case, the seed set S = {vu} and the internal node set I = {vu ∪ Va ∪ V k b }, where vu is allocated with k SCs (i.e., ku = k) while the users in Va have no SC constraints. Thus, the expected benefit is not less than ε (i.e., benefit of the seed b(vu)) and the total cost ranges from k to k + kε (i.e., from seed cost of vu to Binv). Furthermore, the special case can be reduced to IM as follows. Given a IM with the OSN G(cid:48) = {V (cid:48), E(cid:48)}, where V (cid:48) = {Va ∪ V k b } and E(cid:48) is the set of edges between users in V (cid:48), and the seed size of k. For any feasible solution of the special case (i.e., S and I), V k b is a feasible solution of the IM problem. On the other hand, let V denote the seed set selected by solving the IM problem. For any feasible solution of the IM problem, V = V k b since vu connects the top k influential users, and thus we can derive a feasible solution of the special case. For the objective function, the expected benefit derived from the IM problem is slightly less than the expected benefit from the special case by ε, which is negligible. Likewise, the total cost of the special case is approximately equal to k (i.e., k + kε ≈ k) since the SC cost of users in Vb is negligible. Therefore, the special case can be reduced to IM. Furthermore, IM is as hard as maximum k -- cover problem by the reduction that setting all influence probability to 1 of IM. Hence, S3CRM is as hard as the maximum k -- cover problem and the hardness is 1 − 1/e + ε [27]. IV. ALGORITHM DESIGN To effectively solve S3CRM, we design an approximation algorithm, namely Seed Selection and SC allocation Algorithm (S3CA). In contrast to IM [2] -- [16] and PM [17] -- [23] focusing on solely seed selection and ignoring the SC allocation, S3CA introduces the notion of Marginal Redemption (MR) to prioritize the investment in seeds and allocating SCs to users. For each user, MR represents the ratio of the expected benefit gain to the expected cost gain after activated as a seed or allocated with an extra SC, and therefore a user with a larger MR receives the investment (seed or SC) first. To address the investment trade-off, S3CA deploys the investment Fig. 1. A simple example comparing three different methods. (a) Result of IM with unlimited coupon strategy. (b) Result of PM with unlimited coupon strategy. (c) Result of S3CRM. cost is Cseed(v3) + Csc(k3) = 1.5 + (1 ∗ 0.7 + 1 ∗ 0.5) = 2.7. For v1 and v2 as a seed, the expected benefits are 6.15 and 4.68, and the total costs are 2.05 and 2.1, respectively. Thus IM allocates two SCs to the selected seed v3 with the maximum expected benefit (i.e., 6.6) and the redemption rate is 6.6/2.7 = 2.45. Fig. 1(b) is the result of PM applying unlimited coupon strategy. For v1 as a seed, the profit is derived by the expected benefit minus the seed cost (i.e., (3 + 3 ∗ 0.55 + 3 ∗ 0.5) − 1 = 5.15). For v2 and v3 as a seed, the profit are 3.68 and 5.1, respectively, and the total costs are the same as IM. Thus, PM allocates two SCs to the selected seed v1, which results in the maximum profit, and the redemption rate is 6.15/2.05 = 3. Fig. 1(c) shows the result of S3CRM. For selecting v1 as a seed, the remaining budget (i.e., Binv − cseed(v1) = 2.5) is invested with three cases as follows: 1) Allocating two SCs to v1. The expected benefit and the total cost are 3 + 3∗ 0.55 + 3∗ 0.5 = 6.15 and 1 + (1∗ 0.55 + 1∗ 0.5) = 2.05, respectively, and the redemption rate is 6.15/2.05 = 3. 2) Allocating one SC to each of v1 and v2. The expected benefit and the total cost are 5.46 and 1.975, respectively. Note that, since k1 = 1, the probability of activating v2 becomes (1 − 0.55) ∗ 0.5 (i.e., v4 fails to redeem the SC) and we call e(1, 2) a dependent edge (marked in red) while others indepen- dent edge. Thus, the redemption rate is 5.46/1.98 = 2.76. 3) Allocating one SC to each of v1 and v4. The expected benefit is 8.295 and the total cost is 2.675, and thus the redemption rate is 8.295/2.675 = 3.1. The allocation process iteratively calculates the redemption rate by assuming users as seeds. The final result is selecting seed v1 and allocating SCs by {k1 = 1, k4 = 1} with the maximum redemption rate 3.1. Fig. 1 shows that S3CRM derives the best redemption rate by carefully examining all possible combinations of seeds and SC allocation. Note that though cseed(v4) = cseed(v5) > Binv (i.e., v4 and v5 never become a seed), S3CRM can reap the highest benefit among users (i.e., b(v5)) through allocating an SC to v4 while IM and PM fail to activate v5. Theorem 1. S3CRM is NP-hard and can not be approximated within 1 − 1/e + ε, where ε is an arbitrarily small constant. Proof. We first give a special case of S3CRM, and then prove that it can be reduced to IM, which derives the hardness of Fig. 2. Reduction of S3CRM to IM by carefully examining the MR for three strategies as follows: 1) broadening the current influence spread, 2) deepening the current influence spread, and 3) initiating a new source (seed) of the influence spread. To address the SC allocation trade-off, S3CA introduces the notion of Guaranteed Path (GP) to identify the users with high benefit but receiving no resources (not activated) from the previous deployment. For each user in a GP, the SCs are always sufficient for distribution to ensure the highest activation probability (i.e., no dependent edge) and improve the redemption rate. To evaluate the possible improvement for each GP, S3CA introduces Amelioration Index (AI) and Deterioration Index (DI), which are the ratio of improved and decreased expected benefit to the allocated and retrieved SC cost. Then, S3CA can maneuver the investment in SCs to optimize the redemption rate by examining AI and DI. S3CA includes three phases: 1) Investment Deployment (ID), 2) Guaranteed Paths Identification (GPI), and 3) SC Maneuver (SCM). For the investment trade-off, ID exploits MR to iteratively deploy the investment by adopting the strategy with the highest MR. GPI continues to identify the GPs of inactive users with high benefit. Based on the derived GPs, SCM carefully examines the opportunity to maneuver the SCs allocated to users in the ID phase to create a new spread, such that the redemption rate is optimized. A. Algorithm Description 1) Investment Deployment (ID): ID first deploys the invest- ment in seeds and internal nodes under the investment budget by three strategies as follows: 1) activating the source (seed) of a new influence spread, 2) allocating an SC to a user to broaden the current influence spread; meanwhile, enhancing the influence probability by changing an edge from dependent to independent (e.g., by allocating an SC to v1 in Fig. 1(c), the influence probability improves 27.5%), and 3) allocating an SC to the user in the end of the current influence spread to deepen the spread. Nonetheless, previous works (IM [2] -- [16] and PM [17] -- [23]) includes no such subtle manipulations of influence spreads. S3CA introduces pivot source for the evaluation of invest- ment in seeds and SCs, which is derived as follows. For each user, ID calculates the MR (detailed later) of the nodes selected Fig. 3. Results of the example of ID. (a) Iteration 1. (b) Iteration 2. (c) Iteration 3. (d) Iteration 4. as a seed or allocated with an SC after becoming a seed (i.e., updating Ki to 1), and it then iteratively applies the one with the maximum positive MR. Once a user is selected, it is included in a priority queue Q (sorted by redemption rate). Moreover, when an SC is allocated to a seed in Q, the redemption rate is updated. The process stops when all MR becomes negative or all users are included in Q. Afterward, vi is popped from Q as the initial of the influence spread, and it is then included to the candidate seed set S and the candidate internal node set I (if Ki = 1). Moreover, { S, I, K( I)} is included in the candidate deployment D. ID further pops vp from Q as the pivot source for the comparison of the MR of allocating an SC to users. For the investment trade-off, ID iteratively examines the MR of allocating an SC to users (strategy 2 and 3) and the redemption rate of the pivot source vp (strategy 1). If the user vi has the maximum MR larger than the redemption rate of vp, ID invests an SC in vi (i.e., increases Ki by 1) and includes vi in I if vi /∈ I; otherwise, ID initiates a new source vp and includes vp in S and I, and it pops the next pivot source from Q. In each iteration, D includes the current deployment { S, I, K( I)}. The process stops when the total cost exceeds the investment budget Binv, and the final deployment of ID is D∗ ∈ D with the highest redemption rate. Specifically, let γi denote the binary variable (initialized as 1) indicating that if a user vi is selected as seed for the first time, γi = 1; otherwise, γi = 0. If γi = 1, MR of selecting vi as a seed is defined as = B( S∪vi,K( I))−B( S,K( I)) τ vi,γi ; otherwise, MR of allocating Cseed( S∪vi)−Cseed( S) S, I = B( S,K( I∪vi))−B( S,K( I)) an SC to vi is defined as τ vi,γi . Csc(K( I∪vi))−Csc(K( I)) S, I Note that when vi ∈ I, K( I ∪ vi) is different from K( I) since Ki is increased by 1. Example 1. Fig. 3 presents an example of ID with the input setting as follows. For each user vi, b(vi) = csc(vi) = 1, and cseed(vi) ≈ ∞ except that cseed(v1) ≈ 0. The dependent edges are marked in red. Since the only possible seed is v1, the queue Q contains only v1, and the influence starts from v1 allocated with an SC. The expected benefit and cost are approximately 1 + (1 ∗ 0.6 + 1 ∗ (1 − 0.6) ∗ 0.4) = 1.76 and 0 + 1∗ 0.6 + 1∗ (1− 0.6)∗ 0.4 = 0.76, respectively. In the first iteration, the expected benefit gains of allocating an SC to v1 (K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1) are (1 + 1∗ 0.6 + 1∗ 0.4)− 1.76 = 0.24, (1 + 1∗ 0.6 + 1∗ (1− 0.6)∗0.4+1∗0.6∗0.5+1∗0.6∗(1−0.5)∗0.4)−1.76) = 0.42, 1 + 1∗ 0.6 + 1∗ (1− 0.6)∗ 0.4 + 1∗ (1− 0.6)∗ 0.4∗ 0.8 + 1∗ (1 − 0.6) ∗ 0.4 ∗ (1 − 0.8) ∗ 0.7) − 1.76 = 0.15, respectively. Moreover, the expected cost gains of allocating an SC to v1 (K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1) are (1 ∗ 0.6 + 1 ∗ 0.4) − 0.76 = 0.24, (1 ∗ 0.6 + 1 ∗ (1 − 0.6) ∗ 0.4 + 1 ∗ 0.5 + 1 ∗ (1 − 0.5) ∗ 0.4) − 0.76 = 0.7, and (1 ∗ 0.6 + 1 ∗ (1 − 0.6) ∗ 0.4 + 1 ∗ 0.8 + 1 ∗ (1 − 0.8) ∗ 0.7) − 0.76 = 0.94, respectively. Thus, MR of allocating an SC to v1 (K1 = 2), v2 (K1 = 1, K2 = 1), and v3 (K1 = 1, K3 = 1) are 0.24/0.24 = 1, 0.42/0.7 = 0.6, and 0.15/0.94 = 0.16, respectively, and the SC is allocated to v1 with the maximum MR. Fig. 3(a) shows the result of the first iteration and the result of the following iterations are shown in Fig. 3. Fig. 3 presents the subtle manipulation of the influence spread by S3CA with the investment in seeds and SCs, which cannot be accomplished by previous works [2] -- [23]. IM [2] -- [16] selects the most influential user v3 as the seed. However, the seed cost cseed(v3) is not considered and can be arbitrarily large. Although PM [17] -- [23] takes the seed cost into consideration, it cannot decide the user (e.g., v2 or v3 in Fig. 3(a)) to allocate SCs (even applying existing coupon strategies), and it may result in a miserable redemption rate. 2) Guaranteed Paths Identification (GPI): For the SC allo- cation trade-off, GPI constructs the Guaranteed Paths (GP) to identify the inactive but possibly influenced users based on the result of ID D∗ = {S∗, I∗, K(I∗)}. For each seed s ∈ S∗, the possibly influenced inactive users are restrained by the remaining budget (i.e., subtracting the investment budget by the seed cost). Moreover, for the GP to a possibly influenced inactive user, all edges are independent edges to guarantee the highest influence probability. Nonetheless, existing strategies like unlimited and limited coupon strategies cannot identify these users, and it thereby tends to influence those with high benefits. For each seed s ∈ S∗, GPI constructs the GP g(s, vi) from s to each possibly influenced inactive user vi as follows. GPI first marks s as visited, and it then traverses the descendants of s in DFS manner. For each visited node, the traversal starts from its child with the highest to the lowest influence probability. When a user vi is visited, GPI includes the following nodes in a temporary set g, including the visited siblings of both vi and vi's ascendants. It then sets c as the total expected SC cost of all users in g. If c ≤ Binv−cseed(s), 1) g(s, vi) is set to g with a guaranteed cost cs,vi = c, 2) for each user vj in g, Kj is set to the number of visited children (i.e., each user could receive an SC), 3) it updates the expected benefit bs,vi, and 4) GPI proceeds to traverse vi's children. Otherwise, GPI stops traversing vi's children and unvisited siblings (i.e., siblings with influence probability lower than vi's), and it traverses back to the next sibling of vi's parent (i.e., the sibling next to vi's parent in the descending order of influence probability). The process stops when no more user can be visited (i.e., c > Binv − cseed(s)). More specifically, for each user vl in the l-th level, let i U l s denote the set of visited siblings in the l-th level before visiting vl i by the traversal starting from a seed s. A guaranteed Fig. 4. Examples of guaranteed paths. (a) g(v1, v7). (b) g(v1, v13). (c) g(v1, v15) . is g(s, vl i the path). For each node, i) = {vj∀vj ∈ U l i), let K(I) = { Kj∀vj ∈ g(s, vl s, l ≤ l}. path from s to vl i)} denote i For each g(s, vl its SC allocation, where Kj is the SC constraint of vj in i). Moreover, Kj equals to the number of vj's visited g(s, vl = Csc( K(I)) (i.e., children, and the guaranteed cost is cs,vl the expected SC cost that each user in g(s, vl i) could receive an SC). Example 2. Fig. 4 presents three examples of GP, and the GPs are marked in blue and yellow the users of (end of the children on the left side has a higher influence probability. In Fig. 4(a), g(v1, v7) = {v1, v2, v4, v5, v6, v7}, and Fig. 4(b) and 4(c) present g(v1, v13) and g(v1, v15), respectively. Moreover, the expected benefit of a GP involves not only the visited users but also the users connected by the dependent edges (marked in green). GP is a novel structure specially designed for the SC environment, which is not included in the previous works [2] -- [23]. GP can identify the possibly influenced inactive users with high benefits and then guide the influence spread for reaping the benefits. However, existing coupon strategies (lim- ited and unlimited) cannot obtain the benefits since they either apply over-simplified methods or ignore the SC allocation. 3) SC Maneuver (SCM): To optimize the redemption rate, SCM examines the opportunity to maneuver the allocated SCs (i.e., K(I∗)) for creating new spreads based on the derived GPs P. SCM introduces Amelioration Index (AI) and Deterioration Index (DI) to evaluate the amelioration and the deterioration of redemption rate by allocating and retrieving SCs, respectively. For each g(s, vi) ∈ P, AI Ia(g(s, vi)) is the ratio of the expected benefit gains Ba(g(s, vi)) to the expected SC cost of the allocated SCs Ca(g(s, vi)). For retrieving k SCs from vj, DI Id(∆vj (k)) is the ratio of the expected benefit loss to the expected SC cost of the retrieved SCs. Let m and M denote a maneuver operation and a set of maneuver operations (detailed later). To evaluate the efficiency of maneuvering SCs, SCM introduces Maneuver Gap (MG) βm,M g(s,vi) which is the ratio of the benefit gap to the cost gap. The benefit gap Bm,M g(s,vi) and the cost gap C m,M g(s,vi) are the difference between the expected benefit gain and the expected SC cost before and after including m in M. Equipped with the above notions, S3CA can examine the improvement of creating each GP, the debasement of redemption rate by retrieving SCs, and the efficiency of maneuvering SCs, whereas these fine-grained operations are not considered in the previous works [2] -- [23]. i ∈K K j i ∈K K j ∀K∈M∗,∀Kj ∀K∈M∗,∀Kj When (cid:80) i vi, vj ∈ V } (e.g., K j neuvered SCs(cid:80) SCM calculates Ia(g(s, vi)) for each g(s, vi) ∈ P. From the largest to the smallest Ia(g(s, vi)), if 1) its guaranteed cost cs,vi does not exceed the total invested SC cost Csc(K(I∗)) and 2) vi cannot be activated by D∗ (Kp ∈ K(I∗) = 0, where vp is vi's parent), SCM then determines whether to create g(s, vi) as follows. Let vi∗ and δK denote the nearest possibly activated ascendant of vi by D∗ and the difference between the total number of SCs allocated in g(s, vi) and g(s, vi∗ ), respectively. Let M∗ denote the set of maneuver operations, where a maneuver operation m includes a DI Id(∆vj (k)), maneuver mapping K = {K j i = 3 represents maneuvering 3 SCs from vj to vi), the index of the last user with SCs maneuvered. If the total number of the ma- i < δK, SCM calculates the DIs of all vj ∈ I∗ and derives a set of corresponding maneuver operations M. From the maneuver operation m ∈ M with the smallest to the largest DI Id(∆vj (k)), if Id(∆vj (k)) < βm,M∗ and the redemption rate is improved by K ∈ m, SCM includes m in M∗ and proceeds to find the next maneuver operation. If Id(∆vj (k)) ≥ βm,M∗ g(s,vi) or the redemption rate is not improved, SCM skips this GP and proceeds to examine the next GP. i = δK, g(s, vi) is created based on M∗. The process ends after all GPs in P are examined. SCM evaluates the DIs and derives the set of corresponding maneuver operations as follows. Let Kj and Kj denote vj's SC allocation of K(I∗) and g(s, vi), respectively. For each vj ∈ I∗, if it has spare SCs for creating g(s, vi) (i.e., Kj > Kj), SCM calculates DIs by retrieving all possible numbers k of SCs (1 ≤ k ≤ Kj− Kj), as opposite to the derivation of MR (i.e., retrieving instead of adding SCs). Let i∗ denote the index of user whom SCM maneuvers SCs to, which starts from the nearest possibly activated ascendant of vi. Let S denote the M∗ (i.e., (cid:80) sum of SCs already maneuvered to v i∗ according to the current i∗, where K is the union of all K ∈ M∗). SCM builds the maneuver mapping K by splitting the k SCs to v i∗ and his descendants starting from v i∗. First, SCM sets i∗ = K i∗−(K i∗ +S) (the number of SCs required for filling K j v i∗'s SC allocation to K i∗) if k is large enough. Otherwise, i∗ = k. Then if the total cost after retrieving K j K j i∗ SCs of vj i∗ is included in K. If the number to v i∗ is less than Binv, K j of remaining SCs ∆k > 0, SCM moves to the next target (i.e., set i∗ to the index of v i∗'s child with SCs in g(s, vi)). When the mapping of k SCs are determined (i.e., ∆k = 0), the maneuver operation {Id(∆vj (k)),K, i∗} is included in the candidate maneuver operation set M. The process stops when all possible vj are examined. j∈ K K j g(s,vi) Fig. 5. Example of a maneuver operation. (a) K1 = 2, K2 = 2, and K3 = 1. (b) g(v1, v15). (c) g(v1, v4) the result of Fig. 3(d) attached with two high benefit (50 for each) but inactive users v14 and v15 with low SC costs. Fig. 5(b) is g(v1, v15) with bv1,v15 = 10.41 and cv1,v15 = 2.66, whereas Fig. 5(c) presents g(v1, v4) with bv1,v4 = 2.18 and cv1,v4 = 1.46. The largest AI is Im(g(v1, v15)) = Bm(g(v1, v15))/Cm(g(v1, v15)) = 8.23/1.2 = 6.86, and the cost of g(v1, v15) is less than the total cost derived from ID (i.e., 2.66 < 2.84). In the first iteration, the sorted DIs are Id(∆v3 (1)) = 0.38/0.94 = 0.4, Id(∆v2 (1)) = 0.12/0.2 = 0.6, and Id(∆v1 (1)) = 0.47/0.24 = 1.94, and thus the only SC of v3 is maneuvered to v4. Then, in the second iteration, the sorted DIs, are Id(∆v2 (1)) = 0.12/0.2 = 0.6 and Id(∆v1 (1)) = 0.24/0.24 = 1, and an SC of v2 is maneuvered to v8. Finally, in the last iteration, an SC is maneuvered from v1 to v8, and the redemption rate is improved by 380% (i.e., 3.91/1.03 = 3.8). By carefully examining AI, DI, and MG, S3CA further optimizes the redemption rate by reaping the high benefits of users guided by GPs. S3CA shapes the influence spread according to the features of users, which cannot be accomplished by the previous works [2] -- [23] applying any existing coupon strategies. Algorithm 1 presents the pseudo-code of S3CA with three phases: 1) Investment Deployment (ID) (Line 1 -- 24), 2) Guar- anteed Paths Identification (GPI) (Line 25 -- 34), and 3) SC Maneuver (SCM) (Line 35 -- 48). Specifically, ID first identifies the pivot source by iteratively selecting a user vi with the maximum positive marginal redemption (MR) and adding it to a queue Q prioritized by redemption rate (Line 4 -- 7). Then, the initial seed is popped from Q as the initial investment deployment D, and the pivot source vp is popped from Q to compare the MR of users not in Q (Line 9). Subsequently, ID deploys the investment by iteratively examining the MR of each user and the redemption rate of vp (Line 10 -- 23). Three strategies are applied to broaden and deepen the influence (Line 12 -- 15, Line 16 -- 19) by allocating an SC to vi ∈ I, vi /∈ I, and then activate a new seed (Line 20 -- 21). The user with the maximum value of MR or redemption rate is invested by an SC or assigned as a seed. Moreover, the guaranteed paths GPs are identified by the GPI procedure (Alg. 2) in a Depth-First Search manner. On and cM j Specifically, for each g(s, vi), let vj denote vi's nearest ac- tivated ascendant and its AI Ia(g(s, vi)) = Ba(g(s,vi)) Ca(g(s,vi)) , where Ba(g(s, vi)) = bs,vi − bs,vj and Ca(g(s, vi)) = cs,vi − cs,vj . Let bM denote the benefit gain and cost gain by j maneuvering SCs to vj and its descendant according to M, respectively. The benefit gap and the cost gap are defined as g(s,vi) = bm∪M Bm,M Example 3. Fig. 5 presents an example of SCM. Fig. 5(a) is g(s,vi) = cm∪M and C m,M − cM j . − bM j j j , i ← i τ ← R, i ← p for all vi ∈ I do > R and Cseed( S) + Csc(∆K( I)) ≤ Binv > τ and Cseed(vi) + Csc({Ki = 1}) ≤ Binv τ ← 0, i ← ∅ for all vi ∈ V do if τ vi,γi S, I then τ ← τ vi,γi S, I if γi = 1 then γi ← 0, push vi to Q otherwise Ki ← 1, V ← V \ vi R ← redemption rate of vp with Kp ∆K( I) ← increase Ki in K( I) by 1, γi ← 0 if τ vi,γi S, I then R ← τ vi,γi S, I Algorithm 1 Seed Selection and SC allocation Algorithm 1: Initialize a priority queue Q, γi = 1, ∀vi ∈ V , V ← V 2: while V (cid:54)= ∅ and there exists a positive MR do 3: 4: 5: 6: 7: 8: 9: vi ← pop Q, D ← { S ← vi, I ← vi, K( I) ← Ki}, vp ← pop Q, 10: while Q (cid:54)= ∅ and there exists a positive MR do 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: D∗ ∈ D with the maximum redemption rate, P ← ∅ 25: P ← call GPI procedure (Alg. 2) with input {G, D∗, Binv} P 26: Sort Ia(g(s, vi)) in descending order: I 1 a ; vp is vi's parent 27: for I n 28: 29: 30: 31: 32: 33: a (g(s, vi)), n = 1 to P do if cs,vi ≤ Csc(K(I∗)) and Kp ∈ K(I∗) = 0 then vi∗ ← the nearest possibly activated ascendant of vi M∗ ← {0, K = ∅, i∗} ∀K∈M∗,∀Kj if i = p and Cseed( S ∪ vp) + Csc(K( I ∪ vp)) ≤ Binv then S ← S ∪ i, I ← I ∪ i, update K( I), vp ← pop Q else I ← I ∪ i, update K( I) D ← D ∪ { S, I, K( I)} ∆ I ← I ∪ vi, K(∆ I) ← K( I) ∪ Ki = 1, γi ← 0 if τ vi,γi S,∆ I then R ← τ vi,γi S,∆ I vj∈g(s,vi) Kj −(cid:80) > R and Cseed( S) + Csc(K(∆ I)) ≤ Binv for all vi /∈ I and vi ∈ V is influenced do δK ←(cid:80) while(cid:80) vj∈g(s,vi∗ ) Kj i ∈K Kj i < δK do a,· · · ,I a, I 2 , i ← i , i ← i M ← call DIMD procedure (Alg. 3) with input {G, D∗, g(s, vi), M∗} for m = {Id(∆vj (k)), K, i∗} ∈ M in ascending order according to Id(∆vj (k)) do if Id(∆vj (k)) < βm,M∗ then M∗ ← M∗ ∪ m, i∗ ← i∗, break for-loop if All Id(∆vj (k)) > βm,M∗ then Skip this GP, proceed to the next GP g(s,vi) and redemption rate increases g(s,vi) or redemption rate decreases Update D∗ according to M∗ 34: 35: 36: 37: 38: 39: the same level, GPI traverses users in ascending order of their influence probabilities (Line 25). In Alg. 2, GPI traverses from each seed s in S∗ to find GPs g(s, vi) to each vi, where g(s, vi) is the set of the visited siblings of both vi and vi's ascendants (Line 6). When GPI visits vi, if g(s, vi)'s cost (total SC cost of users in g(s, vi)) is smaller than the budget, g(s, vi) is included in a GP set P. Otherwise, GPI stops traversing vi's children and unvisited siblings, and it traverses back to the next sibling of vi's parent. The process stops when no more user can be visited (Line 7 -- 10). Finally, SCM determines whether to create each g(s, vi) ∈ P based on the Amelioration Index (AI) Ia(g(s, vi)), which is the ratio of the expected benefit gain to the expected SC cost (Line 27 -- 39). SCM examines Ia(g(s, vi)) in descending order and checks the Deterioration Index (DI) Id(∆vj (k)) of each influenced user vj, which is the ratio of the expected benefit loss to the expected SC cost by retrieved ∆vj (k) SCs, s ← ∅, visited[vi] ← f alse, ∀i Algorithm 2 Guaranteed Paths Identification (GPI) Input: G = {V, E}, D∗ = {S∗, I∗, K(I∗)}, and Binv Output: P 1: for all s ∈ S∗ do Push s in stack Ψ, U li 2: while Ψ (cid:54)= ∅ do 3: vi ← pop Ψ 4: if visited[vi] = f alse then 5: g ← {vi} ∪ {vj∀vj ∈ U 6: if c ≤ Binv − cseed(s) then 7: 8: 9: 10: s , ∀lj ≤ li}, c ←(cid:80) s ∪ vi, bs,vi ←(cid:80) visited[vi] ← true, g(s, vi) ← g, cs,vi ← c s ← U li U li P ← P ∪ {g(s, vi), cs,vi , bs,vi}, push vj ∈ N (vi) in Ψ ascendant order of p(i, j) vj∈g csc(vj ) vj∈g b(vj ) lj Algorithm 3 Derivation of DI and Maneuver Operation (DIMD) Input: G = {V, E}, D∗ = {S∗, I∗, K(I∗)}, g(s, vi), and M∗ Output: M 1: M ← ∅, i∗ ← i∗ of the last attached element of M∗ 2: for all vj ∈ I∗ do if Kj > Kj then 3: 4: 5: 6: 7: ∆K(I∗) ← K(I∗) with Kj decreased by k Id(∆vj (k)) ← B(S∗,K(I∗))−B(S∗,∆K(I∗)) mapping in M∗, S ←(cid:80) Csc(S∗,K(I∗))−Csc(S∗,∆K(I∗)) K ← ∅, ∆k ← k, i∗ ← i∗, K ← union of all maneuver for k = 1 to Kj − Kj do j i∗ while K i∗ + S < K i∗ and ∆k > 0 do j∈ K K if K i∗ − (K i∗ + S) < ∆k i∗ ← K i∗ − (K i∗ + S), ∆k ← ∆k − Kj then Kj i∗ if K i∗ − (K i∗ + S) = ∆k i∗ ← ∆k, ∆k ← 0 then Kj if the total cost after retrieving Kj i∗ SCs from vj to v i∗ is less than Binv i∗ . 1) If ∆k (cid:54)= 0, i∗ ← the descendant then K ← K ∪ Kj of v i∗ with SCs in g(s, vi). 2) If ∆k = 0, M ← M ∪ {Id(∆vj (k)), K, i∗} Else Break the while-loop 8: 9: 10: 11: 12: 13: 14: 15: according to the DIMD procedure (Line 33). Specifically, in the DIMD procedure (Alg. 3), let Kj and Kj denote vj's SC allocation of K(I∗) and g(s, vi), respectively. For each vj ∈ I∗, if it has spare SCs for creating g(s, vi) (i.e., Kj > Kj), DIMD calculates DIs by retrieving all possible numbers k of SCs (1 ≤ k ≤ Kj − Kj) (Line 2 -- 15). SCM sets K j i∗, which is the number of maneuvered SCs from vj to the target user v i∗, depending on ∆k (Line 9 -- 12). Subsequently, if the total cost after retrieving K j i∗ SCs of vj to v i∗ is less than Binv, i∗ is included in K. Then, if the number of remaining SCs K j ∆k > 0, SCM moves to the next target. Otherwise ∆k = 0, the maneuver operation {Id(∆vj (k)),K, i∗} is included in the candidate maneuver operation set M (Line 13 -- 14). DIMD stops when all possible vj are examined and returns to Alg. 1. DIMD returns all possible influenced users to retrieve SCs for maneuvering SCs to reduce the redemption loss. Besides, a set of the maneuver operations M, which records the detail of retrieve/maneuver SCs, are performed. Based on M, SCM decides whether to create g(s, vi) to optimize the redemption rate (Line 34 -- 38). Then, the final investment deployment D∗ is updated (Line 39). V. PERFORMANCE ANALYSIS In the following, we first prove that the expected benefit B(S, K(I)) is a non-submodular function and derive the reference edges based on Observation 1, which finds the relation between the optimal solution (OP T ) and the pivot sources derived from ID in Sec. IV. We analyze B(S, K(I)) to keep a certain level of submodularity. Subsequently, we c − ε)-approximation algorithm, prove that S3CA is a (1− e− 1 where c is a constant. Lemma 1. For the S3CRM problem, the expected benefit func- tion is non-submodular, and the cost functions are modular. Proof. For ease of description, we transform S3CRM to an edge selection problem as follows. We first add a virtual node t to the OSN G = {V, E}, which connects to all vertices in V . For selecting each seed s, it is transformed to select the edge e(t, s) and assign its weight (influence probability) to 1, whereas for each non-seed user, the weight is 0. The propagation begins from t, and then t activates the selected seeds with their seed costs. Second, similar to [2], we conduct the analysis on an implemented deterministic graph G(cid:48). For each user vi, the SC allocation (i.e., assigning Ki) is transformed to selecting the out-edges (friends) iteratively from the one with the highest influence probability in G(cid:48). The expected benefit is updated based on the influence propagation of the selected edges and the selection process stops when the total cost exceeds Binv. Thus, the problem is transformed to arg maxE(cid:48)⊂E B(E(cid:48)) C(E(cid:48)) , where E(cid:48) is the selected edges. For each edge e(i, j), we call it a live edge if vi successfully activates vj; otherwise, we call it a pseudo-live edge. For each live edge, there must exist one path from the virtual node, where all edges are live, and thus we call it a live path. Let E1 and E2 denote any two set of selected edges, where E1 ⊆ E2 ⊆ E. We prove that the expected benefit function B(e) is non-submodular by including each edge e ∈ E \ E2 in both E1 and E2 with three cases as follows. 1) e is pseudo-live after being included in both E1 and E2. We have B(E2∪ e)− B(E2) = B(E1 ∪ e) − B(E1) = 0 since no user becomes active (i.e., no benefit gain). 2) e is live after being included in both E2 and E1, which implies that e is either attached to a live path existing in both E2 and E1 or the cause to a path turning to live. For the first case, B(E2∪e)−B(E2) ≤ B(E1∪ e)− B(E1), whereas for the latter one, B(E2 ∪ e)− B(E2) ≥ B(E1∪ e)− B(E1). 3) e is live after being included in E2 but pseudo-live in E1, which implies that e is attached to a live path existing in E2 but not in E1. Thus, B(E2∪e)−B(E2) ≥ B(E1 ∪ e) − B(E1). For each selected edge e(i, j), its cost is cseed(j)P (e(i, j)) or csc(j)P (e(i, j)), when vi is the virtual node or user, respectively. Note that, G(cid:48) includes no dependent edge since P (e(i, j)) is determined, and thus the cost of non-selected edges is 0. The total cost function C(e) is the sum of the cost of the selected edges. Let E1 and E2 denote any two set of selected edges, where E1 ⊆ E2 ⊆ E. By including each edge e ∈ E \ E2 in both E1 and E2, C(E2 ∪ e) − C(E2) = C(E1 ∪ e) − C(E1) = C(e), and thus the cost function C is modular. Observation 1. Given a reference cost cref , any set of costs that includes cref and a cost higher than cref , or two identical costs of cref , is not the set of costs of the optimal solution Copt. Let C1 and C2 denote the first and second largest costs in Copt. Note that the cost includes the seed cost and the SC cost since we conduct the analysis on the transformed edge selection problem. Moreover, let Csort denote the sorted costs (from the smallest to the largest), which has E(cid:48) elements (E(cid:48) is the number of edges of the transformed problem). For each cost in Csort as the reference cost cref , we assume it is C1 with the following properties: 1) if C1 = C2, any set contains cref and a cost higher than cref is not Copt, and 2) if C1 > C2, any set containing two elements of cref is not Copt. Based on Observation 1, we can derive the reference edge set eref similar to the pivot source as follows. First, we initialize a candidate set of reference edges e = ∅. For each cost in Csort as the reference cost cref , let Ct = {c∀c ≤ cref ∈ Csort or ∀c < cref ∈ Csort} denote the target set of costs, which corresponds to the assumptions C1 = C2 (i.e, ∀c ≤ cref ) and C1 > C2 (i.e., ∀c < cref ). Then the set of edges within Ct with the first two highest MRs are selected iteratively and included in e. Finally, the edge set in e with the highest redemption rate is selected as eref . Note that eref contains either two edges from the virtual node or one path from the virtual node, which corresponds to selecting two seeds or a seed allocated with an SC in S3CRM, respectively. Lemma 2. Within the space C∗ t strictly contains OP T , where cref = C1. if the corresponding candidate edge set ec has C(ec) ≥ C0 C(OP T ) , where C0 ≤ 1 is a constant, then the B(ec) result of S3CA is always no less than (1−)C0 C(OP T ) , where  is an arbitrary constant. B(OP T ) B(OP T ) B(OP T ) C(eref ) ≥ C0 Proof. We adopt eref as the connection between the result of S3CA, ec, and OPT. First, the relation between ec and OPT is proved to find the relation between eref and OPT. Then, we prove the relation between S3CA and eref and subsequently the one between S3CA and OPT. First, we prove that B(eref ) C(OP T ) as follows. Because the set of costs of the optimal solution Copt never resides in Csort \ Ct for each cref based on Observation 1, we derive the reference edges eref from the target cost sets Ct of all reference costs cref , where Copt must exist. When cref = C1, C∗ t is the smallest space containing Copt, and its corresponding candidate edges ec is derived as the edges with the first two highest MRs are included in e. Moreover, eref has the highest redemption rate among all edge sets in e (i.e., C(OP T ) , where C0 ≤ 1 C(eref ) ≥ B(ec) B(eref ) is a constant, then B(eref ) C(ec) ). Thus, if B(ec) C(eref ) ≥ C0 C(ec) ≥ C0 B(OP T ) B(OP T ) C(OP T ) . Note that B(eref ) C(eref ) can be derived easily since eref contains at most two edges. However, for S3CA, the calculation of the expected benefit B(S, K(I)) is more difficult due to the influence propagation [2]. Hence, following previous works, B(S, K(I)) can be obtained approximately by sampling meth- ods, such as Monte Carlo [2] and reverse greedy [15]. More specifically, it first tosses a coin for each edge with the given influence probability to generate a graph. The users reachable from the seed set by the paths with the allocated coupons will be activated. Note that if a user vi is allocated with more than ki coupons with the corresponding ki living edges after tossing coins, it will only receive the former ki coupons from the incident edges with the largest influence probability. The accuracy of estimating B(S, K(I)) increases as the number of sampling increases, and an arbitrarily close approximation can be obtained, and thus the estimation is (1 − ) -- approximated. Finally, we find the relationship between the result of S3CA and OPT as follows. For the pivot source identification in Sec. IV, all users are assumed as a seed and included in the priority queue Q. For each user as a seed, the MR after activation and the MR of allocation with an SC after activation are examined. S3CA invests a seed or an SC with the highest positive MR iteratively, and the user is included in Q (with one SC or not). The first two elements of Q are popped out as the initial influence spread and the pivot source. Let s1 and s2 denote the first two elements of Q. Let eu 2) denote the edges from the virtual node and the ones to the activated child by s1 (s2), respectively. The result of S3CA is at least as large as (1−) B({eu 2}) 2}) , since S3CA ensures an improvement C({eu in each movement (i.e., ID, GPI, and SCM) with an estimated bias of B(S, K(I)), i.e., (1 − ). 2 ) and ed 1 (eu 1 ,eu 1 ,eu 1 ,ed 1 ,ed 2 ,ed 2 ,ed 1 (ed Let e1 ref and e2 two highest MRs. Furthermore, e1 ref denote the two edges of eref , which ref and have the first ref are iteratively selected in the same way of selecting e2 2}, and thus e1 {eu 2}. 1 , ed 2 , ed Therefore, B({eu C(eref ) , implying that the result C({eu of S3CA is always no less than (1 − )C0 ref and e2 2}) 2}) ≥ B(eref ) ref ∈ {eu 1 ,eu 1 ,eu 1 ,ed 1 ,ed 2 ,ed 2 ,ed 2 , ed 1 , ed 1, eu 1, eu B(OP T ) C(OP T ) . After analyzing the relations among the result of S3CA, redemption rate of eref , and the redemption rate of ec, we further analyze the relation between the redemption rate of OP T and ec. Since the expected benefit function is non- submodular according to Lemma 1, we first derive an upper bound of the expected benefit function and then find the approximation ratio of S3CA as follows. Let Xj denote the result of ec in the j-th iteration, where min(b(vj )) , ∀vi, vj ∈ V , denotes the j = 0, 1, 2, and b0 = max(b(vi)) ratio of the maximum benefit to the minimum benefit of users. Let e∗ t denote the selected edge with the maximum benefit of OP T . By assuming OP T \ X1 = e∗ k, we have the following lemma. Lemma 3. There exists a decomposition of OP T in some i })− order such that for j = 0, 1,(cid:80)k i=1(B(Xj ∪{e∗ 1 ∪···∪ e∗ 2,··· , e∗ 1, e∗ (cid:80)k i=1 B(e∗ t ). i−1}) ≤ b0 1 ∪ ··· ∪ e∗ B(Xj ∪ {e∗ Proof. Since the influence spread starts from the virtual node of the transformed problem, it is intuitive that OP T forms a connected graph rooted at the virtual node; otherwise, there is no gain of redemption rate. Similarly, ec is also a rooted connected graph. Thus, for OP T , there exhibits an order of edges becoming live from the root, which is denoted as Yi = i }, where the activation begins from 1 to i. Let {e∗ k} by the activation order from 1 Y = OP T \ X1 = {e∗ i })− B(X1∪ to k. For any i = 1,··· , k, B(X1∪{e∗ i=1(B(X1∪ {e∗ i ) ≤ b0B(e∗ {e∗ 1 ∪···∪ e∗ i=1 b0B(e∗ t ). For j = 0 (i.e., X0), we can derive the same result following the same analysis; therefore, the lemma is proved. t ). Hence,(cid:80)k i−1}) ≤(cid:80)k i−1}) ≤ B(e∗ i })− B(X1∪{e∗ 1∪···∪e∗ 1 ∪···∪ e∗ 1 ∪ ··· ∪ e∗ 1∪···∪ e∗ 1 ∪ ...e∗ Although the expected benefit function is non-submodular, let c0 = with the upper bound derived by Lemma 3, max(cseed(vi)∪csc(vi)) min(cseed(vj )∪csc(vj )) , ∀vi, vj ∈ V denote the ratio of the maximum cost to the minimum cost of users, the performance bound of S3CA is derived as follows. − 1 Theorem 2. S3CA is a (1 − e b0c0 − ) -- approximation algorithm for the S3CRM. i−1}) 1 ∪ ··· ∪ e∗ i }) − B(X1 ∪ {e∗ 1 ∪ Proof. Since the expected benefit function is monotone in- creasing, by the decomposition Lemma 3, we have B(OP T ) ≤ B(X1 ∪ (OP T \ X1)) ··· ∪ e∗ ≤ B(X1) + b0 = B(X1) + b0 = B(X1) + b0 = B(X1) +(cid:80)k i=1(B(X1 ∪ {e∗ (cid:80)k (cid:80)k i=1 e∗ (cid:80)k i=1(B(X1 ∪ e∗ (cid:80)k (cid:80)k (cid:80)k t )− C(X1)). By iteratively selecting the edges with the maximum MR, t ) − C(X1)) ≤ t ) − C(X1)) ≤ i )−C(X1)) ≤ t )−B(X1) t )−C(X1) (C(X1 ∪ e∗ B(X1∪e∗ t )−B(X1) t )−C(X1) (C(X1 ∪ e∗ C(X1∪e∗ B(X1∪x2)−B(X1) C(X1∪x2)−C(X1) (C(X1 ∪ e∗ B(X1∪x2)−B(X1) C(X1∪x2)−C(X1) c0(C(X1∪e∗ t ) − B(X1)) B(X1∪e∗ C(X1∪e∗ B(X1) + b0 B(X1) + b0 B(X1)+b0 B(X1) + b0c0 i=1 B(X2)−B(X1) C(X2)−C(X1) C(OP T ). The last inequality holds since C is a linear function. Thus, B(OP T ) − B(X1) ≤ b0c0 B(X2) − B(X1) C(X2) − C(X1) C(OP T ). (2) t i=1 i=1 i=1 By applying the same analysis on X0, B(OP T ) − B(X0) ≤ b0c0 B(X1) − B(X0) C(X1) − C(X0) C(OP T ). (3) Let δi = B(OP T ) − B(Xi) and αi = b0c0C(OP T ) C(Xi)−C(Xi−1). By Inequalities 2 and 3, δ2 δ1 ≤ (1 − 1 α2 ), δ1 δ0 ≤ (1 − 1 α1 ), and respectively. By multiplying the left hand and right hand of the above two inequalities separately, δ2 = B(OP T ) − B(X2) ≤ (1 − C(X2) − C(X1) ≤ e b0c0C(OP T ) b0c0 C(OP T ) × e − C(X2)−C(X1) )(1 − C(X1) − C(X0) b0c0C(OP T ) − C(X1 )−C(X0) b0c0C(OP T ) B(OP T ) )B(OP T ) − C(X2 ) b0 c0C(OP T ) B(OP T ). = e Thus, B(X2) ≥ (1 − e − C(X2 ) b0 c0C(OP T ) )B(OP T ), − C(X2) b0c0 C(OP T ) ) b0c0C(OP T ) ≥ (1 − e which implies B(X2) C(X2) Since (1 − e−x)x−1 is monotone decreasing in x ≤ 1 b0c0C(OP T ) ≤ 1 ≥ (1 − e B(X2) C(X2) b0c0C(OP T ) − C(X2) b0c0C(OP T ) ) C(X2) , b0c0 C(X2) B(OP T ) C(X2) b0c0C(OP T ) B(OP T ) b0c0C(OP T ) . and b0c0 ≥ (1 − e − 1 b0c0 ) B(OP T ) C(OP T ) . Finally, since X2 = ec, B(ec) C(ec) ≥ (1 − e − 1 b0 c0 ) B(OP T ) C(OP T ) . let − 1 Hence, due to the estimation bias (Lemma 2), S3CA is a (1− )(1− e b0c0 ) -- approximation algorithm for S3CRM. For − 1 simplicity, we combine the ratio as (1 − e b0 c0 − ), where  is an arbitrarily small constant. Furthermore, when b0 and c0 are both bounded (i.e., 1), S3CA is a constant approximation algorithm for S3CRM. Time complexity. For the weighted directed graph G = {V, E}, V and E denote the number of users and edges, respectively. The time complexity of the ID phase is O(M (V + E)) since it first takes O(2MV ) time to construct the priority queue Q, and it then invests the budget in SCs and seeds by examining the MR of allocating an SC or activating a seed in O(ME) and O(MV ) time, respectively. Note that both the size of coupon allocation and seed set are bounded by the budget. The time complexity of the GPI phase is O(MV (V + E)) since for each seed, the GPs are identified by a DFS-based traversal in O(V + E) time, where the size of seed set is bounded by the budget. The time complexity of the SCM phase is O(MV E) because for each derived GP, the DIs are derived by retrieving SCs from each inactive user vj that is possibly to be influenced, whereas the number of GP is bounded by V , and the DIs are bounded by E. Moreover, the size of DIs is bounded by the vertex induced graph of GP. Therefore, the overall time complexity is O(ME) + O(MV E) + O(MV E) = O(MV E) and correlated to the size of the OSN. In particular, the time O(M ) of evaluating the expected benefit can be speeded up by Monte Carlo [2] and reverse greedy methods [15]. VI. EXPERIMENT A. Experiment Setup We compare S3CA with IM [2] -- [16] and PM [17] -- [23] in four OSNs, i.e., Facebook, Epinions, Google+ [28], and Douban [29], with the detailed setting in Table II. Since IM and PM are not designed for SC, two real coupon strategies are adopted as follows. 1) Limited coupon strategy is provided by Dropbox, Airbnb, Booking.com, etc., where the SC constraint is specified by a constant k, i.e., Ki = k, ∀vi ∈ V . 2) Unlimited coupon strategy is provided by Uber, Lyft, and Hotels.com, etc., where the SC constraint of each user is specified by the number of friends, i.e., Ki = N (vi), ∀vi ∈ V . For the limited coupon strategy, the SC constraint of each user is set to 32 according to Dropbox. We denote IM- U (PM-U) and IM-L (PM-L) as IM with unlimited coupon strategy and limited coupon strategy, respectively. For IM-U and IM-L, the seed size is set to V 2n for n = 0, 1,··· , 10 [17], and the seed size resulting in the maximum influence is selected as the result. The default setting of the IM algorithm follows the previous work [17]. Moreover, we design a two- stage heuristic algorithm, IM-S. The first stage employs the existing IM algorithm [17]. The second stage connects every two seeds with the shortest paths, where the weight of each edge e(i, j) is 1 − P (e(i, j)) (i.e., an edge with a higher influence probability having a smaller weight). Afterward, IM- S uniformly distributes SCs to the users in the paths such that the overall seed cost and SC cost satisfy the investment budget constraint. The influence propagates under the extended IC model [2] as described in Sec. III. Following [3], [6], [8], [9], [14], [15], [17], [18], for each edge e(i, j), the influence probability P (e(i, j)) is set to the reciprocal of vj's in-degree. We adopt the normal benefit setting [17], i.e., for each user, the benefit is randomly generated by a normal distribution N (µ, σ), where µ and σ are the mean and standard deviation, respectively. For each user, the seed cost is proportional to the number of her friends (out-degree) [17]. Moreover, the uniform SC cost follows the real coupon strategies from Dropbox and Hotels.com. To evaluate the effect of different benefits and (cid:80) (cid:80) SC costs, we control the ratio λ of the total benefit to the vi∈V b(vi) total SC cost, where λ = vi∈V csc(vi). Moreover, the effect of different seed costs and benefits is examined by controlling the ratio κ of the total seed cost to the total benefit, where . For all OSNs, the default setting of λ κ = and κ are 1 and 10, respectively. We evaluate 1) the redemption rate, 2) total benefit, 3) the ratio of the total selected seed cost to total allocated SC cost (seed-SC rate), and 4) the average maximum hop number from seeds, by changing 1) Binv, 2) coupon strategies of baseline algorithms, 3) λ, and 4) κ. Each simulation result is averaged over 1000 samples. (cid:80)∀vi∈V cseed(vi) (cid:80)∀vi∈V b(vi) B. Simulation Results Fig. 6 compares the investment efficiency of IM-U, PM-U, IM-L, PM-L, IM-S, and S3CA, in the datasets of Table II. The results are similar for most datasets. Due to the space DATASETS AND THE CORRESPONDING ARGUMENTS TABLE II Dataset Nodes Edges Binv µ, σ Facebook 4K 88K 10K 10, 2 Epinions 76K 509K 50K 20, 4 Google+ 108K 13.7M 200K 50, 10 Douban 5.5M 86M 1M 100, 20 constraint, we present the results of Douban and Facebook. First, the impact on both redemption rate and total benefit from different investment budgets Binv is investigated in Fig. 6(a) -- (b). The results manifest that S3CA achieves the highest redemption rate and total benefit since it maximizes the total expected benefit while reducing the total cost. In Fig. 6(a), though the redemption rate of S3CA sustains in a certain level as Binv increasing, Fig. 6(b) shows that the total benefit increases when Binv increases. Note that the total cost approximately equals to Binv for all algorithms in all settings and thereby is not presented in this section. Fig. 6 presents the results of IM-S. The redemption rate and total benefit of IM-S improve in Fig. 6(a) and (b) with a larger investment budget, but IM-S acquires much smaller redemption rate and benefit compared with other approaches, because it only distributes SCs to the users on the shortest paths and thereby fails to obtain the benefits outside the paths. In Fig. 6(c) and (d), IM- S improves with a larger λ, which is the ratio of total benefit to total SC cost of users, because it is able to acquire a higher benefit from each SC with a higher λ. Fig. 6(e) and (f) manifest that IM-S incurs more running time (sometimes higher than S3CA) as the budget grows, because more shortest paths spanning an increasing number of seeds become candidates for SC distribution. Fig. 7 investigates the impacts on the seed-SC rate with different Binv, λ, and κ, in different datasets, and the results show that S3CA carefully balances the investment in seeds and SCs according to different parameters. In Fig. 7(a) -- (b), S3CA increases the investment in seeds (i.e., the seed-SC rate increases) while Binv increasing. With the generous in investment, more seeds can be deployed for more influential sources. In Fig. 7(c) -- (d), the benefit of each user increases while the SC cost is fixed, which implies that the benefit per unit of investment also increases. Thus, for the seeds, the benefit surpasses its seed cost and the benefit of allocating an SC to other non-seed users, S3CA decides to invest more in seeds. Moreover, the seed-SC rate of baseline algorithms has negligible changes in Fig. 7(a) -- (d) since they do not consider the SC allocation. In Fig. 7(e) -- (f), for different κ, all baseline algorithms increase the investment in seeds since the seed cost increases as κ increasing. However, S3CA decreases the investment in seeds while the seed cost (κ) increases and invests more in SCs to optimize the redemption rate. Thus, S3CA is capable of balancing the investment in seeds and SCs according to different budgets, λ, and κ. Table III and IV show the average farthest hop from seeds and the average running time, respectively. Table III shows that S3CA can deepen the influence spread by allocating SCs Fig. 6. Investment efficiency. (a) Redemption rate with different investment budgets in Douban. (b) Total benefit with different investment budgets in Douban. (c) Redemption rate with different λ in Douban. (d) Redemption rate with different λ in Facebook. (e) Running time with Binv = 2M. (f) Running time with Binv = 3M and the average farthest hops ranging from 2.046 to 3.355. However, for the baseline algorithms, the average farthest hops reside between 1 to 1.939. Thus, the results manifest the effectiveness of S3CA to disseminate SCs to a wider area in OSNs. Moreover, the running time is listed in Table IV. Since S3CA activates the seeds and allocates the SCs under the investment budget, the running time is closely related to the investment budget. Thus, the running time is proportional to the investment budget and less related to the size of OSN, which is shown in Table IV. C. Case Study We have incorporated real SC policies provided by Airbnb and Booking.com on the real dataset in Table II. We have employed the adoption model [30] for each user to find the users that accept SCs. We have adopted real gross margin to set the benefit according to the accounting research [31]. We have used the real datasets of social networks in [29]. More specifically, the SC costs are 50 and 100, and the SC allocations are 100 and 10 according to Airbnb and Book- ing.com, respectively. Since Booking.com has not revealed its SC cost, here we refer to the one in Hotels.com to assign the SC cost. Moreover, the adoption model [30], which quantifies the probability of users adopting a coupon, is to uniformly Fig. 8. Case study with different gross margin. (a) Redemption rate of Airbnb. (b) Seed-SC cost of Airbnb. (c) Redemption rate of Hotels.com. (d) Seed-SC cost of Hotels.com. TABLE III AVERAGE FARTHEST HOPS FROM SEEDS Dataset Facebook Epinions Google+ Douban IM-U 1.958 1.381 1.724 1.014 IM-L 1.000 1.000 1.000 1.000 PM-U 1.872 1.120 1.723 1.002 PM-L 1.004 1.002 1.000 1.001 S3CA 3.579 3.363 2.690 3.134 algorithms, Fig. 10(a) shows that S3CA is closer to the optimal solution, and the redemption rates of some baseline algorithms are even smaller than the worst-case bounds of S3CA, which are derived from the optimal solutions multiplied by the approximation ratio. Fig. 10(b) shows that all solutions returned by S3CA are above the worst-case bound, indicating that the approximation ratio holds for the empirical cases. To test the scalability, we first adopt PPGG [32] to generate large Facebook-like synthetic networks. Fig. 9 presents the running time and the explored ratio (i.e., the ratio of the number of explored nodes of S3CA to the network size) with different network sizes and investment budgets. Fig. 9(a) indicates that the running time becomes larger as the network size grows, but the explored ratio decreases under a fixed budget in Fig. 9(b) (i.e., S3CA stops exploring new nodes when the budget is run out). In contrast, Fig. 9(c) and (d) indicate that both the running time and explored ratio become larger as the investment budget increases, since S3CA in this case is required to examine more candidates for the efficient distribution of SCs. VII. CONCLUSION To the best of our knowledge, this paper makes the first attempt to explore the seed selection with SC allocation under a limited investment budget. We formulate a novel optimiza- tion problem S3CRM and design an approximation algorithm S3CA to optimize the redemption rate in social coupon sce- nario. S3CA first deploys the investment in seeds and social coupons by carefully examining the marginal redemption of Fig. 7. Seed-SC rate. (a) Different investment budgets in Facebook. (b) Different investment budgets in Epinions. (c) Different λ in Facebook. (d) Different λ in Google+. (e) Different κ in Facebook. (f) Different κ in Douban. b(vi) csc, csc, c2 √ sc and select 85%, 10%, and 5% of users with 3 √ all normalized by 3 sc. For the benefit setting, csc + csc + c2 we adopt the gross margin for SCs from accounting research [31], which is defined as b(vi)−csc(vi) ∗ 100 (%) for each vi. Fig. 8 presents the new results with the above setting. The redemption rate increases with a larger gross margin in Fig. 8(a) due to more benefits generated from each user. The redemption rate of Booking.com in Fig. 8(c) is higher because Airbnb has higher SC allocation, but more SCs are not redeemed by users. Therefore, fewer users are influenced and activated. Moreover, for PM-L and PM-U, the redemption rate increases with 60% gross margin in Fig. 8(c), because the benefit is sustained, but some seeds can be discarded to reduce the cost as shown in Fig. 8(d). S3CA achieves the highest redemption rate with different gross margins in Airbnb and Booking.com, since in addition to finding influential seeds, S3CA obtains more benefits with guaranteed paths, which connect and influence high-benefit users by SCs. D. Performance of S3CA To validate the approximation ratio, we have compared S3CA with the optimal solution obtained by computation- intensive exhaustive search in small networks with 150 nodes generated by PPGG [32].9 We change the gross margin for SCs from accounting research [31]. Compared with other 9The input parameters for PPGG are 1) 11 patterns, 2) support of 1000, 3) clustering coefficient of 0.6394, and 4) power-law parameter η = 1.7 and 2.5. TABLE IV AVERAGE RUNNING TIME OF S3CA Binv (K) Facebook (seconds) Binv (K) Epinions (seconds) Binv (M) Douban (seconds) Binv (K) 6 1.02 30 6.51 0.6 121.94 60 8 2.24 40 10.80 0.8 174.05 80 10 3.65 50 15.20 1 242.12 100 1059.93 12 5.49 60 20.66 1.2 304.05 120 14 7.70 70 26.52 1.4 378.45 140 Google+ (seconds) 821.29 928.76 1130.95 1282.55 Fig. 9. Scalability experiments. (a) Running time with different network size. (b) Explored ratio with different network size. (c) Running time with different investment budgets. (d) Explored ratio with different investment budgets. Fig. 10. Performance of S3CA. (a) Average results of baselines, S3CA, OPT, and worst-case. (b) All results of S3CA, OPT, and worst-case. three strategies which are deepening the influence spread, broadening the influence spread, and initiating another start of the influence spread. S3CA then identifies the guaranteed paths to explore the opportunity to optimize the redemption rate by maneuvering the social coupons. After obtaining the guaranteed paths, S3CA further examines the amelioration index and the deterioration index of the amelioration and the deterioration by maneuvering social coupons to users and retrieving social coupons from users, respectively. Finally, S3CA optimizes the redemption rate by maneuvering the SCs from the users with lower deterioration indices to the users with higher amelioration index. Simulation results show that S3CA can effectively improve the investment efficiency up to 30 times of the results of the baseline algorithms. REFERENCES [1] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. Kramer, C. Marlow, J. E. Settle, and J. H. Fowler, "A 61-Million-Person Experiment in Social Influence and Political Mobilization," Nature, vol. 489, no. 7415, p. 295, 2012. [2] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the Spread of Influence through a Social Network," KDD, 2003. [3] W. Chen, C. Wang, and Y. Wang, "Scalable Influence Maximization for Prevalent Viral Marketing in Large-Scale Social Networks," KDD, 2010. [4] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," KDD, 2009. [5] A. Goyal, F. Bonchi, and L. V. Lakshmanan, "A Data-Based Approach to Social Influence Maximization," VLDB, 2011. [6] K. Jung, W. Heo, and W. Chen, "IRIE: Scalable and Robust Influence Maximization in Social Networks," ICDM, 2012. [7] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, "Cost-Effective Outbreak Detection in Networks," KDD, 2007. [8] H. T. Nguyen, T. N. Dinh, and M. T. Thai, "Cost-Aware Targeted Viral Marketing in Billion-Scale Networks," INFOCOM, 2016. [9] H. T. Nguyen, M. T. Thai, and T. N. Dinh, "Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-Scale Networks," in SIGMOD, 2016. [10] N. Ohsaka, T. Akiba, Y. Yoshida, and K.-i. Kawarabayashi, "Fast and Accurate Influence Maximization on Large Networks with Pruned Monte-Carlo Simulations.," in AAAI, 2014. [11] G. Song, X. Zhou, Y. Wang, and K. Xie, "Influence Maximization on Large-Scale Mobile Social Network: A Divide-and-Conquer Method," TPDS, vol. 26, no. 5, pp. 1379 -- 1392, 2015. [12] J. Tang, X. Tang, X. Xiao, and J. Yuan, "Online Processing Algorithms for Influence Maximization," in SIGMOD, 2018. [13] J. Tang, X. Tang, and J. Yuan, "Influence Maximization Meets Efficiency and Effectiveness: A Hop-Based Approach," in ASONAM, 2017. [14] Y. Tang, Y. Shi, and X. Xiao, "Influence Maximization in Near-Linear Time: A Martingale Approach," SIGMOD, 2015. [15] Y. Tang, X. Xiao, and Y. Shi, "Influence Maximization: Near-optimal Time Complexity Meets Practical Efficiency," SIGMOD, 2014. [16] C. Zhou, P. Zhang, J. Guo, X. Zhu, and L. Guo, "UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Net- works," ICDM, 2013. [17] J. Tang, X. Tang, and J. Yuan, "Profit Maximization for Viral Marketing in Online Social Networks: Algorithms and Analysis," TKDE, vol. 30, no. 6, pp. 1095 -- 1108, 2018. [18] J. Tang, X. Tang, and J. Yuan, "Towards Profit Maximization for Online Social Network Providers," INFOCOM, 2018. [19] Y. Zhu and D. Li, "Host Profit Maximization for Competitive Viral Marketing in Billion-Scale Networks," INFOCOM, 2018. [20] H. Zhang, H. Zhang, A. Kuhnle, and M. T. Thai, "Profit Maximization for Multiple Products in Online Social Networks," INFOCOM, 2016. [21] A. Khan, B. Zehnder, and D. Kossmann, "Revenue Maximization by Viral Marketing: A Social Network Host's Perspective," in ICDE, 2016. [22] W. Lu and L. V. Lakshmanan, "Profit Maximization Over Social Networks," ICDM, 2012. [23] Y. Zhu, Z. Lu, Y. Bi, W. Wu, Y. Jiang, and D. Li, "Influence and Profit: Two Sides of the Coin," ICDM, 2013. [24] http://www.businessinsider.com/the-secret-sauce-behind-social- coupons-and-why-it-works-2012-7. [25] S. Hanson and H. Yuan, "Friends with Benefits: Social Coupons as a Strategy to Enhance Customers Social Empowerment," Journal of the Academy of Marketing Science, pp. 1 -- 20, 2017. [26] K. Jung and B. Y. Lee, "Online vs. Offline Coupon Redemption Behaviors," The International Business & Economics Research Journal, vol. 9, no. 12, p. 23, 2010. [27] U. Feige, "A Threshold of ln n for Approximating Set Cover," Journal of the ACM, vol. 45, pp. 634 -- 652, July 1998. [28] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection." http://snap.stanford.edu/data, June 2014. [29] H.-J. Hung, H.-H. Shuai, D.-N. Yang, L.-H. Huang, W.-C. Lee, J. Pei, and M.-S. Chen, "When Social Influence Meets Item Inference," KDD, 2016. [30] S. Tang, "Stochastic Coupon Probing in Social Networks," in CIKM, 2018. [31] D. E. Kieso, J. J. Weygandt, and T. D. Warfield, Intermediate Account- ing: IFRS Edition, vol. 2. John Wiley & Sons, 2010. [32] H.-H. Shuai, D.-N. Yang, S. Y. Philip, C.-Y. Shen, and M.-S. Chen, "On Pattern Preserving Graph Generation," in ICDM, 2013.
1412.4299
2
1412
2015-06-18T16:50:56
Reciprocity in Social Networks with Capacity Constraints
[ "cs.SI", "physics.soc-ph" ]
Directed links -- representing asymmetric social ties or interactions (e.g., "follower-followee") -- arise naturally in many social networks and other complex networks, giving rise to directed graphs (or digraphs) as basic topological models for these networks. Reciprocity, defined for a digraph as the percentage of edges with a reciprocal edge, is a key metric that has been used in the literature to compare different directed networks and provide "hints" about their structural properties: for example, are reciprocal edges generated randomly by chance or are there other processes driving their generation? In this paper we study the problem of maximizing achievable reciprocity for an ensemble of digraphs with the same prescribed in- and out-degree sequences. We show that the maximum reciprocity hinges crucially on the in- and out-degree sequences, which may be intuitively interpreted as constraints on some "social capacities" of nodes and impose fundamental limits on achievable reciprocity. We show that it is NP-complete to decide the achievability of a simple upper bound on maximum reciprocity, and provide conditions for achieving it. We demonstrate that many real networks exhibit reciprocities surprisingly close to the upper bound, which implies that users in these social networks are in a sense more "social" than suggested by the empirical reciprocity alone in that they are more willing to reciprocate, subject to their "social capacity" constraints. We find some surprising linear relationships between empirical reciprocity and the bound. We also show that a particular type of small network motifs that we call 3-paths are the major source of loss in reciprocity for real networks.
cs.SI
cs
Reciprocity in Social Networks with Capacity Constraints Bo Jiang College of Information and Computer Sciences University of Massachusetts [email protected] Amherst MA, USA Zhi-Li Zhang Department of Computer Science and Engineering University of Minnesota Minneapolis MN, USA [email protected] Don Towsley College of Information and Computer Sciences University of Massachusetts [email protected] Amherst MA, USA ABSTRACT Directed links -- representing asymmetric social ties or inter- actions (e.g., "follower-followee") -- arise naturally in many social networks and other complex networks, giving rise to directed graphs (or digraphs) as basic topological models for these networks. Reciprocity, defined for a digraph as the per- centage of edges with a reciprocal edge, is a key metric that has been used in the literature to compare different directed networks and provide "hints" about their structural proper- ties: for example, are reciprocal edges generated randomly by chance or are there other processes driving their gener- ation? In this paper we study the problem of maximizing achievable reciprocity for an ensemble of digraphs with the same prescribed in- and out-degree sequences. We show that the maximum reciprocity hinges crucially on the in- and out- degree sequences, which may be intuitively interpreted as constraints on some "social capacities" of nodes and impose fundamental limits on achievable reciprocity. We show that it is NP-complete to decide the achievability of a simple up- per bound on maximum reciprocity, and provide conditions for achieving it. We demonstrate that many real networks exhibit reciprocities surprisingly close to the upper bound, which implies that users in these social networks are in a sense more "social" than suggested by the empirical reci- procity alone in that they are more willing to reciprocate, subject to their "social capacity" constraints. We find some surprising linear relationships between empirical reciprocity and the bound. We also show that a particular type of small network motifs that we call 3-paths are the major source of loss in reciprocity for real networks. Categories and Subject Descriptors G.2.2 [Graph Theory]: Network problems; H.2.8 [Database Applications]: Data mining Keywords reciprocity; degree sequence; directed graph; social network . 1. INTRODUCTION Many complex networks are naturally directed, which en- dows them with nontrivial structural properties not shared by undirected networks. One such property that has been widely studied is reciprocity, which is classically defined as the fraction of edges that are reciprocated, i.e. paired with an edge of the opposite direction. Nontrivial patterns of reciprocity can reveal possible mechanisms of social, biolog- ical or other nature that systematically act as organizing principles shaping the observed network topology [6]. Pre- vious work shows that reciprocity plays an important role in many information networks such as email networks [16], the World Wide Web [2] and Wikipedia [29, 28]. It is also shown that major online social networks that are directed in nature, such as Twitter[10, 12], Google+[14], Flickr [15, 4], LiveJournal [25, 15, 7], and YouTube [15], all exhibit a nontrivial amount of reciprocity. When we try to interpret observed values of reciprocity, we are faced with the problem of assessing the significance of the observation. For instance, the Swedish Wikipedia has reciprocity of 21%. How significant is this? This question is often answered by comparing measured values with the ex- pected value of some null model. One commonly used null model is a random graph with the same number of nodes and edges [16]. An alternative is a random graph with specified degree sequence, as the specific degree sequence is expected to affect reciprocity [26]. Networks are then classified as re- ciprocal or anti-reciprocal according to whether the observed reciprocity is larger or smaller than the expected value [6]. Significant deviation from the expected values suggests the existence of some underlying organizational mechanism at work. For our example of Swedish Wikipedia, the expected reciprocities in both random null models are almost zero, so the Swedish Wikipedia is classified as a reciprocal net- Informative as this might be, comparison with ex- work. pected values is not the whole story. Is 21% a significant deviation from 0? Can we say that the tendency to recip- rocate is strong in this network? The answer might de- pend on the eye of the beholder. However, if we know for some reason the maximum possible reciprocity is only 28%, then we may safely conclude that 21% is indeed a significant amount of reciprocity. On the other hand, if the maximum is 90%, we might conclude that 21% is not as significant as suggested by the comparison with random null models. In general, knowledge of the extremal values can give a better idea about where the observation lies in the entire spectrum, which can potentially change our conclusion about the sig- nificance level of the observation. Since real social networks often exhibit reciprocities larger than those associated with the random null models, we con- cern ourselves only with the maximum achievable reciprocity in this work. As in the random null models, we may want to retain certain key structural features of the real network when we maximize reciprocity. The particular feature that we choose to preserve in this work is the joint in- and out- degree sequence, which is a confounding factor in the study of reciprocity [26]. In real networks, in- and out-degrees of- ten serve as proxies for some kind of capacities of the corre- sponding node. For example, in a file sharing network where edges represent transfers from file sources to downloaders, the in-degree of a node can reflect the available network bandwidth and the out-degree the amount of resource. In a social network where edges point from followers to followees, the in-degree of a node can reflect its fame and popularity and the out-degree its budget of attention. Quite often these capacity constraints are too important to be ignored in the network under consideration. By preserving the degree se- quence, we honor these capacity constraints, thus controlling these confounding factors. Motivated by the above considerations, we study the prob- lem of maximizing reciprocity subject to prescribed joint in- and out-degree constraints. This paper makes the following contributions. • We formulate the maximum reciprocity problem and prove its NP-hardness. We provide an upper bound on reciprocity and conditions for achieving the bound. • We show that empirical reciprocity is surprisingly close to the upper bound in a wide range of real networks. We also find surprisingly strong linear relationships be- tween empirical reciprocity and the upper bound. • We identify some suboptimal network motifs and show that a particular type of small motif called 3-paths is the major cause for suboptimality in real networks. The rest of the paper is organized as follows. Section 2 in- troduces the maximum reciprocity problem. Section 3 proves the NP-hardness of the problem, and provides a simple up- per bound for maximum reciprocity. Section 4 identifies pat- terns of maximum digraphs and provides a greedy algorithm for eliminating suboptimal motifs. Section 5 conducts some empirical study of real networks and Section 6 concludes the paper. 2. GRAPHIC SEQUENCES AND MAXIMUM RECIPROCITY PROBLEM In this section, we first introduce the notion of a graphic sequence for undirected graphs and then a graphic bi-sequence for directed graphs or digraphs for short, which will be used in the theoretical analysis of Section 3. We then formulate the maximum reciprocity problem. Throughout the rest of the paper, a graph, directed or not, always means a sim- ple graph, i.e. no self-loops or multiple edges are allowed. We will use the terms node and vertex interchangeably. For directed graphs, an edge always means a directed edge. 2.1 Graphic Sequence and Bi-sequence For an undirected graph G = (V, E), the degree dG(v) of a node v is the number of edges incident to v. Associated with every graph G is its degree sequence d = {dG(v) : v ∈ V }. However, not every sequence of nonnegative integers can be realized as the degree sequence of a graph. When it is real- izable, the sequence is called graphic. More precisely, a se- quence of nonnegative integers d = (d1, d2, . . . , dn) is called graphic if there exists a graph G with nodes v1, v2, . . . , vn such that dG(vi) = di for i = 1, 2, . . . , n. The following classical theorem of Erdos and Gallai characterizes graphic sequences. Theorem 1 (Erdos-Gallai). A sequence of nonneg- ative integers d1 ≥ d2 ≥ ··· ≥ dn is graphic if and only if ∑n ∑ i=1 i=1 di is even and k di ≤ k(k − 1) + n ∑i=k+1 min{di, k}, for k = 1, 2, . . . , n. The graphicality of a sequence can be tested in linear time using the Erdos-Gallai theorem [9]. For a digraph G = (V, E), a node has both an in-degree and an out-degree. The in-degree d−G(v) of a node v is the number of directed edges coming into v, and the out-degree d+ G(v) is the number of directed edges going out of v. Associ- ated with every digraph G is a bi-sequence (d+, d−), where G(v) : v ∈ V } is the out-degree sequence and d− = d+ = {d+ {d−G(v) : v ∈ V } is the in-degree sequence. As in the undi- rected case, not every bi-sequence of nonnegative integers can be realized by a digraph. A bi-sequence of nonnegative n ), (d−1 , d−2 , . . . , d−n )} is integers (d+, d−) = {(d+ called graphic if there exists a digraph G with nodes v1, i and d−G(vi) = d−i v2, . . . , vn such that d+ for i = 1, 2, . . . , n. The Fulkerson-Chen-Anstee theorem char- acterizes graphic bi-sequences. G(vi) = d+ 2 , . . . , d+ 1 , d+ (Fulkerson-Chen-Anstee). A bi-sequence Theorem 2 1 , . . . , d+ {(d+ graphic if and only if∑n n ), (d−1 , . . . , d−n )} with d+ i =∑n ∑ min{d−i , k − 1} + ∑ 1 ≥ d+ i=1 d−i and ∑i=k+1 d+ i ≤ i=1 d+ i=1 i=1 k k n min{d−i , k}, 2 ≥ ··· ≥ d+ n is for k = 1, 2, . . . , n. 2.2 Maximum Reciprocity Problem In this subsection, we formulate the maximum reciprocity problem. For notational simplicity, we henceforth make no distinction between a graph (digraph) and its edge set when no confusion arises. Given a digraph G, let Gs be the symmetric subgraph of G, i.e. (i, j) ∈ Gs if and only if both (i, j) ∈ G and (j, i) ∈ G. The reciprocated edges of a digraph G are precisely those of Gs. Thus the number ρ(G) of reciprocated edges in G is given by ρ(G) = Gs, and the reciprocity of G is r(G) := ρ(G)/G. Note that we use G to denote the number of edges in G and each pair of reciprocal edges contributes two to ρ(G). Given a graphic bi-sequence (d+, d−), let G(d+, d−) de- note the nonempty set of graphs that have (d+, d−) as their degree bi-sequence. Since the total number of edges is fixed for a given graphic bi-sequence, maximizing r(G) is the same as maximizing ρ(G). The maximum reciprocity problem is then to find a digraph G in G(d+, d−) with maximum ρ(G), i.e. maximize ρ(G) subject to G ∈ G(d+, d−). Proposition 1. The number of reciprocated edges in any digraph with a given degree bi-sequence cannot exceed the total balanced degree, i.e. ρ(d+, d−) ≤ β(d+, d−). A necessary condition for equality is that both d+ ∧ d− and d+ ∨ d− be graphic. Proof. Let G ∈ G(d+, d−) be a maximum digraph. Note that the number of reciprocated edges going out of a node G(v) ∧ d−G(v). The desired bound is obtained v is at most d+ by summing over v. If equality holds, then Gs and Gu, when viewed as undi- rected graphs, have respective degree sequences d+∧d− and d+ ∨ d−. Thus both d+ ∧ d− and d+ ∨ d− are graphic. Note that it is possible that neither d+ ∧ d− nor d+ ∨ d− is graphic. In fact, one sequence can fail to be graphic inde- pendent of whether the other is graphic or not, as illustrated by the following examples, where graphic bi-sequences are shown along with the corresponding maximum digraphs. Example 1. In Figure 1, neither the min sequence d+∧d− nor the max sequence d+ ∨ d− is graphic, since they both have odd sums. Here ρ(d+, d−) = 2 < β(d+, d−) = 3. 1 2 3 4 5 i 1 2 3 4 5 (d+ i , d−i ) (1, 0) i ∧ d−i d+ 0 i ∨ d−i d+ 1 (1, 1) (0, 2) (2, 1) (1, 1) 1 0 1 1 1 2 2 1 Figure 1: Graphic bi-sequence with non-graphic max and min sequences. Example 2. In Figure 2, the min sequence d+ ∧ d− is graphic, while the max sequence d+ ∨ d− is not. No reci- procity is allowed by this bi-sequence, i.e. ρ(d+, d−) = 0, while the upper bound gives β(d+, d−) = 2n, so the gap can be arbitrarily large. The only unbalanced nodes s and r have very large unbalanced degrees that cannot be absorbed by themselves, as a consequence of which some, in fact all, balanced degrees have to be used for absorbing unbalanced degrees rather than forming reciprocal edges. Example 3. In Figure 3, the max sequence d+ ∨ d− is graphic, while the min sequence d+ ∧ d− is not. As in Ex- ample 2, no reciprocity is allowed here, i.e. ρ(d+, d−), while the upper bound is β(d+, d−) = 2n. The situation is, how- ever, the opposite. Node 0 has too large a balanced degree relative to the number of nodes with nonzero balanced de- grees, which is one here. Thus some of the balanced degrees have to be absorbed by the unbalanced degrees. The common pattern in Examples 2 and 3 is that there are a small number of nodes with extremely large degrees. In the social network context, these nodes correspond to celebrities We denote the maximum value by ρ(d+, d−) and refer to a digraph G with ρ(G) = ρ(d+, d−) as a maximum reciprocity digraph or maximum digraph for short. 2.3 Some Notations We collect here some notations for later reference. Let G denote a generic digraph. • Let Ga be the anti-symmetric subgraph of G, i.e. (i, j) ∈ Ga if and only if (i, j) ∈ G but (j, i) /∈ G. Note that G = Gs + Ga and Gs ∩ Ga = ∅, i.e. G is the edge disjoint union of Gs and Ga. • Let Gu be the undirected graph obtained by sym- metrizing G, i.e. (i, j) ∈ Gu if either (i, j) ∈ G or (j, i) ∈ G. Let (d+, d−) be a graphic bi-sequence. • The min sequence is d+ ∧ d− = (d+ 1 ∧ d−1 , d+ 2 ∧ d−2 , . . . , d+ n ∧ d−n ), where a ∧ b = min{a, b}. • The max sequence is d+ ∨ d− = (d+ 1 ∨ d−1 , d+ 2 ∨ d−2 , . . . , d+ n ∨ d−n ), where a ∨ b = max{a, b}. • The total number of edges is ε(d+, d−) =∑i β(d+, d−) =∑i d+ i =∑i d−i . i ∧ d−i , d+ which is the total variation distance between d+ and d−. Note that ε(d+, d−) = β(d+, d−) + ν(d+, d−). 3. HARDNESS ANALYSIS AND BOUNDS In this section, we first provide an upper bound for the maximum number of reciprocated edges allowed by a graphic bi-sequence. We then prove that the maximum reciprocity problem is NP-hard by showing that it is NP-complete to decide the achievability of the upper bound. Some sufficient conditions for achieving the upper bound are then provided. 3.1 Upper Bound for Reciprocity In this subsection, we first establish a simple upper bound on the maximum number of reciprocal edges in terms of the total imbalance of the graphic bi-sequence, along with neces- sary conditions for achieving this upper bound. Some exam- ples are provided to illustrate how the necessary conditions may fail and that they are not sufficient, which provides insight into why the bound is not always tight. which is the ℓ1-norm of the min sequence. i − d−i , d+ ∑ i 1 2 • The total unbalanced degree is ν(d+, d−) = • The total balanced degree is r 0 1 2 n−1 n i i , d−i ) (d+ 0 ∼ ⌊n/2⌋ (n − i, i) ⌈n/2⌉ ∼ n (n − i, i) i ∧ d−i d+ i n − i i ∨ d−i d+ n − i i Figure 4: Insufficiency of necessary condition. Proof. Note that the problem is the same as the exis- tence problem of a digraph G ∈ G(d+, d−) with ρ(G) = β(d+, d−). This problem is in NP, since given a digraph G, we can verify whether ρ(G) = β(d+, d−) in polynomial time. To show that the problem is NP-hard, we adapt the proof of Lemma 5 in [5] by reduction from the 3-color tomography problem, which is shown to be NP-hard therein. Recall that the 3-color tomography problem is as follows. Given nonnegative integral vectors rw, rb ∈ Nn, and sw, sb ∈ Nm that satisfy i ≤ m, for 1 ≤ i ≤ n, 1 ≤ j ≤ m, j ≤ n, rw i + rb sw j + sb and n ∑ i=1 rc i = m ∑ j=1 sc j, for c ∈ {w, b}, decide if (rw, rb, sw, sb) is feasible, i.e. there exists a matrix M with entries in {w, b, g} such that rc i = {j : Mij = c}, for c ∈ {w, b}. Let (rw, rb, sw, sb) be an n × m instance of the 3-color sc j = {i : Mij = c}, tomography problem. For 1 ≤ i ≤ n and 1 ≤ j ≤ m, let d+ i = rw d−i = rw i + rb i + n − 1, i + n − 1, n+j = sw d+ j , d−n+j = sw j + sb j. (1) i=1 rw i . Now we show that (rw, rb, sw, sb) is feasible if and only if (d+, d−) is graphic and ρ(d+, d−) = β(d+, d−), where β(d+, d−) = n(n − 1) + 2∑n First assume that M is a solution to the 3-color tomog- raphy instance. We construct a digraph G as follows. For 1 ≤ i ≤ n and 1 ≤ j ≤ m, let Wij = 1 if Mij = w, and Bij = 1 if Mij = b. Let J be an n × n matrix with all off-diagonal entries equal to 1 and diagonal entries equal to 0. Let the adjacency matrix of G be ( J W + B 0 ) . W T It is straightforward to verify that G ∈ G(d+, d−) and ρ(G) = β(d+, d−). For the reverse direction, assume that (d+, d−) is graphic and ρ(d+, d−) = β(d+, d−). Then there exists a digraph G ∈ ρ(d+, d−) with ρ(G) = β(d+, d−). Divide the adja- cency matrix of G into the following block form G =(G11 G12 G21 G22) . i s (d+ i , d−i ) (2n, 0) i ∧ d−i d+ 0 i ∨ d−i d+ 2n 1 ∼ 2n r (1, 1) (0, 2n) 1 0 1 2n Figure 2: Graphic bi-sequence with graphic min sequence but non-graphic max sequence. s1 s2 r1 r2 0 s2n r2n i s1 ∼ s2n r1 ∼ r2n 0 (d+ i , d−i ) (1, 0) i ∧ d−i d+ 0 i ∨ d−i d+ 1 (0, 1) (2n, 2n) 0 2n 1 2n Figure 3: Graphic bi-sequence with graphic max sequence but non-graphic min sequence. (node r in Figure 2), information aggregators (node s in Figure 2), or middlemen (node 0 in Figure 3). These large degree nodes often incur inevitable reduction of reciprocity from the upper bound. The next example shows that the necessary condition in Proposition 1 is not sufficient. i , d+ Example 4. For the bi-sequence (d+ i ) = (n − i, i), i = 0, 1, . . . , n, the upper bound is β(d+, d−) = ⌊n/2⌋ · ⌈n/2⌉. When n is a multiple of 4, both the max sequence d+ ∨ d− and the min sequence d+ ∧ d− are graphic. However, ρ(d+, d−) = 0, as the only digraph in G(d+, d−), of which (i, j) is an edge if and only if i < j, has zero reciprocity; see Figure 4. 3.2 Proof of NP-hardness We saw in the previous subsection that the upper bound may not be achievable. Unfortunately, the next theorem shows that it is NP-complete to decide whether the upper bound is achievable, which means the maximum reciprocity problem is NP-hard. Theorem 3. The decision problem whether ρ(d+, d−) = β(d+, d−) is NP-complete. 1 2 2n s n+i, which, by (1), evaluates k=1 G(k, j) and d+ i=1 d+ where G11 is n × n and G22 is m × m. Let Φ =∑n to n(n − 1). On the other hand, d−j = ∑n+m n+i =∑n+m ∑ j=1 d−j −∑m ∑ k=1 G(n + i, k), so G11(i, j) − ∑ ∑ Φ = j=1 j=1 i=1 i=1 m m n n G22(i, j) ≤ n(n − 1) = Φ, where the inequality follows from the facts that G11(i, j) ≤ 1, G11(i, i) = 0 and G22(i, j) ≥ 0. Since the equality holds, we must have G11 = J and G22 = 0. Thus ρ(G) = n(n − 1) + 2 ≤ n(n − 1) + 2 = n(n − 1) + 2 n n i=1 ∑ ∑ ∑ j=1 i=1 m G12(i, j)G21(j, i) G21(j, i) m j=1 ∑ ∑ j=1 m n+j = β(d+, d−) = ρ(G). d+ Since the equality holds, G12(i, j) ≥ G21(j, i). Thus G12 = W + B and G21 = W T for some (0, 1)-matrices W and B. Let Mij = w if W (i, j) = 1, and Mij = b if Bij = 1. Then M is a solution to the 3-color tomography instance. Since the graphicality of (d+, d−) can be tested in quadratic time using the Fulkerson-Chen-Anstee theorem, the above reduction then shows that it is NP-hard to decide whether ρ(d+, d−) = β(d+, d−). 3.3 Sufficient Conditions for Achieving Bound Given the hardness of the maximum reciprocity problem, we provide some sufficient conditions for achieving the upper bound in Proposition 1. We start with the following slightly more general theorem, which may potentially be used to lower bound ρ(d+, d−). Theorem 4. Suppose that d0 is a graphic sequence such that the residual bi-sequence (d+−d0, d−−d0) is also graphic. If ∆ < √δn +(δ − 1 2 − δ, where n = V0, ∆ = ∨i∈V0 i ), with V0 = {i : d+ i + d−i − d0 i + d−i − d0 (d+ (d+ i ∨ d−i > 0}, then ρ(d+, d−) ≥ 2∑i d0 2)2 + 3 i ) and δ = ∧i∈V0 This theorem is analogous to Theorem 2.2 in [3], which deals with packing two graphic sequences for undirected graphs. Theorem 4 deals with packing a graphic sequence d0 for undirected graphs and a graphic bi-sequence (d+ − d0, d− − d0) for digraphs. The proof closely follows that of Theorem 2.2 in [3] and can be found in [11]. Applying Theorem 4 with d0 = d+ ∧ d−, we obtain the following sufficient conditions for achieving the upper bound in Proposition 1. i . Corollary 1. ρ(d+, d−) = β(d+, d−) if the following conditions hold, (1). d+∧d− and (d+−d+∧d−, d−−d+∧d−) are graphic; 2 − δ, where n = V0, ∆ = i ∨ d−i ), with V0 = (d+ (2). ∆ < √δn +(δ − 1 2)2 + 3 i ∨ d−i ) and δ = ∧i∈V0 (d+ i ∨ d−i > 0}. ∨i∈V0 {i : d+ Note that ∆ is the maximum of either the in- or out- degrees. Putting an upper bound on ∆ rules out extremely large degrees, which are the trouble makers in the examples of Section 3.1. However, in most real networks, we have δ = 1, so the sufficient condition essentially requires ∆ < √n, which, unfortunately, usually fails to hold. In fact, it fails for most networks studied in Section 5. 4. PATTERNS IN MAXIMUM DIGRAPHS In this section, we identify some structural patterns of maximum digraphs, or equivalently, the associated subop- timal structures that contribute to the loss in reciprocity not imposed by the degree bi-sequence. We first look at some small suboptimal motifs and provide a greedy algo- rithm to eliminate them. We then show some more compli- cated structural patterns of maximum digraphs and demon- strate how they can help us pin down the maximum digraphs in some special cases. Omitted proofs can be found in [11]. Throughout this section, a cycle or a path always refers to a directed cycle or directed path, i.e. the edges must be all in the same direction as we follow the cycle or path. We also require that the edges be distinct. On the other hand, the vertices are not necessarily distinct. When the vertices are distinct, we say the path or cycle is elementary. 4.1 Small Suboptimal Motifs In this subsection, we focus on a particular type of small motifs that we call 3-paths, the nonexistence of which also guarantees the nonexistence of many larger scale subopti- mal structures. As we will see in Section 5, elimination of such suboptimal motifs brings reciprocity close to the corre- sponding upper bound for a variety of real world networks. Given a digraph G, we call an elementary path of length 3, π = (v0, v1, v2, v3), a 3-path if (vi, vi+1) ∈ Ga for i = 0, 1, 2, i.e., π consists entirely of unreciprocated edges. We further classify 3-paths into the following four types according to the connectivity between v0 and v3 (Figure 5), (I). (v0, v3) /∈ Gu, i.e. there is no edge between v0 and v3; (II). (v0, v3) ∈ Gs; (III). (v3, v0) ∈ Ga, i.e. (v0, v1, v2, v3, v0) is a 4-cycle; (IV). (v0, v3) ∈ Ga. As shown in Figure 5, 3-paths of Types I, II and III are suboptimal and can be rewired locally to increase reci- procity. We say a digraph is 3-path optimal if it has no 3-path of Type I, II or III. Note that when viewed as a transformation on Ga, the rewiring procedure in Figure 5 simply eliminates 4-cycles (Type III), and replaces open 3- paths by a shortcut from its first vertex to its last vertex if such a shortcut does not yet exist (Types I and II). Thus each rewiring increases the number of reciprocated edges by either 2 or 4, and we have the following Lemma 1. A maximum digraph is 3-path optimal. Given a digraph G, we can greedily rewire all 3-paths to get a lower bound on the maximum reciprocity allowed by the degree bi-sequence of G. The resulting greedy algorithm is shown in Algorithm 1. Lemma 2 guarantees that Algo- rithm 1 eliminates all 3-paths of Types I, II and III. v0 × v3 v1 × v2 (b) Type II. v0 v3 v1 v2 gorithm 1. Let G denote a 3-path optimal digraph through- out this subsection. Lemma 3 shows that the unreciprocated edges of a 3-path optimal digraph cannot form any elementary path of odd length without a shortcut. As a result, for any two vertices u and v, either there is no path from u to v in Ga, or there is such a path of length at most 2. Lemma 3. If π = (v0, v1, . . . , v2p+1) is an elementary path of odd length in Ga, then (v0, v2p+1) ∈ Ga. Lemma 4 shows that the anti-symmetric subgraph of a 3-path optimal digraph is almost cycle free. We can obtain a directed acyclic graph from it by removing an edge from each 3-cycle. (d) Type IV. Lemma 4. The only possible cycles in Ga are 3-cycles, and any two of them must be vertex disjoint. v1 v2 v1 v2 × × × × v0 v3 v0 v3 (a) Type I. (c) Type III. Figure 5: Different types of 3-paths with corresponding rewirings. The edges marked by red crosses are to be rewired into the dashed green edges. Algorithm 1 GreedyRewire Input: G = (V, E) 1: S ← V 2: while S = ∅ do pick v0 ∈ S 3: if ∃ non-Type IV 3-path π = (v0, v1, v2, v3) then 4: 5: 6: 7: 8: 9: 10: end while 11: return G G ← Rewire(π) S ← S ∪ {v1, v2} S ← S − {v0} end if else Lemma 2. Algorithm 1 returns a 3-path optimal digraph. Note that depending on how v0 and π are picked, Al- gorithm 1 can return different 3-path optimal graphs. Al- though there is no theoretical guarantee, we will see in Sec- tion 5 that reciprocities of 3-path optimal digraphs returned by Algorithm 1 are very close to the corresponding upper bounds and hence close to the maxima as well. The next subsection shows that 3-path optimality precludes many other suboptimal structures, which partially explains why Algo- rithm 1 works pretty well in practice. 4.2 Properties of Maximum Digraphs In this subsection, we consider additional suboptimal struc- tures that are more complicated than 3-paths. Some of these structures are automatically eliminated by Algorithm 1, while others require extra attention. We will state the results as properties of maximum digraphs. Any violation of the stated properties yields a suboptimal structure. 4.2.1 3-path optimal digraphs We first consider some properties of 3-path optimal di- graphs, which, by Lemma 1, are also properties of maxi- mum digraphs. All these properties involve only unrecip- rocated edges. Note that any suboptimal structures that violate these properties are automatically eliminated by Al- Although 3-path optimality does not preclude 3-cycles, they are unlikely to exist in 3-path optimal graphs obtained from real world networks using Algorithm 1, as Lemma 5 requires that the vertices of a 3-cycle in such graphs have exactly the same connectivity to every vertex outside the 3- cycle, which is extremely unlikely, especially in large graphs. Lemma 5. For a 3-cycle C in Ga and any vertex v not in C, either there is no path in Ga that connects v and C, or there is an edge of Ga between v and each vertex of C, all in the same direction. 4.2.2 Maximum digraphs In this subsection, we consider some properties of maxi- mum digraphs that are not direct consequences of 3-path op- timality. The associated suboptimal structures may be left intact by Algorithm 1 and require extra attention. Through- out this subsection, let G⋆ denote a maximum digraph with a given bi-sequence (d+, d−), i.e. G⋆ ∈ G(d+, d−) and ρ(G⋆) = ρ(d+, d−). We know from Lemma 4 that large cycles involving only unreciprocated edges are suboptimal structures, but certain cycles of even length that contains reciprocated edges are also suboptimal. In particular, we have the following Lemma 6. Let C be an even cycle in H ∈ G(d+, d−). If any two edges in C ∩ Hs are separated by an odd number of edges in C, then there exists H′ ∈ G(d+, d−) with ρ(H′) = ρ(H) + Ca − 2Ca ∩ Hs, where Ca is the anti-symmetric part of C, i.e. Ca = {(i, j) ∈ C : (j, i) /∈ C}. Note that C ∩ Ha ⊂ Ca, but it is not necessarily true that Ca = C ∩ Ha. The two edges (3, 4) and (5, 0) in Figure 6(a) are in Ca but not in C ∩ Ha. Any cycle satisfying the condi- tions in Lemma 6 is suboptimal if it has more anti-symmetric edges than symmetric ones. The cycles (0, 1, 2, 3, 4, 5, 0) in Figure 6(a) and (0, 1, 2, 0, 5, 3, 4, 5, 0) in Figure 6(b) are two such examples. Note that these two cycles are not automat- ically eliminated by Algorithm 1. Lemma 7 specifies how multiple 3-cycles should be con- nected in maximum digraphs. If we collapse each 3-cycle into a single vertex by contracting its edges, the subgraph of G⋆ a induced by these vertices will have the structure in Figure 4. Therefore, while the existence of multiple 3-cycles is already very unlikely in 3-path optimal digraphs, it is even less likely in maximum digraphs with degree bi-sequences of real world networks. Proposition 2 shows that when the bi-sequence is perfectly balanced, the maximum digraph achieves perfect or near- perfect reciprocity. Therefore, any unfulfilled reciprocity must be due to the lack of effort to form reciprocal edges rather than due to the fundamental limit imposed by the bi-sequence itself. Proposition 2. Suppose (d+, d−) is perfectly balanced, i.e. ν(d+, d−) = 0. (1). If ε(d+, d−) is even, then ρ(d+, d−) = ε(d+, d−). (2). If ε(d+, d−) is odd, then ρ(d+, d−) = ε(d+, d−) − 3, and G⋆ a consists of a 3-cycle. i = d−i Proof. Since ν(d+, d−) = 0, we have d+ for all i. Thus any edge of G⋆ a must be contained in a cycle of length at least 3 in G⋆ a. By Lemma 4, the length of such a cycle is exactly 3. By Lemma 7, there is at most one such cycle in G⋆ a is either empty or a 3-cycle. Since ρ(G⋆) must be even, the former case corresponds to even ε(d+, d−) and the latter odd ε(d+, d−). a. Thus G⋆ The next proposition shows that when the bi-sequence is slightly unbalanced, the number of possible values of ρ(d+, d−) increases. This sheds some light on why the maximum reci- procity problem is so difficult. As the total unbalanced de- gree increases, the number of possibilities is expected to ex- plode. Proposition 3. Suppose (d+, d−) is slightly unbalanced 1 = 1. 0 − d−0 = 1 and d−1 − d+ with ν(d+, d−) = 1, d+ (1). If ε(d+, d−) is even, then the gap ε(d+, d−)−ρ(d+, d−) is either 2 or 4. When the gap is 2, the two edges in G⋆ a form a 2-path from 0 to 1. When the gap is 4, G⋆ a is the vertex disjoint union of {(0, 1)} and a 3-cycle. (2). If ε(d+, d−) is odd, then the gap ε(d+, d−)−ρ(d+, d−) a = {(0, 1)}. a is the vertex disjoint union of is either 1 or 5. When the gap is 1, G⋆ When the gap is 5, G⋆ a 2-path from 0 to 1 and a 3-cycle. Proof. Note that there must be a path from 0 to 1 in G⋆ a. Let π be the shortest path from 0 to 1 in G⋆ a. All edges in G⋆ a − π, if there is any, must be contained in a cycle in G⋆ a. By Lemma 4, G⋆ a can only have 3-cycles. If G⋆ a had more than one 3-cycles, Lemma 7 would require that there be at least 9 edges in G⋆ a that are not contained in any cycle, all of which must be in π. Lemma 3 shows that π has either one or two edges. Therefore, G⋆ a − π is either empty or has one 3-cycle. By Lemma 5, π and the 3-cycle, if there is one, must be vertex disjoint. Since π ∈ {1, 2}, a − π ∈ {0, 3}, it follows that ε(d+, d−) − ρ(G⋆) = and G⋆ G⋆ a − π ≤ 2 + 3 = 5. Note that ρ(G⋆) is even. If ε(d+, d−) is even, then ε(d+, d−) − ρ(G⋆) is equal to π = 2 or α(G⋆) = π + Ga − π = 1 + 3 = 4. If ε(d+, d−) is odd, then ε(d+, d−)− ρ(G⋆) is equal to π = 1 or π + G⋆ a − π = 2 + 3 = 5. a = π + G⋆ 2 3 × × 1 4 (b) 0 ×× 5 2 3 × × 1 4 (a) 0 × 5 Figure 6: Suboptimal even cycle with reciprocated edges. Reciprocity can be increased by rewiring edges marked by red crosses into the dashed green edges. Lemma 7. The set of all distinct 3-cycles of G⋆ a can be linearly ordered as C0, C1, . . . , Cm such that there are 9 edges of G⋆ a going from Ci to Cj for all 0 ≤ i < j ≤ m. The next lemma complements Lemma 3 by specifying con- nection patterns of elementary paths of even length. Lemma 8. Let π = (v0, v1, . . . , v2p) be an elementary path of even length 2p ≥ 4 in G⋆ a, E0 = {(v2i, v2j) : i = j} and a, then G⋆ E1 = {(v2i−1, v2j−1) : i = j}. If (v0, v2p) /∈ G⋆ either has all the edges in E0 but none in E1, or vice versa. Figure 7 shows both possibilities for an elementary path of length 4. The shortcuts required by Lemma 3 are also shown. The red dashed edges represent those that cannot coexist with the green edges in a maximum digraph. Some suboptimal structures that violate Lemma 8 cannot be au- tomatically eliminated by Algorithm 1. For example, if the pair of edges between the vertices 0 and 2 are missing from Figure 7(a), the resulting suboptimal digraph will be left intact by Algorithm 1. 0 1 2 3 4 (a) E0 ⊂ G⋆, E1 ∩ G⋆ = ∅. 0 1 2 3 4 (b) E1 ⊂ G⋆, E0 ∩ G⋆ = ∅. Figure 7: Patterns of even paths in maximum digraphs.. Each undirected solid edge represents a pair of reciprocated edges in G⋆. Each dashed edge represents a pair of edges that are both missing in G⋆. 4.3 Some Examples In this subsection, we illustrate how the structural pat- terns of the previous subsection may be used to pin down the maximum digraph in some special cases. Here G⋆ always denotes a maximum digraph. It is easy to come up with examples where the gaps are 1 and 2, respectively. The next examples shows that the other two cases are also possible. Example 5. Let (d+, d−) = {(1, 3, 2, 2, 2), (0, 4, 2, 2, 2)}. Figure 8(a) shows a realization G of this bi-sequence, where each undirected edge represents a pair of edges in opposite directions. Note that ρ(G) = ε(d+, d−) − 4. We claim that ρ(G) = ρ(d+, d−). If not, then ρ(G⋆) = ε(d+, d−) − 2 by Proposition 3, and the two edges in G⋆ a form a 2-path π from a to b. Since c, d, e have the same in- and out-degrees and hence are equivalent, we may assume without loss of generality that π = (a, c, b). Thus G⋆ a − π is symmetric and corresponds to a simple graph with degree sequence d = {0, 3, 1, 2, 2}. There is only one simple graph with this degree sequence, which is shown by the black edges in Figure 8(b). When we superimpose π and G⋆ a − π, there are two edges from (c, b), and hence G⋆ /∈ G(d+, d−), a contradiction. a b c d e a c b d e (a) G. (b) π and G⋆ a − π. Figure 8: Example 5. Example 6. Let (d+, d−) = {(1, 0, 4, 2, 2, 2), (0, 1, 4, 2, 2, 2)}. Figure 9 shows a realization G of this bi-sequence, where each undirected edge represents a pair of edges in opposite directions. Note that ρ(G) = ε(d+, d−) − 5. Since the se- quence d+∧d− = {0, 0, 4, 2, 2, 2} is not graphic, Proposition 1 shows that ρ(d+, d−) < β(d+, d−) = ε(d+, d−)− 1. Thus Proposition 3 yields ρ(G) = ρ(d+, d−). In fact, G is the only element of G(d+, d−). a b c d e f Figure 9: Example 6. 5. EMPIRICAL STUDY In this section, we conduct an empirical analysis of real networks by comparing the observed values of reciprocity against the upper bounds. We also look at the lower bounds on maximum reciprocities given by Algorithm 1. 5.1 Datasets The networks that we analyze include major online social networks (OSN) that are directed in nature [15, 12, 8, 24, 13]. For the purpose of comparison, we have also included other types of networks: biological networks [20, 21, 18, 23, 19, 27], communication networks [13], product co-purchasing networks [13], web graphs [13], Wikipedias [1], software call graphs [22, 17], and P2P networks [13]. All the datasets except for Wikipedias are already converted into graph rep- resentations by other researchers and the descriptions for the datasets can be found at the cited sources. For Wikipedias, each node represents a page. Only article pages, i.e. pages with namespace ID 0, are included. Pages that redirect to the same page are represented as a single node correspond- ing to the destination page. There is an edge from node A to node B if there is at least one hyperlink from page A to page B. Multiple edges and self-loops are discarded. 5.2 Empirical Reciprocity vs. Upper Bound Figure 10: Scatter plot of empirical reciprocity versus upper bound. Regression line was fitted without data points for biological, P2P and software call networks. Figure 10 shows the scatter plot of empirical reciproci- ties against the corresponding upper bounds. Here the up- per bound is normalized by the number of edges, i.e., it is the ratio β(d+, d−)/ε(d+, d−). Note that the reciprocity values vary widely, ranging from 0 for the peer-to-peer net- work Gnutella to 90% for the online social network Slashdot. There is even a fair amount of variation within the cate- gories of biological, social and Wikipedia networks. In gen- eral, social networks and Wikipedia networks tend to have high reciprocity, while software call networks tend to have low reciprocity. Note the strong linear correlation between empirical reciprocity and the upper bound. This is a bit sur- prising, especially for the social networks, in view of the large variations in reciprocity. Related to Figure 10 is the scatter plot in Figure 11 of number of reciprocated edges against the unnormalized bound β(d+, d−). There the linear relation- ship in log-log scale is even more apparent, with biological networks being also around the regression line. These linear relationships suggest that there might exist some universal mechanism that works across different domains. Despite the wide variation in reciprocity, the ratio between the empirical reciprocity and the normalized upper bound has a much narrower range as shown by the box plots for the ratios in Figure 12. Note that the ratios are close to zero for the P2P network Gnutella and software call graphs. The Gnutella exhibits zero reciprocity, far away from the upper bounds, which are above 30%. This is probably because Gnutella implements an indirect reciprocity mechanism. The low reciprocity for software call graphs is not surprising, as software codes are usually designed to work in a hierarchical manner. The case for biological networks are more complicated, as the four biological networks considered here are actually of quite dif- ferent natures. For example, the C. Elegan neural network and the mouse cortex network are both neural networks, but the former is at the neuron level while the latter is at a coarser level of cortical regions. One can speculate that y=1.1x-0.21 biological communication co-purchase social web wikipedia software call p2p Slashdot0811 Slashdot0902 YouTube LiveJournal1 LiveJournal mouse-cortex Chinese Flickr Korean Pokec Italian Polish NotreDame Portuguese Russian English ego-Twitter French Japanese Epinions1 German Twitter C.Elegan protein-interaction Dutch Google+ Google Stanford email-EuAll BerkStan Swedish ego-Google+ wiki-Talk yeast AT 0 StackOF 0.2 Spanish wiki-Vote 0.4 0.6 upper bound 0.8 1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 reciprocity ples include the web graphs, the Swedish Wikipedia and the Google+ network, whose reciprocities are not very high in absolute value but quite high relative to the bound. This suggests that when we study these networks, it might be more meaningful to ask the question why there is such large imbalance in degrees than to ask the question why the ten- dency to reciprocate is low. 5.3 Reciprocity of 3-path Optimal Digraphs In this subsection, we look at 3-path optimal digraphs returned by Algorithm 1. Note that the reciprocity of such a digraph provides a lower bound on the maximum reciprocity of the corresponding degree bi-sequence. Figure 13 shows the scatter plot of the reciprocities of the 3-path optimal digraphs against the corresponding upper bounds. Note that the reciprocities of 3-path optimal di- graphs are very close to the upper bounds, which means that the maximum reciprocities are also very close to the upper bounds. Therefore, for the degree bi-sequences of those real networks, the fundamental limit that they impose on reci- procity is largely summarized by the upper bounds, and the major source of loss in reciprocity is the existence of 3-paths of Types I, II and III. Thus in practice Algorithm 1 usu- ally suffices for approximating maximum reciprocities and we do not need to worry much about the more complicated suboptimal structures in Section 4.2.2. Figure 11: Scatter plot of number of reciprocated edges ver- sus upper bound. Regression line was fitted in log scale, without data points for software call networks. Figure 12: Box plot of reciprocity-bound ratio for different network categories. both the low reciprocity in C. Elegan neural network and the high reciprocity in the mouse cortex network are due to biological reasons. However, we do not know if this behavior is a norm or an exception due to the lack of data for similar networks. In all categories other than biological, software call and P2P networks, the ratios are above 50% with only three ex- ceptions: the wiki-Vote network, the Stack Overflow Q&A network, and the Spanish Wikipedia. Although we have classified the Stack Overflow Q&A network as a social net- work, it differs from typical social networks. The low reci- procity suggests that there is a hierarchy of expertise. What is more interesting is the wiki-Vote network and the Spanish Wikipedia, as their behaviors deviate from those of other networks of the same category, which suggests that there might be something unusual about them that is worthy of scientific study. Apart from the three outliers, all other networks in these categories actually achieve a significant fraction of the possible reciprocity suggested by the upper bound. This means that modulo the degree constraints, the tendency to reciprocate is much stronger than the empirical reciprocity alone might have suggested. Prominent exam- Figure 13: Scatter plot of reciprocity of the 3-path optimal digraph returned by Algorithm 1 versus upper bound. Finally, recall from Section 4.2.1 that the existence of 3- cycles in a 3-path optimal digraph requires some specific structures. These structures are usually too special to occur in practice, so 3-cycles are unlikely to exist in 3-path optimal digraphs. This is indeed the case for most of the 3-path opti- mal digraphs obtained from the real networks studied here, the anti-symmetric parts of which turn out to be acyclic. 6. CONCLUSION In this work, we showed that the maximum reciprocity problem is NP-hard. We provided a partial characteriza- tion of networks with maximum reciprocity and a greedy algorithm to eliminate suboptimal motifs. We also provided an upper bound on reciprocity along with necessary condi- tions and sufficient conditions for achieving the bound. We y=0.14x1.09 biological communication co-purchase social web wikipedia software call Stackoverflow 103 105 upper bound 107 109 108 106 104 102 # reciprocated edges 100 101 Spanish wiki-Vote Stackoverflow Bio Com CoP Soc Web Wiki Call P2P 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 reciprocity-bound ratio y=x biological communication co-purchase social web wikipedia software call p2p 0 0.2 0.4 0.6 upper bound 0.8 1 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 reciprocity from GreedyRewire demonstrated that the bound is surprisingly close to the observed reciprocity in a wide range of real networks, which suggests that the tendency to form reciprocal edges might be much stronger than the observed reciprocity indicates. We found surprising linear relationships between empirical re- ciprocities and the corresponding upper bounds. We showed that a particular type of suboptimal motif called 3-paths is the major source of loss in reciprocity in these networks. Acknowledgements This work was supported in part by DoD ARO MURI Award W911NF-12-1-0385, NSF grants CNS-1065133, CNS-1117536, CNS-1411636, and DTRA grants HDTRA1-09-1-0050 and HDTRA1-14-1-0040. 7. REFERENCES [1] http://dumps.wikimedia.org/. [2] R. Albert, H. Jeong, and A.-L. Barab´asi. Internet: Diameter of the world-wide web. Nature, 401(6749):130 -- 131, 1999. [3] A. H. Busch, M. J. Ferrara, S. G. Hartke, M. S. Jacobson, H. Kaul, and D. B. West. Packing of graphic n-tuples. Journal of Graph Theory, 70(1):29 -- 39, 2012. [4] M. Cha, A. Mislove, and K. P. Gummadi. A measurement-driven analysis of information propagation in the flickr social network. In Proc. WWW'09, pages 721 -- 730, 2009. [5] C. Durr, F. Guinez, and M. Matamala. Reconstructing 3-colored grids from horizontal and vertical projections is NP-hard. In Algorithms-ESA 2009, page 776787. Springer, 2009. [6] D. Garlaschelli and M. I. Loffredo. Patterns of link reciprocity in directed networks. Phys. Rev. Lett., 93:268701, Dec 2004. [7] A. Gaudeul and C. Peroni. Reciprocal attention and norm of reciprocity in blogging networks. Technical report, Jena Economic Research Papers, 2010. [8] R. Gonzalez, R. Cuevas, R. Motamedi, R. Rejaie, and A. Cuevas. Google+ or Google-?: Dissecting the evolution of the new OSN in its first year. In Proc. WWW'13, pages 483 -- 494, 2013. [9] A. Iv´anyi and L. Lucz. Erdos-Gallai test in linear time. Combinatorica, 2011. [10] A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: Understanding microblogging usage and communities. In Proc. WebKDD/SNA-KDD'07, pages 56 -- 65, 2007. [11] B. Jiang, Z.-L. Zhang, and D. Towsley. Reciprocity in social networks with capacity constraints. Technical Report UM-CS-2015-013, UMass Amherst, 2015. [12] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In Proc. WWW'10, pages 591 -- 600, 2010. [13] J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [14] G. Magno, G. Comarela, D. Saez-Trumper, M. Cha, and V. Almeida. New kid on the block: Exploring the Google+ social graph. In Proc. IMC'12, pages 159 -- 170, 2012. [15] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proc. IMC'07, pages 29 -- 42, 2007. [16] M. E. J. Newman, S. Forrest, and J. Balthrop. Email networks and the spread of computer viruses. Phys. Rev. E, 66:035101, Sep 2002. [17] Y. Qu, Q. Zheng, T. Liu, J. Li, and X. Guan. In-depth measurement and analysis on densification power law of software execution. In Proc. WETSoM'14, pages 55 -- 58. ACM, 2014. [18] M. C. Teixeira, P. T. Monteiro, J. F. Guerreiro, J. P. Gon¸calves, N. P. Mira, S. C. dos Santos, T. R. Cabrito, M. Palma, C. Costa, A. P. Francisco, et al. The YEASTRACT database: an upgraded information system for the analysis of gene and genomic transcription regulation in Saccharomyces cerevisiae. Nucleic Acids Research, 43(D1):D161 -- D166, 2014. [19] A. Vinayagam, U. Stelzl, R. Foulle, S. Plassmann, M. Zenkner, J. Timm, H. E. Assmus, M. A. Andrade-Navarro, and E. E. Wanker. A directed protein interaction network for investigating intracellular signal transduction. Science signaling, 4(189):rs8, 2011. [20] D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440 -- 442, 1998. [21] J. G. White, E. Southgate, J. N. Thomson, and S. Brenner. The structure of the nervous system of the nematode caenorhabditis elegans. Phil. Trans. R. Soc. Lond, 314(1165):1 -- 340, 1986. [22] K.-K. Yan, G. Fang, N. Bhardwaj, R. P. Alexander, and M. Gerstein. Comparing genomes to computer operating systems in terms of the topology and evolution of their regulatory control networks. PNAS, 107(20):9186 -- 9191, 2010. [23] A. Yilmaz, M. K. Mejia-Guerra, K. Kurz, X. Liang, L. Welch, and E. Grotewold. AGRIS: Arabidopsis Gene Regulatory Information Server, an update. Nucleic Acids Research, 39(suppl 1):D1118 -- D1122, 2011. [24] A. T. T. Ying. Mining challenge 2015: Comparing and combining different information sources on the stack overflow data set. In MSR'15, 2015. [25] P. Zakharov. Structure of LiveJournal social network. In Proc. SPIE, volume 6601, pages 660109 -- 660109 -- 8. International Society for Optics and Photonics, 2007. [26] G. Zamora-L´opez, V. Zlati´c, C. Zhou, H. Stefanci´c, and J. Kurths. Reciprocity of networks with degree correlations and arbitrary degree sequences. Phys. Rev. E, 77:016106, Jan 2008. [27] B. Zingg, H. Hintiryan, L. Gou, M. Y. Song, M. Bay, M. S. Bienkowski, N. N. Foster, S. Yamashita, I. Bowman, A. W. Toga, et al. Neural networks of the mouse neocortex. Cell, 156(5):1096 -- 1111, 2014. [28] V. Zlati´c and H. Stefanci´c. Model of wikipedia growth based on information exchange via reciprocal arcs. Europhysics Letters, 93(5):58005, 2011. [29] V. Zlati´c, M. Bozicevi´c, H. Stefanci´c, and M. Domazet. Wikipedias: Collaborative web-based encyclopedias as complex networks. Phys. Rev. E, 74:016115, Jul 2006.
1601.05527
1
1601
2016-01-21T07:09:21
Single- and Multi-level Network Sparsification by Algebraic Distance
[ "cs.SI", "cs.DC", "cs.DS" ]
Network sparsification methods play an important role in modern network analysis when fast estimation of computationally expensive properties (such as the diameter, centrality indices, and paths) is required. We propose a method of network sparsification that preserves a wide range of structural properties. Depending on the analysis goals, the method allows to distinguish between local and global range edges that can be filtered out during the sparsification. First we rank edges by their algebraic distances and then we sample them. We also introduce a multilevel framework for sparsification that can be used to control the sparsification process at various coarse-grained resolutions. Based primarily on the matrix-vector multiplications, our method is easily parallelized for different architectures.
cs.SI
cs
Single- and Multi-level Network Sparsification by Algebraic Distance Emmanuel John∗ Ilya Safro† August 16, 2018 6 1 0 2 n a J 1 2 ] I S . s c [ 1 v 7 2 5 5 0 . 1 0 6 1 : v i X r a Abstract Network sparsification methods play an important role in modern network analysis when fast estimation of computationally expensive properties (such as the diameter, centrality indices, and paths) is required. We propose a method of network sparsification that preserves a wide range of structural properties. Depending on the analysis goals, the method allows to distinguish between local and global range edges that can be filtered out during the sparsification. First we rank edges by their algebraic distances and then we sample them. We also introduce a multilevel framework for sparsification that can be used to control the sparsification process at various coarse-grained resolutions. Based primarily on the matrix-vector multiplications, our method is easily parallelized for different architectures. Keywords: Networks, Sparsification, Multilevel Methods, Software, Scalable Algo- rithm 1 Introduction Networks are an abstract model of the relationships between discrete objects. Examples include networks of genes, consumers and generators in the power grid, and networks of friendships or followers in social communities. In order to study real world networks, they are often represented as graphs, where the vertices represent the objects and edges model the relationship or interaction between them. Modeling networks this way facilitates the analysis and understanding of many different structural properties of the underlying complex system. Several powerful software packages such as SNAP [23], Pajek[11], NetworkIt [39], NetworkX [13], and Gephi [4] have been developed to provide this capability. However, many complex networks are massive in size. For example, Facebook users post about 3.2 billion likes and comments each day [1], Twitter has more than 190 million users and about 65 million tweets are posted each day [43], and the human gene network contain several million edges [29]. Although, modeling and understanding these networks is very important in many application domains, the massive size of the network makes it often impractical to perform network analysis on the entire dataset. In sparsification methods, we aim to select a representative sample of the corresponding graph such that some properties of the original graph are preserved. In other words, central to sparsifi- cation is the idea that if an algorithm depends on or computes the properties that are preserved in the sparsified graph, we can expect that the results will be similar for the original graph [15] while the algorithm will perform much faster on the sparsified graph. Sampling is broadly being carried ∗School of Computing, Clemson University, Clemson, SC [email protected] †School of Computing, Clemson University, Clemson, SC [email protected] 1 out in real world networks. Most network analytics consider just a sample in time of the networks under study which is usually the result of data collection limitations [1]. Thus, it is important to understand and develop scalable methods for sampling massive networks. There are several motivating examples for network sparsification. One obvious example is in the domain of visualization. It is often computationally intensive to render huge graphs on a computer screen as well it is hard to visually analyze such graphs. Sparsification helps to visualize a sample of the graph that reveals structural properties that would have been difficult to visualize and visually analyze in the original graph [21, 35]. The computational difficulty of visualization often arises from its objective, which requires solving a computational optimization problem [16, 2]. Another broad application is the reduction in the cost of computational network analysis. In computing the betweenness centrality of every node in a massive network, for example, by prioritizing what edges should be retained and what should be removed, it is possible to improve the running time of the algorithms at a very minimal cost in optimality [3]. Thirdly, graph sparsification can be applied to revealing hidden populations which are hard for researchers to find by just looking at the entire population. For example, Salganik et. al showed that when trying to sample the population of injection drug dealers, it is difficult to sample directly as this population is hidden and so specialized sampling algorithms are needed [34]. Methods applied usually involve starting out with a sample of the desired population and using that as a seed for revealing the other members of the sample population [15]. Existing methods include snowball sampling [14, 12] and respondent driven sampling [34]. In addition, in the case where there is an incomplete data, sampling can be used to estimate properties of the original graph. This is particularly useful in dynamic graphs [40], graph streaming algorithms [1] and collective classification [33]. There are several approaches to sampling a large graph while preserving the desired properties. An example involves formulating a mathematical programming problem to minimize the distance between the sparse graph and the original graph [15]. However, such approaches are often quite complex and running them might be costlier than running the algorithm on the larger graph. Spectral approximation algorithms also exist [38]. However, those algorithms are not very fast as well and often infeasible for large graphs [15] as they often involve hidden constants and require convergence in eigen-problems. The more common approaches are (1) vertex sampling, which involves selecting a number of vertices from the original graph and retaining the vertex-induced subgraph, and (2) edge sampling, which involves the selection of edges and corresponding edge- induced subgraph. Other variations of edge and vertex sampling have been developed (see [15] for a full survey). In our method we focus on the edge sampling and also preserve the nodes from the original graph. In order to achieve this, we ensure that every node has at least one incident edge in the sparsified graph. 1.1 Strength of Connectivity in Sparsification If the properties to be preserved are known beforehand, then, in many cases, it is possible to deter- mine what kind of edges are important to preserve those properties and which ones are redundant. Thus, the sampling transformation can then be designed with the objective of retaining those edges. A general framework for sparsification involves: (1) ranking the edges and assigning each edge an edge score; and (2) sampling edges based on their scores [15]. Scoring edges provides a motiva- tion for rating the strength of connection between two vertices. In particular, this is extremely important in weighted networks, where the weights can be approximate, noisy or even completely missing. Different types of the connection strength have been proposed for scoring edges. We refer 2 the reader to [24] for a brief survey on the sparsification-relevant types of connectivity strength. The most relevant to our work is a cohort of spectral methods widely used in theoretical computer science to sparsify dense graphs such that some spectral properties are preserved. These are usually cut-based properties that are formulated using Cheeger inequality. For example, Spielman et al. introduced the edge effective resistance [36]. The effective resistance is computed using the linear system solver [37] which runs in O(mlog15n) time which can be time consuming to be feasible. Another example is the vectorized PageRank [10]. Various interpretations of the diffusion have been proposed and analyzed [19, 41] for graph kernels. However, these methods usually suffer from impractical complexity. Another relevant class of methods is based on the Jaccard index in which a similarity between two vertices is measured by computing the overlap in their neighborhoods. In [35], Satuluri et. al rated edges according to the local similarity sim(i, j) = Ni ∩ Nj/Ni ∪ Nj, where Ni is the neighborhood of node i. This method was designed for clustering objectives assuming that nodes with larger shared neighborhoods are likely to belong to the same cluster. A global similarity threshold is then chosen for which edges are filtered. The authors also introduced a method for local sparsification in which they rate and filter edges per node by selecting the top de i edges ranked by their similarity score, where e ∈ (0, 1). Their method ensures that there is at least one edge per node after sparsification. We explore this property in our method. This sparsification technique can be computationally expensive since it requires counting the number of triangles an edge is a part of. The authors, however, provided an approximation for computing the similarity. Based on the work of Satuluri et al. [35], local degree method favors the retention of high degree nodes - also known as hub nodes [24]. As in the local similarity, for each node, they include edges to the top de i nodes. However, edges are sorted according to the degree of their neighbors in descending order. The main idea of this method is to keep edges in sparsified graph that leads to nodes with high degree. Additionally, vertex connectivity can be measured by the betweenness centrality, the shortest path length, the weight of substructures (such as spanning rooted forests, routes, overlapping paths that connect two vertices [8]) and algebraic distance [9] which we will discuss in Section 3. 1.2 Our Contribution We introduce two methods for complex network sparsification that distinguish between strong and weak connectivity through neighborhoods of limited distance from the endpoints of edges. In some networks (such as those that include geospatial information), these types of connections can be interpreted as long- and short-range connections while in other (such as social networks) as inner- and outer-community connections. In both methods the sampling is based on the connectivity measured by the algebraic distance between nodes [9]. It generalizes the idea of methods that estimate the Jaccard coefficient for more distant neighborhoods through limited application of lazy random-walks (also known as algebraic distance [9]). In the first method (the single level approach) we demonstrate multiple settings of filtering local and global connections with the sampling similar to [35]. In the second method we propose a multilevel algorithm that combines the single level approach with the multilevel framework [28] to sparsify graphs at different coarse-grained resolu- tions. We provide a robust method that can be tuned to preserve different network properties that are important in a variety of applications. The multi- and single level methods can both be used to either preserve the global structure or the local structure. We also discuss how our method can be parallelized and show the ruining time in OpenMP implementation. Evaluation of methods is demonstrated through comparison of several network properties with those measured on the 3 original network. The proposed methods are implemented and available at [18]. 2 Preliminaries We denote the graph underlying a given network by G = (V, E, w), where V is a set of vertices, E is a set of edges, and w : E → R≥0 is a weighting function on E that represents the strength of connectivity between two vertices. The graph is undirected, containing no self-loops and multi- edges. For each node i ∈ V we define its degree by di and its neighbors by Ni. The clustering coefficient is a measure of the probability that neighbors of a node are connected to each other [27]. Consequently, it is a measure of the degree to which nodes in a network tend to cluster [43]. The clustering coefficient of a node i is defined as ci = λi/τi, where λi is the number of triangle subgraphs i participates in, and τi = di(di − 1)/2, i.e., the number of triples. The clustering coefficient of a graph G is defined as (cid:88) i∈V (cid:48) CG = 1 V (cid:48) ci, (1) where V (cid:48) = {i ∈ V di > 1}. The diameter of a graph is defined as the maximum distance shortest path among all pairs of vertices in G from the same connected component. The result- ing sparsified networks are compared with the original network using following properties: degree distribution, clustering coefficient, number of connected components1, diameter, betweenness cen- trality, PageRank centrality, and modularity [27]. We will use the Spearman Rank Correlation Coefficient (ρ) that is a measure of the correlation between two distributions. It is defined as i )/(n(n2 − 1)), where pi = xi − yi, and xi and yi are the ranks computed from the ρ = 1 − (6(cid:80) p2 scores Xi and Yi. 3 Algebraic distance In order to determine the strength of connection of edges for the purpose of sparsification, we use the algebraic distance introduced in [28, 9]. The algebraic distance of an edge ij (denoted by δij) is interpreted as locally converged iterative process that propagates the weighted average of values from Ni and Nj initialized by random numbers [9]. This expresses the strength of connectivity between two nodes through their local neighborhoods. The process is essentially a Jacobi over- relaxation (JOR) or a lazy random walk with limited number of steps (see Algorithm 1). The algebraic distance was successfully used in several algebraic multigrid algorithms [25, 7] and in multilevel algorithms for discrete optimization on graphs (such as the minimum linear arrangement [28], and graph partitioning [32]) to reduce the order of interpolation that results in a sparsified coarse system. Other stationary iterative relaxations can also be applied in a similar setting but since JOR is implicitly parallelizable using matrix-vector multiplications, we prefer to use it instead of other relaxations (such as Gauss-Seidel) that converge faster. Optionally, the algebraic distance can also be normalized by the square-root of the product of the weighted degrees of the two nodes to reduce extremely high strength of connection between hub nodes. 1In many existing sparsification methods, the number of connected components is preserved "artificially", i.e., even if the edge is marked for deletion, it is not deleted if it increases the number of connected components. Here we do not restrict our algorithms with such requirement. 4 Algorithm 1 Algebraic distance implementation: ComputeAlgDist 1: Input: Parameter α (in our experiments α = 1/2) 2: ∀ij ∈ E Rij = 0 3: for r = 0, 1, 2, ... do ∀i ∈ V x(0) for k = 0, 1, 2, ... do i ← rand(−0.5, 0.5) 5: 4: (cid:80) (cid:80) j∈Ni wijx(k−1) j∈Ni j wij ∀i ∈ V x(k) i ← αx(k−1) i + (1 − α) 6: 7: 8: end for Rescale x back to (−0.5, 0.5) ∀ij ∈ E Rij = Rij + (xi − xj)2 9: 10: end for 11: return ∀ij ∈ E δij ← 12: ∀ij ∈ E δij ← δij(cid:112)di ∗ dj 1(cid:112)Rij +  (cid:46) the number of test vectors r is small (cid:46) the number of JOR iterations k is small (cid:46)  is sufficiently small (cid:46) optional normalization The algebraic distance will serve as the main criterion for choosing edges for sparsification in the algorithms below. Because it helps to distinguish between so called short- and long-range connections [9], we will use it to demonstrate different types of sparsification in which local and global properties are preserved correspondingly to the types of algebraic distances that we choose. The short-range connections (large values of δij) will be called δ-strong. The long-range connections (small values of δij) will be called δ-weak. 4 Single-level sparsification In the single-level approach we demonstrate three types of sparsification in which we filter δ-weak, δ-strong edges and their mixture. In all of these cases, first, for each edge in the graph, we compute the algebraic distance. Then, for each node i, we sample the top de i neighbors ranked by their algebraic distances, where e ∈ [0, 1]. In this approach it is possible to sample for local or global structure preservation or a combination of both. To preserve the global structure, we select de i weakest connections and add them to the sparse graph (see Figure 1c). Similarly, de i strongest connections are preserved to emphasize the importance of a local structure in the sparse graphs (see Figure 1b). 5 (a) Original network (b) Sparsified network by eliminating δ-weak connections (c) Sparsified network by eliminating δ-strong connections Figure 1: An example of a small network with 3 dense clusters and sparse cuts between them (a). Sparsification of δ-weak connections will result in network presented in (b). Sparsification of δ-strong connections is presented in (c). Algorithm 2 Single-level sparsification: Sparsify(G) 1: Input: Sparsification parameter e, Graph G 2: Output: Sparsified graph Gsparse 3: Gsparse ← empty graph 4: ComputeAlgebraicDistances(G) 5: for i ∈ V do 6: Sort Ni by δij in ascending (or descending) order Add top de i edges to Gsparse 7: 8: end for 9: return Gsparse It is also possible to partially preserve both global and local structures with a slight change in the algorithm, namely, by distributing the algebraic distances into bins, and sampling the edges from all bins. In order, to distribute the algebraic distances into bins, we define the bin width , and the number of bins k = (max δij − min δij)/h, where σ is the standard deviation of h = 3.5∗σ algebraic distances. 3√ di Algorithm 3 Single-level sparsification with binning: SparsifyB(G) 1: Input: Sparsification parameter e, Graph G 2: Output: Sparsified graph Gsparse 3: Gsparse ← empty graph 4: ComputeAlgebraicDistances(G) 5: for i ∈ V do 6: Distribute Ni into bins, each bin corresponds to edges ... Randomly select bins and edges up to de i to Gsparse 7: 8: end for 9: return Gsparse 6 5 Multilevel sparsification The multilevel approach [6, 42] can be applied as a general framework for many different numerical methods. Most real-world instances are not completely random, i.e., a particular similarity or dependence between variables exists and, thus, can partially be detected to reduce their number in complex computations. Here we introduce and advocate the use of multilevel approach as a general purpose framework for network sparsification. In the heart of the proposed method lies an idea to sparsify the network at multiple scales of coarseness which, in contrast to most existing sparsification methods that sample single edges, will allow to sample clusters of edges of different sizes and δ-weakness. It is known that the topology of many complex networks is hierarchical (or multiscale) and, thus, often might be self-dissimilar across scales [17, 44, 5, 26]. In such hierarchical representations, groups of nodes are aggregated into communities, which automatically bundles edges into coarse connections. Bundling the edges at different scales of coarseness will introduce different levels of δ-weakness for such coarse connections which may or may not be required to be sparsified for the required analysis. For example, in the analysis of a social network, we may want to visualize only a certain type of edges that connect dense communities of small sizes, while connections between large communities and local inner connections are out of the scope. In the proposed framework, this can be achieved by creating a hierarchy of coarse representations, and sparsifying at those levels that do not correspond to the desired communities. To create a multilevel framework we use the algebraic multigrid (AMG) aggregation strategy that was introduced in [31]. For simplicity, we do not split fine nodes across the aggregates (like in some optimization problems [31, 32]) but instead cover the graph with star-like structures and coarsen them. For the completeness of paper we briefly repeat the main components of the coarsening algorithm. Given an original graph G, in the multilevel framework we recursively construct a hierarchy of decreasing size coarse graphs G0 = G, G1, ..., Gl. The original graph is gradually coarsened into the smaller graphs until the small enough graph Gl is reached. The sparsification algorithm is then run on the coarsest level and the results (i.e., edges to eliminate for sparsification) are inherited by the finer graph and the uncoarsening continues until G0 is reached. In most cases, our discussion is focused on fine-to-coarse and coarse-to-fine transformations of graphs and solutions, respectively. For this purpose, we denote the fine and coarse level graphs by Gf = (Vf , Ef ), and Gc = (Vc, Ec), respectively. At each level, after sparsifying edges inherited from Gc, Algorithm 1 is applied to recompute algebraic distance on Gf . The Coarsening We begin with selecting a dominating set of seed nodes C ⊂ Vf that will serve as centers of future coarse nodes in Vc. Setting initially F = Vf and C = ∅, the selection is done by traversal of F and moving to C such nodes that are not strongly coupled to those that are already in C. At each step F ∪ C = Vf is preserved, and at the end the size of Vc is known, namely, Vc = C. After C is selected, nodes in F = V \ C are distributed to their aggregates according to the restriction operator P ∈ {0, 1}Vf×C, where (cid:19) δij(cid:80) k∈C δik (2)  1 1 0 PiJ = (cid:18) if i ∈ F, J = Ic argmaxj∈C if i ∈ C, J = Ic(i) otherwise, 7 Algorithm 4 Multilevel sparsification of graph: MLSparsify 1: Input: fine graph Gf = (Vf , Ef ), vector of sparsification ratios 2: Output: sparse graph Gs 3: function ML(Gf ) 4: f = (Vf , Es f ) 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: end function 17: return Gs f ComputeAlgDist(Gf ) if Vf is small enough then f ← SparsifyB(Gf ) Es else createSeeds(Gf ) Compute P Gc ← (Lc = P T Lf P ) c ← MLSparsify(Gc) Gs f ← Uncoarsen(Gs Gs c) ComputeAlgDist(Gs f ) f ← SparsifyB(Gs Gs f ) end if (cid:46) Sparsify coarse edges (cid:46) Coarsening: seeds (cid:46) Coarsening: restriction operator (cid:46) Coarsening: coarse graph (cid:46) Recursive call to sparsify the next coarser level (cid:46) Sparsification of edges inherited from coarse level (cid:46) Algebraic distances are recomputed (cid:46) Sparsification of current level edges and Ic(j) returns an index of coarse node J that corresponds to j ∈ C. Then, the Galerkin coarsening creates a coarse graph Laplacian Lc = P T Lf P , where Lf is the Laplacian of Gf . Coarsest Level At the coarsest level, we sparsify the edges by using the single-level Algorithm (3). These edges correspond to bundles of edge chains at the fine levels that connect the most distant regions in a graph, so if the goal is to preserve the global structure, the user should avoid of sparsification at deep coarse levels. Uncoarsening We initialize the solution (sparsification) of Gf by uncoarsening the edges sparsi- fied in Gc. When the order of interpolation in the multilevel algorithm equals 1 (i.e., there is only one non-zero entry per row in P , see Eq. 2), each coarse edge IJ ∈ Ec can bundle at most two types of edges in Ef , namely, at most one edge that connect two seeds I−1 (J), and possibly multiple edges pq ∈ Ef such that PpI−1 (J) = 1. If IJ is sparsified at the coarse level, then edges of both types are sparsified at the fine level. After initialization of the fine level, we recompute algebraic distances to update the information about connectivity in the sparsified fine graph, and, then, more edges may or may not be sparsified at the fine level depending on the parameter settings. Full multilevel cycle is presented in Algorithm 4. Example of full multilevel cycle on a Facebook network (see fb-uf in Table 1) is shown in Figure 2. (I) = 1, and PqI−1 (I) and I−1 c c c c 6 Computational Results Implementation and Evaluation We provide C++ implementation for both the single- and multilevel algorithms in [18]. For the comparison of original and sparsified networks, we employed methods implemented in NetworKit [39]. We experimented with varying degrees of sparsification, taking values of e ranging from 0.1 to 0.9 (see Section 4). All numerical properties for the comparison 8 Figure 2: Complete Sparsification V-Cycle are the averages over 10 runs with different random seeds for each parameter setting. The following parameter were used in computation of algebraic distance: R = 10, k = 40, and α = 0.5. Their robustness is discussed in [9]. In addition, for the single-level algorithm (3), we provide two sets of results for each graph, namely, with and without the normalization (see last step in Algorithm 1) of algebraic distance. In each case we experimented with sparsification of weak edges, strong edges and mixture of both. In the multilevel algorithm (4), we experimented with sparsifying at the coarsest, middle and the finest levels. In our experiments, we split the number of levels in the multilevel algorithm into 3 equal segments, and choose a parameter, level-span which determine how many levels in each segment gets sparsified. We then sparsify one segment at a time and observe the corresponding network properties. For example, for a graph with 6 levels, with a level-span of 2, to sparsify the coarsest levels only we use the following parameter configuration: (0.3, 0.3,−1,−1,−1,−1), where a setting of −1 indicates no sparsification occurs at this level. Similarly, the middle and finest levels can be sparsified using (−1,−1, 0.3, 0.3,−1,−1), and (−1,−1,−1,−1, 0.3, 0.3) configuration settings respectively. However, in our implementation, users can specify any combination of settings for different levels. The sparisification ratio (ratio of number edges in the sparse graph to the number of edges in the original graph), is kept between 20% to 40% for each stage in order to make the results comparable. For the purpose of our study, we maintain a level span of 3. Datasets We experiment with 18 real-world networks (see Table 1), which for the purpose of our study we grouped into two groups of social networks, one group of citation networks (CIT) and one group of biological networks (BIO). We split the social networks into 2 groups (SN1, and SN2) - one consisting of Facebook networks, Livejournal and Google+ (general purpose social networks), and the other consisting other consisting of Flickr, Buzznet, Foursquare, Catster, Blogcatalog and Livemocha. The graphs were retrieved from the NetworkRepository [30], the Koblenz [20], and the SNAP [22] collections. The size of the networks range between 1 million to 34 million edges. 9 CoarseningUncoarseningLevel 0Level 1Level d Level d-1 Level d-2 . . .Original networkSparsified network Table 1: Benchmark graphs Group Social Networks 1 (SN1) Biological Networks (BIO) Social Networks 2 (SN2) Citation Networks (CIT) Graph fb-indiana fb-texas84 fb-uf fb-penn94 livejournal google-plus human-gene1 human-gene2 Mouse flickr buzznet foursquare catster blogcatalog livemocha ca-cit-Hepth cit-patent codblp V 29.7K 36.4K 35.1K 41.5K E 1.3M 1,6M 1.5M 14M 27.9M 107.6K 12.2M 12M 9M 4M 22K 14K 14.5M 43K 105K 2.3M 101.2K 2.8M 639K 3.2M 149.7K 5.4M 88.8K 2.1M 104.1K 2.2M 22.9K 2.6M 3.7M 16.5M 540.5K 15.2M min deg. max deg. avg degree 1 1 1 1 1 1 1 1 1 7 1 1 1 1 1 1 1 1 1.4K 6.3K 8.2K 4.4K 2.7K 20.1K 7.9K 7.2K 8K 5.4K 64.3K 106.2 80.6K 9.4K 3K 11.9K 793 3.3K 87 87 83 65 13 227.4 1.1K 1.3K 670 43.7 54 10 72 47 42 233.38 8.75 56 Methods of Comparison We studied various levels of sparsification while comparing the follow- ing properties of the sparse graph Gs, to those in the original graph Go. The single value properties are: (a) Diameter - We measure the ratio of the diameter in Go to the new diameter in Gs (in plots "orig diameter/diameter"); (b) Number of connected components - we measure the ra- tio of the number of connected components in Gs to that in Go (in plots "comp/orig comp"); (c) Modularity - we measure the ratio of modularity in Gs to that of Go (in plots "mod/orig mod", Networkit [39] provides an implementation of the Louvain method). Certain network properties are represented better by their distributions over the nodes. In order to accurately compare the dis- tributions, we use the Spearman rank correlation coefficient. This effectively, reveals how different the sparse graph is from the original in the context of these properties where a correlation value of 1 means they are perfectly correlated and correlation value of 0 means no correlation. The follow- ing distributions are compared using the Spearman rank: (a) Node betweeenness centrality; (b) PageRank centrality; (c) Degree distribution; and (d) Clustering coefficient distribution (ci). The method changes slightly in comparing node betweenness centrality. Considering that the cost of computing betweenness for large graphs is very expensive, we make use of an approximate method provided by Networkit. However, to ensure accuracy we compute this 10 times and take average of the positional rankings and then compute the Spearman rank correlation. 6.1 Single-level Algorithm The single-level algorithm was tested with both unnormalized and normalized algebraic distances. The results for unnormalized algebraic distance are presented in Figures 3, 4, 5, and 6 for groups SN1, SN2, CIT, and BIO, respectively. (The results for the normalized algebraic distance can be found in Appendix A.) In each figure, 3 columns, and 7 rows of plots are presented. In all 4 figures: (a) each column corresponds to the type of filtering, i.e., to the types of edges that retain after sparsification; (b) each row corresponds to the type of comparison. Each plot contains several colored curves that correspond to the respective graphs (see vertical legend). One point 10 in each curve corresponds to an average of the measured comparison method over 10 runs for the corresponding edge ratio in each. The x- and y-axes correspond to the sparsification ratio and method of comparison, respectively. In the y-axis of betweenness, PageRank, degree, and clustering coefficient distribution centralities, the Spearman rank is denoted by ρ. For example, we examine the behavior of the degrees in social network Google+ in SN1 when δ-strong edges retain after sparsification. In Figure 3, we find a row "Degree centrality" (row 3). The results for retaining δ-strong edges are found in the third column. The black curve corresponds to Google+, where each point is an average of 10 runs. Note: Most curves do not reach a visible zero of the x-axis. This is because the sparsification is interrupted when the number of edges becomes less than the number of nodes. δ-weak edges Plots labelled as δ-weak (column 1) are results obtained by retaining only weak edges, when δ-weak edges are preferred during sparsification (i.e, δ-strong edges are deleted). In this type of sparsification, we expect that sparsification of the local structure will mostly dominate the sparsification of the global structure. Indeed, we observe that properties (such as the betweenness centrality, diameter, and the number of components) that heavily depend on usually limited number of long-range weak connections are well preserved. δ-strong Plots labelled as δ-strong (column 3) are results obtained by retaining δ-strong edges and removing δ-weak edges. By preferring δ-strong edges during sparsification, we attempt to preserve properties that depends on the local structure of the graph. Such properties as clustering coefficient, pagerank and degree centrality survive sparsification better when this method is used. In particular, we can observe that the clustering coefficient (which is in many cases the reason for a strong community structure) is preserved at the level of ≈ 75% in SN1 when 70% of edges are removed (instead of ≈ 40% for δ-weak sparsification). A similar phenomena is observed in BIO. It is interesting to note that in SN2, in comparison to the δ-weak sparsification, the changes in the clustering coefficient are not significant. Mixture sparsification In plots labelled as mixed, we maintain a balance between the δ-weak and δ-strong types of sparsification by preferring ensuring that both are sparsified. For such prop- erties as the betweenness centrality, PageRank and degree centrality, the results are better for up to 20% sparsification ratio when compared to selecting either weak or strong edges. For such prop- erties as the clustering coefficient, modularity, diameter and connected components, retaining both weak and strong edges provides results that is in between that produced by weak or strong edges sparsification. 11 δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u l C t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 3: Social Networks 1 12 fb-indianafb-uffb-texas84fb-penn94gpluslj0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9800.9850.9900.9951.0001.005ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0Origdiameter/diameter0.20.40.60.81.0Edgeratio020406080100120comp/origcomp0.20.40.60.81.0Edgeratio0200400600800100012001400comp/origcomp0.20.40.60.81.0Edgeratio05000100001500020000250003000035000comp/origcomp0.20.40.60.81.0Edgeratio0.70.80.91.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.900.920.940.960.981.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 4: Social Networks 2 13 flickrfoursquarecatsterbuzznetblogcataloglivemocha0.20.40.60.81.0Edgeratio0.9960.9981.000ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.9970.9980.9991.000ρ0.20.40.60.81.0Edgeratio0.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.30.40.50.60.70.80.91.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio1.001.021.041.061.081.101.12comp/origcomp0.20.30.40.50.60.70.80.91.0Edgeratio1.001.051.101.151.20comp/origcomp0.20.40.60.81.0Edgeratio020040060080010001200comp/origcomp0.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.30.40.50.60.70.80.91.0Edgeratio1.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.42.6mod/origmod0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 5: Citation Networks 14 ca-cit-Hepthcodblpcit-patent0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.960.970.980.991.00ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio050100150200250300350comp/origcomp0.20.40.60.81.0Edgeratio0102030405060708090comp/origcomp0.20.40.60.81.0Edgeratio02000400060008000100001200014000comp/origcomp0.20.40.60.81.0Edgeratio0.81.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.61.7mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 6: Biological Networks 15 human1human2mouse0.00.20.40.60.81.0Edgeratio0.980.991.00ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.00.20.40.60.81.0Edgeratio0.950.960.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.950.960.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio0.70.80.91.0ρ0.00.20.40.60.81.0Edgeratio0.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.00.20.40.60.81.0Edgeratio1.001.011.021.031.041.05comp/origcomp0.20.40.60.81.0Edgeratio1.0001.0051.0101.0151.0201.025comp/origcomp0.00.20.40.60.81.0Edgeratio1.001.051.101.151.201.25comp/origcomp0.00.20.40.60.81.0Edgeratio0.81.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.00.20.40.60.81.0Edgeratio1.01.52.02.53.0mod/origmod0.00.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.70.80.91.0ρ Comparing with Local Degree In the introduction, we mentioned the Local Degree method (LD) [24] which favors the retention of edges participating in hubs (nodes with high degree). In order to compare our method to LD, we ran the single level algorithm for retaining weak edges, strong edges and a mixture of both on the Google+ graph (google-plus in Table 1). Same set of network properties discussed earlier in this section were used for comparison. For betweenness centrality, degree centrality, local clustering coefficient and PageRank, we plot the Spearman rank correlation against the edge ratio. Figure 7 shows the plots of δ-weak, δ-strong, mixed and local degree(LD) for each property. The results are similar for betweenness centrality, degree centrality and PageRank. However, for such properties as modularity and clustering coefficient, the algebraic distance performs better than LD especially when sparsification is aggressive. The δ-weak sparsifi- cation preserves the diameter slightly bettern than LD while the δ-strong method did not perform well on it and on the number of components. We note that the LD method was comprehensively studied on the Facebook networks only. Four Facebook networks in SN1 demonstrate similar per- formance with both methods. The Google+ network has exceptionally high clustering coefficient (0.52 vs. 0.23 in Facebook networks) and smaller diameter (6 vs. 8 in Facebook networks) which are more difficult to preserve if the method does not distinguish between local- and global-range connections. Betweenness Centrality Clustering Coefficient Distribution Degree Centrality Diameter Connected Components Modularity PageRank Figure 7: Comparison of LD and single-level algebraic distance methods. 16 WeakMixedStrongLD0.20.40.60.81.0Edgeratio0.9940.9950.9960.9970.9980.9991.000⇢0.20.40.60.81.0Edgeratio0.20.00.20.40.60.81.0⇢0.20.40.60.81.0Edgeratio0.860.880.900.920.940.960.981.00⇢0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio12345678comp/origcomp0.20.40.60.81.0Edgeratio0.40.50.60.70.80.91.0mod/origmod0.20.40.60.81.0Edgeratio0.800.850.900.951.00⇢ 6.2 Multi-Level Results The purpose of the multilevel approach is to extend the general sparsification framework to enable highly controllable sparsification of bundles of edges at multiple coarse-grained resolutions. Similar to the single-level experiments, we group the networks into 4 groups. Tables 2, 3, 4, and 5 show the results of the multilevel algorithm for sets SN1, SN2, BIO and CIT, respectively. The 4 major column sections in the aforementioned tables consists of the graph name, the levels' configuration for which sparsifcation is tested, the number of edges at each setting, and the network properties that we study. The properties column consist of the following properties: a) CC - clustering coefficient b) D - Diameter of the graph, c) Q - Modularity of the graph, d) Γ - the number of components in the network, e) BCρ - Spearman rank correlation for betweenness centrality, f) P Rρ - Spearman rank correlation of Pagerank, g) DCρ - Spearman rank correlation of degree centrality, and h) CCρ - Spearman rank correlation of the clustering coefficient. Correlation here represents the correlation between the original graph and the sparse graph. The "Level" column contains the sparsification settings at different levels, where G0 represents the original graph, G1 is the graph with sparsification only at the coarsest levels, G2 is the graph with sparsification only at the middle levels and G3 represents the graph with sparsification at the fine levels. In order to keep the results comparable, we keep the sparsification ratio between 20% to 40%. The sparsification parameter is obtained by a binary search fitting algorithm. Note that we do not compare the sparse graphs (G1, G2, G3) to themselves but only with the fine graph G0. The parameter setting of a coarsening was similar to one described in [28] with interpolation order 1. Graph Name Level flickr buzznet foursquare catster blog-catalog livemocha G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 E CC 2.3M 0.09 921.0K 0.15 496.1K 0.12 634.9K 0.04 2.8M 0.25 713.8K 0.26 919.3K 0.21 666.6K 0.1 0.22 3.2M 1.1M 0.17 765.9K 0.19 0.04 1.1M 5.4M 0.41 0.31 1.3M 0.26 1.7M 0.27 1.5M 2.1M 0.46 423.9K 0.41 570.8K 0.26 566.1K 0.18 2.2M 0.06 636.9K 0.04 869.1K 0.04 556.7K 0.02 D 9.0 35.0 18.0 25.0 5.0 11.0 18.0 16.0 4.0 36.0 47.0 14.0 10.0 15.0 11.0 14.0 9.0 14.0 11.0 12.0 6.0 12.0 10.0 11.0 Q 0.67 0.91 0.84 0.55 0.31 0.5 0.3 0.29 0.41 0.94 0.94 0.57 0.39 0.69 0.37 0.29 0.32 0.67 0.27 0.23 0.36 0.45 0.29 0.29 Properties BCρ Γ 1.0 83 1.0 144 1.0 134 1.0 5.8K 1.0 1 1.0 1 1.0 12 1.0 239 1.0 1 1.0 18 366 1.0 10.0K 1.0 281 1.0 1.0 293 1.0 360 1.0 1.1K 1 1.0 1.0 1 1.0 9 1.0 391 1.0 1 3 1.0 1.0 8 1.4K 1.0 P Rρ DCρ CCρ 1.0 0.6 0.71 0.64 1.0 0.82 0.83 0.75 1.0 0.74 0.49 0.36 1.0 0.59 0.86 0.76 1.0 0.81 0.85 0.7 1.0 0.89 0.9 0.77 1.0 0.62 0.73 0.77 1.0 0.91 0.94 0.89 1.0 0.88 0.78 0.74 1.0 0.59 0.87 0.84 1.0 0.87 0.89 0.83 1.0 0.91 0.91 0.88 1.0 0.78 0.8 0.74 1.0 0.6 0.6 0.28 1.0 0.87 0.79 0.73 1.0 0.39 0.63 0.4 1.0 0.47 0.44 0.29 1.0 0.48 0.49 0.38 Table 3: Multiscale results for social networks 2(SN2) graphs 17 Graph Name Level fb-indiana fb-texas84 fb-uf fb-penn94 livejournal gplus G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 E 0.2 CC D 1.3M 0.21 361.4K 0.31 349.8K 0.14 402.7K 0.04 1.6M 374.7K 0.29 574.8K 0.13 521.9K 0.05 1.5M 0.22 423.4K 0.24 425.1K 0.16 418.9K 0.05 1.4M 0.22 351.7K 0.33 463.4K 0.16 365.6K 0.04 34.7M 0.35 13.6M 0.47 13.4M 0.39 8.2M 0.02 12.2M 0.52 0.54 3.6M 3.0M 0.42 0.15 3.3M 8.0 13.0 10.0 12.0 7.0 16.0 9.0 12.0 8.0 12.0 11.0 11.0 8.0 16.0 11.0 14.0 21.0 72.0 42.0 30.0 6.0 14.0 12.0 19.0 Properties BCρ P Rρ DCρ CCρ Γ 1.0 1 1.0 18 0.99 8 0.99 37 1.0 1 1.0 16 0.99 5 1.0 29 1.0 1 0.99 3 1.0 15 1.0 57 1.0 1 1.0 16 1.0 23 1.0 122 1.0 1 1.0 1.7K 1.0 7.1K 316.9K 1.0 1.0 1 1.0 15 18 1.0 1.0 905 1.0 0.64 0.57 0.03 1.0 0.57 0.66 0.08 1.0 0.58 0.6 -0.01 1.0 0.57 0.6 -0.09 1.0 0.75 0.76 0.37 1.0 0.59 0.57 -0.26 1.0 0.84 0.89 0.93 1.0 0.86 0.94 0.94 1.0 0.88 0.9 0.92 1.0 0.85 0.89 0.89 1.0 0.85 0.91 0.67 1.0 0.91 0.9 0.79 1.0 0.83 0.89 0.95 1.0 0.82 0.94 0.96 1.0 0.88 0.9 0.95 1.0 0.8 0.9 0.92 1.0 0.81 0.87 0.73 1.0 0.9 0.88 0.88 Q 0.45 0.93 0.34 0.3 0.38 0.92 0.31 0.24 0.44 0.61 0.37 0.27 0.48 0.95 0.38 0.3 0.75 1.0 0.8 0.72 0.47 0.89 0.38 0.26 Table 2: Multiscale results for social networks 1 (SN1) graphs Graph Name Level bio-human-gene1 bio-human-gene2 bio-mouse-gene G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 E CC 12.3M 0.63 0.66 2.8M 0.33 4.0M 0.06 3.9M 9.0M 0.66 0.67 2.4M 0.64 3.1M 2.5M 0.62 14.5M 0.53 4.6M 4.1M 4.1M 0.6 0.28 0.06 D 8.0 18.0 9.0 11.0 7.0 7.0 26.0 39.0 12.0 21.0 13.0 14.0 Q 0.38 0.8 0.39 0.33 0.31 0.74 0.52 0.42 0.62 0.89 0.56 0.52 Properties Γ 17 19 22 78 2 15 14 66 97 105 132 400 BCρ 1.0 0.99 0.99 0.99 1.0 1.0 0.98 0.93 1.0 0.99 1.0 1.0 P Rρ DCρ CCρ 1.0 0.9 0.91 0.89 1.0 0.87 0.87 0.88 1.0 0.94 0.93 0.91 1.0 0.74 0.71 0.21 1.0 0.74 0.74 0.64 1.0 0.72 0.65 0.08 1.0 0.95 0.91 0.93 1.0 0.86 0.88 0.87 1.0 0.95 0.94 0.95 Table 4: Multiscale results for biological (BIO) networks 18 Graph Name Level E ca-cit-Hepth cit-patent codblp G0 G1 G2 G3 G0 G1 G2 G3 G0 G1 G2 G3 CC 0.61 2.4M 487.5K 0.7 875.3K 0.49 722.2K 0.21 16.5M 0.09 0.16 5.8M 3.4M 0.13 5.0M 0.01 15.2M 0.82 0.91 5.3M 3.4M 0.81 0.5 4.7M D 9.0 18.0 13.0 16.0 26.0 61.0 57.0 39.0 23.0 30.0 32.0 29.0 Q 0.41 0.93 0.37 0.25 0.81 0.93 0.97 0.84 0.84 0.98 0.97 0.84 Properties BCρ Γ 1.0 74 0.99 86 0.99 111 0.99 279 1.0 3.6K 43.8K 1.0 631.4K 1.0 235.5K 1.0 1.0 1 1.0 20.1K 44.3K 1.0 1.0 29.1K P Rρ DCρ CCρ 1.0 0.84 0.91 0.83 1.0 0.79 0.58 0.68 1.0 0.55 0.27 0.51 1.0 0.75 0.81 -0.04 1.0 0.73 0.59 0.54 1.0 0.68 0.62 0.38 1.0 0.84 0.94 0.95 1.0 0.78 0.64 0.74 1.0 0.78 0.63 0.82 Table 5: Multiscale results for citation (CIT) networks 6.3 Running time Figures 8(a-b) show the running time of both single- and multi-level algorithms for varying spar- sification ratios. Each point in the plot represents the number of edges in the graph versus the runtime in seconds averaged over three runs. The coefficient of determination, R2, shows how well the regression line fits the model. An R2 of 0 indicates the line does not fit the data and an R2 of 1 indicates the line perfectly fits the data. The results show that both algorithms scales linearly with the number of edges in the graph. As mentioned earlier, this is important as it defeats the purpose of sparsification if the algorithm is slow. The experiments were performed in a Linux environment on a multicore compute server with 64 Intel Xeon cores and 64 GB of memory. a) Single-level b) Multi-level Figure 8: Running time of sparsification. 19 0100200300400500600Averageruntime0.00.51.01.52.02.53.03.54.0NumberofEdges×107R2=0.96020040060080010001200Averageruntime0.00.51.01.52.02.53.03.54.0NumberofEdges×107R2=0.98 6.4 Parallelization Parallelization of the single-level algorithm does not require redesigning it. There are two compu- tationally intensive parts of our method that gain from parallelization. One is the computation of the algebraic distance and the other the deletion of edges. Because of the implicitly parallel nature of the Jacobi over-relaxation, we are able to parallelize it by using OpenMP's shared data, multiple thread model. Since vector updates are independent, this method is highly efficient, creating speed gains of more than 50% with only 8 threads as seen in Figure 9. Figure 9 shows the benchmark results of parallelizing the algebraic distance computation where y-axis represents the average run- time averaged over 3 runs and x-axis represents the number of threads. We tested with number of threads ranging from 1 to 64 on 4 networks, namely, fb-uf, human-gene1, cit-patent, and catster. The experiments were performed in a Linux environment on a multicore compute server with 64 Intel Xeon cores and 64 GB of memory. Figure 9: Running time in shared memory model. 7 Conclusions In this study we introduced single- and multi-level methods of network sparsification by algebraic distance. While many sparsification methods exist, most of them target certain properties without distinguishing short- and long-range connections that is the main goal of our method. We showed that by enabling different filtering capabilities, sparsification can be tuned to preserve either global or local structure or a combination of both. In addition to preserving a host of graph properties, we believe that the development of the multilevel sparsification framework can serve as a foundation for future work in that direction in which a variety of sparsification criteria (such as the algebraic distance) can be incorporated into it. 20 102030405060NumberofThreads46810121416AverageRuntimefb-uf102030405060NumberofThreads50100150200250300350AverageRuntimecit-patent102030405060NumberofThreads30405060708090100110AverageRuntimehuman-gene1102030405060NumberofThreads152025303540455055AverageRuntimecatster A Normalized Sparsification We experimented with the single-level algorithm that employ normalized algebraic distances (see line 15 of Algorithm 1). The purpose of this normalization is to decrease the strength of connection expressed in the algebraic distance between hubs. The normalization results show that normalizing the algebraic distance further improves properties that are sensitive to the existence of weak edges. Example are diameter and connected components. As seen in the plots for diameter (see δ-weak column in Figures 10, 11, 12, and 13), the minimum edge ratio before the diameter deteriorates is further improved. Similarly for the number of components the number of components for the smallest sparse graph is reduced and some case kept constant as seen in δ-weak column in Figures 10, 11, 12, and 13). Such properties as local clustering coefficient, degree centrality, and PageRank that do not depend on global edges are relatively unaffected. 21 δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 10: Social Networks 1 22 fb-indianafb-uffb-texas84fb-penn94gpluslj0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9850.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.50.60.70.80.91.01.1Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio1.01.52.02.53.03.54.04.55.05.5comp/origcomp0.20.40.60.81.0Edgeratio0500100015002000comp/origcomp0.20.40.60.81.0Edgeratio05000100001500020000250003000035000comp/origcomp0.20.40.60.81.0Edgeratio0.60.70.80.91.01.11.21.31.41.5mod/origmod0.20.40.60.81.0Edgeratio1.01.11.21.31.41.51.6mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.0mod/origmod0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 11: Social Networks 2 23 flickrfoursquarecatsterbuzznetblogcataloglivemocha0.20.40.60.81.0Edgeratio0.9970.9980.9991.000ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.9970.9980.9991.000ρ0.20.40.60.81.0Edgeratio0.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.750.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.550.600.650.700.750.800.850.900.951.00Origdiameter/diameter0.20.30.40.50.60.70.80.91.0Edgeratio0.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio0.940.960.981.001.021.041.06comp/origcomp0.20.30.40.50.60.70.80.91.0Edgeratio1.01.11.21.31.41.51.61.71.81.9comp/origcomp0.20.40.60.81.0Edgeratio02004006008001000comp/origcomp0.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.30.40.50.60.70.80.91.0Edgeratio1.01.21.41.61.8mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.30.40.50.60.70.80.91.0Edgeratio0.750.800.850.900.951.00ρ0.20.40.60.81.0Edgeratio0.40.60.81.01.2ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 12: Citation Networks 24 ca-cit-Hepthcodblpcit-patent0.20.40.60.81.0Edgeratio0.9920.9940.9960.9981.000ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.20.40.60.81.0Edgeratio0.980.991.00ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.820.840.860.880.900.920.940.960.981.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.10.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.20.40.60.81.0Edgeratio051015202530354045comp/origcomp0.20.40.60.81.0Edgeratio020406080100120comp/origcomp0.20.40.60.81.0Edgeratio020004000600080001000012000comp/origcomp0.20.40.60.81.0Edgeratio0.81.01.21.41.6mod/origmod0.20.40.60.81.0Edgeratio0.91.01.11.21.31.41.51.61.7mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio−0.50.00.51.0ρ δ-weak Mixture δ-strong s s e n n e e w t e B y t i l a r t n e C g n i r e t s u C l t n e i c ffi e o C n o i t u b i r t s i D y t i l a r t n e C e e r g e D r e t e m a i D s t n e n o p m o C y t i r a l u d o M k n a r e g a P Figure 13: Biological Networks 25 human1human2mouse0.00.20.40.60.81.0Edgeratio0.9800.9850.9900.9951.0001.005ρ0.20.40.60.81.0Edgeratio0.9900.9951.000ρ0.00.20.40.60.81.0Edgeratio0.970.980.991.00ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ0.00.20.40.60.81.0Edgeratio−0.50.00.51.0ρ0.00.20.40.60.81.0Edgeratio0.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.20.40.60.81.01.2ρ0.00.20.40.60.81.0Edgeratio0.700.750.800.850.900.951.00Origdiameter/diameter0.20.40.60.81.0Edgeratio0.750.800.850.900.951.001.05Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.20.30.40.50.60.70.80.91.0Origdiameter/diameter0.00.20.40.60.81.0Edgeratio0.940.960.981.001.021.041.06comp/origcomp0.20.40.60.81.0Edgeratio1.0001.0051.0101.0151.0201.0251.0301.035comp/origcomp0.00.20.40.60.81.0Edgeratio1.001.051.101.151.201.251.30comp/origcomp0.00.20.40.60.81.0Edgeratio0.60.81.01.21.41.61.82.02.2mod/origmod0.20.40.60.81.0Edgeratio1.01.21.41.61.82.02.22.4mod/origmod0.00.20.40.60.81.0Edgeratio1.01.52.02.53.0mod/origmod0.00.20.40.60.81.0Edgeratio0.50.60.70.80.91.0ρ0.20.40.60.81.0Edgeratio0.900.920.940.960.981.00ρ0.00.20.40.60.81.0Edgeratio0.00.20.40.60.81.0ρ References [1] Nesreen K. Ahmed, Jennifer Neville, and Ramana Kompella. Network sampling: From static to streaming graphs. ACM Trans. Knowl. Discov. Data, 8(2):7:1 -- 7:56, jun 2013. [2] David Auber. Tulipa huge graph visualization framework. In Graph Drawing Software, pages 105 -- 126. Springer, 2004. [3] David A Bader, Shiva Kintali, Kamesh Madduri, and Milena Mihail. Approximating between- ness centrality. In Algorithms and Models for the Web-Graph, pages 124 -- 137. Springer, 2007. [4] Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy, et al. Gephi: an open source software for exploring and manipulating networks. ICWSM, 8:361 -- 362, 2009. [5] P. M. Binder. Frustration in complexity. Science, 322:323, 2008. [6] A. Brandt and D. Ron. Chapter 1 : Multigrid solvers and multilevel optimization strategies. In J. Cong and J. R. Shinnerl, editors, Multilevel Optimization and VLSICAD. Kluwer, 2003. [7] Achi Brandt, James J. Brannick, Karsten Kahl, and Irene Livshits. Bootstrap AMG. SIAM J. Scientific Computing, 33(2):612 -- 632, 2011. [8] Pavel Chebotarev and Elena Shamis. On proximity measures for graph vertices. arXiv preprint math/0602073, 2006. [9] Jie Chen and Ilya Safro. Algebraic distance on graphs. SIAM Journal on Scientific Computing, 33(6):3468 -- 3490, 2011. [10] Fan Chung, Wenbo Zhao, and Mark Kempton. Ranking and sparsifying a connection graph. Internet Mathematics, 10(1-2):87 -- 115, 2014. [11] Wouter De Nooy, Andrej Mrvar, and Vladimir Batagelj. Exploratory social network analysis with Pajek, volume 27. Cambridge University Press, 2011. [12] Leo A Goodman. Snowball sampling. The annals of mathematical statistics, pages 148 -- 170, 1961. [13] Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynam- ics, and function using NetworkX. In Proceedings of the 7th Python in Science Conference (SciPy2008), pages 11 -- 15, Pasadena, CA USA, August 2008. [14] M. S. Handcock and K. J. Gile. On the Concept of Snowball Sampling. ArXiv e-prints, 2011. [15] Pili Hu and Wing Cheong Lau. A survey and taxonomy of graph sampling. CoRR, abs/1308.5865, 2013. [16] Yifan Hu. Efficient, high-quality force-directed graph drawing. Mathematica Journal, 10(1):37 -- 71, 2005. [17] S. Itzkovitz, R. Levitt, N. Kashtan, R. Milo, M. Itzkovitz, and U. Alon. Coarse-graining and self-dissimilarity of complex networks. Physical Review E, 71(1):016127, 2005. 26 [18] Emmanuel John and Ilya Safro. Network sparsification by algebraic distance. https: //github.com/emmanuj/ml-sparsifier, 2015 -- 2016. [19] Risi Imre Kondor and John Lafferty. Diffusion kernels on graphs and other discrete structures. In Proceedings of the 19th international conference on machine learning, pages 315 -- 322, 2002. [20] J´erome Kunegis. Konect: The koblenz network collection. In Proceedings of the 22Nd Inter- national Conference on World Wide Web, WWW '13 Companion, pages 1343 -- 1350, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering Committee. [21] Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almquist, Carter T. Butts, and Athina Markopoulou. Coarse-grained topology estimation via graph sampling. CoRR, abs/1105.5488, 2011. [22] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [23] Jure Leskovec and Rok Sosic. SNAP: A general purpose network analysis and graph mining library in C++. http://snap.stanford.edu/snap, June 2014. [24] Gerd Lindner, Christian L. Staudt, Michael Hamann, Henning Meyerhenke, and Dorothea Wagner. Structure-preserving sparsification of social networks. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ASONAM '15, pages 448 -- 454, New York, NY, USA, 2015. ACM. [25] Oren E Livne and Achi Brandt. Lean algebraic multigrid (lamg): Fast graph laplacian linear solver. SIAM Journal on Scientific Computing, 34(4):B499 -- B522, 2012. [26] Enys Mones, Lilla Vicsek, and Tamas Vicsek. Hierarchy measure for complex networks. PLoS ONE, 7(3):e33799, 03 2012. [27] M. E. J. Newman. Networks, An Introduction. Oxford University Press, 2010. [28] Dorit Ron, Ilya Safro, and Achi Brandt. Relaxation-based coarsening and multiscale graph organization. Multiscale Modeling & Simulation, 9(1):407 -- 423, 2011. [29] Ryan A. Rossi and Nesreen K. Ahmed. bio-human-gene1 - biological networks, 2013. [30] Ryan A. Rossi and Nesreen K. Ahmed. The network data repository with interactive graph analytics and visualization. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. [31] I. Safro, D. Ron, and A. Brandt. Graph minimum linear arrangement by multilevel weighted edge contractions. Journal of Algorithms, 60(1):24 -- 41, 2006. [32] Ilya Safro, Peter Sanders, and Christian Schulz. Advanced coarsening schemes for graph partitioning. Journal of Experimental Algorithmics (JEA), 19:2 -- 2, 2015. [33] Tanwistha Saha, Huzefa Rangwala, and Carlotta Domeniconi. Sparsification and sampling of networks for collective classification. In Social Computing, Behavioral-Cultural Modeling and Prediction, pages 293 -- 302. Springer, 2013. 27 [34] Matthew J Salganik and Douglas D Heckathorn. Sampling and estimation in hidden popula- tions using respondent-driven sampling. Sociological methodology, 34(1):193 -- 240, 2004. [35] Venu Satuluri, Srinivasan Parthasarathy, and Yiye Ruan. Local graph sparsification for scalable clustering. In Proceedings of the 2011 ACM SIGMOD International Conference on Manage- ment of data, pages 721 -- 732. ACM, 2011. [36] Daniel A Spielman and Nikhil Srivastava. Graph sparsification by effective resistances. SIAM Journal on Computing, 40(6):1913 -- 1926, 2011. [37] Daniel A Spielman and Shang-Hua Teng. Nearly-linear time algorithms for graph partitioning, graph sparsification, and solving linear systems. In Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 81 -- 90. ACM, 2004. [38] Daniel A Spielman and Shang-Hua Teng. Spectral sparsification of graphs. SIAM Journal on Computing, 40(4):981 -- 1025, 2011. [39] Christian Staudt, Aleksejs Sazonovs, and Henning Meyerhenke. Networkit: An interactive tool suite for high-performance network analysis. CoRR, abs/1403.3005, 2014. [40] D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Willinger. Sampling techniques for large, dynamic graphs. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pages 1 -- 6, April 2006. [41] Arthur D Szlam, Mauro Maggioni, and Ronald R Coifman. Regularization on graphs with function-adapted diffusion processes. The Journal of Machine Learning Research, 9:1711 -- 1739, 2008. [42] C. Walshaw. Multilevel refinement for combinatorial optimisation problems. Annals Oper. Res., 131:325 -- 372, 2004. [43] Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, and Xing Li. Understanding graph sampling algorithms for social network analysis. In Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, pages 123 -- 128. IEEE, 2011. [44] D.H. Wolpert and W. Macready. Using self-dissimilarity to quantify complexity. Complexity, 12(3):77 -- 85, 2007. 28
1211.6086
2
1211
2012-12-05T23:12:05
Finding influential users of an online health community: a new metric based on sentiment influence
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
What characterizes influential users in online health communities (OHCs)? We hypothesize that (1) the emotional support received by OHC members can be assessed from their sentiment ex-pressed in online interactions, and (2) such assessments can help to identify influential OHC members. Through text mining and sentiment analysis of users' online interactions, we propose a novel metric that directly measures a user's ability to affect the sentiment of others. Using dataset from an OHC, we demonstrate that this metric is highly effective in identifying influential users. In addition, combining the metric with other traditional measures further improves the identification of influential users. This study can facilitate online community management and advance our understanding of social influence in OHCs.
cs.SI
cs
Working paper Finding influential users of an online health community: a new metric based on sentiment influence Kang Zhao1,2, Greta Greer3, Baojun Qiu2,4, Prasenjit Mitra2, Kenneth Portier3, and John Yen2 1 University of Iowa, S224 PBB, Iowa City, IA [email protected]. 2 College of Information Sciences and Technology, The Pennsylvania State University, University Park, PA 16802. {pmitra, jyen}@ist.psu.edu. 3 American Cancer Society, 250 Williams Street NW, Atlanta, GA, 30303. {greta.greer, ken- neth.portier}@cancer.org. 4 eBay Inc. 2065 Hamilton Ave, San Jose, CA 95125. [email protected]. Abstract What characterizes influential users in online health communities (OHCs)? We hypothesize that (1) the emotional support received by OHC members can be assessed from their sentiment ex- pressed in online interactions, and (2) such assessments can help to identify influential OHC members. Through text mining and sentiment analysis of users’ online interactions, we propose a novel metric that directly measures a user’s ability to affect the sentiment of others. Using da- taset from an OHC, we demonstrate that this metric is highly effective in identifying influential users. In addition, combining the metric with other traditional measures further improves the identification of influential users. This study can facilitate online community management and advance our understanding of social influence in OHCs.  This research is supported by American Cancer Society and the Pennsylvania State University. Kang Zhao and Baojun Qiu conducted part of this research during their doctoral studies at the Pennsylvania State University. 1. Introduction As more and more people use the Internet to satisfy their health-related needs, many of them seek support through participation in an online health community (OHC) where they interact with peers facing similar health problems. According to a study by the Pew Research Center, 80% of adult Internet users in the U.S. use Internet for health-related purposes. Among them, 34% reads about health-related experiences or comments from others (1) and 5% of all Internet users participated in an OHC (2). Obtaining psychosocial support is one of the key benefits of the participation in OHC (3, 4). The effectiveness and proper functioning of these communities may be affected by the presence and activities of influential users (IUs), who provide psychoso- cial supports to other members of the community and have “the power or capacity of causing an effect in indirect or intangible ways” (5). However, an influential user may disappear from an OHC due to his/her health condition (e.g., recurrent cancer), which can present major challenges for the OHC. Hence, the identification of current and emerging influential users can help to im- prove the sustainability of OHCs. We propose a novel approach to IU identification based on the assumption that through their online activities influential OHC users are able to affect the emotion of other community mem- bers. Hence, we aim at identifying IUs in an OHC by (1) measuring the effect of inter-personal influence, (2) identifying key contributors to the influence in threaded discussions, and (3) ag- gregating a person’s contribution to social influence in the community. The proposed approach utilizes individual OHC users’ sentiment dynamics and develops a new metric based on sent i- ment influence. This approach is applied to data from the online forum of a peer-support com- munity sponsored by the American Cancer Society, the Cancer Survivors Network (CSN http://csn.cancer.org). The dataset used contains 48,779 threaded discussions with more than 468,000 posts from 27,173 de-identified users over a 10-year period ending in October, 2010. Each thread starts with an initial post, which is published by the thread originator and followed by responding replies from other users (respondents). In many cases, the thread will contain ad- ditional posts from the originator (self-replies). 2. The Proposed Approach 2.1 Sentiment Analysis. In an OHC, user emotions cannot be directly observed, but the sentiment of their posts can re- flect their emotions at the time of posting. Manually labeling sentiment for so many posts is not feasible. Instead, our previous research designed an algorithm to detect the sentiment of posts automatically and classify texts into positive or negative sentiment classes (6). To calibrate the classification algorithm, we manually label 298 randomly selected posts as belonging to positive or negative sentiment classes. Examples of initial posts and responding posts with negative and positive sentiment are shown in Table 1. Negative sentiment Table 1. Examples of posts in CSN and their sentiment classes. Initial post My mom became resistant to chemo after 7 treatments and now the trial drug is no longer working :(, ... Reply I feel really sorry for that. I know how painful it is… Initial post Hooray! The tumor is gone according to my doctor! … …, I love the way you think, ..., hope is crucial and no one can deny that a Reply cure may be right around the corner!!! Positive sentiment Next, we extract several lexical and style features from the content of each post, including the number of words with positive sentiment (e.g., “happy” and “joy”) and negative sentiment (e.g., “disappointed” and “painful”), the number of Internet slang (e.g., “LOL” and “:-)”), the numbers of question marks and exclamation marks, etc. These features are chosen because they can dif- ferentiate posts with positive sentiment and others with negative sentiment. For instance, a post that expresses negative sentiment often contains many words with negative sentiment. Finally, machine-learning-based classifiers are trained based on these manually labeled posts (with cross validations). The ultimate goal is having a classifier that is able to assign to each post the correct sentiment labeled by human experts. Of the several classifiers we tried, AdaBoost (7) with regression trees as weak learners has the best sentiment classification performance (8). The classifier achieves an accuracy of 79.2%, meaning that the classifier can correctly determine sentiment labels for about 80% of the 298 manually labeled posts. This performance is in line with other sentiment analysis of various do- mains that have reported accuracy rates ranging from 66% to 84% (6, 9). Then, this sentiment classification model is applied to all unlabeled posts, producing a sentiment label for each. Spe- cifically, for each post pi, the sentiment classification model estimates a sentiment posterior probability, Pr(c=pospi), which measures how likely it is that the post belongs to the positive sentiment class given its post characteristics. If P r(c=pospi)>0.5, post pi is labeled as positive; otherwise, it is labeled as negative. Figure 1 illustrates the process of sentiment classification for posts. Materials and Methods S1 includes more detailed descriptions of our sentiment classifica- tion approaches. 2.2 The new metric. Given the assigned sentiment of all the posts in the OHC, we utilize the sentiment dynamics within threads to develop a metric that reflects each user’s ability to influence others’ sentiments. Thread originators often start a thread to seek support from the community on a health-related issue. Replies from other users exert some level of influence on the originator’s feeling on the issue, so that sentiment of the originator’s subsequent self-replies in the thread may change. From such sentiment change, we derive a measure of how influential responding users are. Fig1. The process of sentiment classification for posts in the OHC. If a thread does not receive any responding reply, presumably the thread originator does not re- ceive support from the community with respect to that thread. If the thread originator does not post any reply in a thread she started (i.e., a self-reply), we cannot measure her change of senti- ment on the issue discussed in this thread. Among the 48,779 threads, only 23,000 threads have at least one responding reply, and contain at least one self-reply from the thread originator. By comparing a thread originator’s sentiment in the initial post with her sentiment in subsequent self-replies, it is possible to measure the influence from thread respondents. Fig.2. Sentiment change of thread originators by number of posts. A point represents the aver- age sentiment of thread originators’ n-th posts in threads they initiated. As the 2nd post from the originator is the 1st self-reply, the 2nd data point from the left-hand side denotes the average sen- timent of originators' first self-replies. Fig.3. Change in originators’ sentiment as a function of the average sentiment of responding re- plies. As Figure 2 illustrates, sentiment of thread originators, on average, changes within threads they initiated. The most significant change in average sentiment occurs between their initial posts and their first self-replies. Their sentiment does not change much between their first self-reply and subsequent posts in the same thread. For our analysis, the sentiment of originators’ self-replies is simply averaged as SF= , where si refers to one of the N self-replies from the thread originator. Similarly, the sentiment of responding replies is averaged as SR= 1()/NriiPcpossN , where rj is one of the M responding replies in the thread. Then the sentiment change indicator for a thread originator is computed as ΔPr= SF-S0, where S0 =Pr(c=posp0) is the sentiment from the initial post of the thread. Plotting ΔPr against SR (Figure 3) demonstrates that ΔPr tends to have higher values as SR increases. While the curve does demonstrate some non- linearity, the Pearson correlation coefficient between ΔPr and SR is 0.96 (P-value≤0.0001). We conclude that the more positive the sentiment of responding replies, the greater the positive change in the originator’s sentiment. While this finding only establishes association, it does lend support to our thesis that the sentiment of thread respondents can impact that of originators. The analysis also establishes that social support from respondents generally influences thread origina- tors in a positive way. After at least one responding reply is received, about 75% of all the thread originators who started with negative sentiment expressed positive subsequent sentiment; among those who started with positive sentiment, 85% stayed positive in their subsequent senti- ment. Figure 4 shows the distribution of ΔPr for originators who start a thread with a post that has negative sentiment. 7.9% of them have ΔPr < 0. The average ΔPr is 0.1359 and a t-test concludes that ΔPr is significantly greater than 0. Having demonstrated that the sentiment of respondents has an impact on the change in sentiment of the thread initiator, we return to the issue of identifying influential users. We posit that influ- ential users post greater numbers of influential responses and use the number of influential re- sponding replies (IRR) as a metric of influence. An IRR is a responding reply that is able to a f- fect the sentiment of posts by the thread originator. While all responding rep lies in a thread may alter the sentiment of originators’ self-replies, we only consider responding replies that are pub- 1()/MrjjPcposrM lished before an originators’ first self-reply within the thread. The rationale for this is twofold. First, a thread originator’s sentiment often changes significantly between the initial post and the first self-reply, but it only changes little afterwards (See Figure 2). Hence, responses in a thread before the originator posts again are more likely to be influential than other responses. Second, the temporal intervals between initial posts and first self-replies have a median value of 17 hours, with two-thirds of them below 24 hours. The cumulative distributions of temporal intervals be- tween initial posts and the first/last self-reply (Figure 5) shows that threads can sometimes last quite a long time with the originator often keeping the conversation going with multiple self- replies. Thus by focusing on those early responses, we can further increase the probability that an originator’s sentiment change is actually due to the responding replies and not due to other events happening offline, such as changes in their physical conditions, personal support from friends and acquaintances, or approaching holidays. Fig.4. the distribution of ΔPr for originators who start a thread with a post that has negative sen- timent Fig. 5. Cumulative distribution of the intervals between initial posts and their first/last self-replies. Operationally, an IRR moves the thread originator’s sentiment in the direction of the reply’s sen- timent (positive or negative). If an IRR rj brings in positive sentiment to a thread (i.e., our sen- timent classifier assigns Pr(c=posrj)>0.5 for post rj), the originator’s sentiment in the first self- reply (s1) should become more positive compared to that in the initial post (p0), i.e., Pr(c=poss1)>Pr(c=posp0); if rj contains negative sentiment (i.e., Pr(c=posrj)<0.5), the origina- tor’s sentiment in the first self-reply should become more negative than it was in the initial post, i.e., Pr(c=poss1)<Pr(c=posp0). If there are multiple IRRs between the initial post and the first self-reply, all are considered to be contributory to the originator’s sentiment change. This is analogous to the aggregation of influence from multiple actors in the threshold model (10, 11), even though thresholds that represent individual differences on the ease of being influenced are not explicit in the definition of IRR. Formally, a responding reply rj in the thread started by ini- tial post p0 is an IRR if and only if the following two conditions are met: Condition 1: T(p0)<T(rj)< T(s1), where T(p) is the publishing time of post p. Condition 2: Pr(c=posrj)>0.5, if Pr(c=poss1)>Pr(c=posp0) or Pr(c=posrj)<0.5, if Pr(c=poss1)<Pr(c=posp0); Please note that the metric considers responding replies that bring both positive and negative sentiment to thread originators. There are at least two reasons to consider negative influences on sentiments. First, in some contexts, it is not always appropriate to publish responding replies with positive sentiment. For example, if a thread reports the death of a community member, in- fluential users may show their sympathy in the thread that may deepen the sadness of the origina- tor (We examined threads where IRRs had negative sentiment impacts on thread originators. A preliminary lexical search found that 13% of the initial posts contain words or expressions relat- ed to death. Please refer to Material and Methods S3 for details). Responding replies like this can also be supportive in this special context and do not necessarily have a negative impact on the community. Second, a small number of the influential users may feel so passionate about an opinion that they, while contributing to the emotion support of some members, could annoy those who do not agree with their opinions. Distinguishing different types of negative sentiment influence and finding IUs whose activities may have negative impacts on the whole community is beyond the scope of this research. In general, the number of IRRs posted by a user is a reflection of the individual’s engagement in and contribution to the community, promptness in providing support, and more importantly, the level of influence that this user can exert on others. These are all important characteristics of in- fluential users in the OHC. 3. Evaluation One is able to rank users according to their numbers of IRRs--the higher the number of IRRs is, the more likely they are influential users. Validation of the ranking requires an independently derived and ranked list of OHC influential users. Unfortunately, while it is easy to label users whose activity levels are very low as non-influential users, identifying a true influential user re- quires good knowledge of each user’s history of activities and of other users’ reactions to their posts over an extended period of time. With the help of domain experts, in this case the CSN community manager and two staff members who monitor forum content on a full-time basis, 41 community members (referred to as IU List-1) are nominated as influential users. Ranking of List-1 is not performed because these experts do not think that it is feasible to do so reliably for such a high number of users1. Although List-1 comes from subjective evaluations and does not include all the IUs in the com- munity, it provides a starting point for evaluating the utility of using IRR to identify IUs. Be- cause we do not know all the IUs in the community, we cannot directly use traditional metrics, such as precision and recall, to measure the performance of our approach. Instead, we evaluate our ranking using Top-K recalls (also known as Recall@K): we check how many of the 41 nom- inated influential users in List-1 can be ranked within top K (with various K values) by our new IRR metric. If n of them are ranked within top K, then the Top-K recall is n/41. The higher the Top-K recall for a ranking metric, the better the performance of the metric. Table 2 also lists the Top-K recalls of various user rankings by traditional metrics, including contribution metrics and network centralities (Here we use a post-reply network, where there is an edge pointing from us- er A to user B if A published a responding reply in a thread started by B). Intuitively, higher K values lead to higher Top-K recalls. More importantly, the performance of our new IRR metric is better than that of all other metrics for top-50 recall, top-100 recall, and top-150 recall. 1 Note that in information retrieval and search engine evaluation, only relevance judgments are sought and not totally ordered ranks because of the same reason. Table 2. Compare the Top-K recall from various single-metric user rankings (using IU List-1). K=150 K=100 K=50 Metric 0.585 0.439 0.342 Total number of threads initiated 0.781 0.707 0.415 Total number of posts In-degree in the post-reply network 0.317 0.512 0.610 0.780 0.659 0.390 Out-degree in the post-reply network 0.488 0.366 0.293 Betweenness in the post-reply network 0.732 0.561 0.390 PageRank in the post-reply network Early replies within 24 hours 0.487 0.707 0.781 0.805 0.732 0.512 Total number of IRRs Table 3. Compare the performance of the IRR ranking and an ensemble classifier (using both IU List-1 and List-2)2. IRR Ranking The original ensemble classifier The new ensemble clas- sifier with IRR K=50 Recall (max =0.397) 0.349 0.278 Precision 0.880 0.700 K=100 Recall (max =0.794) 0.627 Precision Recall 0.790 0.762 K=150 Precision (max=0.840) 0.640 0.532 0.670 0.698 0.587 0.373 0.940 0.579 0.730 1.000 0.840 How does the performance of the IRR metric compare to the combined power of traditional met- rics? Our early work developed several classifiers (12) that can be used to also identify IUs. These classifiers utilized 68 user features that measured users’ contributions in various ways (e.g., the numbers of posts and active days), network centralities (e.g., degree, betweenness, and PageRank), and post content (e.g., the frequency of words with positive/negative sentiment in a user’s posts). The best performing classifier utilized an ensemble random-forest model built on outcomes from other individual classifiers fitted to the same online community. Materials and Methods S2 includes more information about the ensemble classifier. To assess the precision of this ensemble classifier, domain experts reviewed a new list of users that were ranked within the top 150 by the classifier but were not included in List-1. Using criteria similar to those that gen- 2 Note that there are 85+41=126 influential users when we combine List-1 and List-2. As 126>100>50, the maximum possible values for Top-50 and Top-100 recalls are not 1. For instance, even though the top 50 users are all influential ones, the maximum possible Top-50 recall is only 50/126=0.397. Similarly, the maximum Top-100 recall is 100/126=0.794; the maximum Top-150 precision is 126/150=0.84. erated IU List-1, domain experts endorsed an additional 85 influential users (referred to as IU List-2). The longer list of IUs endorsed by domain experts enables better comparison between our IRR ranking and the classifier. Surprisingly, as Table 3 shows, the performance of our IRR ranking is better than that of the classifier in both Top-K recalls and precisions, even though the IRR ranking only uses one metric and the other classifier uses 60 features. In addition to recall, the high precision of our metric is very useful. For example, the Top-50 precision is 0.880, meaning that 88% of the top 50 users are indeed influential ones. To test the validity of the IRR metric, we also conduct sensitivity analysis. The sentiment class label of a post is the basis for finding IRRs in the OHC. Originally, a classification threshold of Pr(c=pospi)=0.5 is used to determine the sentiment of posts, with those above 0.5 being classi- fied as having positive sentiment. Then is the new IRR metric robust when we pick different threshold values for sentiment classification? We vary the classification threshold values from 0.3 to 0.7 and count each user’s number of IRRs again. It turns out that the IRR metric is very robust against such threshold changes. Users’ numbers of IRRs based on different threshold val- ues are still highly correlated with correlation coefficients higher than 0.998 (see Table 4). In other words, despite of the changing threshold values, a user with many IRRs still is a high-IRR user, and vice versa. Consequently, the IRR ranking maintains consistent performance in identi- fying influential users when different threshold values are used (see Table 5). To further improve the identification of influential users and illustrate the synergistic benefit of our new metric, we also incorporate the IRR metric as a new feature into the original ensemble classifier. The IRR-enhanced classifier performs much better than the previous one (See the last row in Table 3). Its strong performance in Top-50 recall and precision are especially desirable for finding members with very high influence in the OHC. The new classifier’s perfect Top-150 recall means that it could find all of the nominated and endorsed influential users within top 150. The imperfect top-150 precision is also acceptable because the combined list with 126 IUs (from IU List-1 and List-2) still may not include all influential users in the OHC. Table 4. Correlation coefficients for the numbers of IRRs with different thresholds values for sentiment classification. Threshold values Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.3 Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.4 Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.6 Pr(c=pospi)=0.5 vs Pr(c=pospi)=0.7 Correlation coefficient (p-value) 0.9985 (0.0000) 0.9986 (0.0000) 0.9995 (0.0000) 0.9985 (0.0000) Threshold values for sentiment classification Precision Precision Recall Table 5. Performance of IRR ranking with different thresholds values for sentiment classifica- tion. (using both IU List-1 and List-2). K=50 Recall (max =0.397) 0.349 0.349 0.349 0.349 0.349 K=100 Recall (max =0.794) 0.627 0.610 0.603 0.603 0.603 Pr(c=pospi)=0.5 Pr(c=pospi)=0.3 Pr(c=pospi)=0.4 Pr(c=pospi)=0.6 Pr(c=pospi)=0.7 K=150 Precision (max=0.840) 0.640 0.633 0.637 0.637 0.640 0.790 0.770 0.760 0.760 0.760 0.762 0.754 0.746 0.754 0.762 0.880 0.880 0.880 0.880 0.880 4. Related work Classic social network theories regarding IUs can be classified into two categories: (1) structure- based centrality metrics, and (2) influence models. Structure-based centrality metrics assess the degree of importance of a node based on the position of the node in a social network. Major cen- trality measures include betweenness centrality (13). degree centrality (14), closeness centrality (15), and Pagerank in a directed network, in which the rank of a node is determined by the rank of those with a link pointing to that node (16). These theories and their extensions have been widely adopted in the analysis of many social networks. The second category of social network theories regarding influential users characterizes the dynamics of social influence using a diffu- sion model such as the threshold model, the independent cascade model, and their variants and extensions (17, 18). Influential users can then be identified through maximizing the effect of so- cial influence based on these (19). The emergence of online communities (20), where users often interact through open discussions, provides important opportunities for using novel computational social science approaches (21, 22) to identify influential users from large-scale social networks. In addition to the structure of users’ social networks, online communities also capture detailed information of users’ online in- teractions (e.g., the amount, content and time of interactions) that are typically not available in other types of social networks. Research that tries to identify IUs in these communities not only considers network-level centralities, but also incorporates individual users’ behaviors and contri- butions. For example, in online communities that feature contagion or diffusion phenomena, as seen in Twitter or more generally with online viral spreading, researchers used randomized ex- periments and statistical analysis to find out each individual’s influence based on attributes of the individual and the dyadic relationship (23). In an online Q&A community, the difference in knowledge between question-askers and answerers has been used to find experts (24), a type of influential users. Analyses of the blogosphere have utilized blogger contributions (e.g. , the num- ber and length of posts) and reader activities (e.g., posting comments to a blog) to assess the in- fluence of a blogger (25). Meanwhile, social contacts are known to influence health-related behaviors and emotions in in- dividuals (26-28). Provision of emotional support is a key component of OHCs, especially OHCs that cater to individuals with serious medical conditions, such as cancer. Individuals with serious medical conditions often experience stress and anxiety especially around the time of first diagnosis and during treatment (29). However, this important function of OHCs has not been re- flected in the literature of IU identification. 5. Discussions This research develops a novel metric that can identify influential users in OHCs. It focuses on the sentimental effect of inter-personal influence on individuals and directly measures an OHC member’s ability to influence others’ sentiment. This research has important implications for building an active, supportive, and sustainable OHC. For instance, early identification of IUs in an OHC provides community managers an opportunity to publicly recognize their contributions by awarding them prestigious status (e.g., presenting virtual badges of honor) and to encourage other members’ participation in the OHC. Also, OHC managers can guide emerging community IUs to assume greater leadership roles and thereby assure consistent, strong peer leadership. This is especially valuable to OHCs, in which influential users are sometimes lost as a result of health-related factors that limit or preclude their continued involvement in the community. The analysis of influential users using IRR illustrated here can also be applied to the study of online social networking sites, such as those focused on product reviews or political opinions, where sentiment is a major part of community interactions. The proposed metric for influential users is significant not only because it has been shown to be effective for identifying influential users from a large community with a long history, but also because it provides fundamentally new insights into understanding the nature of social influence at multiple scales. The concept of “influential post” introduces, for the first time, a fundamenta l element of social influence at the inter-personal level. The concept is intrinsically multi-scale, because it is based on the alignment of a responding reply’s sentiment (inter-personal level) with the direction of the sentiment change of the thread originator at the individual level. The concept of “influential post” also compliments the previous emphasis on analyzing “relationship” net- works with a fundamentally new perspective that analyzes the conversation of actual social in- teractions in which influence takes place. This new perspective is especially suitable for analyz- ing influence in online communities, in which interactions emerge and evolve among people previously unconnected. We believe that this new metric will provide an important basis for ad- vancing our understandings about influence, human behaviors, and the dynamics of online com- munities. For instance, longitudinal studies about influential posts can be useful for studying the dynamic patterns of user engagement in online communities. As has been the case with other studies of online social influence, our approach is limited in that only inter-personal influence through online interactions is examined. As previously mentioned, the sentiment in a user’s post may also be influenced by offline issues. We have tried to elimi- nate as much offline influence as possible by focusing on the sentiment effect of prompt replies to thread originators. To achieve a complete understanding of influence in an OHC, researchers need to capture and analyze members’ offline activities and characteristics. This can then be combined with a more fine-grained text analysis of their posts. We have mentioned earlier in this paper that another limitation of this work is that it does not distinguish healthy negative sentiment influences (e.g., sadness due to the death of a community member) from those that are not healthy for the community (e.g., opinions that are so strong that can annoy certain community members). Such a distinction, which requires a more fine-grained analysis of the content of the threads, can contribute to the identification of IUs who can have negative impacts on the community. This, we believe, is an important area for future research. Last, in addition to emotional support, we want to measure one’s influence in online activities that aim at providing information support. We are also interested gauging one’s influence in threads that that do not receive any self-reply. 6. Materials and Methods 6.1 Features and performance for sentiment analysis for posts. From posts in the forum, we extract lexical and stylish features for training sentiment models. Table S1 summarizes these features. Pos and Neg represent the numbers of positive and negative words (and emoticons) respectively. The lists of words’ sentiment are based on those introduced by Hu and Liu (30), and the positive and negative emoticon lists are collected from Internet. We found that many posts in CSN forum mention names, e.g., UserIDx, I love the way you think, as shown in Table 1. Wondering whether name mention has a relationship with sentiment, we in- troduce NameMention as a feature that counts the occurrences of de-identified names in a post. We also introduce Slang as a feature to check whether the numbers of slang in a post correlate with its sentiment. PosStrength and NegStrength are two features indicate the strength of positive and negative sentiment respectively. Introduced by Thelwall et al.(31), they not only consider whether a word is in positive or negative lists, but also consider the strength (e.g., “very good” and “good!!!” are more positive than “good”). is the number of Neg Slang NameMention Table S1. Features for the sentiment analysis of forum posts. Definition Feature The number of words in a post PostLength NumOfPos/PostLength, where NumOfPos is the number of Pos words/emoticons with positive sentiment. NumOfNeg/PostLength, where NumOfNeg words/emoticons with positive sentiment. NumOfName/PostLength, where NumOfName is the number of names mentioned. NumOfSlang/PostLength, where NumOfSlang is the number of Internet slangs Positive sentiment strength from the SentiStrength Package. PosStrength Negative sentiment strength from the SentiStrength Package. NegStrength PosVsNeg (NumOfPos+1)/(NumOfNeg+1) PosVsNegStrength PosStrength/NegStrength Sentence The number of sentences The average length of words AvgWordLen QuestionMarks The number of question marks ExclamationMarks The number of exclamations Table S2. Best performance from classifiers. ROC Area Classifier AdaBoost 0.832 0.832 Logistic regression 0.816 LogitBoost 0.802 BayesNet Bagging 0.794 0.785 Neural networks 0.782 Decision tree SVM 0.658 Classification accuracy 79.2% 77.5% 76.8% 74.2% 73.5% 73.8% 77.2% 75.2% We try 8 different types of classifiers including AdaBoost, LogitBoost, Bagging, SVM, logistic regression, Neural Networks, BayesNet, and decision trees. All combinations of the features are considered for each type of model to find the features set which achieves the best performance. Both classification accuracy and ROC area are used as metrics because they have different focus on measurement. Classification accuracy measures the percentage of correctly classified instanc- es. ROC area calculates the area under the receiver operating characteristic (ROC) curve, which plots the true positive rate vs. false positive rate for a binary classifier system as the discrimina- tion threshold of the classifier varies. ROC curve can measure the ability of a classifier to pro- duce good relative instance scores, and is insensitive to changes in class distribution. Table S2 summarizes the results of different models based on their best feature sets (10-fold cross- validation). AdaBoost (regression trees are used as weak learners) achieves the best ROC Area (0.832) as well as the best classification accuracy (79.2%). In contrast, the ROC area and accura- cy of an AdaBoost using all features in Table S1 are even lower--0.813 and 75.2% respectively (too many features may have caused over-fitting). Contribution features Table S3. Summary of basic features for each community member. Group Features Number of one’s initial posts (i.e., posts that start threads) Number of one’s replies to others (i.e., following posts) Number of threads that one contributed post(s) to Number of other users’ posts published after one’s post in the same thread Avg. response delay between one’s post and the next post by others in the same thread (in minutes) Total length of one’s post (in bytes) Avg. length of one’s post (in bytes) Avg. content length of one’s top 30 longest posts (in bytes) Number of one’s active days (one published at least 1 post in an active day) Time span of one’s activity (from first active day to the last) Avg. number of posts per active day Avg. number of posts per day during one’s time span of activity One’s in-degree and out-degree in the post-reply network One’s betweenness centrality in the post-reply network One’s PageRank in the post-reply network Avg. percentage of words w/ positive sentiment in one’s posts Avg. percentage of words w/ negative sentiment in one’s posts Avg. percentage of Internet slangs/emoticons in one’s posts Avg. percentage of words w/ strong emotion in one’s posts Ratio between the numbers of words w/ positive and negative words in one’s posts Topical diversity (Shannon entropy and log energy of topic distribution in a user’s posts) Network features Semantic features 6.2 The classification approach to identify influential users. To identify influential users from the OHC, we extract three groups of basic features for each user: contribution, network, and semantic features. Contribution features, as the name implies, measure a user’s direct contribution to the forum, such as number of discussion threads (topics) initiated and replies posted, number of days the user has actively posted, length of the user’s post, etc. Network features reflect users’ centrality (e.g. in/out-degree and betweenness) in a post-reply network, where there is an edge pointing from user A to user B if user A replied a thread started by user B. Semantic features reflect positive or negative sentiment, emotional strength, diversity of topical coverage (utilizing Latent-Dirichlet Allocation), etc. of a user’s posts. Table S3 summarizes these basic features. On the basis of these basic features, we also take advantage of the sub-community structure of the social network among community mem- bers to generate new neighborhood-based and cluster-based features, which help to improve the performance of our classifiers. Table S4. Performance of various classifiers for identifying IUs. Classifier Naïve Bayesian Logistic Regression Random Forest One-class SVM Two-class SVM The ensemble classifier (based on random forest) Top-150 Recall 0.796 0.706 0.779 0.781 0.739 0.854 We apply 5 classifiers, Naïve Bayesian, Logistic Regression, and Random Forest, one -class SVM, and two-class SVM, to classify community members into IUs and non-IUs using 10-fold cross-validation. Top-150 recalls (evaluated with IU List-1) obtained from the 5 classifiers range from 0.706 to 0.796 (see Table S4). Ensemble methods are used to further improve the classification. For each user, a classifier gives a classification result, either as a probability or a binary value to denote whether the user is con- sidered a leader. We then fed each user’s five classification results from the five individual clas- sifiers to an ensemble classifier. Among many ensemble methods, the ensemble classifier based on Random Forest achieves the best performance: an average top-150 recall (evaluated with IU List-1) of 0.854 (see Table S4). 6.3 The list of words and expressions related to death. This list was picked from “List of expressions related to death” at Wikipedia 3 and “Death and general words relating to death” at the MacMillan Dictionary Thesaurus4 . "pass away", "passing away", "passed away", "funeral", "die", "dying", "death", "memorial", "is gone", "was gone", "at rest", "final summons", "room temperature", "at peace", "in peace", "be- yond the grave", "beyond the veil", "over the big ridge", "the last roundup", "the great majority", "the ultimate sacrifice", "a last bow", "last breath", "bereavement", "demise", "obituar". 2. 3. 4. 5. 6. References: Fox S (2011) The Social Life of Health Information, 2011. (Pew Research Center's Internet & 1. American Life Project). Chou WY, Hunt YM, Beckjord EB, Moser RP, & Hesse BW (2009) Social media use in the United States: implications for health communication. J Med Internet Res 11(4). Rodgers S & Chen Q (2005) Internet Community Group Participation: Psychosocial Benefits for Women with Breast Cancer. Journal of Computer-Mediated Communication 10(4):00-00. Kim E, et al. (2012) The process and effect of supportive message expression and reception in online breast cancer support groups. Psycho-Oncology 21(5):531-540. Merriam-Webster.com (2011) influnce. Pang B & Lee L (2008) Opinion Mining and Sentiment Analysis. Foundations and Trends in Information Retrieval 2(1-2):1-135. Freund Y & Schapire R (1995) A desicion-theoretic generalization of on-line learning and an application to boosting. Computational Learning Theory-Lecture Notes in Computer Science, ed Vitányi P (Springer Berlin / Heidelberg), Vol 904, pp 23-37. Qiu B, et al. (2011) Get Online Support, Feel Better -- Sentiment Analysis and Dynamics in an Online Cancer Survivor Community. Proceedings of the Third IEEE Third International Confernece on Social Computing (SocialCom'11), pp 274-281. Liu B (2006) Web Data Mining: Exploring Hyperlinks, Contents and Usage Data (Springer) p 532. Granovetter M (1978) Threshold Models of Collective Behavior. The American Journal of Sociology 83(6):1420-1443. Valente TW (1996) Network models of the diffusion of innovations. Computational & Mathematical Organization Theory 2(2):163-164. Zhao K, et al. (2011) Identifying Leaders in an Online Cancer Survivor Community. Proceedings of the 21st Annual Workshop on Information Technologies and Systems (WITS'11), pp 115-120. Freeman LC (1977) A set of measures of centrality based on betweenness. Sociometry 40:35-41. 10. 11. 12. 13. 7. 8. 9. 3 http://en.wikipedia.org/wiki/List_of_expressions_related_to_death 4 http://www.macmillandictionary.com/thesaurus-category/american/Death-and-general-words-relating-to-death 18. 19. 21. 22. 14. 15. 16. Albert R, Jeong H, & Barabasi AL (2000) Error and attack tolerance of complex networks. Nature 406(6794):378-382. Cobb NK, Graham AL, & Abrams DB (2010) Social Network Structure of a Large Online Community for Smoking Cessation. Am. J. Public Health 100(7):1282-1289. Brin S & Page L (1998) The anatomy of a large-scale hypertextual Web search engine. Computer networks and ISDN systems 30(1-7):107-117. 17. Watts D (2002) A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences of the United States of America 99(9):5766-5771. Goldenberg J, Libai B, & Muller E (2001) Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 12(3):211-223. Kempe D, Kleinberg J, & Tardos E (2003) Maximizing the spread of influence through a social network. Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, (ACM), pp 137-146. 20. Wellman B (1999) Net surfers don't ride alone: Virtual communities as communities. Communities in cyberspace, eds Smith MA & Kollock P (Routledge), pp 167-194. Lazer D, et al. (2009) Life in the network: the coming age of computational social science. Science 323(5915):721-723. Keegan B, Ahmed MA, Williams D, Srivastava J, & Contractor N (2011) Sic Transit Gloria Mundi Virtuali? Promise and Peril in the Computational Social Science of Clandestine Organizing. Proceedings of the ACM WebSci'11, pp 1-8. Aral S & Walker D (2012) Identifying Influential and Susceptible Members of Social Networks. Science 337(6092):337-341. Zhang J, Ackerman MS, & Adamic L (2007) Expertise networks in online communities: structure and algorithms. Proceedings of the 16th international conference on World Wide Web, (ACM), pp 221-230. Agarwal N, Liu H, Tang L, & Yu PS (2008) Identifying the influential bloggers in a community. Proceedings of the International Conference on Web Search and Web Data Mining, (ACM), pp 207-218. Centola D (2010) The Spread of Behavior in an Online Social Network Experiment. Science 329(5996):1194-1197. Fowler JH & Christakis NA (2008) Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study. BMJ 337(a2338):1-9. Centola D (2011) An Experimental Study of Homophily in the Adoption of Health Behavior. Science 334(6060):1269-1272. Barraclough J (1999) Cancer and Emotion: A Practical Guide to Psycho-oncology (Wiley) 3rd Ed. Hu M & Liu B (2004) Mining and summarizing customer reviews. Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'04), (ACM, 1014073), pp 168-177. Thelwall M, Buckley K, Paltoglou G, Cai D, & Kappas A (2010) Sentiment in short strength detection informal text. Journal of the American Society for Information Science and Technology 61(12):2544-2558. 31. 23. 24. 25. 26. 27. 28. 29. 30.
1102.5063
3
1102
2012-03-04T01:31:30
Topology Discovery of Sparse Random Graphs With Few Participants
[ "cs.SI", "physics.soc-ph", "stat.ME" ]
We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. The rest of the nodes are hidden, and do not provide any information for topology discovery. We consider topology discovery under two routing models: (a) the participants exchange messages along the shortest paths and obtain end-to-end measurements, and (b) additionally, the participants exchange messages along the second shortest path. For scenario (a), our proposed algorithm results in a sub-linear edit-distance guarantee using a sub-linear number of uniformly selected participants. For scenario (b), we obtain a much stronger result, and show that we can achieve consistent reconstruction when a sub-linear number of uniformly selected nodes participate. This implies that accurate discovery of sparse random graphs is tractable using an extremely small number of participants. We finally obtain a lower bound on the number of participants required by any algorithm to reconstruct the original random graph up to a given edit distance. We also demonstrate that while consistent discovery is tractable for sparse random graphs using a small number of participants, in general, there are graphs which cannot be discovered by any algorithm even with a significant number of participants, and with the availability of end-to-end information along all the paths between the participants.
cs.SI
cs
Topology Discovery of Sparse Random Graphs With Few Participants∗ Animashree Anandkumar†, Avinatan Hassidim‡and Jonathan Kelner§ May 23, 2018 Abstract We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. The rest of the nodes are hidden, and do not provide any information for topology discovery. We consider topology discovery under two routing models: (a) the participants exchange messages along the shortest paths and obtain end-to-end measurements, and (b) additionally, the participants exchange messages along the second shortest path. For scenario (a), our proposed algorithm results in a sub-linear edit-distance guarantee using a sub-linear number of uniformly selected participants. For scenario (b), we obtain a much stronger result, and show that we can achieve consistent reconstruction when a sub-linear number of uniformly selected nodes participate. This implies that accurate discovery of sparse random graphs is tractable using an extremely small number of participants. We finally obtain a lower bound on the number of participants required by any algorithm to reconstruct the original random graph up to a given edit distance. We also demonstrate that while consistent discovery is tractable for sparse random graphs using a small number of participants, in general, there are graphs which cannot be discovered by any algorithm even with a significant number of participants, and with the availability of end-to-end information along all the paths between the participants. Keywords: Topology Discovery, Sparse Random Graphs, End-to-end Measurements, Hidden Nodes, Quartet Tests. 1 Introduction Inference of global characteristics of large networks using limited local information is an important and a challenging task. The discovery of the underlying network topology is one of the main goals of network inference, and its knowledge is crucial for many applications. For instance, in communication networks, many network monitoring applications rely on the knowledge of the routing topology, e.g., to evaluate the resilience of the network to failures [2, 3]; for network traffic ∗A shorter version appears in [1]. This version is scheduled to appear in Journal on Random Structures and Algorithms. †A. Anandkumar is with the Center for Pervasive Communications and Computing, Electrical Engineering and Computer Science Dept., University of California, Irvine, USA 92697. Email: [email protected] ‡A. Hassidim is with Google Research, Tel Aviv, Israel. Email: [email protected] §J. Kelner is with the Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Tech- nology, Cambridge MA 02139. Email: [email protected] 1 prediction [4, 5] and monitoring [6], anomaly detection [7], or to infer the sources of viruses and rumors in the network [8]. In the context of social networks, the knowledge of topology is useful for inferring many characteristics such as identification of hierarchy and community structure [9], prediction of information flow [10, 11], or to evaluate the possibility of information leakage from anonymized social networks [12]. Traditionally, inference of routing topology in communication networks has relied on tools such as traceroute and mtrace [13] to generate path information between a subset of nodes. However, these tools require cooperation of intermediate nodes or routers to generate messages using the Internal Control Message Protocol (ICMP). Increasingly, today many routers block traceroute requests due to privacy and security concerns [14, 15], there by making inference of topology using traceroute inaccurate. Moreover, traceroute requests are not scalable for large networks, and cannot discover layer-2 switches and MPLS (Multi-protocol Label Switching) paths, which are increasingly being deployed [16]. The alternative approach for topology discovery is the approach of network tomography. Here, topology inference is carried out from end-to-end packet probing measurements (e.g., delay) be- tween a subset of nodes, without the need for cooperation between the intermediate (i.e., non- participating) nodes in the network. Due to its flexibility, such approaches are gaining increasing popularity (see Section 1.2 for details). The approach of topology discovery using end-to-end measurements is also applicable in the context of social networks. In many social networks, some nodes may be unwilling to participate or cooperate with other nodes for discovering the network topology, and there may be many hidden nodes in "hard to reach" places of the network, e.g., populations of drug users, and so on. Moreover, in many networks, there may be a cost to probing nodes for information, e.g., when there is a cash reward offered for filling out surveys. For such networks, it is desirable to design algorithms which can discover the overall network topology using small fraction of participants who are willing to provide information for topology discovery. There are many challenges to topology discovery. The algorithms need to be computationally efficient and provide accurate reconstruction using a small fraction of participating nodes. Moreover, inference of large topologies is a task of high-dimensional learning [17]. In such scenarios, typically, only a small number of end-to-end measurements are available relative to the size of the network to be inferred. It is desirable to have algorithms with low sample complexity (see Definition 3), where the number of measurements required to achieve a certain level of accuracy scales favorably with the network size. It is indeed not tractable to achieve all the above objectives for discovery of general network topologies using an arbitrary set of participants. There are fundamental identifiability issues, and in general, no algorithm will be able to discover the underlying topology. We demonstrate this phenomenon in Section 8.2, where we construct a small network with a significant fraction of participants which suffers from non-identifiability. Instead, it is desirable to design topology discovery algorithms which have guaranteed performance for certain classes of graphs. We consider the class of Erdos-R´enyi random graphs [18]. These are perhaps the simplest as well as the most well-studied class of random graphs. Such random graphs can provide a reasonable explanation for peer-to-peer networks [19] and social networks [20]. We address the following issues in this paper: can we discover random graphs using a small fraction of participating nodes, selected uniformly at random? can we design efficient algorithms with low sample complexity and with provable performance guarantees? what kinds of end-to-end measurements between the 2 participants are useful for topology discovery? finally, given a set of participants, is there a lower bound on the error (edit distance) of topology discovery that is achievable by any algorithm? Our work addresses these questions and also provides insights into many complex issues involved in topology discovery. 1.1 Summary of Contributions We consider the problem of topology discovery of sparse random graphs using a uniformly selected set of participants. Our contributions in this paper are three fold. First, we design an algorithm with provable performance guarantees, when only minimal end-to-end information between the participants is available. Second, we consider the scenario with additional information, and design a discovery algorithm with much better reconstruction guarantees. Third, we provide a lower bound on the edit distance of the reconstructed graph by any algorithm, for a given number of participants. Our analysis shows that random graphs can be discovered accurately and efficiently using an extremely small number of participants. We consider reconstruction of the giant component of the sparse random graph up to its minimal representation, where there are no redundant hidden nodes (see Section 3.1). Our end-to-end measurement model consists of random samples (e.g., delay) along the shortest paths between the participants. Using these samples, we design the first random-discovery algorithm, referred to as the RGD1 algorithm, which performs local tests over small groups of participating nodes (known as the quartet tests), and iteratively merges them with the previously constructed structure. Such tests are known to be accurate for tree topologies [21], but have not been previously analyzed for random-graph topologies. We provide a sub-linear edit-distance guarantee (in the number of nodes) under RGD1 when there are roughly n5/6 participants, where n is the number of nodes in the network. The algorithm is also simple to implement, and is computationally efficient. We then extend the algorithm to the scenario where additionally, there are end-to-end measure- ments available along the second shortest paths between the participating nodes. Such information is available since nodes typically maintain information about alternative routing paths, should the shortest path fail. In this scenario, our algorithm RGD2, has a drastic improvement in accuracy under the same set of participating nodes. Specifically, we demonstrate that consistent discovery can be achieved under RGD2 algorithm when there are roughly n11/12 number of participants, where n is the network size. Thus, we can achieve accurate topology discovery of random graphs using an extremely small number of participants. For both our algorithms, the sample complexity is poly-logarithmic in the network size, meaning that the number of end-to-end measurement samples needs to scale poly-logarithmically in the network size to obtain the stated edit-distance guarantees. Our analysis in this paper thus reveals that sparse random graphs can be efficiently discovered using a small number of participants. Our algorithms exploit the locally tree-like property of random graphs [18], meaning that these graphs contain a small number of short cycles. This enables us to provide performance guarantees for quartet tests which are known to be accurate for tree topologies, and this is done by carefully controlling the distances used by the quartet tests. At the same time, we exploit the presence of cycles in random graphs to obtain much better guarantees than in the case of tree topologies. In other words, while tree topologies require participation of at least half the number of nodes (i.e., the leaves) for accurate discovery, random-graph topologies can be accurately discovered using a sub-linear number of participants. Finally, we provide lower bounds on the reconstruction error under any algorithm for a given number of participants. Specifically, we show that if less than roughly √n nodes participate in 3 topology discovery, reconstruction is impossible under any algorithm, where n is the network size. We also discuss topology discovery in general networks, and demonstrate identifiability issues in- volved in the discovery process. We construct a small network with a significant fraction of nodes as participants which cannot be reconstructed using end-to-end information on all possible paths between the participants. This is in contrast to random graphs, where consistent and efficient topology discovery is possible using a small number of participants. To the best of our knowledge, this is the first work to undertake a systematic study of random- graph discovery using end-to-end measurements between a subset of nodes. Although we limit ourselves to the study of random graphs, our algorithms are based on the locally tree-like property, and are thus equally applicable for discovering other locally tree-like graphs such as the d-regular graphs and the scale-free graphs; the latter class is known to be a good model for social networks [20, 22] and peer-to-peer networks [19]. Indeed more sophisticated and general models for networks have been developed [23–25], but we defer their study for future work. 1.2 Related Work Network tomography has been extensively studied in the past and various heuristics and algorithms have been proposed along with experimental results on real data. For instance, the area of mapping the internet topology is very rich and extensive, e.g., see [4,26–32]. In the context of social networks, the work in [33] considers prediction of positive and negative links, the work in [34] considers inferring networks of diffusion and influence and the work in [35] considers inferring latent social networks through spread of contagions. A wide range of network tomography solutions have been proposed for general networks. See [36] for a survey. Topology discovery is an important component of network tomography. There have been several theoretical developments on this topic. The work in [37] provides hardness results for topology discovery under various settings. Topology discovery under availability of different kinds of queries have been previously considered, such as: (i) Shortest-path query, where a query to a node returns all the shortest paths (i.e., list of nodes in the path) from that node to all other nodes [38]. This is the strongest of all queries. These queries can be implemented by using Traceroute on Internet. In [38], the combinatorial-optimization problem of selecting the smallest subset of nodes for such queries to estimate the network topology is formulated. The work in [39] considers discovery of random graphs using such queries. The bias of using traceroute sampling on power-law graphs is studied in [40], and weighted random walk sampling is considered in [41]. (ii) Distance query, where a query to a node returns all the shortest-path distances (instead of the complete list of nodes) from that node to any other node in the network [39]. These queries are available for instance, in Peer-to-Peer networks through the Ping/Pong protocol. This problem is related to the landmark placement, and the optimization problem of having smallest number of landmarks is known as the metric dimension of the graph [42]. The work in [43] considers reconstruction of tree topologies using shortest-path queries. (iii) Edge-based queries: There are several types of edge queries such as detection query, which answer whether there is an edge between two selected nodes, or counting query, which returns number of edges in a selected subgraph [44,45], or a cross-additive query, which returns the number of edges crossing between two disjoint sets of vertices [46]. However, all the above queries assume that all the nodes (with labels) are known a priori, and that there are no hidden (unlabeled) nodes in the network. Moreover, most of the above works 4 consider unweighted graphs, which are not suitable when end-to-end delay (or other weighted) information is available for topology discovery. As previously discussed, the above queries assume extensive information is available from the queried objects, and this may not be feasible in many networks. Topology discovery using end-to-end delays between a subset of nodes (henceforth, referred to as participating nodes), has been previously studied for tree topologies using unicast traffic in [16,21,47] and multicast traffic [48]. The algorithms are inspired by phylogenetic tree algorithms. See [49] for a thorough review. Most of these algorithms are based on a series of local tests known as the quartet-based distance tests. Our algorithms are inspired by, and are based on quartet methods. However, these algorithms were previously applied only to tree topologies, and here, we show how algorithms based on similar ideas can provide accurate reconstruction for a much broader class of locally-tree like graphs such as the sparse random graphs. Recent works also incorporate additional information from temporal dynamics [50] or consider causal models for networks [51, 52], while our work does not consider these effects. 2 System Model Notation For any two functions f (n), g(n), f (n) = O(g(n)) if there exists a constant M such that f (n) ≤ M g(n) for all n ≥ n0 for some fixed n0 ∈ N. Similarly, f (n) = Ω(g(n)) if there exists a constant M′ such that f (n) ≥ M′g(n) for all n ≥ n0 for some fixed n0 ∈ N, and f (n) = Θ(g(n)) if f (n) = Ω(g(n)) and f (n) = O(g(n)). Also, f (n) = o(g(n)) when f (n)/g(n) → 0 and f (n) = ω(g(n)) when f (n)/g(n) → ∞ as n → ∞. We use notation O(g(n)) = O(g(n)poly log n). Let I[A] denote indicator of an event A. Let Gn denote a random graph with probability measure P. Let Q be a graph property (such as being connected). We say that the property Q for a sequence of random graphs {Gn}n∈N holds asymptotically almost surely (a.a.s.) if, lim n→∞ P(Gn satisfies Q) = 1. Equivalently, the property Q holds for almost every (a.e.) graph Gn. For a graph G, let C(l; G) denote the set of (generalized) cycles1 of length less than l in graph G. For a vertex v, let Deg(v) denote its degree and for an edge e, let Deg(e) denote the total number of edges connected to either of its endpoints (but not counting the edge e). Let BR(v) denote the set of nodes within hop distance R from a node v and ΓR(v) is the set of nodes exactly at hop distance R. The definition is extended to an edge, by considering union of sets of the endpoints of edge. Denote the shortest path (with least number of hops) between two nodes i, j as Path(i, j; G) and the second shortest path as Path2(i, j; G). Denote the number of H-subgraphs in G, i.e., the number of subgraphs in G corresponding to H, as NH;G. 2.1 Random Graphs We assume that the unknown network topology is drawn from the ensemble of Erdos-R´enyi random graphs [18]. This random graph model is arguably the simplest as well the most well-studied model. 1A generalized cycle of length l is a connected graph of l nodes with l edges (i.e., can be a union of a path and a cycle). In this paper, a cycle refers to a generalized cycle unless otherwise mentioned. 5 Denote the random graph as Gn ∈ G(n, c/n), for c < ∞, where n is the number of nodes and each edge occurs uniformly with probability c/n. This implies a constant average degree of c for each node, and this regime is also known as the "sparse" regime of random graphs. It is well known that sparse random graphs exhibit a phase transition with respect to the number of components. When c > 1, there is a giant component containing Θ(n) nodes, while all the other components have size Θ(log n) [53, Ch. 11]. This regime is known as the super-critical regime. On the other hand, when c < 1, there is no giant component and all components have size Θ(log n). This regime is known as the sub-critical regime. We consider discovery of a random graph in the super-critical regime (c > 1). This is the regime of interest, since most real-world networks are well connected rather than having large number of extremely small components. Moreover, the presence of a giant component ensures that the topology can be discovered even with a small fraction of random participants. This is because the participants will most likely belong the giant component, and can thus exchange messages between each other to discover the unknown topology. We limit ourselves to the topology discovery of the giant component in the random graph, and denote the giant component as Gn, unless otherwise mentioned. 2.2 Participation Model For the given unknown graph topology Gn = (Wn, En) over Wn = {1, . . . , n} nodes, let Vn ⊂ Wn be the set of participating nodes which exchange messages amongst each other by routing them along the graph. Let ρn := Vnn denote the fraction of participating nodes. It is desirable to have small ρn and still reconstruct the unknown topology. We assume that the nodes decide to participate uniformly at random. This ensures that information about all parts of the graph can be obtained, thereby making graph reconstruction feasible. We consider the regime, where Vn = n1−ǫ, for some ǫ > 0, meaning that extremely small number of nodes participate in discovering the topology. Let Hn := Wn \ Vn be the set of hidden nodes. The hidden nodes only forward the messages without altering them, and do not provide any additional information for topology discovery. The presence of hidden nodes thus needs to be inferred, as part of our goal of discovering the unknown graph topology. 2.3 Delay Model The messages exchanged between the participating nodes experience delays along the links in the route. The participating nodes measure the end-to-end delays2 between message transmissions and receptions. We consider the challenging scenario that only this end-to-end delay information is available for topology discovery. Let m be the number of messages exchanged between each pair of participating nodes i, j ∈ Vn. Denote the m samples of end-to-end delays computed from these messages as Dm i,j := [Di,j(1), Di,j (2), . . . , Di,j(m)]T . We assume that the routes taken by the m messages are fixed, and we discuss the routing model in the subsequent section. On the other hand, these messages experience different delays along 2Our algorithms work under any additive metric defined on the graph such as link utilization or link loss [16], although the sample complexity, i.e., the number of samples required to accurately estimate the metrics, does indeed depend on the metric under consideration. 6 each link3 which are drawn identically and independently (i.i.d) from some distribution, described below. Let De denote the random delay along a link e ∈ Gn (in either direction). We assume that the delays De1 and De2 along any two links e1, e2 ∈ Gn are independent. The delays are additive along any route, i.e., the end-to-end delay along a route R(i, j) between two participants i, j ∈ Vn is DR(i,j) := Xe∈R(i,j) De. (1) Further, the family of delay distributions are regular and bounded, as in [21]. The delay distributions {De}e∈En and the graph topology Gn are both unknown, and need to be estimated using messages between participating nodes. We exploit the additivity assumption in (1) to obtain efficient topology discovery algorithms. 2.4 Routing Model The end-to-end delays between the participating nodes thus depends on the routes taken by the messages. We assume that the messages between any two participants are routed along the shortest path with the lowest number of hops. On the other hand, the nodes cannot select the path with the least delay since the delays along the individual links are unknown and are also different for different messages. We also consider another scenario, where the participants are able to additionally route messages along the second shortest path. This is a reasonable assumption, since in practice, nodes typically maintain information about the shortest path and an alternative path, should the shortest path fail. The nodes can forward messages along the shortest and the second shortest paths with different headers, so that the destinations can distinguish the two messages and compute the end-to-end delays along the two paths. We will show that this additional information vastly improves the accuracy of topology discovery. These two scenarios are formally defined below. Scenario 1 (Shortest Path Delays): Each pair of participating nodes i, j ∈ Vn exchange m messages along the shortest path in Gn, where the shortest path4 is with respect to the number of hops. Denote the vector of m end-to-end delays as Dm i,j. Scenario 2 (Shortest Path and Second Shortest Path Delays): Each pair of participating nodes i, j ∈ Vn exchange m messages along the shortest path as well as m messages along the i,j. second shortest path. The vector of m samples along the second shortest path is denoted by eDm 3 Reconstruction Guarantees 3.1 Minimal Representation Our goal is to discover the unknown graph topology using the end-to-end delay information between the participating nodes. However, there can be multiple topologies which explain equally well the end-to-end delays between the participants. This inherent ambiguity in topology discovery with hidden nodes has been previously pointed out in the context of latent tree models [54]. 3The independence assumption implies that we consider unicast traffic rather than multicast traffic considered in many other works, e.g., in [48]. 4If the shortest path between two nodes is not unique, assume that the node pairs randomly pick one of the paths and use it for all the messages. 7 (a) A non-minimal graph (b) Minimal representation Figure 1: In the above figures, the shaded nodes are participants while the rest are hidden. In the minimal representation of a graph, hidden nodes with degree two and less (the highlighted hidden nodes) are merged with their neighbors. See Procedure 1 for details. Procedure 1 Gn := Minimal(Gn; Vn) is the minimal representation of Gn′ given set of participating nodes Vn. Input: Graph Gn′, set of participating nodes Vn, and set of hidden nodes Hn. Initialize Gn = Gn, n ← n′. while ∃h ∈ Gn ∩ Hn with Deg(h) ≤ 2 do Remove h from Gn if Deg(h) ≤ 1. Contract all h with Deg(h) = 2 in Gn. Decrement n accordingly. end while There is an equivalence class of topologies with different sets of hidden nodes which generate the same end-to-end delay distributions between the participating nodes. We refer to the topology with the least number of hidden nodes in this equivalence class as the minimal representation. Such a minimal representation does not have redundant hidden nodes. For example, in Fig.1, the graph and its minimal representation are shown. In Procedure 1, we characterize the relationship between a graph and its minimal representation, given a set of participants. The minimal representation is obtained by iteratively removing redundant hidden nodes (degree two and less) from the graph, i.e., in the first iteration, redundant hidden nodes are removed and the resulting graph is again inspected for the presence of hidden nodes. For example, in Fig.1, the highlighted hidden nodes are redundant and are thus merged with their neighbors to obtain the minimal representation. Any algorithm can only reconstruct the unknown topology up to its minimal representation us- ing only end-to-end delay information between the participating nodes. In sparse random graphs, only a small (but a linear) number of nodes are removed in the minimal representation, and this number decreases with the average degree c. It thus suffices to reconstruct the minimal represen- tation of the original topology, and our goal is to accomplish it using small fraction of participants. We assume that the delay distributions on the edges of the minimal representation {De}e∈ eGn have bounded variances {l(e)}e∈ eGn satisfying 0 < f ≤ l(e) ≤ g < ∞, ∀ e ∈ eGn. (2) 8 3.2 Performance Measures We now define performance measures for topology discovery algorithms. It is desirable to have an algorithm which outputs a graph structure which is close to the original graph structure. However, the reconstructed graph cannot be directly compared with the original graph since the hidden nodes introduced in the reconstructed graph are unlabeled and may correspond to different hidden nodes in the original graph. To this end, we require the notion of edit distance defined below. Definition 1 (Edit Distance) Let F, G be two graphs5 with adjacency matrices AF , AG, and let V be the set of labeled vertices in both the graphs (with identical labels). Then the edit distance between F, G is defined as ∆(F, G; V ) := min π AF − π(AG)1, where π is any permutation on the unlabeled nodes while keeping the labeled nodes fixed. In other words, the edit distance is the minimum number of entries that are different in AF and in any permutation of AG over the unlabeled nodes. In our context, the labeled nodes correspond to the participating nodes while the unlabeled nodes correspond to hidden nodes. Our goal is to output a graph with small edit distance with respect to the minimal representation of the original graph. Ideally, we would like the edit distance to decay as we obtain more delay samples and this is the notion of consistency. tent if it asymptotically recovers the minimal representation of the unknown topology, i.e., Definition 2 (Consistency) Denote bGn({Dm ples between the participating nodes Vn. A graph estimator bGn({Dm i,j}i,j∈Vn), Gn; Vn) > 0] = 0. P[∆(bG({Dm lim m→∞ i,j}i,j∈Vn) as the estimated graph using m delay sam- i,j}i,j∈Vn) is structurally consis- The above definition assumes that the network size n is fixed while the number of samples m goes to infinity. A more challenging setting where both the network size and the number of samples grow is known as the setting of high-dimensional inference [17]. In this setting, we are interested in estimating large network structures using a small number of delay samples. We will consider this setting for topology discovery in this paper. Indeed in practice, we have large network structures but can obtain only few end-to-end delay samples with respect to the size of the network. This is formalized using the notion of sample complexity defined below for our setting. (3) Definition 3 (Sample Complexity) If the number of samples is m = Ω(f (n)), for some func- tion f , such that the estimator bGn({Dm P[∆(bG({Dm m,n→∞ m=Ω(f (n)) lim i,j}i,j∈Vn) satisfies i,j}i,j∈Vn), Gn; Vn) = O(g(n))] = 0, for some function g(n), then the estimator bGn is said to have sample complexity of Ω(f (n)) for achieving an edit distance of O(g(n)). Thus, our goal is to discover topology in high-dimensional regime, and design a graph estimator that requires a small number of delay samples, and output a graph with a small edit distance. 5We consider inexact graph matching where the unlabeled nodes can be unmatched. This is done by adding required number of isolated unlabeled nodes in the other graph, and considering the modified adjacency matrices [55]. 9 4 Preliminaries We now discuss some simple concepts which will be incorporated into our topology discovery algorithms. 4.1 Delay Variance Estimation In our setting, topology discovery is based on the end-to-end delays between the participating nodes. Recall that in Section 2.3, we assume general delay distributions on the edges with bounded variances. Our topology discovery algorithms will be based solely on the estimated variances using the end-to-end delay samples. We use the standard unbiased estimator for variances [56]. where ¯Dm i,j is the sample mean delay blm(i, j) := 1 m − 1 mXk=1 (Di,j(k) − ¯Dm i,j)2, ¯Dm i,j := 1 m mXk=1 Di,j(k). (4) (5) Note that we do not use an estimator specifically tailored for a parametric delay distribution, and hence, the above estimator yields unbiased estimates for any delay distribution. Our proposed algorithms for topology discovery require only the estimated delay variances {bl(i, j)}i,j∈V as inputs. Indeed, more information is available in the delay samples Dm. For instance, in [21], the higher-order moments of the delay distribution are estimated using the delay samples and this provides an estimate for the delay distribution. However, we see that for our goal of topology discovery, the estimated end-to-end delay variances suffice and yield good performance. Recall that {l(i, j)}i,j∈V denotes the true end-to-end delay variances and that from (1), the variances are additive along any path in the graph. We will henceforth refer to the variances as "distances" between the nodes and the estimated variances as "estimated distances". This abstraction also implies that our algorithms will work under input of estimates of any additive metrics. 4.2 Quartet Tests We first recap the so-called quartet tests, which are building blocks of many algorithms for dis- covering phylogenetic-tree topologies with hidden nodes [54, 57–59]. The definition of a quartet is given below. See Fig.2. Definition 4 (Quartet or Four-Point Condition) The pairwise distances {l(i, j)}i,j∈{a,b,u,v} for the configuration in Fig.2 satisfy l(a, u) + l(b, v) = l(b, u) + l(a, v), (6) and the configuration is denoted by Q(abuv). 10 PSfrag replacements a a b h1 h2 u v Figure 2: Quartet Q(abuv). See (6) and (8). In the literature on tree reconstruction, instead of (6), an inequality test is usually employed since it is more robust, given by, l(a, b) + l(u, v) < min(l(a, u) + l(b, v), l(b, u) + l(a, v)). (7) However, we use the equality test in (6), since it is also useful in detecting cycles present in random graphs. In practice, we only have access to distance estimates and we relax the equality constraint in (6) to a threshold test, and this is known as the quartet test. Thus, the quartet test is local test between tuples of four nodes. For the quartet Q = (abuv), let e denote the middle edge of the quartet6, i.e., the edge which joins a vertex on the shortest path between a and b to a vertex on the shortest path between u and v (Note that the edge can have zero length if the hidden nodes connecting a, b and u, v are the same.). The estimated length of the middle edge (h1, h2) between hidden nodes h1 and h2 is given by 2bl(h1, h2) =bl(a, u) +bl(b, v) −bl(a, b) −bl(u, v). (8) Similarly, all other edge lengths of the quartet can be calculated through the set of linear equations which are based on the fact that the end-to-end lengths in a quartet are the sum of edge lengths along the respective paths. Many phylogenetic-tree reconstruction algorithms proceed by iteratively merging quartets to obtain a tree topology. See [60] for details. We employ the quartet test for random graph discovery but it additionally incorporates the presence of cycles. Moreover, we introduce modifications under scenario 2, as outlined in Section 5.2, where second shortest path distances are available in addition to the shortest path distances between the participating nodes. 5 Proposed Algorithms 5.1 Scenario 1 We propose the algorithm RGD1 for discovering random graphs under scenario 1, as outlined in Section 2.4, where only shortest path distance estimates are available between the participating nodes. The idea behind RGD1 is similar to the classical phylogenetic-tree reconstruction algorithms based on quartet tests [54, 58]. However, the effect of cycles on such tests needs to analyzed, and is carried out in Section 6.1. The algorithm is summarized in Algorithm 2. 6Such a middle edge always exists, by allowing for zero length edges, and such trivial edges are contracted later in the algorithm. 11 The algorithm recursively runs the quartet tests over the set of participating nodes. The algorithm limits to testing only "short quartets" between nearby participating nodes. Intuitively, this is done to avoid testing quartets on short cycles, since in such scenarios, the quartet tests may fail to reconstruct the graph accurately. Since the random graphs are locally-tree like and contain a small number of short cycles, limiting to short quartets enables us to avoid most of the cycles. The idea of short quartets has been used before (e.g. in [58]) but for a different goal of obtaining low sample complexity algorithm for phylogenetic-tree reconstruction. We carry out a detailed analysis on the effect of cycles on quartet tests in Section 6.1. In algorithm RGD1, we consider short quartets, where all the estimated distances between the quartet end points are at most Rg + τ , where g is the upper bound on the (exact) edge lengths in the original graph, as assumed in (2). Thus, R′ := Rg/f is the maximum number of hops between the end points of a short quartet, where f is the lower bound on the edge lengths. We refer to R′ as the diameter of the quartet. This needs to be chosen carefully to balance the following two events: encountering short cycles and ensuring that most hidden edges (with at least one hidden end point) are part of short quartets. The parameter τ is chosen to relax the bound, since we have distance estimates, computed using samples, rather than exact distances between the participating nodes. The short quartets are listed in arbitrary order in Q. The algorithm attempts to merge the quartets in Q, one at a time, with the previously con- needs to be done in such a scenario; or the quartet may be merged without creating new cycles. merge Q(abuv), additional testing needs to be carried out. Firstly, if it is a short cycle (of length less than 2Rg + τ ), then the algorithm cannot be guaranteed to merge Q(abuv) accurately and it is listed as a bad quartet. Secondly, if it is not a short cycle, the algorithm needs to infer the joining structed graph bGn using procedure QuartetMerge. There are different possibilities during this process. The quartet under consideration, say Q(abuv), may be already satisfied in bGn: nothing This is carried out using procedure TreeMerge. Alternatively, if a cycle needs to be created in bGn to points between the existing paths in bGn and the new path to be created. This is carried out using quartets in W without creating new cycles in bGn, and then attempts to merge Q(abuv) by using existing hidden nodes in the paths to create a new (long) cycle and checking if it conflicts with the distances on quartets in W. There is a tolerance of ǫ′ for checking distance conflicts. In the end, any edge smaller than a threshold ǫ are contracted, for some chosen constant ǫ < f , where f is the lower bound on the edge lengths of the original graph. procedure CycleMerge and entails the presence of "witnesses" W ⊂ Q, which are (remaining) short quartets whose nodes are within distance 2R from a, b, u, v. The algorithm attempts to merge the The quartets that fail to be merged using the above procedure are listed as bad quartets. These set of quartets cannot be guaranteed to be merged accurately. Any post-processing heuristic can be used to attempt the merging of these bad quartets. Our analysis accounts for these bad quartets towards contributing to the edit distance between the reconstructed graph and the minimal representation of the original graph. The above algorithm is similar in spirit to quartet merging algorithm proposed in [58], but with the crucial addition of CycleMerge procedure to handle the presence of cycles. 5.2 Scenario 2 We now consider scenario 2, as outlined in Section 2.4, where second shortest path distance esti- mates are available in addition to shortest path distance estimates between the participating nodes. We propose RGD2 algorithm for this case, which is summarized in Algorithm 3. 12 tance Estimates. edge lengths and parameters R, τ, ǫ, ǫ′ > 0. Initialize list of short quartets: Q = {Q(abuv) : max Algorithm 2 RGD1({bl(i, j)}i,j∈Vn ; R, g, τ, ǫ, ǫ′) for Topology Discovery Using Shortest-Path Dis- Input: Distance estimates between the participating nodes {bl(i, j)}i,j∈Vn , upper bound g on exact i,j∈{a,b,u,v}bl(i, j) < Rg + τ}, list of bad quartets Qbad = ∅ and reconstructed graph bGn = (Vn,∅). [bGn, Fail] ← QuartetMerge(bGn, Q(abuv),Q,{bl(i, j)}i,j∈Vn ; ǫ, ǫ′). while Q 6= ∅ do Q(abuv) ← Pop(Q). Q ← Q \ {Q(abuv)}. if Fail then Qbad ← Qbad ∪ {Q(abuv)}. end if end while Use any heuristic to merge bad quartets in Qbad. The algorithm RGD2 is an extension of RGD1, where we use the second shortest distances in the quartet tests, in addition to the shortest distances. For each tuple of participating nodes a, b, u, v ∈ Vn, the quartet test in (6) is carried out for all possible combinations of shortest and second shortest distances; only short quartets are retained, where all the distances used for quartet test are less than the specified threshold (which is the same as in RGD1). If the same quartet is formed using different combinations of shortest and second shortest distances, only the quartet with the shorter middle edge, computed using (8), is retained. We clarify the reason behind this rule and give examples on when this can occur in Section 6.1. As before, all these quartets are merged with previously constructed graph using procedure QuartetMerge, but with a minor difference that the path lengths need to be checked since there may be multiple paths between participating nodes with different lengths. The performance analysis for RGD2 is carried out in Section 6.3. 6 Analysis Under Exact Distances We now undertake performance analysis for the proposed topology discovery algorithms RGD1 and RGD2. In this section, for simplicity, we first analyze the performance assuming that exact distances between the participating nodes are input to the algorithms. Analysis when distance estimates are input to the algorithms is considered in Section 7. 6.1 Effect of Cycles on Quartet Tests We now analyze the effect of cycles on quartet tests. Recall that the quartet test is the inequality test in (6), and if this inequality test is satisfied, internal edge lengths of the quartet are computed, and they are added to the output using procedure QuartetMerge. The quartet test in (6) is based on the assumption that the shortest paths between the four nodes {a, b, u, v} in the quartet are along the paths on the quartet. Thus, the outcome of the quartet test is incorrect only when some shortest path between {a, b, u, v} is outside the quartet. We refer to such quartets as "bad quartets". There are two 13 and Second Shortest-Path Distance Estimates. bound g on exact edge lengths and parameters R, τ, ǫ, ǫ′ > 0. Initialize list of short quartets: Q = {Q(abuv) : max Algorithm 3 RGD2({bl(i, j),bl2(i, j)}i,j∈Vn ; R, g, τ, ǫ, ǫ′) for Topology Discovery Using Shortest-Path Input: Shortest-path and second shortest-path distance estimates {bl(i, j),bl2(i, j)}i,j∈Vn upper i,j∈{a,b,u,v}bl(i, j) < Rg + τ}, list of bad quartets Qbad = ∅ and reconstructed graph bGn = (Vn,∅). [bGn, Fail] ← QuartetMerge(bGn, Q(abuv),Q,{bl(i, j),bl2(i, j)}i,j∈Vn ; ǫ, ǫ′). while Q 6= ∅ do Q(abuv) ← Pop(Q). Q ← Q \ {Q(abuv)}. if Fail then Qbad ← Qbad ∪ {Q(abuv)}. end if PSfrag replacements a end while Use any heuristic to merge bad quartets in Qbad. a b w h3h4 h1 u y h2 x z v CycleMerge Procedure. In order to create a new path between h1 and h2 (shown using dotted lines according to length specified by quartet Q(abuv)), the quartet Q(wxyz) is used as a witness to Figure 3: An example on the use of witnesses for creating new paths in the existing graph bG in verify if h3 and h4 are the joining points of the existing path in bG with the new path. possible outcomes for bad quartets (a) the procedure QuartetMerge detects inconsistencies in the set of linear equations, used to compute the internal distances in the quartet, and does not merge the quartet, or (b) the procedure QuartetMerge does not detect inconsistencies, and thus merges a fake quartet with wrong internal edge lengths. Both these outcomes result in reconstruction error. The examples of both the cases are given in Fig.5. Note that the set of linear equations used by the procedure QuartetMerge for computing the internal edge-lengths in the quartet consist of 5 variables and 6 equations (corresponding to the 6 known edge-lengths between the quartet end- points). Additionally, there is an equality constraint that l(a, u)+l(b, v) = l(a, v)+l(b, u). The case in Fig.5a does not satisfy this equality constraint7, since the cycle is in the middle of the quartet, and thus the procedure QuartetMerge does not merge this quartet. On the other hand, for the case in Fig.5b, the equality constraint is satisfied, since the cycle is on the same side of the quartet, and in this case, the procedure QuartetMerge merges the quartet, but with wrong edge lengths, as shown in Fig.5c. Thus, bad quartets lead to reconstruction error. The number of bad quartets can be bounded 7There exist pathological cases of equal distances where configurations of the form in Fig.5a will satisfy equality constraint. Such scenarios do not occur in a.e. random graph. 14 path lengths. Fail ← False. Procedure 4 QuartetMerge(bGn, Q(abuv)),Q,{bl(i, j), [bl2(i, j)]}i,j∈Vn ; ǫ, ǫ′) for merging a new quar- tet Q(abuv) with current structure bGn. Input: Current graph bG, candidate quartet Q(abuv), remaining short quartets Q, shortest dis- tance estimates between the participating nodes {bl(i, j)}i,j∈Vn and optionally second shortest distances {bl2(i, j)}i,j∈Vn , threshold ǫ for contracting short edges and tolerance ǫ′ for comparing if For each i, j ∈ {a, b, u, v}, bl(i, j; bG) −bl(i, j; Q) < ǫ′ (All paths already present in bG) then else if For each i, j ∈ {a, b, u, v}, either bl(i, j; bG) −bl(i, j; Q) < ǫ′ orbl(i, j; bG) = ∞ (Either the paths agree or the path does not exist in bG) then bGn ← TreeMerge(bGn, Q(abuv), ǫ′), Fail ← False. (Merge quartet without creating cycles). else if ∃ i, j ∈ {a, b, u, v} such thatbl(i, j; bG) +bl(i, j; Q) < 2Rg + τ (A merge would create a short if Second shortest distances {bl2(i, j)}i,j∈Vn , are available then Use second shortest distances between a, b, u, v to infer the join points in bG. If the points are consistently found, add quartet Q(abuv) to bG and output Fail ← False. Else output Fail ← True. (Report failure due to inconsistent distances). Fail ← True. (Report failure due to presence of a short cycle). cycle) then else end if else [bGn, Fail] ← CycleMerge(bGn, Q(abuv),Q,{bl(i, j), [bl2(i, j)]}i,j∈Vn , [{bl2(i, j)}i,j∈Vn ]; ǫ′). (Attempt to merge quartet by creating a new long cycle and querying witnesses, if no witnesses are present, create a new path, else if witnesses are contradictory output fail). end if Contract any edge (with at least one hidden end point) with length < ǫ. as follows: in a bad quartet, the middle edge of the quartet is part of a (generalized) cycle of length less than 2R′, where R′ := Rg/f is the maximum number of hops between the endpoints of a short quartet, as discussed in Section 5.1. In addition, the bad quartets also affect the merging of quartets using CycleMerge procedure when they are called upon to serve as witnesses. Thus, we also need to consider quartets which are part of slightly longer cycles. See Appendix B for details. The number of such bad quartets can be bounded for random graphs leading to reconstruction guarantees for RGD1 algorithm. For the RGD2 algorithm where second shortest path distances are additionally available, bad quartets do not adversely affect performance. We argue that a quartet is correctly recognized as long as the paths on the quartet correspond to either the shortest or the second shortest paths (between the quartet endpoints). In such a scenario, some combination of shortest and second shortest path distances exists which accurately reconstructs the quartet and the RGD2 algorithm finds all such combinations. Moreover, fake quartets are detected since they produce a longer middle edge than the true quartet. This is because the cycle shortens the distance between end points on its side (in Fig.5b, this corresponds to {a, b} and note that the middle edge in Fig.5c is longer than the true edge length). Thus, a quartet is correctly reconstructed under RGD2 when the paths on the quartet consist of 15 without creating cycles. Assign h as h2. end if Assign h as h1. end if tolerance ǫ′ for comparing path lengths. Procedure 5 TreeMerge(bGn, Q(abuv)); ǫ′) for merging a new quartet with current structure bGn Input: Current graph bG, candidate quartet Q(abuv) with hidden nodes h1, h2 (See Fig.2), and if There exists hidden node in bG such that bl(i, h; bG) −bl(i, h1; Q) < ǫ′ for i = a, b then if There exists hidden node in bG such that bl(i, h; bG) −bl(i, h2; Q) < ǫ′ for i = u, v then Connect paths in bG according to Q which are missing as follows: If both h1 and h2 are assigned in bG, connect h1 and h2 in bG and assign lengthbl(h1, h2; Q) if they are not already connected in bG. If say h1 is assigned and the path between a and h1 exists in bG but not between b and h1, let l ← minw 0.5(bl(w, b) +bl(h1, b; Q) −bl(h1, w; bG) over all w ∈ bG such that bl(w, b) < Rg + τ . l <bl(h1, b; Q), split pathbl(h1, w; bG), add new hidden node h3 such thatbl(h3, w; bG) =bl(b, w) − l the lengths in Q. Otherwise, also add new paths to bG. and attach b to h3 with length l; otherwise create a new path between h1 and b. Similarly split the other paths if present or create new paths. If the paths exist but not the hidden nodes, split the paths and add hidden nodes according to PSfrag replacements a If a u h1 h2 b v Figure 4: A bad quartet: l(a, b) < l(a, h1) + l(b, h1). Since the maximum number of hops between {a, b, u, v} is R′ := Rg/f , and one of the shortest paths is not along the quartet, the middle edge (h1, h2) is part of a generalized cycle of (hop) length less than 2R′. Such quartets are detected by the RGD1 algorithm. shortest or second shortest paths. We finally use the locally tree-like property of random graphs to establish that this occurs in almost every graph if the quartet diameter R′ is small enough. Thus, we obtain stronger reconstruction guarantees for RGD2 algorithm. 6.2 Analysis of RGD1 We now provide edit distance guarantees for RGD1 under appropriate choice of maximum quartet diameter R′ := Rg/f . We analyze the edit distance by counting the number of hidden edges (with at least one hidden end point) which are not recovered correctly under RGD1. A hidden edge is not recovered when one of the following two events occur: (a) it is not part of a short quartet (b) it is part of a bad short quartet. A large value of the quartet diameter R′ decreases the likelihood of event (a), while it increases the likelihood of event (b), i.e., we are likely to encounter more cycles as R′ is increased. For a fixed value of R′, we analyze the likelihood of these two events and obtain 16 using short quartets "near" to a, b, u, v. Also use second shortest distances if available and they are less than 2Rg + τ ). for Each Q(wxyz) ∈ W do Procedure 6 CycleMerge(bGn, Q(abuv)),Q,{bl(i, j)}i,j∈Vn ; ǫ′) for merging a new quartet with cur- rent structure bGn by creating cycles. Input: Current graph bG, candidate quartet Q(abuv) with hidden nodes h1, h2 (See Fig.2), re- maining short quartets Q, shortest distance estimates {bl(i, j)}i,j∈Vn and optionally second short- est distance estimates {bl2(i, j)}i,j∈Vn and tolerance ǫ′ for comparing path lengths. W ← {Q(ijkl) : Q(ijkl) ∈ Q,∪x,y∈{i,j,k,l,a,b,u,v}bl(x, y) < 2Rg + τ}. (Find potential witnesses by if For i, j ∈ {w, x, y, z}, either bl(i, j; bG) −bl(i, j; Q) < ǫ′ orbl(i, j; bG) = ∞ (Either the paths agree in the two graphs or the path does not exist in bG) then bGn ← TreeMerge(bGn, Q(wxyz), ǫ′), Fail ← False. (Merge all quartets in W which do not To create new paths in bG according to Q(abuv), consider all hidden nodes on paths in bG as If the witnesses are absent or contradictory, output Fail ← True. Else, add the new path to bG candidates for positions where the paths split. Query the quartet corresponding to these hidden nodes for verification. (See Fig.3 for an example). create cycles). end if end for and output Fail ← False. the bound on edit distance stated below. Assume that the algorithm RGD1 chooses parameter R as where Rmin ≤ R ≤ Rmax, Rmin := 2 log 9 log n (√c−1)2 log 3 , Rmax := 6 log n 5 log c . Let the fraction of participating nodes be ρn = n−β, such that implying that γ > 2β, where Similarly, define µ as R−Rmin 2 ρnc = ω(1), γ := log c log n (R − Rmin). µ := R log c ξ(c) log n , (9) (10) (11) (12) (13) where ξ(c) is a function that depends on the average degree c of the original Erdos-R´enyi random graph, and is given by ξ(c) := 1 − e−c − ce−c − 0.5c2e−c. (14) Recall that f and g are the bounds on edge lengths according to (2). We have the following result. 17 PSfrag replacements PSfrag replacements a a PSfrag replacements a a b h1 h2 u v a b h1 h2 u v a 1.5 h1 1.5 b h2 1.5 u 1 1 v (a) Bad Quartet Where Test Fails. (b) Bad Quartet Where Test Suc- ceeds. (c) Reconstructed Quartet for (b). Figure 5: Two possible outcomes for bad quartets in (a) and (b). Assume all unit-length edges. In (a), the procedure QuartetMerge fails and quartet is not declared, while in (b), it succeeds but leads to wrong edge estimates, as shown in (c). Theorem 1 (Edit Distance Under RGD1) The algorithm RGD1 recovers the minimal represen- tation eGn of the giant component of a.e. graph Gn ∼ G(n, c/n) with edit distance ∆(bGn,eGn; Vn) = O(n5µg/f−4β). (15) Remarks: (i) Thus, an edit-distance guarantee can be provided under RGD1 when the parameter R is chosen according to the constraints mentioned above. A sufficient condition to achieve a sub-linear edit distance above under homogeneous edge lengths (f = g) is when 10β(1 + δ) log c ξ(c) log c − 4β < 1, (16) for some constant δ > 0. When c → ∞, we have ξ(c) → 1 and in this regime, we have that β < 1/6. 5 In other words, approximately n 6 nodes need to participate to achieve a sub-linear edit distance under RGD1. (ii) When the ratio of the bounds on the edge lengths g/f is small (i.e., the edge lengths are nearly homogeneous), the edit-distance guarantee in (15) improves, for a fixed ρ. This is because we can control the hop lengths of the selected quartets more effectively in this case. (iii) The dominant event leading to the edit-distance bound in (15) is the presence of bad quartets due to short cycles in the random graph. In subsequent section, we show that RGD2 algorithm effectively handles this event using the second shortest path distances. Proof Ideas: The proof is based on the error events that can cause the quartet tests to fail. The first error event is that an edge which does not occur as a middle edge of a short quartet, meaning that there are not enough participating nodes within distance R/2 from it. The second error event is that an edge occurs as a middle edge of a bad quartet, meaning that it is close to a short cycle or it has bad quartets as witnesses. We analyze the probability of these events and the resulting edit distance due to these events. 6.3 Analysis of RGD2 We now provide edit distance guarantees for RGD2 algorithm. The analysis is on the lines of the previous section, but we instead analyze the presence of overlapping cycles, as noted in Section 6.1. 18 There are no overlapping short cycles in a random graph, and thus, we can provide a much stronger reconstruction guarantee for the RGD2 algorithm, compared to the RGD1 algorithm. We have the following result. Theorem 2 (Edit Distance Under RGD2) Under the assumptions of Theorem 1, the algorithm RGD2 recovers the minimal representation eGn of the giant component of a.e. graph Gn ∼ G(n, c/n) with edit distance The above result immediately implies that consistent recovery of the minimal representation is possible when there are enough number of participating nodes. We state the result formally below. ∆(bGn,eGn; Vn) = O(n8µg/f−4β−1). (17) Corollary 1 (Consistency Under RGD2) The algorithm RGD2 consistently recovers the mini- mal representation Gn of the giant component of a.e. graph Gn ∼ G(n, c/n), when the parameter R and the fraction of participating nodes ρ satisfy or equivalently f ξ(c)(cid:19) 8Rg (cid:18) c ρ4 = o(n), R−Rmin 2 c ρ = ω(1), 8µg f − 4β < 1, γ > 2β. Remarks: (i) From the above constraints, we see that consistent topology recovery is feasible. Thus, for homogeneous edge lengths (f = g), as c → ∞ and the number of participants is more than n11/12, RGD2 consistently recovers the topology. Thus, a sub-linear number of participants suffice to recover the minimal representation consistently. (ii) Thus, the availability of second shortest distances makes consistent topology discovery possible with a sub-linear number of participating nodes, while consistent recovery is not tractable under RGD1 using only shortest-path distances between a sub-linear number of participants. Proof Ideas: The proof is on similar lines as in Theorem 1, but with modified error events that cause the quartet tests to fail. As before, the first error event is that an edge which does not occur as a middle edge of a short quartet. The second error event is now that an edge is close to two overlapping short cycles instead of being close to a single short cycle. This event does not occur in random graphs for sufficiently short lengths, and thus, we see a drastic improvement in edit distance. 7 Analysis Under Samples We have so far analyzed the performance of RGD1 and RGD2 algorithms when exact distances (i.e., delay variances) are input to the algorithm. We now analyze the scenario when instead only delay samples are available and estimated variances are input to the algorithm. We show that the proposed algorithms have low sample complexity, meaning they require slow scaling of number of samples compared to the network size to achieved guaranteed performance. The result is given below. 19 Theorem 3 (Sample Complexity) The edit distance guarantees under RGD1 and RGD2 algo- rithms, as stated in Theorem 1 and Theorem 2, are achieved under input of estimated delay vari- ances, if the number of delay samples satisfies m = Ω(poly(log n)). (18) Thus, the sample complexity of RGD1 and RGD2 algorithms is poly(log n). In other words, the size of the network n can grow much faster than the number of delay samples m, and we can still obtain good estimates of the network. This implies with m = Ω(poly(log n)) samples, we can consistently discover the topology under RGD2 algorithm, given sufficient fraction of participating nodes. Proof Ideas: The proof follows from Azuma-Hoeffding inequality for concentration of individual variance estimates, as in [21, Proposition 1], and then consider the union bound over various events. 8 Converse Results & Discussion 8.1 Fraction of Participating Nodes We have so far provided edit distance guarantees for the proposed topology discovery algorithms. In this section, we provide a lower bound on the fraction of participating nodes required for any algorithm to recover the original graph up to a certain edit distance guarantee. We can obtain a meaningful lower bound only when the specified edit distance is lower than the edit distance between a given graph and an independent realizations of the random graph. Otherwise, the edit distance guarantee could be realized by a random construction of the output graph. To this end, we first prove a lower bound on the edit distance between any fixed graph and an independent realization of the random graph. Let D(G; δ) denote the set of all graphs which have edit distance of at most δ from G D(G; δ) := {F : ∆(F, G;∅) < δ}. (19) Lemma 1 (Lower Bound on Edit Distance) Almost every random graph Gn ∼ G(n, c/n) has an edit distance at least (0.5c − 1)n from any given graph Fn. Proof: First, we have for any graph Fn edges and the size of B is and we use the bound that(cid:0)N since we can permute the n vertices and change at most δn entries in the adjacency matrix AF k )k3k. Let B denote the set of graphs having exactly cn 2(cid:19) ≥ ( )cn/2 = ( )cn/2. n c We can now bound the probability that a random graph Gn ∼ G(n, c/n) belongs to set D(Fn; δn) for any given graph Fn is (20) 2 2 δn(cid:19) < n(δ+1)n3δn, D(Fn; δn) ≤ n! ·(cid:18) n2 k(cid:1) ≤ N k k! ≤ ( N B =(cid:18) n2 n2 cn 2 cn P[Gn ∈ D(Fn; δn)] ≤ P[Gn ∈ D(Fn; δn)] P[Gn ∈ B] 20 D(Fn; δn) max g∈D(Fn;δn) P[Gn = g] ≤ B min g∈B ≤ D(Fn; δn) (a) B P[Gn = g] = n(δ+1−c/2)n3δn, where inequality (a) is due to the fact that ming∈B P[Gn = g] ≥ maxg∈S(Fn) P[Gn = g] (i.e., the mode of the binomial distribution). Hence, P[Gn ∈ D(Fn; δn)] decays to zero as n → ∞, when δ < 0.5c − 1. Thus, for any given graph, a random graph does not have edit distance less than (0.5c−1)n from it. It is thus reasonable to expect for any graph reconstruction algorithm to achieve an edit distance less than (0.5c − 1)n, since otherwise, a random choice of the output graph could achieve the same edit distance. We now provide a lower bound on the fraction of the participating nodes such that no algorithm can reconstruct the original graph up to an edit distance less than (0.5c − 1)n. Theorem 4 (Lower Bound) For Gn ∼ G(n, c/n) and any set of participants Vn, for any graph estimator bGn using (exact) shortest path distances between the participating node pairs, we have ✷ P[∆(bGn, Gn; V ) > δn] → 1, when V 2 < M n(0.5c − δ − 1) log log n log n , (21) for a small enough constant M > 0 and any δ < (0.5c − 1). Thus, no algorithm can reconstruct Gn up to edit distance δn, for δ < 0.5c− 1, if the number of participating nodes is below a certain threshold. From Lemma 1, almost every random graph has an edit distance greater than (0.5c − 1)n from a given graph. Thus, when the number of participating nodes is below a certain threshold, accurate reconstruction by any algorithm is impossible. Remarks: (i) The lower bound does not require that the participating nodes are chosen uniformly and holds for any set of participating nodes of given cardinality. (ii) The lower bound is analogous to a strong converse in information theory [61] since it says that the probability of edit distance being more a certain quantity goes to one (not just bounded away from zero). (iii) The result is valid even for the scenario where second shortest path distances are used since the maximum second shortest path distance is also O(log n). (iv) We have earlier shown that our algorithms RGD1 and RGD2 have good performance under a sub-linear number of participants. Closing the gaps in the exponents between lower bound and achievability is of interest. Proof Ideas: The proof is based on information-theoretic covering type argument, where cover the range of the estimator with random graphs of high likelihood. Using bounds on binomial distribution, we obtain the desired lower bound. 8.2 Non-Identifiability of General Topologies Our proposed algorithms require the knowledge of shortest and second shortest path distances. Performance analysis reveals that the knowledge of second shortest path can greatly improve the 21 PSfrag replacements a h1 h2 a u b v w PSfrag replacements h1 h2 a u b v w Figure 6: Example of two graphs with unit lengths where nodes a, b, u, v, w are participating. Even under all path length information between the participating nodes, the two graphs cannot be distinguished. accuracy of topology discovery for random graphs. We now address the question if this can be accomplished in general. To this end, we provide a counter-example in Fig.6, where a significant fraction of nodes are par- ticipating, and we are given distances along all the paths between the participants; yet, the topology cannot be correctly identified by any algorithm. This reveals a fundamental non-identifiability of general topologies using only a subset of participating nodes. 8.3 Relationship to Phylogenetic Trees We note some key differences between the phylogenetic-tree model [49] and the additive delay model employed in this paper. In phylogenetic trees, sequences of extant species are available, and the unknown phylogenetic tree is to be inferred from these sequences. The phylogenetic-tree models the series of mutations occurring as the tree progresses and new species are formed. Efficient algorithms with low sample complexity have been proposed for phylogenetic-tree reconstruction, e.g., in [58, 62]. In the phylogenetic-tree model, the correlations along the phylogenetic tree decay exponentially with the number of hops. This implies that long-range correlations (between nodes which are far away) are "hard" to estimate, and require large number of samples (compared to the size of the tree) to find an accurate estimate. However, under the delay model, the delays are additive along the edges, and even long-range delays can be shown to be "easy" to estimate. Hence, the delay model does not require the more sophisticated techniques developed for phylogenetic-tree reconstruction (e.g., [62]), in order to achieve low sample complexity. However, the presence of cycles complicates the analysis for delay-based reconstruction of random graphs. Moreover, we developed algorithms when additional information is available in the form of second shortest-path distances. Such information cannot be obtained from phylogenetic data. We demonstrated that this additional information leads to drastic improvement in the accuracy of random-graph discovery. 9 Conclusion In this paper, we considered discovery of sparse random graph topologies using a sub-linear number of uniformly selected participants. We proposed local quartet-based algorithms which exploit the locally tree-like property of sparse random graphs. We first showed that a sub-linear edit-distance guarantee can be obtained using end-to-end measurements along the shortest paths between a 22 sub-linear number of participants. We then considered the scenario where additionally, second shortest-path measurements are available, and showed that consistent topology recovery is feasible using only a sub-linear number of participants. Finally, we establish a lower bound on the edit distance achieved by any algorithm for a given number of participants. Our algorithms are simple to implement, computationally efficient and have low sample complexity. There are many interesting directions to explore. Our algorithms require the knowledge of the bounds on the delay variances (i.e., edge lengths), and algorithms which remove these requirements can be explored. Our algorithms are applicable for other locally tree-like graphs as well, while the actual performance indeed depends on the model employed. Exploring how the reconstruction performance changes with the graph model is of interest. In many networks, such as peer-to-peer networks, there is a high churn rate and the nodes join and leave the networks, and it is of interest to extend our algorithms to such scenarios. Moreover, we have provided reconstruction guarantees in terms of edit distance with respect to the minimal representation, and plan to analyze reconstruction of other graph-theoretic measures such as the degree distribution, centrality measures, and so on. While we have assumed uniform sampling, other strategies (e.g., random walks) need to analyzed. We plan to implement the developed algorithms developed on real-world data. Acknowledgements The authors thank the anonymous reviewers for comments which significantly improved this paper. The first author is supported in part by the setup funds at UCI and the AFOSR Award FA9550- 10-1-0310. A Properties of Random Graphs We first note the number of cycles in random graphs. Lemma 2 (Cycles in Erdos-R´enyi Random Graphs) In Gn ∼ G(n, c n ), the expected number of cycles of lengths l is O(cl). Moreover, the number of two overlapping cycles of length l, denoted by Hl, satisfies E[NHl] = O(n−1c2l+1). (22) for δ > 0. Thus, there are a.a.s. no overlapping cycles of length less than (1−δ) log n 2 log c Proof: argument, the expected number of cycles is given by The proof is along the lines of [18, Cor. 4.9], but we specialize it for cycles. By counting E[NC(l)] =(cid:18)n l(cid:19) l! 2l(cid:16) c n(cid:17)l = O(cl). Let number of vertices in H, be v(Hl) = s with l < s ≤ 2l. Note that the number of edges Hl ≥ s + 1 to be overlapping cycles. Hence, E[NHl] ≤(cid:18)n s(cid:19)(s!)(cid:16) c n(cid:17)s+1 = O(n−1cs+1), and we obtain the desired result. ✷ 23 Since we are dealing with the minimal representative eGn obtained by contracting nodes of degree < 3 in the original random graph Gn′, we need to derive its distribution. First note that n = Θ(n′) a.a.s., where n′ is the number of nodes in the original graph. On lines of [63, Lemma 4.4] and [63, Lemma 5.1], conditioned on n nodes in the minimal representative, the resulting graph is Erdos-R´enyi, conditioned on the event that the minimum degree is at least three and denote this distribution as G′(n, c We now obtain a lower bound on the size of the neighborhood in l hops in G′(n, c/n). Let Γl(i) n ). We have the following result. denote the set of nodes at graph distance l from node i in G′(n, c n ). Lemma 3 (Neighborhood in G′(n, c at least 1 − o(1/n), n )) For each node i in graph eGn ∼ G′(n, c 1 n ), with probability for all l0 ≤ l ≤ 3 log n 5 log c , where Γl(i) ≥ (√c − 1)2 cl−l0 log n, log 9 log n (√c−1)2 log 3 . l0 ≤ Moreover, the number of two overlapping cycles of length l, denoted by Hl, satisfies E′[NHl] = O(cid:18) n−1c2l+1 ξ(c)l (cid:19) . Let E′[NCl] denote the expected number of cycles of length l in random graph G′(n, c/n) Proof: and let E[NCl] denote the corresponding number in Erdos-R´enyi random graph G(n, c/n). Let Λn(l) denote the event that all given l nodes have degree at least three in G(n, c/n), and let Φn(l) denote the event that all given l nodes have degree at least three in G(n, c/n) and have edges only to nodes other than the given l nodes. Thus, we have that E′[NCl] = E[NClΛ(l)] = E[NCl1Λ(l)] P[Λ(l)] ≤ E[NCl] P[Λ(l)] = O (cid:18) c ξ(c)(cid:19)l! , 24 Proof: minimum degree of three. Let l0 denote the first time when The proof is along the lines of [64, Lemma 6] but with modification to account for the Γl0(i) ≥ 9 log n (√c − 1)2 . (25) Since the minimum degree is at least three, l0 is given by (24). The rest of the proof proceeds along the lines of [64, Lemma 6]. ✷ We now provide bounds on the number cycles in G′(n, c Lemma 4 (Cycles in G′(n, c n ), the expected number of cycles of lengths l is n ). Let ξ(c) := 1 − e−c − ce−c − 0.5c2e−c. n )) In eGn ∼ G′(n, c E′[NCl] = O (cid:18) c ξ(c)(cid:19)l! . (23) (24) (26) (27) (28) where 1 denotes indicator event and P[Λn(l)] ≥ P[Φn(l)] = (P[Φn(1)])l n→∞= ξ(c)l, (29) where the last result is from the fact that the asymptotic degree distribution of a node is the Poisson distribution. Similarly we have the other result on number of overlapping cycles. ✷ B Proof of Theorem 1 To prove the reconstruction guarantees for RGD1 algorithm, we first characterize "good" events which lead to accurate addition of edges in each step of RGD1 algorithm. We then bound the number of "bad" events which leads to an edit distance guarantee between the reconstructed graph bG by RGD1 algorithm (under exact distances) and the minimal representation of the original graph eG. Recall in Section 6.1, we introduced the concept of bad quartets, where a middle hidden node is part of a cycle of length less than 2R′ hops in the original graph Gn, where R′ = Rg/f . Such quartets have wrong edge lengths or are not discovered. We weaken the criterion for bad quartets as those, where a middle hidden node is part of a (generalized) cycle of length less than 3R′ hops. We note that this suffices to guarantee the presence of good witnesses which leads to accurate merging of the quartet under consideration. We prove this fact below. Lemma 5 (Correctness of RGD1 for good quartets) Given a minimal representation eG and a set of observed nodes V , conditioned on the event that every edge in eG is part of a short quartet (with edge lengths less than Rg + τ ), each short quartet is successfully and accurately merged by RGD1 when its middle hidden node is not part of a (generalized) cycle of length less than 3R′ hops. Proof: The proof proceeds by induction on the steps of RGD1. Initially the graph is empty and (i.e., either the hidden nodes and paths are not yet added, or if there are added are correct). If TreeMerge procedure is called by RGD1 algorithm in this step, it is accurate since it correctly since the quartet added is good, it is correct. At any step, assume that the graph bG is accurate Let Q(abuv) be the quartet to be merged with bG and let h1 and h2 be its two hidden nodes. adds the quartet Q(abuv) to bG. If CycleMerge procedure is called instead, the quartet Q(abuv) is accurately merged if the join points between the existing paths in bG and the new paths to be created are correct. Note that the distance between hidden nodes h1 and h2 to be added and the join points to be inferred is at most R′ hops. Since each of the join points is part of the short quartet, these short quartets are part of the witness set W. If the witness quartets are not part of cycles of length less than 2R′ hops, then they are guaranteed to be of the correct length and the join points for Q(abuv) are correctly discovered. This implies that the middle nodes in Q(abuv) is accurate upon merging Q(abuv). This implies the correctness of RGD1 at each step and thus, the above statement holds. are required to be not part of generalized short cycles of length less than 3R′. Thus, the graph bG Thus, the above result implies that the errors occur due to the following events: let E1(e; eGn, Vn) denote the event that the edge e is not a middle edge in any short quartet. Let E2(v; eGn, Vn) denote the event that the node v is the middle node of a bad short quartet, and let Kv denote the number of such bad short quartets (with participating nodes as end points and v as one of the middle ✷ 25 nodes). The edit distance satisfies ∆(bGn,eGn; Vn) ≤ Xv∈ eGn (Deg(v; eGn) + 6Kv) I[E2(v)] + 2n2 Xe∈Gn I[E1(e)]. (30) This is because under event E2(v), v is the middle node of a bad quartet, either it is not recon- structed, in which case, it contributes an edit distance of at most Deg(v), or the bad quartet is reconstructed with wrong edge lengths. In this case, it amounts to adding three wrong edges and not reconstructing the three correct edges. Thus, the edit distance is at most 6Kv, where Kv is the number of bad quartets having v as a middle node under this event. For event E1(e), where there is no short quartet containing e as a middle edge, we use the trivial bound on the edit distance as 2n2. For the event E1(e), we have since E c endpoints of e. We now have 1(e; Gn, Vn)] = {Vn ∩ BR/2(v1;eGn) ≥ 2}∩{Vn ∩ BR/2(v2; eGn) ≥ 2}, where v1 and v2 are the P[E1(e; Gn, Vn)] ≤ 2 max v∈V P[Vn ∩ BR/2(v; eGn) < 2], PhVn ∩ BR/2(v; eGn) < 2(cid:12)(cid:12)(cid:12)BR/2(v; eGn) ≥ ki ≤ (1 − ρ)k(cid:18)1 + ρ 1 − ρ(cid:19) . We have a lower bound on BR/2(v; eGn) from Lemma 3. Hence, for where Rmin and Rmax are given by (10), with probability 1 − o(n−1), we have Rmin ≤ R ≤ Rmax, for some constant δ > 0. Thus, BR/2(v) ≥ (1 − δ)c(R−Rmin)/2, P[V ∩ BR/2(v) < 2] ≤ (1 − ρ)(1−δ)c(R−Rmin )/2 (1 + ρ 1 − ρ ). (31) (32) For the second event E2, that the edge v is a part of a bad quartet, this occurs when it is part of a (generalized) cycle of length less than 3R′, where R′ = Rg/f = γg log n f log c . We have from Lemma 4, The number of bad short quartets Kv satisfies P[E2(v; eGn, Vn)] = P[v ∈ C(3R′;eGn)], ξ(c)(cid:19)3R′! . P[e ∈ C(3R′; eGn)] = O (cid:18) c Kv = O(ρ4c2R′ ), 26 since Kv ≤ Vn ∩ BR′/2(v; eGn)4 and E[Vn ∩ BR′/2(v; eGn)] ≤ ρ(cid:18) c ξ(c)(cid:19)R′/2 , and using Chernoff bounds, we have Vn ∩ BR′/2(v; Gn) = O(ρ(c/ξ(c))R′ /2) with probability 1 − o(n−1). Thus, the expected edit distance is E[∆(bGn, eGn; Vn)] = O(n4(1 − ρ)(1−δ)c(R−Rmin )/2 + O (cid:18) c ξ(c)(cid:19)5R′ ρ4! . ) (33) Let ρn = n−β. We have (1 − ρ)Θ(c(R−Rmin)/2) = O(exp[−nγ/2−β]), when γ > 2β and γ := log c O(n5µg/f−4β), and is the dominant error event. Thus, the expected edit distance is log n (R − Rmin). When (c/ξ(c))R′ = nµg/f , the second term in (33) is By Markov inequality, we have the result. E[∆(bGn, eGn; Vn)] = O(n5µg/f−4β ). C Proof of Theorem 2 The proof follows the lines of proof of Theorem 1. It is easy to note that each step of RGD2 succeeds and accurately merges a candidate quartet Q(abuv) when the quartet has at most one (generalized) cycle of length less than 3R′. This is because in this case, the join points of the quartet Q(abuv) in bG can be inferred using shortest and second shortest paths. As in Theorem 1, we require that all edges be part of short quartets. Thus, We again have error events E1 and E2 which lead to a bound on edit distance (30). As before, let E1(v; eGn, Vn) denote the event that the node v is not a middle node in any short quartet and E2(v) is the event that the node v is the middle node of a bad short quartet. However, now, the definition of a bad quartet is different: it occurs only when node v part of at least two overlapping generalized cycles, both of length less than 3R′, and denote such structures as H3R′. The analysis for E1 is same as in proof of Theorem 1. For E2, from Lemma 4, we have, P[v ∈ H3R′] = O(n−2( Thus, the expected edit distance is c ξ(c) )6R′ ). E[∆(bGn, eGn; Vn)] = O(n(1 − ρ)c(R−Rmin)/2 + O(n−1( )8R′ ρ4). c ξ(c) ) Thus, we have the desired result. 27 D Proof of Theorem 3 The proof follows the lines of sample complexity results in [21]. From [21, Proposition 1], we have concentration bounds for delays (distances) under m samples as P[blm(i, j) − l(i, j) > ǫ] ≤ 2 exp[− mǫ2 M R3 ], for any ǫ > 0, some constant M > 0, and for all i, j ∈ Vn. Taking union bound over all node pairs, we see that when m = Ω(poly(log n)), we have concentration of all the distances and we have the desired result. E Proof of Theorem 4 We use a covering argument for obtaining the lower bound, inspired by [65, Thm. 1]. For recon- structed graph bG using shortest path distances between O(V (G)2/2) node pairs, the range R(bG) of the estimator is bounded by R(bG) ≤ (Diam(G))V (G)2/2, since the delay variances on the edges are assumed to be known exactly, and the shortest path can Thus, using (19) and (20), For the original graph G ∼ G(n, c/n), we have the required probability range from 1 to Diam(G). For G ∼ G(n, c/n), the diameter8 is O(log n) w.h.p. Let S(bG; δn) denote all the graphs which are within edit distance of δn of the graphs in range R(bG) S(bG; δn) := {F : ∆(F, G′) ≤ δn, for some G′ ∈ R(bG)}. S(bG; δn) ≤ [G′∈R( bG) D(G′; δn) ≤ R(bG)n(δ+1)n3δn. P[∆(bG, G; V ) > δn] = Xg∈S c +Xg∈S ≥ Xg∈S c = Xg∈S c = 1 −Xg∈S P[∆(bG, g; V )] > δn]P(G = g) P[∆(bG, g; V )] > δn]P(Gn = g) P[∆(bG, g; V ) > δn]P(Gn = g) P(Gn = g), P(Gn = g) (34) (a) (b) 8The diameter of G(n, c n ) is C(c) log n [66], where C(c) = 1 log c + 2 c + O( log c c2 ) as c → ∞. 28 where equality (a) is due to the fact that P[∆(bG, g; V ) > δn] = 1 for all g ∈ S c and (b) is due toPg∈S P(G = g) +Pg∈S c P(G = g) = 1. From (34), it suffices to provide an asymptotic upper 2(cid:1)} denote the number of bound for the term Υ :=Pg∈S edges in the graph g ∈ Gn. Then, P(G = g). Furthermore, let eg ∈ {1, . . . ,(cid:0)n P(G = g) =(cid:16) c n(cid:17)eg(cid:16)1 − n(cid:17)(n 2)−eg c . We have the general result that for graphs g1, g2 ∈ Gn Define We obtain Thus, eg1 ≤ eg2 ⇒ P(G = g1) ≥ P(G = g2). z := min(l ∈ N : z ≤ O(V 2 log log n log n lXk=1(cid:18)(cid:0)n 2(cid:1)k (cid:19) ≥ S) ) + 0.5n(δ + 1) + o(1). (35) (36) (37) c ≤ P(G = g) n(cid:17)k(cid:16)1 − Υ :=Xg∈S zXk=0(cid:18)(cid:0)n ≤ exp(cid:20)− where inequality (a) follows from the fact that Pr(Bin(N, q) ≤ k) ≤ exp(− 2 with the identifications N =(cid:0)n from (a) that if V 2 < M n(0.5c − δ − 1) log n and we obtain the required result. 2(cid:1)k (cid:19)(cid:16) c nc(cid:16)0.5n(0.5c − δ − 1) − O(cid:0)V 2 log log n 2(cid:1), q = c/n and k = z, and that (cid:0)n n(cid:17)(n 2)−k log n (a) 4 (cid:1) − o(1)(cid:17)2(cid:21) N q (N q− k)2) for k ≤ N q 2(cid:1) ≥ (n/2)2. Finally, we observe log log n for small enough M > 0, then Υ → 0 as n → ∞ References [1] A. Anandkumar, A. Hassidim, and J. Kelner, "Topology Discovery of Sparse Random Graphs With Few Participants," in Proc. of ACM SIGMETRICS, June 2011. [2] S. Kandula, D. Katabi, and J. Vasseur, "Shrink: A Tool for Failure Diagnosis in IP Networks," in Proc. of ACM SIGCOMM Workshop on Mining network data, Philadelphia, PA, Aug. 2005. [3] A. Motter and Y. Lai, "Cascade-based Attacks on Complex Networks," APS Physical Review E, vol. 66, no. 6, pp. 65–102, 2002. [4] B. Eriksson, P. Barford, R. Nowak, and M. Crovella, "Learning Network Structure from Passive Measurements," in Proc. of the ACM SIGCOMM conference on Internet measurement, Kyoto, Japan, Aug. 2007. 29 [5] Y. Vardi, "Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data." J. of the American Statistical Association, vol. 91, no. 433, 1996. [6] A. Anandkumar, C. Bisdikian, and D. Agrawal, "Tracking in a Spaghetti Bowl: Monitoring Transactions Using Footprints," in Proc. of ACM SIGMETRICS, Annapolis, Maryland, USA, June 2008. [7] D. Alderson, H. Chang, M. Roughan, S. Uhlig, and W. Willinger, "The many facets of internet topology and traffic," AIMS J. on Networks and Heterogeneous Media, vol. 1, no. 4, p. 569, 2006. [8] D. Shah and T. Zaman, "Detecting Sources of Computer Viruses in Networks: Theory and Experiment," in Proc. of ACM Sigmetrics, New York, NY, June 2010. [9] S. Fortunato, "Community Detection in Graphs," Physics Reports, 2009. [10] F. Wu, B. Huberman, L. Adamic, and J. Tyler, "Information Flow in Social Groups," Physica A: Statistical and Theoretical Physics, vol. 337, no. 1-2, pp. 327–335, 2004. [11] D. Acemoglu, A. Ozdaglar, and A. ParandehGheibi, "Spread of (mis) information in social networks," Games and Economic Behavior, 2010. [12] L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore Art Thou r3579x?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography," in Proc. of ACM Intl. Conf. on World Wide Web, Banff, Canada, May 2007. [13] "mtrace– Print multicast path." ftp://ftp.parc.xerox.com/pub/net-research/ipmulti. [14] M. Gunes and K. Sarac, "Resolving anonymous routers in Internet topology measurement studies," in Proc. of IEEE INFOCOM, 2008, pp. 1076–1084. [15] B. Yao, R. Viswanathan, F. Chang, and D. Waddington, "Topology inference in the presence of anonymous routers," in Proc. of IEEE INFOCOM, 2003. [16] J. Ni, H. Xie, S. Tatikonda, and Y. Yang, "Efficient and dynamic routing topology inference from end-to-end measurements," Networking, IEEE/ACM Transactions on, vol. 18, no. 1, pp. 123–135, 2010. [17] M. Wainwright and M. Jordan, "Graphical Models, Exponential Families, and Variational Inference," Foundations and Trends in Machine Learning, vol. 1, no. 1-2, pp. 1–305, 2008. [18] B. Bollob´as, Random Graphs. Academic Press, 1985. [19] M. Jovanovi´c, F. Annexstein, and K. Berman, "Modeling peer-to-peer network topologies through small-world models and power laws," in TELFOR, 2001. [20] M. Newman, D. Watts, and S. Strogatz, "Random graph models of social networks," Proc. of the National Academy of Sciences of the United States of America, vol. 99, no. Suppl 1, 2002. [21] S. Bhamidi, R. Rajagopal, and S. Roch, "Network Delay Inference from Additive Metrics," To appear in Random Structures and Algorithms, on Arxiv, 2010. 30 [22] A. Barab´asi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, pp. 509–512, 1999. [23] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani, "Kronecker graphs: An approach to modeling networks," J. of Machine Learning Research, vol. 11, pp. 985–1042, 2010. [24] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, "Statistical properties of community structure in large social and information networks," in Proc. of WWW, 2008, pp. 695–704. [25] A. Clauset, C. Moore, and M. Newman, "Hierarchical structure and the prediction of missing links in networks," Nature, vol. 453, no. 7191, pp. 98–101, 2008. [26] "Internet Mapping Project," http://www.cheswick.com/ches/map/. [27] "The Skitter Project," http://www.caida.org/tools/measurement/skitter/. [28] "Cooperative Analysis for Internet Data Analysis, (CAIDA)," http://www.caida.org/tools/. [29] R. Govindan and H. Tangmunarunkit, "Heuristics for Internet Map Discovery," in IEEE IN- FOCOM, Tel-Aviv, Israel, June 2000. [30] N. Spring, R. Mahajan, D. Wetherall, and T. Anderson, "Measuring ISP Topologies with Rocketfuel," IEEE/ACM Tran. on networking, vol. 12, no. 1, pp. 2–16, 2004. [31] Y. Shavitt and E. Shir, "DIMES: Let the internet measure itself," ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, p. 74, 2005. [32] Y. He, G. Siganos, and M. Faloutsos, "Internet Topology," in Encyclopedia of Complexity and Systems Science, R. Meyers, Ed. Springer, 2009, pp. 4930–4947. [33] J. Leskovec, D. Huttenlocher, and J. Kleinberg, "Predicting Positive and Negative Links in Online Social Networks," in ACM WWW Intl. Conf. on World Wide Web, 2010. [34] M. Gomez-Rodriguez, J. Leskovec, and A. Krause, "Inferring Networks of Diffusion and Influ- ence," in Proc. of the ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, 2010. [35] S. Myers and J. Leskovec, "On the Convexity of Latent Social Network Inference," in Proc. of NIPS, 2010. [36] R. Castro, M. Coates, G. Liang, R. Nowak, and B. Yu, "Network Tomography: Recent Devel- opments," Stat. Sc., vol. 19, pp. 499–517, 2004. [37] F. Chung, M. Garrett, R. Graham, and D. Shallcross, "Distance realization problems with applications to Internet tomography," J. of Comp. and Sys. Sc., vol. 63, no. 3, pp. 432–448, 2001. [38] Z. Beerliova, F. Eberhard, T. Erlebach, A. Hall, M. Hoffmann, M. Mihal ak, and L. Ram, "Network Discovery and Verification," IEEE Journal on Selected Areas in Communications, vol. 24, no. 12, p. 2168, 2006. 31 [39] T. Erlebach, A. Hall, and M. Mihal'ak, "Approximate Discovery of Random Graphs," Lecture Notes in Computer Science, vol. 4665, p. 82, 2007. [40] D. Achlioptas, A. Clauset, D. Kempe, and C. Moore, "On the bias of traceroute sampling: Or, power-law degree distributions in regular graphs," J. ACM, vol. 56, no. 4, 2009. [41] M. Kurant, M. Gjoka, C. T. Butts, and A. Markopoulou, "Walking on a Graph with a Mag- nifying Glass," in Proceedings of ACM SIGMETRICS '11, San Jose, CA, June 2011. [42] S. Khuller, B. Raghavachari, and A. Rosenfeld, "Landmarks in graphs," Discrete Appl. Math., vol. 70, no. 3, pp. 217–229, 1996. [43] L. Reyzin and N. Srivastava, "On the longest path algorithm for reconstructing trees from distance matrices," Information Processing Letters, vol. 101, no. 3, pp. 98–100, 2007. [44] --, "Learning and verifying graphs using queries with a focus on edge counting," Lecture Notes in Computer Science, vol. 4754, p. 285, 2007. [45] H. Mazzawi, "Optimally Reconstructing Weighted Graphs Using Queries," in Symposium on Discrete Algorithms, 2010, pp. 608–615. [46] S. Choi and J. Kim, "Optimal query complexity bounds for finding graphs," in Proc. of annual ACM symposium on Theory of computing, 2008, pp. 749–758. [47] M. Shih and A. Hero, "Unicast inference of network link delay distributions from edge mea- surements," in Proc. of IEEE ICASSP, vol. 6, 2002, pp. 3421–3424. [48] N. Duffield, J. Horowitz, F. Presti, and D. Towsley, "Multicast topology inference from end- to-end measurements," Advances in Performance Analysis, vol. 3, pp. 207–226, 2000. [49] R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids. Cambridge Univ. Press, 1999. [50] M. Gomez-Rodriguez, E. Balduzzi, M. DE, and B. Scholkopf, "Uncovering the temporal dy- namics of diffusion networks," in Intl. Conf. on Machine Learning, Bellevue, WA, 2011. [51] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in Proc. of ACM SIGKDD, 2010, pp. 1059–1068. [52] T. Snowsill, N. Fyson, T. De Bie, and N. Cristianini, "Refining causality: who copied from whom?" in Proc. of ACM SIGKDD, 2011, pp. 466–474. [53] N. Alon and J. Spencer, The probabilistic method. Wiley-Interscience, 2000. [54] J. Pearl, Probabilistic Reasoning in Intelligent Systems-Networks of Plausible Inference. Mor- gan Kaufmann, 1988. [55] G. Bunke et al., "Inexact graph matching for structural pattern recognition," Pattern Recog- nition Letters, vol. 1, no. 4, pp. 245–253, 1983. [56] E. Lehmann, Theory of Point Estimation. New York, NY: Chapman & Hall, 1991. 32 [57] H.-J. Bandelth and A. Dress, "Reconstructing the shape of a tree from observed dissimilarity data," Adv. Appl. Math, vol. 7, pp. 309–43, 1986. [58] P. L. Erdos, L. A. Sz´ekely, M. A. Steel, and T. J. Warnow, "A few logs suffice to build (almost) all trees: Part ii," Theoretical Computer Science, vol. 221, pp. 153–184, 1999. [59] T. Jiang, P. E. Kearney, and M. Li, "A polynomial-time approximation scheme for inferring evolutionary trees from quartet topologies and its application," SIAM J. Comput., vol. 30, no. 6, pp. 1942–1961, 2001. [60] R. Durbin, S. R. Eddy, A. Krogh, and G. Mitchison, Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids. Cambridge Univ. Press, 1999. [61] T. Cover and J. Thomas, Elements of Information Theory. John Wiley & Sons, Inc., 2006. [62] C. Daskalakis, E. Mossel, and S. Roch, "Optimal phylogenetic reconstruction," in STOC '06: Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, 2006, pp. 159–168. [63] I. Benjamini, G. Kozma, and N. Wormald, "The mixing time of the giant component of a random graph," Arxiv preprint, 2006. [64] F. Chung and L. Lu, "The diameter of sparse random graphs," Advances in Applied Mathe- matics, vol. 26, no. 4, pp. 257–279, 2001. [65] G. Bresler, E. Mossel, and A. Sly, "Reconstruction of Markov Random Fields from Samples: Some Observations and Algorithms," in Intl. workshop APPROX Approximation, Randomiza- tion and Combinatorial Optimization. Springer, 2008, pp. 343–356. [66] D. Fernholz and V. Ramachandran, "The diameter of sparse random graphs," Random Struc- tures and Algorithms, vol. 31, no. 4, pp. 482–516, 2007. 33
1805.10391
2
1805
2018-11-23T09:04:13
Estimating Shell-Index in a Graph with Local Information
[ "cs.SI", "physics.soc-ph" ]
For network scientists, it has always been an interesting problem to identify the influential nodes in a given network. The k-shell decomposition method is a widely used method which assigns a shell-index value to each node based on its influential power. The k-shell method requires the global information of the network to compute the shell-index of a node that is infeasible for large-scale real-world dynamic networks. In this work, we propose a method to estimate the shell-index of a node using its local information. We also propose hill-climbing based approach to hit the top-ranked nodes in a small number of steps. We further discuss a method to estimate the rank of a node based on the proposed estimator.
cs.SI
cs
Estimating Shell-Index in a Graph with Local Information Akrati Saxena* S. R. S. Iyengar* [email protected] [email protected] *Department of Computer Science and Engineering, Indian Institute of Technology Ropar, India Abstract For network scientists, it has always been an interesting problem to identify the influential nodes in a given network. The k-shell de- composition method is a widely used method which assigns a shell- index value to each node based on its influential power. The k-shell method requires the global information of the network to compute the shell-index of a node that is infeasible for large-scale real-world dynamic networks. In this work, we propose a method to estimate the shell-index of a node using its local information. We also propose hill-climbing based approach to hit the top-ranked nodes in a small number of steps. We further discuss a method to estimate the rank of a node based on the proposed estimator. 1 Introduction In real-world networks, hierarchical organization of networks gives rise to the core-periphery structure. The concept of the core-periphery structure was first proposed by Borgatti and Everett [1] in 2000. The core is a densely connected nucleus of the network that is surrounded by sparsely connected periphery nodes. Core nodes are highly connected with each other and also highly connected with periphery nodes. Authors also proposed a method to detect the core-periphery structure based on the adjacency matrix division, such that the number of edges is maximum among core nodes that is preceded 1 by the number of edges between core and periphery, and periphery nodes have very less number of edges among themselves. The complexity of the proposed matrix division method is very high, and so, it is infeasible for large-size real- world networks. Carmi et al. employed the k-shell decomposition algorithm first time to study the core-periphery structure in the Internet network and classified the network into three categories [2]. The k-shell decomposition method was proposed by Seidman and it is a well-known method in social network analysis to identify the tightly knit group of influential core nodes in unweighted networks [3]. This algorithm works by recursively pruning the nodes from lower degree to higher degree. First, we recursively remove all nodes of degree 1, until there is no node of degree 1. All these nodes are assigned shell-index ks = 1. In the next step, we remove all nodes of degree 2 if any. While pruning the degree 2 nodes, new nodes having degree 2 or less can be generated and will also be removed in the same iteration. All these nodes will be assigned shell-index ks = 2. Similarly, nodes of degree 3, 4, 5, ... are pruned step by step. When we remove nodes of degree k, if there appears any node of degree less than k, it will also be removed in the same step. All these nodes are assigned shell-index k. This method thus divides the entire network into shells and assigns a shell-index to each node. The shell-index increases as we move from the periphery to the core and the higher shell-index represents the higher coreness. The innermost shell has the highest shell-index kmax and is called the core of the network. Batagelj and Zaversnik proposed an order O(m) algorithm to compute the coreness of all nodes, where m is the total number of edges in the network [4]. Many studies have shown that core nodes are highly influential nodes in a network. In the entire discussion, influential nodes refer to the nodes having the higher spreading power. Kitsak et al. [5] showed that information spreads faster if the spreading is started from a core node rather than a periphery node. Saxena et al. showed the importance of core nodes in information diffusion on networks with meso-scale structures [6]. The results conclude that the information becomes viral once it hits the core nodes and spreads into multiple communities through the core. Pei and Maske studied the correlation of various centrality measures with the influential power of the nodes on real-world networks and observed that shell-index is an effective centrality measure to identify the most influential nodes [7, 8]. Shell-index is a widely used method to compute the influential power of a node, but it has its disadvantages. Firstly, to compute the shell-index of a node using the k-shell decomposition method, we need the entire network, 2 which is infeasible for large-scale dynamic networks. Secondly, the k-shell method assigns the same index values to many nodes which actually might have different influential power, as shown in [9 -- 11]. In this work, we show that the shell-index value of a node can be estimated using its h2 − index which can be computed using the local neighborhood information of the node. We study the correlation of shell-index and h2 − index with the spreading power of a node and observe that the h2 − index has good correlation with the spreading power and can be used in real-world networks to identify the influential nodes. We further show that the h2 − index has better monotonicity than the shell-index. In most of the real-world applications, we only need to identify top in- fluential nodes to spread the information without having the global informa- tion of the network. We implement hill-climbing based algorithms using the proposed shell-index estimator to identify the top-ranked nodes in a small number of steps. The detailed algorithm and results are discussed in Sec- tion 5. Next, we propose a heuristic method to estimate the influential rank of a node without computing the index value of all the nodes. The proposed method is discussed in Section 6. The main contributions of the work are as follows. 1. Discuss a method to compute the shell-index of a node using the shell- index value of its neighbors. 2. Propose an estimator for the shell-index value of a node. 3. Hill-climbing based methods to identify top-ranked nodes using the proposed estimator. 4. A heuristic method to estimate the percentile rank of a node based on the proposed estimator. The rest of this paper is organized as follows. In Section 2, we discuss the related literature. Section 3 covers the preliminary definitions. In Section 4, we discuss the estimation of shell-index using h2 − index and experimental results. In Section 5, we discuss hill-climbing based approaches to identify the top-ranked nodes and their simulation on real-world networks. In Section 6, we discuss a heuristic method to estimate the percentile rank of a node. Section 7 concludes the paper with future directions. 3 2 Related Work In recent years, the problem of identifying influential nodes has attracted researchers from different areas like computer science, epidemiology, biology, statistics, etc. Researchers have defined various centrality measures to com- pute the importance of a node based on its characteristics and the given application context. These centrality measures can be categorized as local centrality measures and global centrality measures. Centrality measures that can be computed using local neighborhood information of the node are called local centrality measures like degree centrality [12], h-index [13], semi-local centrality [14] etc. The centrality measures that require the entire network for their computation are called global centrality measures like closeness [15], betweenness [16], eigenvector [17], shell-index [3], PageRank [18] etc. The computational complexity of global centrality measures is very high, and it depends on the network size. The use of a specific centrality measure to identify important nodes is highly application dependent. Recently Kitsak et al. showed that shell-index is highly correlated with the spreading power of a node [5]. These results have been supported by many other studies that show that the core nodes are highly influential and the information flows into multiple communities through the core [6, 19]. Initially, the k-shell decomposition method was defined for undirected unweighted networks, but recently it has been extended to different types of networks. Garas et al. extended the k-shell method to identify the core- periphery structure in weighted networks [20]. They defined the weighted degree that considers both the degree as well as the weights of the con- nected edges. Then, the weighted degree is used while applying the k-shell decomposition method. Eidsaa et al. also proposed a method to identify the core-periphery structure in weighted networks where they only consider the strength of the nodes while pruning the nodes in each iteration [21]. This method is known as s-shell decomposition method or strength decomposition method. Wei et al. proposed an edge-weighting k-shell method where they consider both the degree as well as the edge-weights, and the edge weight is computed by adding the degree of its two endpoints [22]. The importance of both of these parameters can be set using a tuning parameter which varies from 0 to 1. Researchers have shown that the shell-index can be efficiently used to identify the influential nodes in a network [5,19]. However, the k-shell method 4 assigns the same index values to many nodes which actually might have dif- ferent influential power [9 -- 11]. Zeng et al. modified the k-shell decomposition method and proposed a mixed degree decomposition (MDD) method which considers both the residual degree and the exhausted degree of the nodes while assigning them index values [11]. Liu et al. proposed an improved ranking method that considers both the shell-index of the node and its dis- tance with the highest shell-index nodes [23]. The proposed method com- putes the shortest distance of all nodes with the highest shell-index nodes, so, it has high computational complexity. Liu et al. showed that in real-world networks some core-like groups are formed which are not true-core [24]. The nodes in these groups are tightly connected with each other but have very few links outside. Based on this observation, the authors filtered out redundant links which have low diffusion power but supports non-pure core groups to be formed, and then apply k-shell decomposition method. Authors show that the coreness computed on this new graph is a better measure of influential power and it is highly correlated with the spreading power computed using SIR model in the original graph. Researchers have also proposed hybrid centrality measures by combining the shell-index with other centrality measures. Hou et al. introduced the concept of all-around score to find influential nodes [25]. All-around score (cid:113)(cid:107)d(cid:107)2 + (cid:107)CB(cid:107)2 + (cid:107)ks(cid:107)2, where d is the of a node is defined as, Score = degree, CB is the betweenness centrality, and ks is the shell-index of the node. The degree takes care of local connectivity of the node, betweenness takes care of shortest paths that represent global information, and shell- index represents the position of the node with respect to the center. The total time complexity of the complete process is O(n · m), as it depends on the complexity of betweenness centrality that has the highest complexity. Basaras et al. proposed a hybrid centrality measure based on degree and shell-index and showed that it works better than the traditional shell-index [26]. Bae and Kim proposed a method where the centrality value of a node is computed based on the shell-index value of its neighbors; it thus considers both degree and shell-index value of the nodes [27]. The results show that the proposed method outperforms other methods in scale-free networks with community structure. Tatti and Gionis proposed a graph decomposition method that considers both the connectivity as well as the local density while the k-shell decomposition method only considers the connectivity of the nodes [28]. The running time of the proposed algorithm is O(n2 · m). They further 5 proposed a linear-time algorithm that computes a factor-2 approximation of the optimal decomposition value. All the discussed centrality measures have better monotonicity, but they require global information of the network to be computed; and so, they are not favorable in large-scale networks. bounded by 1 +(cid:80) Real-world networks are highly dynamic, and it is infeasible to re-compute the shell-index of each node for every single change in the network. Li et al. proposed a method to update the shell-index value of the affected nodes, whenever a new edge is added or deleted from the network [29]. Jakma et al. proposed the first continuous, distributed method to compute shell- index in dynamic graphs [30]. Pechlivanidou et al. proposed a distributed algorithm based on MapReduce to compute the k-shell of the graph [31]. Montresor et al. proposed an algorithm to apply the k-shell method on live distributed systems [32]. The execution time of the proposed algorithm is u∈V [d(u) − ks(u)], and it gives 80 percent reduction in the execution time on the considered real-world networks. Dasari et al. proposed a k-shell decomposition algorithm called ParK that reduces the number of random access calls and the size of the working set while computing the shell- index in larger graphs [33]. They further proposed a faster algorithm which involves parallel execution to compute the k-shell in larger graphs. Sariyuce et al. proposed the first incremental k-shell decomposition algorithms for streaming networks [34]. The proposed method has million times speed-up than the original k-shell method on a network having 16 million nodes. Lu et al. explored the relationship between the degree, h-index [13], and coreness of a node [35]. They showed that the h-index family of a node converges to the coreness of the node. K-shell method has been widely used in literature to study different net- works. Catini et al. used shell-index to identify clusters in PubMed scientific publications [36]. To identify the clusters, a graph is created where the nodes are the publications, and there is an edge between two nodes if the distance between the locations of the corresponding researchers is less than the thresh- old. In the experiments, authors have taken the threshold 1 km. Based on the k-shell decomposition, authors categorized the cities into monocore and multicore. Later on, the journal impact factors are used to quantify the qual- ity of research of each core. Results show that k-shell decomposition method can be used to identify the research hub clusters. Core-periphery structure has been studied in the wide variety of networks, such as financial network [37, 38], human-brain network [39, 40], nervous sys- tem of C. elegans worm [41], blog networks [42], scientific publication net- 6 work [36], collaboration network [43, 44], protein interaction networks [45], communication network of software development team [46 -- 49], hollywood collaboration network [50], language network [51], YouTube social interac- tion network [52], metabolic networks [53], etc. Karwa et al. proposed a method to generate all graphs for a given shell-index sequence [54]. In one of our works, we studied the properties of the core like its size and density [55]. We further studied how the core is evolved with time and how the core nodes acquire a specific position in the network. We observed that making more connections with the existing core nodes help a node to shift into the core regardless of the total number of connections. Based on our observations, we proposed evolving models for both unweighted and weighted networks having community and core-periphery structure. We further stud- ied the core-periphery structure in multilayered terrorist networks [56, 57] and proposed an evolving model to generate synthetic multilayered networks having similar characteristics [58]. With time the size of real-world networks is increasing exponentially, so, it is infeasible to collect the entire network to study its global properties. Researchers have focussed to propose fast and efficient methods to identify influential nodes and their ranking in the given network [59]. Saxena et al. have proposed methods to estimate the degree rank of a node using power- law degree distribution [60, 61] and sampling techniques [62 -- 64]. In [65, 66], authors proposed heuristic methods to fast estimate the closeness rank of a node. In this work, we will discuss a heuristic method to estimate the influential rank of a node using local information. 3 Preliminaries 3.1 H-Index The h-index of a node u (h − index(u)) is h if h of its neighbors have degree at least h and there is no subset of h+1 neighbors where each node belonging to that subset has the degree at least h + 1. The h2 − index of a node u (h2 − index(u)) is computed by taking its h − index based on the h − index of its neighbors and not their degrees. Note: The h-index of a list l (h− index(l)) is h if h is the highest number such that h entries of the list are equal to or greater than h. 7 3.2 SIR Model We use the Susceptible-Infected-Recovered (SIR) spreading model to simu- late the spreading process on real-world networks and compute the spreading power of each node. In the SIR model, a node can be in three possible states: 1. S (susceptible), 2. I (infected), and 3. R (recovered). Initially, all nodes are in the susceptible mode except one, which is infected and will start spreading the infection in the network. The infected node will infect each of its suscep- tible neighbors with infection probability (λ). If the neighbor gets infected, its status is changed to Infected. Once an infected node contacts all of its neighbors to infect them, its status is changed to Recovered with probability µ. For generality, we set µ = 1. Recovered nodes will neither be infected anymore nor infect others, and they remain Recovered until the spreading stops. Initially, we infect a single node, and all other nodes are susceptible. Then the infection starts spreading from the seed node to the others through links. The spreading process stops when there is no infected node in the network. The number of recovered nodes is considered the spreading power or spreading capability of the original node. We execute the SIR model 100 times from each node and take the average of the spreading power to compute the final spreading power of the node. The infection probability is taken as λ > λc, where λc = (cid:104)d(cid:105) /((cid:104)d2(cid:105) − (cid:104)d(cid:105)) is the epidemic threshold computed using mean-field theory, where d represents the degree of the node [67]. 4 Section 1: Shell-Index Estimation In this section, we discuss a method to estimate the shell-index using local neighborhood information. Theorem 1. The shell-index of a node u can be computed as ks(u) = h − index(ks(v)∀v ∈ ngh(u)), where ngh(u) is the set of the neighbors of node u. Proof. Let's assume that h-index of (ks(v)∀v ∈ ngh(u)) is h then there are at least h nodes having shell-index equal to or greater than h as per the definition of h-index. Now, we will see how the shell-index of a node u will be decided in the k-shell decomposition method. In the k-shell decomposition method, in ith 8 iteration all those nodes are removed who have exactly i connections with the nodes having the shell-index i or greater than i. Thus, the node u will be removed in hth iteration as h of its neighbors have shell-index h or greater than h. This is nothing but the h−index of node u based on the shell-indices of its neighbors as defined above. Next, we explain Theorem 1 using examples. The first example is shown in Figure 1(a) where node u has eight neighbors having shell-indices 1, 2, 3, 3, 4, 6, 8, and 10. Now, we will see how the shell-index of node u will be determined during the k-shell decomposition method. All the iterations are shown in Figure 1. In the 1st iteration, first of its neighbors will be removed and node u will be left with seven connections with the nodes having the shell-indices greater than 1, so, the node u will not be removed in the first iteration. In the 2nd iteration, its second neighbor will be removed as it has shell-index 2, but still, the node u has six connections with the higher shells, so, it will not be removed. In the third iteration, its third and fourth neighbors will be removed as both of these neighbors have shell-index 3. The node u still has four connections with the higher shells, so it will not be removed. In the fourth iteration, 5th of its neighbors having shell-index 4 will be removed, and now the node u has only three connections with the higher shells, so, as per the k-shell decomposition method, node u will also be removed in the fourth iteration. So, the shell-index of node u is 4 that is nothing but the h − index of the shell-indices of its neighbors. Similarly, in Figure 2, node u has degree 7, and the shell-indices of its neighbors are 1, 2, 2, 3, 3, 3, and 5. Now in the 1st iteration of the k-shell decomposition method, 1st of its neighbors will be removed. Node u still has six connections with the higher shells, so, it will not be removed. In the 2nd iteration, second and third of its neighbors will be removed and node u still has four connections with the higher shells, so, it will not be removed. In the 3rd iteration, 4th, 5th, and 6th of its neighbors will be removed. Node u now has only one connection with the higher shells, so, it will also be removed in the same iteration. Thus, it has shell-index 3. In Figure 3, node u has degree 6 and the shell-indexes of its neighbors are 10, 11, 11, 13, 15, and 25. In 1st, 2nd, ..., 5th iteration, the node u will not be removed as it has six connections with the higher shells. In the 6th iteration, node u will be removed, so, the shell-index of node u is 6, i.e., the h-index of the shell-indices of its neighbors. 9 (a) Initial subgraph having all connections of node u (b) After Iteration 1 (c) After Iteration 2 (d) After Iteration 3 Figure 1: Example 1: Estimate shell-index of node u while applying k-shell decomposition algorithm Figure 2: Example 2: A subgraph of a network to explain shell-index com- putation using shell-indices of neighbors 10 Figure 3: Example 3: A subgraph of a network to explain shell-index com- putation using shell-indices of neighbors Shell-Index Estimation Using Theorem 1, the shell-index of a node can be estimated if the shell- indices of its neighbors are known. However, in real life applications, the shell-indices of the neighbors will not be known. We know that the shell- index of a node is bounded above by its degree, ks(v) ≤ d(v). So, to estimate the shell-index of node u, we can consider the degree of its neighbors in place of their shell-index. This is nothing but the h − index of node u as defined in Section 3.1. To further improve the estimation, we consider the h− index of its neighbors as ks(v) ≤ h − index(v) ≤ d(v) and this is nothing but the h2 − index of the node. Thus the shell-index of a node can be estimated using its h2 − index. Next, we will study the performance of the proposed estimator in real-world networks. Pseudo-code for the proposed method is given in Algorithm 1, where ngh(u) is the list of the neighbors of node u. The proposed estimator can be further improved if we compute the h3 − index of the node, however, in the Results section, we show that h2 − index itself is a good estimator. It can be computed faster and requires less neighborhood information than to compute the h3 − index of the node. Algorithm 1 Compute h2 − index(G, u) Take a list ngh hindex, ngh hindex = [ ] for each v in ngh(u) do add h − index(v) in ngh hindex end for Return h − index(ngh hindex) 11 4.1 Results and Discussion We study the performance of h2 − index versus shell-index on the following real-world networks. Datasets 1. Astro-Ph: This is the co-authorship network of ArXiv's Astrophysics (Astro-ph) publications where authors are represented by nodes, and there is an edge between two nodes if the corresponding authors have published together [68]. It contains 14845 nodes and 119652 edges. 2. Buzznet: Buzznet is a subgraph extracted from a social networking site that is used to share the photo, journal, and video [69]. It consists of 101163 nodes and 2763066 edges. 3. Cond-Mat: This is the co-authorship network of ArXiv's condensed matter section [68]. This dataset covers all papers from January 1993 to April 2003 (124 months). It contains 13861 nodes and 44619 edges. 4. DBLP: This is a coauthorship network extracted from DBLP com- puter science bibliography, where an edge denotes that the authors have common publications [70]. This network contains 317080 nodes and 1049866 edges. 5. Digg: This friendship network was extracted from Digg website in 2009 [71]. It contains 261489 nodes and 1536577 edges. 6. Enron: This network is the email communication network of the em- ployees of Enron organization from 1999 to 2003 [72]. Nodes of the network are email addresses, and there is an edge between two nodes if they have communicated at least once. The dataset has 84384 nodes and 295889 edges. 7. Facebook: This dataset is an induced subgraph of Facebook [73], where users are represented by nodes and friendships are represented by edges. It contains 63392 nodes and 816831 edges. 8. FB-Wall: This is a network where nodes represent Facebook users, and there is an edge between two users if any one of them posts on the 12 Facebook-wall of another user [73]. It contains 43953 nodes and 182384 edges. 9. Foursquare: Foursquare is a location-based social networking software for mobile devices that can be accessed using GPS. This dataset is an induced subgraph of friendships of Foursquare [69]. It contains 639014 nodes and 3214985 edges. 10. Gowalla: This friendship network is extracted from a location-based social network called, Gowalla [74]. Gowalla was used to share the locations among its users. It contains 196591 nodes and 950327 edges. The experimental results are shown in Table 1. First, we compute the monotonicity of shell-index and h2 − index. Ideally, if a node has influen- tial power different from other nodes, it should be assigned a different index value. In the k-shell decomposition method, all the nodes which are pruned at one level are assigned the same shell-index value. Researchers have shown that they can have different influential power and should have been assigned different values [9 -- 11]. A better centrality measure should assign the same index value to fewer nodes and allocate more unique values. This charac- teristic of the measure can be captured using the monotonicity [27]. This is defined as, (cid:16) 1 − (cid:80) (cid:17)2 M (R) = r∈R nr(nr−1) n(n−1) where R denotes the ranking values of all the nodes based on any given centrality measure, n represents the size of R, i.e., the number of nodes in our case, and nr represents the number of nodes having rank r. If all nodes have the same rank, the monotonicity (M ) of the ranking is 0, and it is not a valid ranking measure. If each node has a unique rank then the monotonicity (M ) is 1. Results in Table 1 show that the monotonicity of h2 − index is either the same or slightly better than the shell-index. Next, we study the correlation of shell-index and h2 − index with the spreading power of the node. The spreading power of a node is computed by executing the SIR model (SIR model is defined in Section 3.2) 100 times and taking the average of its spreading powers. In experiments, the infection probability λ is taken as λ = (cid:104)d(cid:105) /((cid:104)d2(cid:105)−(cid:104)d(cid:105))+0.01. To study the correlation, we compute Kendall's Tau (τ ), Pearson (r), and Spearman (ρ) correlation 13 coefficients. Results in Table 1 show that the correlation of h2 − index with the spreading power is either as good as the correlation of shell-index with the spreading power or better. We further study how the correlation of shell-index and h2 − index with the spreading power changes as we vary the infection probability. Results are shown in Figure 4 for Astro-physics collaboration network and FB-wall social interaction network. The epidemic threshold value (λc) for Astro-Ph and FB-Wall network is 0.02 and 0.04 respectively, so, the considered range of the infection probability is taken 0.05 − 0.14, i.e., greater than the λc for both the networks. The results show that h2 − index has a good correlation with varying infection probabilities. We thus conclude that the h2 − index is a better centrality measure and a good estimator of the shell-index in real-world networks. h2 − index has an advantage over shell-index that it is a local centrality measure and can be computed for a node using local neighborhood information without gathering the entire network. 14 Table 1: Performance of Shell-Index (ks) and h2 − index using monotonicity and SIR spreading model h2 − Index Kendall Pearson Spearman Kendall Pearson Spearman h2 − index vs. SIR Monotonicity ks vs. SIR Network Ref Nodes Edges 1 5 Astro-Ph Buzznet Cond-Mat DBLP Digg Enron Facebook Fb-Wall Foursquare Gowalla [68] [69] [68] [70] [71] [72] [73] [73] [69] [74] 14845 101163 13861 317080 261489 84384 63392 43953 639014 196591 119652 2763066 44619 1049866 1536577 295889 816831 182384 3214985 950327 ks 0.89 0.93 0.75 0.74 0.45 0.30 0.91 0.76 0.50 0.73 0.89 0.93 0.76 0.75 0.45 0.30 0.91 0.77 0.50 0.74 0.51 0.21 0.55 0.49 0.48 0.45 0.49 0.62 0.54 0.59 0.67 0.28 0.69 0.61 0.60 0.58 0.64 0.75 0.66 0.71 0.67 0.30 0.69 0.61 0.59 0.55 0.65 0.76 0.65 0.72 0.52 0.21 0.56 0.49 0.48 0.45 0.49 0.62 0.54 0.59 0.67 0.28 0.70 0.62 0.60 0.58 0.64 0.75 0.66 0.71 0.68 0.30 0.70 0.62 0.59 0.55 0.65 0.76 0.65 0.72 5 Section 2: Hill-Climbing based approach to Identify Top-Ranked Nodes In many real-life applications, we need to identify top influential nodes to spread the information faster. For example, if a marketing company wants to provide free samples of their products, they would like to find out influential people in the network who can help them in popularizing their product. Similarly, if someone wants to spread a virus using the Internet network, she would like to find out and infect a node having the highest spreading power. In large-scale networks, it is infeasible to collect the entire network to identify the top influential nodes. This motivates us to propose local infor- mation based methods for identifying top nodes without having the global information like network size, average degree, the highest h2 − index of the network, and so on. Researchers have proposed various sampling-based meth- ods to estimate global properties of the network like network size [75], global clustering coefficient [76], average degree [77], degree distribution of the net- work [78], and so on. In this work, we have shown that the influential power of a node can be computed using its h2 − index, i.e. a local measure. For a given node, even if we compute its h2 − index locally, we do not know how influential this node is in the entire network, and whether this node belongs to the highest influential nodes or not. In [79], Gupta et al. proposed Hill-Climbing based methods that can be used to hit the highest shell-index nodes faster in a network. In the proposed method, a random walker starts from a periphery node and move to one of its neighbors having the highest shell-index until a top node is found. The proposed method cannot be applied in practice as the shell-index is a global centrality measure, but the results showed that the proposed hill climbing walk hit the top nodes in a very small number of steps. In this work, we have shown that the influential power of a node can be computed using its h2 − index, i.e., a local measure. We modify the proposed methods to identify the node having the highest h2 − index in In rest of the discussion, the top-ranked nodes refer to the the network. nodes having the highest h2 − index in the network. The algorithm is called IndexBasedHillClimbing(G, u, k, maxindex), and its pseudo code is given in Algorithm 2. The inputs of the algorithm are G, u, k, and maxindex where G is the given network, u is the seed node from which the crawler 16 (a) Astro-Ph Collaboration Network (b) FB-Wall Social Interaction Network Figure 4: The correlation of shell-Index and h2 − index with the spreading power for varying infection probability on a. Astro-Ph and b. FB-Wall network 17 starts crawling the network, k is the repeat-count that shows how many times the crawler will restart the walk from a randomly chosen neighbor of the current node if it is stuck to a local maxima, and maxindex is the maximum h2 − index in the given network. A node is called local maxima if its h2−index is higher than all of its neighbors. The nodes having the highest h2 − index in the network are called global maxima. For the clarification, a local maxima can also be the global maxima. The algorithm works in the following manner. The crawler starts from the given node u, and it moves to one of its neighbors that has not been visited before and has the highest h2 − index. The crawler keeps moving until it hits the local maxima. If this node has the highest h2 − index, the algorithm exits, else, the crawler jumps to one of its non-visited neighbors uniformly at random, and the repeat-count is increased by one. The same procedure is repeated until the highest h2 − index node is identified or the repeat-count reaches its maximum value. If the algorithm reaches to maxi- mum repeat-count without finding out the highest h2−index node, it returns "The algorithm is failed to find out the top-ranked node." In Algorithm 2, ngh(u) represents a set of all neighbors of node u. randomchoice(set) func- tion returns a random element from the given set. The proposed method is further modified as shown in Algorithm 3 named In this method, IndexAndDegreeBasedHillClimbing(G, u, k, maxindex). the crawler will move to one of the highest degree nodes among the non- visited neighbors having the highest h2 − index. Beside this, there is one more change; once the algorithm stuck to local maxima, the crawler moves to one of its non-visited neighbors having the highest degree. Intuitively it seems that the highest degree node will have a high probability to be connected with the top-ranked nodes, and so, this algorithm will work faster and better than the first one. Discussion We implement the proposed methods on real-world networks, and the results are shown in Table 2. In the experiments, the algorithm is executed from all non top-ranked nodes (the nodes not having the highest h2 − index), and the number of steps taken to hit a top-ranked node are averaged to compute the average number of steps. In experiments, the value of repeat- count (k) is set to 50. In Table 2, the average and the standard deviation of the number of steps are shown in Avg(steps) and Std(steps) columns. The 18 Algorithm 2 IndexBasedHillClimbing(G, u, k, maxindex) Take a list visited nodes and visited nodes = [ ] num of steps = 0 repeat count = 0 current node = u next node = u add u in visited nodes f lag = T rue while f lag == T rue do for each v in ngh(current node) do if h2−index(v) ≥ h2−index(next node) and v /∈ visited nodes then next node = v end if end for if next node == current node then if h2 − index(next node) == maxindex then else if repeat count < k then f lag = F alse next node = randomchoice({v v ∈ ngh(current node) and v /∈ visited nodes}) repeat count = repeat count + 1 else Print "The algorithm is failed to find out the top-ranked node." f lag = F alse end if end if if f lag == T rue then add next node in visited nodes current node = next node num of steps = num of steps + 1 end if end while Return h2 − index(current node) 19 Algorithm 3 IndexAndDegreeBasedHillClimbing(G, u, k, maxindex) Take a list visited nodes and visited nodes = [ ] num of steps = 0 repeat count = 0 current node = u next node = u add u in visited nodes f lag = T rue while f lag == T rue do for each v in ngh(current node) do if h2−index(v) ≥ h2−index(next node) and v /∈ visited nodes then next node = v end if end for for each v in ngh(current node) do if h2 − index(v) == h2 − index(next node) and deg(v) ≥ deg(next node) and v /∈ visited nodes then next node = v end if end for if next node == current node then if h2 − index(next node) == maxindex then f lag = F alse else if repeat count < k then for each v in ngh(current node) do if deg(v) ≥ deg(next node) and v /∈ visited nodes then next node = v end if end for repeat count = repeat count + 1 else Print "The algorithm is failed to find out the top-ranked node." f lag = F alse end if end if if f lag == T rue then add next node in visited nodes current node = next node num of steps = num of steps + 1 end if 20 end while Return h2 − index(current node) Avg(count) shows the average of the number of repeat-count that algorithm takes when it is stuck to a local maxima. The Algo F ailed(%) shows how many times the algorithm has not succeeded to hit the top-ranked node in the given repeat-count. The algorithm might succeed if we increase the value of repeat-count. The results show that on an average, a top-ranked node can be reached in very few steps (3-213 in the considered datasets), and the average value of the repeat-count is 0-10. The algorithm is failed in very few cases for the repeat- count 50. In the case of IndexAndDegreeBasedHillClimbing(G, u, k, maxindex) algorithm, the average number of steps and the average repeat-count is re- duced but the probability of failing the algorithm is increased in the given repeat-count as the crawler always moves to higher degree nodes and ends up following the same path that leads to the local maxima. In DBLP net- work, the probability of failure is much higher when we apply degree based hill-climbing approach as the algorithm is mostly stuck to a local maxima due to following the same route and not able to hit the global maxima in the given repeat-count. This highly depends on the network structure and not on its size. When we apply these algorithms in practice, we do not know the highest h2 − index (maxindex), the algorithms, therefore, will have to be repeated few more times to make sure that the node returned by the algorithm is the actual global maxima and not the local maxima. The results show that a smaller value of repeat − count will suffice the purpose. To increase the efficiency, the crawlers can be started from a few randomly chosen nodes to avoid the local maxima and hit the top-ranked nodes with a high probability. The proposed methods can be further improved by only computing the h2 − index of the neighbors that can be considered for the next step of the crawler instead of computing the h2 − index of all of its neighbors. A node having the degree lower than the h2 − index of the current node cannot have the h2 − index higher than the current node, so, all such neighbors can be discarded. This further fastens up the proposed method. We also observe that in all considered real-world networks, the induced subgraph of all the top-ranked nodes (the highest h2 − index nodes) is con- nected. So, once we hit one top node, all top nodes can be identified. All these nodes can be used to spread the information faster in the network. 21 2: Table IndexAndDegreeBasedHillClimbing algorithms Network IndexBasedHillClimbing Results Nodes for IndexBasedHillClimbing and Avg Std Avg Algo IndexAndDegreeBasedHillClimbing Avg Algo Avg Std (steps) (steps) (count) F ailed(%) (steps) (steps) (count) F ailed(%) Astro-Ph Buzznet Cond-Mat DBLP Digg Enron Facebook FB-Wall Foursquare Gowalla 14845 101163 13861 317080 261489 84384 63392 43953 639014 196591 8.66 3.20 15.55 213.13 4.09 5.08 6.06 9.04 10.84 4.33 9.82 0.69 15.46 84.89 1.50 0.97 1.90 4.48 0.38 4.17 0.37 0.00 2.27 9.79 0.02 0.00 0.30 0.59 0.00 0.15 1.21 0.00 1.39 5.45 0.03 0.00 0.00 0.00 0.00 0.02 5.70 3.20 9.95 118.76 4.03 5.07 5.99 8.65 10.84 3.92 1.40 0.69 4.88 5.34 0.85 0.93 1.80 4.12 0.38 1.32 0.00 0.00 0.18 0.00 0.00 0.00 0.31 0.48 0.00 0.03 3.27 0.00 11.58 79.60 0.15 0.04 0.02 0.04 0.00 0.22 6 Section 3: Rank Estimation of a Node In this section, we employ structural behavior of h2 − index to propose a fast rank estimation method. We observe that the curve of percentile rank versus h2 − index follows a unique pattern in all the considered real-world networks as shown in Figure 5. The percentile rank of a node is computed as ∗ 100, where n is the network size and R(u) P ercentileRank(u) = n−R(u)+1 is the rank of node u based on its h2− index value in the given network. The study of this curve shows the 4-parameter logistic equation to be a best fit. The equation of the curve is given as, n P ercentileRank(u) = a2 + (cid:16) h2−index(u) a1 − a2 (cid:17)p , x0 1 + (1) where a1, a2, x0, and p are parameters, and p denotes slope of the logistic curve (also called hill's slope). The plots are shown in Figure 5, where black colored circles depict the actual percentile rank of the nodes, and the red colored triangles show the best-fit curve using the 4-parameter logistic equation. The best fit curve is plotted using scaled Levenberg-Marquardt algorithm [80] with 1000 iterations and 0.0001 tolerance. It can be concluded from the plots that the logistic equation can be used to estimate the percentile rank of a node. Once we estimate the parameters of the equation, the percentile rank of a node can be 22 computed in O(1) time without computing the index values of all the nodes. This approach is similar to the heuristic method proposed for estimating the closeness rank of a node. Estimating Parameters of the Logistic Curve: We estimate the parameters of the logistic curve by analyzing the curves for different networks. The estimated value of a parameter x is represented by x(cid:48). In the logistic curve, a2 is close to the highest rank value, so, it can be estimated as, a(cid:48) 2 = 100. The value of a1 is close to the minimum percentile rank. Using this observation, we estimate a(cid:48) 1 = 1 and plots show that the estimated curve is close to the best fit. The value of p is computed by averaging the slopes of the considered datasets using the estimated value of a1 and a2. Table 3 shows p values using the estimated parameters (a1 = 1 and a2 = 100) and their average is 1.44, so p(cid:48) = 1.44. x0 is computed using scaled Levenberg- Marquardt algorithm [80] for implementation, and its better estimator can be further proposed. Table 3: Networks versus their p values using the estimated values of a1 and a2 Network Astro-Ph Buzznet Cond-Mat DBLP Digg p value Network p value 1.49 1.26 2.44 2.08 0.91 Enron Facebook FB-Wall Foursquare Gowalla Average 0.90 1.37 1.56 0.97 1.40 1.44 Discussion The percentile rank of a node is estimated using equation 1, so, Estimated P ercentileRank(u) = a(cid:48) (cid:19)p(cid:48) . The plots for the 2 + (cid:18) actual rank, best-fit rank, and estimated rank are shown in Figure 5. To measure the accuracy of the proposed method, we compute absolute error (Actual P ercentile Rank−Computed P ercentile Rank) for each h2−index value and find their average. The average error and standard deviation for 2 1−a(cid:48) a(cid:48) x(cid:48) 0 h2−index(u) 1+ 23 the estimated rank using the best-fit and estimated parameters are shown in Table 4. We further compute Kendall's Tau (τ ), Pearson (r), and Spearman (ρ) correlation coefficients for the actual versus estimated ranks using the best-fit and estimated parameters. The results are shown in Table 5 with the values rounded off by two decimal places. The results show that the logistic curve can be efficiently used to estimate the percentile rank. The percentile rank can be converted to actual rank if the network size or its estimated value is known. However, we have considered the percentile rank as it gives a complete idea about the relative rank of the node. Table 4: Absolute error for percentile ranking using best-fit and estimated curve Estimated Network Best-Fit Avg. Error Std. Dev Avg. Error Std. Dev Astro-Ph Buzznet Cond-Mat DBLP Digg Enron Facebook Fb-Wall Foursquare Gowalla 0.36 5.73 0.64 0.18 0.36 0.57 6.58 0.65 1.54 0.19 0.28 6.13 0.39 0.14 0.29 0.31 5.62 0.43 1.46 0.12 1.96 1.73 6.92 2.83 0.95 1.48 2.66 2.43 2.02 0.64 1.02 1.91 2.86 2.05 1.31 1.74 1.66 0.88 3.01 0.51 7 Conclusion In this work, we have shown that h2−index is a good estimator of shell-index and can be used to identify influential nodes in real-world networks. We also observed that h2 − index has better monotonicity than the shell-index and has better correlation with the spreading power of the nodes. We further proposed hill-climbing based methods to identify the top-ranked nodes. The results show that a top-ranked node can be found in a small number of steps. We also observed that the induced subgraph of all the top-ranked nodes is connected and once we find one top node, all the top nodes can be identified. A mathematical bound for estimating the number of steps to hit 24 (a) Astro-Ph (b) Buzznet (c) Cond-Mat (d) DBLP (e) Digg (f) Enron (g) Facebook (h) FB-Wall 25 (i) Foursquare (j) Gowalla Figure 5: Percentile Rank versus h2 − index Table 5: Correlation coefficients for percentile ranking using best-fit and estimated curve Estimated Network Best-Fit Kendall Pearson Spearman Kendall Pearson Spearman Astro-Ph Buzznet Cond-Mat DBLP Digg Enron Facebook Fb-Wall Foursquare Gowalla 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 0.83 1.00 1.00 0.99 0.99 0.88 1.00 0.96 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 0.99 0.99 0.99 0.94 0.93 0.99 0.99 0.92 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 a top node in a given scale-free network can be further proposed. In the last section, we discussed a heuristic method to estimate the percentile rank of a node. The accuracy of the proposed method is computed using the absolute error and correlation coefficients. One can further propose better methods for estimating the parameters of the logistic curve which will improve the accuracy of the rank estimation. Acknowledgement: Authors would like to thank IIT Ropar HPC com- mittee for providing the resources for performing the experiments. References [1] Stephen P Borgatti and Martin G Everett. Models of core/periphery structures. Social networks, 21(4):375 -- 395, 2000. [2] Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt, and Eran Shir. A model of internet topology using k-shell decomposition. Proceed- ings of the National Academy of Sciences, 104(27):11150 -- 11154, 2007. [3] Stephen B Seidman. Network structure and minimum degree. Social networks, 5(3):269 -- 287, 1983. 26 [4] Vladimir Batagelj and Matjaz Zaversnik. Fast algorithms for deter- mining (generalized) core groups in social networks. Advances in Data Analysis and Classification, 5(2):129 -- 145, 2011. [5] Maksim Kitsak, Lazaros K Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eugene Stanley, and Hern´an A Makse. Identification of influential spreaders in complex networks. Nature physics, 6(11):888 -- 893, 2010. [6] Akrati Saxena, SRS Iyengar, and Yayati Gupta. Understanding spread- ing patterns on social networks based on network topology. In Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on, pages 1616 -- 1617. IEEE, 2015. [7] Sen Pei and Hern´an A Makse. Spreading dynamics in complex net- Journal of Statistical Mechanics: Theory and Experiment, works. 2013(12):P12002, 2013. [8] Sen Pei, Lev Muchnik, Jos´e S Andrade Jr, Zhiming Zheng, and Hern´an A Makse. Searching for superspreaders of information in real-world social media. Scientific reports, 4:5547, 2014. [9] Ahmad Zareie and Amir Sheikhahmadi. A hierarchical approach for influential node ranking in complex social networks. Expert Systems with Applications, 93:200 -- 211, 2018. [10] Zhixiao Wang, Ya Zhao, Jingke Xi, and Changjiang Du. Fast rank- ing influential nodes in complex networks using a k-shell iteration fac- tor. Physica A: Statistical Mechanics and its Applications, 461:171 -- 181, 2016. [11] An Zeng and Cheng-Jun Zhang. Ranking spreaders by decomposing complex networks. Physics Letters A, 377(14):1031 -- 1035, 2013. [12] Marvin E Shaw. Some effects of unequal distribution of information upon group performance in various communication nets. Journal of abnormal and social psychology, 49(4):547 -- 553, 1954. [13] Jorge E Hirsch. An index to quantify an individual's scientific research output. Proceedings of the National academy of Sciences of the United States of America, pages 16569 -- 16572, 2005. 27 [14] Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and Tao Zhou. Identifying influential nodes in complex networks. Physica a: Statistical mechanics and its applications, 391(4):1777 -- 1787, 2012. [15] Gert Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 -- 603, 1966. [16] Linton C Freeman. A set of measures of centrality based on betweenness. Sociometry, pages 35 -- 41, 1977. [17] Karen Stephenson and Marvin Zelen. Rethinking centrality: Methods and examples. Social Networks, 11(1):1 -- 37, 1989. [18] Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertex- tual web search engine in: Seventh international world-wide web con- ference (www 1998), april 14-18, 1998, brisbane, australia. Brisbane, Australia, 1998. [19] Yayati Gupta, Akrati Saxena, Debarati Das, and SRS Iyengar. Modeling memetics using edge diversity. In Complex Networks VII, pages 187 -- 198. Springer, 2016. [20] Antonios Garas, Frank Schweitzer, and Shlomo Havlin. A k-shell de- composition method for weighted networks. New Journal of Physics, 14(8):083030, 2012. [21] Marius Eidsaa and Eivind Almaas. s-core network decomposition: A generalization of k-core analysis to weighted networks. Physical Review E, 88(6):062819, 2013. [22] Bo Wei, Jie Liu, Daijun Wei, Cai Gao, and Yong Deng. Weighted k-shell decomposition for complex networks based on potential edge weights. Physica A: Statistical Mechanics and its Applications, 420:277 -- 283, 2015. [23] Jian-Guo Liu, Zhuo-Ming Ren, and Qiang Guo. Ranking the spreading influence in complex networks. Physica A: Statistical Mechanics and its Applications, 392(18):4154 -- 4159, 2013. [24] Ying Liu, Ming Tang, Tao Zhou, and Younghae Do. Improving the accuracy of the k-shell method by removing redundant links: From a perspective of spreading dynamics. Scientific reports, 5:13172, 2015. 28 [25] Bonan Hou, Yiping Yao, and Dongsheng Liao. Identifying all-around nodes for spreading dynamics in complex networks. Physica A: Statis- tical Mechanics and its Applications, 391(15):4012 -- 4017, 2012. [26] Pavlos Basaras, Dimitrios Katsaros, and Leandros Tassiulas. Detect- ing influential spreaders in complex, dynamic networks. Computer, 46(4):0024 -- 29, 2013. [27] Joonhyun Bae and Sangwook Kim. Identifying and ranking influential spreaders in complex networks by neighborhood coreness. Physica A: Statistical Mechanics and its Applications, 395:549 -- 559, 2014. [28] Nikolaj Tatti and Aristides Gionis. Density-friendly graph decompo- sition. In Proceedings of the 24th International Conference on World Wide Web, pages 1089 -- 1099. International World Wide Web Confer- ences Steering Committee, 2015. [29] Rong-Hua Li, Jeffrey Xu Yu, and Rui Mao. Efficient core maintenance in large dynamic graphs. Knowledge and Data Engineering, IEEE Trans- actions on, 26(10):2453 -- 2465, 2014. [30] Paul Jakma, Marcin Orczyk, Colin S Perkins, and Marwan Fayed. Dis- In Proceedings of tributed k-core decomposition of dynamic graphs. the 2012 ACM conference on CoNEXT student workshop, pages 39 -- 40. ACM, 2012. [31] Katerina Pechlivanidou, Dimitrios Katsaros, and Leandros Tassiulas. Mapreduce-based distributed k-shell decomposition for online social net- works. In Services (SERVICES), 2014 IEEE World Congress on, pages 30 -- 37. IEEE, 2014. [32] Alberto Montresor, Francesco De Pellegrini, and Daniele Miorandi. Dis- tributed k-core decomposition. Parallel and Distributed Systems, IEEE Transactions on, 24(2):288 -- 300, 2013. [33] Naga Shailaja Dasari, Ranjan Desh, and Mohammad Zubair. Park: An efficient algorithm for k-core decomposition on multicore processors. In Big Data (Big Data), 2014 IEEE International Conference on, pages 9 -- 16. IEEE, 2014. 29 [34] Ahmet Erdem Sar´ıyuce, Bugra Gedik, Gabriela Jacques-Silva, Kun- Lung Wu, and Umit V C¸ atalyurek. Streaming algorithms for k-core decomposition. Proceedings of the VLDB Endowment, 6(6):433 -- 444, 2013. [35] Linyuan Lu, Tao Zhou, Qian-Ming Zhang, and H Eugene Stanley. The h-index of a network node and its relation to degree and coreness. Nature communications, 7, 2016. [36] Roberto Catini, Dmytro Karamshuk, Orion Penner, and Massimo Ric- caboni. Identifying geographic clusters: A network analytic approach. Research policy, 44(9):1749 -- 1762, 2015. [37] Daniel Fricke and Thomas Lux. Core -- periphery structure in the overnight money market: evidence from the e-mid trading platform. Computational Economics, 45(3):359 -- 395, 2015. [38] Paolo Barucca and Fabrizio Lillo. Disentangling bipartite and core- periphery structure in financial networks. Chaos, Solitons & Fractals, 88:244 -- 253, 2016. [39] Danielle S Bassett, Nicholas F Wymbs, M Puck Rombach, Mason A Porter, Peter J Mucha, and Scott T Grafton. Task-based core-periphery organization of human brain dynamics. PLoS computational biology, 9(9):e1003171, 2013. [40] Hae-Jeong Park and Karl Friston. Structural and functional brain net- works: from connections to cognition. Science, 342(6158):1238411, 2013. [41] Nivedita Chatterjee and Sitabhra Sinha. Understanding the mind of a worm: hierarchical network structure underlying nervous system func- tion in c. elegans. Progress in brain research, 168:145 -- 153, 2007. [42] Darko Obradovic and Stephan Baumann. A journey to the core of the bl- ogosphere. In Social Network Analysis and Mining, 2009. ASONAM'09. International Conference on Advances in, pages 1 -- 6. IEEE, 2009. [43] Loet Leydesdorff, Caroline Wagner, Han Woo Park, and Jonathan International collaboration in science: The global map and Adams. the network. arXiv preprint arXiv:1301.0801, 2013. 30 [44] Clark Hu and Pradeep Racherla. Visual representation of knowledge networks: A social network analysis of hospitality research domain. In- ternational Journal of Hospitality Management, 27(2):302 -- 312, 2008. [45] Feng Luo, Bo Li, Xiu-Feng Wan, and Richard H Scheuermann. Core and periphery structures in protein interaction networks. In Bmc Bioinfor- matics, volume 10, page S8. BioMed Central, 2009. [46] Kevin Crowston, Kangning Wei, Qing Li, and James Howison. Core and periphery in free/libre and open source software team communications. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on, volume 6, pages 118a -- 118a. IEEE, 2006. [47] Chintan Amrit and Jos Van Hillegersberg. Exploring the impact of socio- technical core-periphery structures in open source software development. journal of information technology, 25(2):216 -- 229, 2010. [48] Pankaj Setia, Balaji Rajagopalan, Vallabh Sambamurthy, and Roger Calantone. How peripheral developers contribute to open-source soft- ware development. Information Systems Research, 23(1):144 -- 163, 2012. [49] Marcelo Cataldo and James D Herbsleb. Communication networks in geographically distributed software development. In Proceedings of the 2008 ACM conference on Computer supported cooperative work, pages 579 -- 588. ACM, 2008. [50] Gino Cattani, Simone Ferriani, and Paul D Allison. Insiders, outsiders, and the struggle for consecration in cultural fields: A core-periphery perspective. American Sociological Review, 79(2):258 -- 281, 2014. [51] Evelina Fedorenko and Sharon L Thompson-Schill. Reworking the lan- guage network. Trends in cognitive sciences, 18(3):120 -- 126, 2014. [52] John C Paolillo. Structure and network in the youtube core. In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual, pages 156 -- 156. IEEE, 2008. [53] Jing Zhao, Guo-Hui Ding, Lin Tao, Hong Yu, Zhong-Hao Yu, Jian-Hua Luo, Zhi-Wei Cao, and Yi-Xue Li. Modular co-evolution of metabolic networks. BMC bioinformatics, 8(1):311, 2007. 31 [54] Vishesh Karwa, Michael J Pelsmajer, Sonja Petrovi´c, Despina Stasi, Dane Wilburne, et al. Statistical models for cores decomposition of an undirected random graph. Electronic Journal of Statistics, 11(1):1949 -- 1982, 2017. [55] Akrati Saxena and SRS Iyengar. Evolving models for meso-scale struc- tures. In Communication Systems and Networks (COMSNETS), 2016 8th International Conference on, pages 1 -- 8. IEEE, 2016. [56] Ralucca Gera, Ryan Miller, Akrati Saxena, Miguel MirandaLopez, and Scott Warnke. Three is the answer: Combining relationships to analyze multilayered terrorist networks. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pages 868 -- 875. ACM, 2017. [57] Ryan Miller, Ralucca Gera, Akrati Saxena, and Tanmoy Chakraborty. Discovering and leveraging communities in dark multi-layered networks for network disruption. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 1152 -- 1159. IEEE, 2018. [58] Oludare Adeniji, David S Cohick, Ralucca Gera, Victor G Castro, and Akrati Saxena. A generative model for the layers of terrorist networks. In Proceedings of the 2017 IEEE/ACM International Conference on Ad- vances in Social Networks Analysis and Mining 2017, pages 690 -- 697. ACM, 2017. [59] Akrati Saxena and SRS Iyengar. Global rank estimation. arXiv preprint arXiv:1710.11341, 2017. [60] Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Rank me thou shalln't compare me. arXiv preprint arXiv:1511.09050, 2015. [61] Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree centrality ranking of a node. arXiv preprint arXiv:1511.05732, 2015. [62] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Observe locally rank globally. In Proceedings of the 2017 IEEE/ACM International Confer- ence on Advances in Social Networks Analysis and Mining 2017, pages 139 -- 144. ACM, 2017. 32 [63] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Degree ranking using local information. arXiv preprint arXiv:1706.01205, 2017. [64] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Estimating degree rank in complex networks. Social Network Analysis and Mining, 8(1):42, 2018. [65] Akrati Saxena, Ralucca Gera, and SRS Iyengar. Fast estimation of closeness centrality ranking. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pages 80 -- 85. ACM, 2017. [66] Akrati Saxena, Ralucca Gera, and SRS Iyengar. A faster method to estimate closeness centrality ranking. arXiv preprint arXiv:1706.02083, 2017. [67] Claudio Castellano and Romualdo Pastor-Satorras. Thresholds for epi- demic spreading in networks. Physical review letters, 105(21):218701, 2010. [68] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):2, 2007. [69] R. Zafarani and H. Liu. Social computing data repository at ASU, 2009. [70] Jaewon Yang and Jure Leskovec. Defining and evaluating network com- munities based on ground-truth. Knowledge and Information Systems, 42(1):181 -- 213, 2015. [71] Tad Hogg and Kristina Lerman. Social dynamics of digg. EPJ Data Science, 1(1):1 -- 26, 2012. [72] Bryan Klimt and Yiming Yang. The enron corpus: A new dataset for email classification research. In Machine learning: ECML 2004, pages 217 -- 226. Springer, 2004. [73] Bimal Viswanath, Alan Mislove, Meeyoung Cha, and Krishna P Gum- madi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, pages 37 -- 42. ACM, 2009. 33 [74] Eunjoon Cho, Seth A Myers, and Jure Leskovec. Friendship and mobil- ity: user movement in location-based social networks. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discov- ery and data mining, pages 1082 -- 1090. ACM, 2011. [75] Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size estimation. arXiv preprint arXiv:1210.0460, 2012. [76] Stephen J Hardiman and Liran Katzir. Estimating clustering coeffi- cients and size of social networks via random walk. In Proceedings of the 22nd international conference on World Wide Web, pages 539 -- 550. International World Wide Web Conferences Steering Committee, 2013. [77] Anirban Dasgupta, Ravi Kumar, and Tamas Sarlos. On estimating the average degree. In Proceedings of the 23rd international conference on World wide web, pages 795 -- 806. ACM, 2014. [78] Bruno Ribeiro and Don Towsley. On the estimation accuracy of degree In Decision and Control (CDC), distributions from graph sampling. 2012 IEEE 51st Annual Conference on, pages 5240 -- 5247. IEEE, 2012. [79] Yayati Gupta, Debarati Das, and SRS Iyengar. Pseudo-cores: The ter- minus of an intelligent viral meme's trajectory. In Complex Networks VII, pages 213 -- 226. Springer, 2016. [80] Jorge J Mor´e. The levenberg-marquardt algorithm: implementation and theory. In Numerical analysis, pages 105 -- 116. Springer, 1978. 34
1910.06052
1
1910
2019-10-14T11:44:06
Altering control modes of complex networks based on edge removal
[ "cs.SI", "eess.SY", "eess.SY", "physics.soc-ph" ]
Controlling a complex network is of great importance in many applications. The network can be controlled by inputting external control signals through some selected nodes, which are called input nodes. Previous works found that the majority of the nodes in dense networks are either the input nodes or not, which leads to the bimodality in controlling the complex networks. Due to the physical or economic constraints of many real control scenarios, altering the control mode of a network may be critical to many applications. Here we develop a graph-based algorithm to alter the control mode of a network. The main idea is to change the control connectivity of nodes by removing carefully selected edges. We rigorously prove the correctness of our algorithm and evaluate its performance on both synthetic and real networks. The experimental results show that the control mode of a network can be easily changed by removing few selected edges. Our methods provide the ability to design the desired control mode for different control scenarios, which may be useful in many applications.
cs.SI
cs
Altering control modes of complex networks based on edge removal Xizhe Zhang1,2*, Qian Li1 1 (School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, China) 2 (Joint Laboratory of Artificial Intelligence and Precision Medicine of China Medical University and Northeastern University, Shenyang, Liaoning, China) Abstract: Controlling a complex network is of great importance in many applications. The network can be controlled by inputting external control signals through some selected nodes, which are called input nodes. Previous works found that the majority of the nodes in dense networks are either the input nodes or not, which leads to the bimodality in controlling the complex networks. Due to the physical or economic constraints of many real control scenarios, altering the control mode of a network may be critical to many applications. Here we develop a graph-based algorithm to alter the control mode of a network. The main idea is to change the control connectivity of nodes by removing carefully selected edges. We rigorously prove the correctness of our algorithm and evaluate its performance on both synthetic and real networks. The experimental results show that the control mode of a network can be easily changed by removing few selected edges. Our methods provide the ability to design the desired control mode for different control scenarios, which may be useful in many applications. Keyword: complex network; structural controllability; control modes; edge removal; input nodes 1. Introduction The control of the complex networked systems is of great importance in many applications. Recent developments about structural controllability of complex networks1-3 have attracted much attention. Considerable research efforts have been devoted to analyzing control principle of various real-world networks. For example, network controllability has been used to analyzing the interbank loan network4,5, finding the underlying mechanism of human brain network6-8, identifying disease genes9-13 and finding drug target13-15. A network is said to be controllable if its state can be controlled from an initial state to a desired final state in finite time2. The nodes used to input the external control signals are called actuator nodes, and the actuator nodes that do not share input signals are called driver nodes16-21. The minimum set of driver nodes is called Minimum Driver nodes Set (MDS). Previous works22 found that the MDS can be obtained by the maximum matching (the maximum edges set which do not share nodes) of the network. Based on this framework, Liu et.al18 applied the structural controllability theory to the complex networks and found that the size of the MDS is closely related to the degree distribution of the networks. Ruths et.al23,24 further investigated the formation of the MDS and found that MDS is mainly composed of the source nodes and the sink nodes of the control path. Menichetti et.al25 found the size of the MDS is mainly determined by the number of the low in-degree nodes, especially those with one or two in-degree. For most of the real networks, the maximum matching is usually not unique because of their structural complexity. Therefore, there may exist many MDSs which can fully control the network16,19. According to the participation of the nodes in all MDSs, a node is called an input node if it appears in at least one MDS. Otherwise, it is called redundant node. By using above control type of nodes, many works have been done to investigate the types of nodes in control. For example, input nodes can be used for identifying critical regulatory genes26, finding cancer-associated genes20, identifying novel disease genes and potential drug targets9,10,13. Previous work19 found an interesting bimodality phenomenon in dense networks, which is that the majority of the nodes must be either input nodes or redundant nodes. This leads to two control modes of complex networks, centralized and distributed control19. For the networks with centralized control, most of the nodes are redundant nodes, which means the selection of driver nodes are very limited. For the networks with distributed control, most of the nodes are input nodes, which suggests that there are many available options to input the external control signals into the network. Different control modes may have different practical applications, for example, distributed control mode may improve the resilience to control the network yet induce potential security risk19. Although our previous work16 provides a method to alter the control modes by adding edges, we still do not know how to alter the control mode by removing edges. Therefore, it is of great practical significance to investigate how to design or alter the control mode of a network. Here we present an efficient method to alter the control mode of a network by removing edges. The method we presented here is motived by our previous findings that the input nodes and redundant nodes are connected by the alternating paths, respectively16. We prove that by altering the control type of few selected nodes, the control mode of a network can be easily changed. The experimental results on synthetic and real networks show the efficiency of our algorithm. Comparing other strategies such as adding edges17 or reversing the direction of edges19, the strategy of removing edges may be more feasible in many applications. For example, when controlling the biological network such as protein-protein interaction networks9, it is impractical or difficult to add new interaction between proteins. However, removing edges can be easily done by inhibiting the signals transmitted between proteins. 2. Structural controllability and maximum matching Consider a linear time-invariant network G(V, E), its dynamics can be described by the following equation: ' ( ) x t = + ( ) Ax t ( ) Bu t (1) where the state vector x(t)=(x1(t), …, xN(t))T denotes the value of N nodes in the network at time t, A is the transpose of the adjacency matrix of the network, B is the input matrix that defines how control signals are input to the network, and u(t)=(u1(t), …, uH(t))T represents the H input signals at time t. To analyze the controllability of the directed network, we need to convert the directed network to an undirected bipartite graph. The bipartite graph is built by splitting the node set V into two node sets V- and V+, where a node n in G is converted to two nodes n- and n+ in B. The nodes n- and n+ are, respectively, connected to the in-edges and out-edges of node n. Next, we introduce some concepts about maximum matching. A set of edges is called a matching if no two edges in the matching share common nodes. The edges belong to a matching are called matched edges. A node is said to be matched if there is a matched edge linked to the node; Otherwise, the node is unmatched. The unmatched nodes in V+ are called unsaturated nodes, and the unmatched nodes in V- are called driver nodes. A path is said to be an alternating path if the edges of the path are alternately in and not in the matching. An alternating path that begins and ends on the unmatched nodes is called augmenting path. A maximum matching is a matching with the maximum number of edges. According to the structural controllability theory, for any maximum matching of the network, the set of unmatched nodes in V- is called Minimum Driver nodes Set (MDS), which can be used to control the network. Because maximum matching is not unique for most networks, there may exist numerous MDSs in a network. A node is called an input node if it appears in at least one MDS. Otherwise, we call it as a redundant node. Figure 1 shows a simple network with its maximum matching and the node classification. Input nodes and redundant nodes are not evenly distributed in the networks. Previous works19 found that in some dense networks, the majority of nodes of a network are either input nodes or redundant nodes. This bifurcation phenomenon leads to two control modes of the networks: centralized control and distributed control. For networks with distributed control, most of the nodes are input nodes. For the networks with centralized control, most of the nodes are redundant nodes. Therefore, to alter the control modes of a network, we need to change the control type of most of the nodes of a network. Figure.1 A simple network and its node classification. (A). a simple network and one of its maximum matching (red edges). We show its driver nodes (shaded in blue) and matched nodes (shaded in red); (B). The bipartite graph of the network. Each node of the original directed network are split into two nodes, which connected to in and out edges, respectively; (C). Input nodes and redundant nodes of the network. The blue nodes are redundant nodes, and the green nodes are input nodes. The input nodes {1, 2} can be reached by driver nodes {3, 7} through alternating paths. The redundant nodes {4, 5, 6} cannot be reached by any input nodes. 3. From distributed control to centralized control First, we introduce how to change a network from distributed control to centralized control. This is equivalent to altering the control type of most of the nodes from input nodes to redundant nodes. Our previous work16 found that a node is an input node if and only if it can be reached by an alternating path from a driver node; otherwise, it is a redundant node. Figure 1C give an example of input nodes and their connectivity. For example, the input nodes 1 and 2 can be reached by driver nodes 3 and 7 through alternating paths. However, the redundant nodes 4, 5 and 6 cannot be reached by any driver node through any alternating path. The detailed theorem is as follows: Property 1: For any MDS D and a driver node n∊D, all nodes of C(n) must be input nodes, where C(n) is the set of all nodes which can be reached from node n through any alternating path. Property 2: For any MDS D, if node m cannot be reached by any alternating path start from any driver node of D, then m must be a redundant node and never appears in any MDS. Because the input nodes are connected to driver nodes by alternating paths, we can define connected components based on the alternating path, which are called control components. Based on above properties, we now present a new theorem for altering a connected component which only contains input nodes to the component only contains redundant nodes: contains at least one driver node, all nodes of the set 𝐶"=𝐶−(𝐶∩𝐷) are redundant nodes of network Theorem 1: For a network G(V, E) and one of its MDS D, consider a control component C, which Proof: Based on property 1, the input nodes are connected to at least one driver nodes by alternating paths. Therefore, if we disconnect all the driver nodes from the alternating paths, the input nodes will be G'(V, E'), where 𝐸"=𝐸−𝑒+,(𝐶∩𝐷). turned into redundant nodes. The easiest way is to remove all in-edges 𝑒+,(𝐶∩𝐷) of the driver nodes. Because driver node are unmatched nodes, therefore, all edges of 𝑒+,(𝐶∩𝐷) are unmatched. Therefore, removing the edges 𝑒+,(𝐶∩𝐷) will not change the maximum matching. For new network G'(V, E'), any driver node of D cannot reached the nodes set 𝐶"=𝐶−(𝐶∩𝐷) by any alternating paths. Based on property 2, all node of set 𝐶"=𝐶−(𝐶∩𝐷) are redundant nodes. The proof is complete. Figure 2 gives an example subgraph of the whole network for altering input nodes to redundant nodes. By removing the in-edge e(2,5) of driver node 5, the input nodes 3 and 4 of the original network are changed into redundant nodes in the new network. Because we only remove the unmatched edges from the network, the MDS D of original network G(V, E) is also an MDS of G'(V, E'). It means that the control schemes of the network will not change even after changing the control mode of the network. It is one of the advantages of our algorithm. Figure 2 Illustration of altering input nodes to redundant nodes. By removing the in-edge of driver node 5, the input nodes 3 and 4 are changed into redundant nodes. Based on the theorem 1, we designed an efficient algorithm to alter the control mode of a network. The basic idea of the algorithm is to first find the largest connected component of input nodes based on alternating paths and disconnected the driver nodes from the connected component. The above idea and steps are formulated in Algorithm 1 for altering a network from distributed control to centralized control. Input: Network G(V, E); Find a maximum matching M of G; let the nodes set without matched in-edges be D; find all alternating paths start from node i; let Pi be the set of nodes which have even distance to node i on these alternating paths; end Algorithm 1: Altering a network from distributed control to centralized control 1. 2. Output: removed edges set Re 3. 4. 5. 6. 7. 8. 9. 10. end for each i∈D do for each pair i≠j do if 𝑃+∩𝑃1≠∅ then 𝑃+=𝑃1∪𝑃+, 𝑃1=∅; 11. Let the largest nodes set be Pmax and 𝐷4=𝑃567∩𝐷; 𝑅9=𝑅9∪𝑒+,(𝑛+); for each node ni in Dp do 12. 13. 14. end 15. Output: removed edges set Re. 4. From centralized control to distributed control Next, we show how to change a network from centralized control to distributed control. This is equivalent to alter the control type of most nodes from redundant nodes to input nodes. Based on property 2, the redundant nodes cannot be reached by any alternating path start from any driver nodes. Therefore, to alter the control type of redundant nodes, we need to change some matched nodes to driver nodes. That can be done by removing carefully selected edges from the alternating paths which start from the redundant nodes. The edges of an alternating path are alternately in and not in a maximum matching. If the matching is maximum, the alternating paths must be connected to at most one unmatched node. Therefore, there are three possible cases for the alternating paths: case 1 (Figure 3A): alternating path with odd length, where the path starts with a matched node and end with an unmatched node; case 2 (Figure 3B): alternating cycles, where the alternating path form a cycle; case 3 (Figure 3C): alternating path with odd length, where the start and end nodes are both matched; Figure 3 shows the results when removing a matched edge from an alternating path. For case 1, if we remove a matched edge, the alternating path will be even length. For case 2, if we remove a matched edge, the alternating cycle will turn into alternating paths with even length. However, the type of nodes within the alternating cycle remains unchanged. For case 3, if we remove a matched edge, there will exist a driver node in the alternating path, which makes all nodes on this path be the input nodes based on property 1. Figure 3 Three cases when removing a matched edge from a network. (A). Case 1: alternating paths with an odd length. If we remove a matched edge, the alternating path will be even length; (B). Case2: alternating cycles. If we remove a matched edge, the alternating cycle will turn into alternating paths with even length; (C). Case 3: alternating paths with even length. If we remove a matched edge, there will exist a driver node in the alternating path, which makes all nodes on this path be the input nodes; Therefore, to change a network from centralized control to distributed control, we need to first find the largest connected components of redundant nodes and change the control type of the nodes. The basic idea is first to break the cycles and remove the unmatched nodes in alternating paths, and change a matched node to driver node by removing its matched edge. Therefore, the other redundant nodes which connected by the driver node will be changed to input nodes. The above idea and steps are formulated in Algorithm 2 for altering a network from centralized control to distributed control. Algorithm 2: Altering a network from centralized control to distributed control 1. 2. Output: removed edges set Re 3. 4. 5. 6. 7. find all alternating paths start from node i; let Pi be the set of nodes which have even distance to node i on these alternating paths; end //detach all unmatched nodes from redundant nodes Find a maximum matching M of G; let the nodes set without matched out-edges be U; Input: Network G(V, E); for each i∈U do for each pair i≠j do 8. for each node ni in Up do 12. 13. 14. end if 𝑃+∩𝑃1≠∅, let 𝑃+=𝑃1∪𝑃+, 𝑃1=∅; 11. Find the largest nodes set Pmax; Let 𝑈4=𝑃567∩𝑈; 𝑅9=𝑅9∪𝑒<=>(𝑛+); for each cj∈Ci do select one matched edge ej∈cj; 𝑅9=𝑅9∪𝑒1; for each node n in 𝑃567 do 23. Find the largest nodes set Hk, let its matched edge is ek, let 𝑅9=𝑅9∪𝑒?; //remove cycles find all alternating cycles Ci of Pmax; // remove one matched edge 9. 10. end 15. 16. 17. 18. end 19. 20. 21. 22. end find all alternating paths start from node n; let Hi be the set of nodes which have odd distance to node n on these alternating paths; 24. Output: removed edges set Re. 5. Results To investigate the efficiency of our methods, we constructed a series of networks based on scale- free network model27. The power exponent of in-degree distribution and out-degree distribution are γin=γout=3. The average degree <k> is from 5 to 40 with increment 0.1. For each <k>, we generated 100 random instances. Therefore, there are total 35,000 network instances used to evaluate the methods. First, we computed the percentage of driver nodes ND (Figure 4A), the percentage of input nodes ID (Figure 4B), the size of the maximum connected component of input nodes (Figure 4C) and the size of the maximum connected component of redundant nodes (Figure 4D) for each network. With the increase of the average degree of the networks, we can observe that the percentage of driver nodes monotonically decreased (Figure.4A), indicating the denser networks are easier controlled. However, the percentage of input nodes exhibited a bifurcation phenomenon, indicating that for the dense network, most nodes are either input nodes or redundant nodes (Figure.4B). Furthermore, these nodes are connected by alternating paths and constitute the large connected components (Figure 4C-4D). Therefore, to alter the control modes of the network, we only need to change the type of the maximum connected component of nodes. Figure.4 Percentage of driver nodes and input nodes of Scale-free networks with γin=γout=3. A. percentage of driver nodes ND versus average degree; B. percentage of input nodes ID versus average degree; C. percentage of maximum connected component of input nodes versus average degree; D. percentage of maximum connected component of redundant nodes versus average degree. Next, we evaluated the performance of our algorithms. Figure.5A shows an example for changing a network from distributed mode to centralized mode. By removing only 11 edges, almost all input nodes of the original network are changed to redundant nodes. For more complex networks, our algorithms are still efficient to change the control modes of the networks. For networks with different average degrees, we computed the percentage of removed edges and the changed input nodes after removing these edges. Figure 5B shows that with the increase of k, very few removed edges can significant changed the type of most input nodes. For example, for dense networks (k>11), only 0.5% removed edges can change the type of nearly 80% nodes. For sparse networks (k<8), we can still change almost 30% nodes with less than 8% edges. Note that the number of input nodes of these networks is also small (ID<0.4, Figure 6B), which means that our algorithm can change many input nodes even in sparse networks. Furthermore, we evaluated the efficiency of our algorithm by computing the percentage of changed input nodes per removed edge ΔnD/p. Figure 5C shows that ΔnD/p increases rapidly with the average degree k, which indicates that it is easier to change the control mode for dense networks. Above results are rooted that in the dense networks, most nodes are connected by the alternating paths and form a large connected component (Figure 4C-4D), that means to alter the unmatched nodes of a connected component will also alter the other nodes of the connected set. Therefore, the larger the connected component is, the easier networks are changed. For the networks with centralized modes, the results are similar (Figure 6). Although the algorithm needs more steps to change from centralized control to distributed control, the resulted are not significantly increased. Therefore, we can also easily change a network from centralized modes to distributed modes. Figure 5 Changing a network from distributed control to centralized control. A. an example network with distributed control. By removing 11 edges (green edges), most nodes are changed to redundant nodes. B. percentage of removed edges versus percentage of the altered input node. C. number of altered input nodes per edges. The networks we used are generated by scale-free networks model with degree exponents γin=γout=3, N=104 and average degree <k>∈[5,25]. For each <k>, we generate 100 networks. Figure 6 Changing a network from centralized control to distributed control. A. an example network with distributed control. By removing 4 edges (green edges), most nodes are changed to redundant nodes. B. percentage of removed edges versus percentage of the altered input node. C. number of altered input nodes per edges. The networks we used are generated by scale-free networks model with degree exponents γin=γout=3, N=104 and average degree <k>∈[5,25]. For each <k>, we generate 100 networks. Next, we evaluated the performance of our algorithms on real networks. These networks are selected based on their diversity of topological structure, including biological networks, social networks, and technical networks. For each network, we show its type, name, number of nodes (N) and edges (L), density of driver nodes nMDS, size and type of the largest connected component CCmax, in which I, R denote input components and redundant components respectively, the proportion of edges (p) that is removed from the network to change the type of CCmax and the density of changed input nodes (ΔnD) after removing edges. The detailed results are listed in Table.1. For networks with the large connected components, we can change their control modes by removing very few edges. For example, for Amazon co-purchasing network, only 2% removed edges can change 80% or more input nodes of the network. However, for some networks with the small connected components, such as s208a, s420a, s838a, it is hard to change their control types. The reason may root that the size of connected components of these networks is on average small; therefore altering the maximum connected components is not enough to change the control mode of the networks. In this case, we need to remove more edges to change the control mode of the networks. Table 1. Results for real networks. For each network, we show its type, name, number of nodes (N) and edges (L), density of driver nodes nMDS, size and type of the largest control component CCmax, in which I, M denote Input set and Matched set respectively, the proportion of edges (p) that is removed from the network to change the type of CCmax and the density of changed driver nodes (ΔnD) after removing edges. Type Food Web Name StMarks Mangrove Silwood Prison inmate N 54 97 154 67 L 356 1492 370 182 <k> 13.19 nMDS CCmax p ΔnD 24.07% 38.89%(R) 10.39% 62.96% 30.76 22.68% 55.67%(I) 5.63% 34.02% 4.81 75.32% 84.42%(I) 75.14% 14.29% 5.43 13.43% 59.70%(R) 6.59% 64.18% Trust Slashdot0902 82168 948464 23.09 4.55% 91.23%(I) 9.27% 86.68% WikiVote 7115 103689 29.15 66.56% 32.12%(R) 22.69% 25.76% s208a s420a s838a 122 252 512 189 399 819 3.10 23.77% 17.21%(I) 6.35% 3.17 23.41% 9.13%(I) 3.20 23.24% 5.27%(I) 3.51% 2.20% 4.10% 1.98% 0.98% ArXiv-HepTh 27770 352807 25.41 21.58% 48.96%(R) 4.56% 57.61% SciMet Google p2p-1 p2p-2 p2p-3 3084 10416 6.75 37.48% 52.14%(I) 20.32% 29.83% 875713 5105039 11.66 36.95% 60.80%(I) 4.20% 10.37% 10876 8846 8717 46 39994 31839 31525 7.35 55.20% 90.58%(I) 49.92% 35.85% 7.20 57.78% 90.55%(I) 50.82% 34.69% 7.23 57.74% 91.75%(I) 50.85% 35.41% 879 38.22 4.35% 97.83%(I) 3.53% 93.48% Electronic circuits Citation Internet Organizational Consulting Social communication Product co- purchasing Social network UClonline 1899 20296 21.38 32.33% 79.94%(I) 11.87% 49.55% Amazon0302 262111 1234877 9.42 3.23% 49.55%(R) 1.41% 74.78% Amazon0312 400727 3200440 15.97 3.52% 83.61%(R) 0.21% 81.52% Amazon0505 410236 3356824 16.37 3.62% 91.35%(I) 0.92% 87.78% Amazon0601 403394 3387388 16.79 2.04% 75.90%(R) 1.33% 90.65% twitter_combined 81306 1768149 43.49 19.39% 79.40%(I) 3.03% 60.36% Facebook_0 Facebook_107 Facebook_348 347 1912 572 5038 29.04 5.48% 86.46%(R) 0.04% 81.84% 53498 55.96 45.92% 54.08%(R) 0.00% 53.24% 6384 22.32 61.01% 38.64%(R) 0.03% 38.29% Finally, we apply our algorithms to human Protein-Protein Interaction (PPI) network. Previous works28 have found that some redundant nodes of PPI network are related to cancer genes and drug targets. Altering the control type of these nodes may play an important role in the transition from healthy to disease states. We used a directed human PPI network29 which contains 6,339 proteins and 34,813 interactions. The PPI network has 3707 input nodes and 2631 redundant nodes, therefore, the control mode of the network are distributed control. We used algorithm 1 to change the network from distributed control to centralized control. After removing 11.8% (4108 of 34813) edges, the redundant nodes are increased from 2631 to 4011, which means the control mode of the new network is centralized control. The detailed list of removed edges can be found in the supplemental material. Furthermore, by comparing online databases such as Online Mendelian Inheritance in Man (OMIM) (omim.org), we found that most of the removed edges are related to disease genes. For example, 48.3% (1986 of 4108) removed edges have two nodes related to disease genes, and 40.8% (1675 of 4108) edges have one node related to disease genes. This may provide us a new way to understand the underlying principle of healthy state and disease state of PPI network. 6. Conclusion Controlling complex networks is of great importance in many applications. How to change the control modes of complex networks is important in many real control scenarios. There may exist several ways to modify the topological structure of complex networks, such as add or remove nodes and edges, reverse the direction of edges. In many real networks, removing edges may be feasible because it can be done by simply blocking the signals in the edges. Here we present a novel algorithm to alter the control mode of a network based on edge removal. The main idea is to alter the connectivity of nodes in control based on edge removal. One advantage of our algorithm is that when we alter a network from distributed control to centralized control, the control schemes of the network will not change. We evaluated the performance of our algorithms in both synthetic and real networks, the results showed that the control mode of the denser network can be easily changed by removing very few carefully selected edges. Furthermore, for human Protein-Protein Interaction (PPI) network, we found that most of the removed edges are related to the disease genes, which provide us a new way to understand the underlying principle between healthy state and disease state. These findings will improve our understanding of the control principles of complex networks and may be useful in various real control scenarios. Acknowledgments Supported by the Natural Science Foundation of China under grant number 60093009, 91546110. Author Contributions X.-Z.Z. designed research wrote the paper and analyzed the data. Q.L. performed the experiments. All authors reviewed the manuscript. Additional Information The authors declare no competing financial interests. Correspondence and requests for materials should be addressed to X.-Z.Z. (Email: [email protected]) References [1] Lin, C.-T. Structural controllability. IEEE Transactions on Automatic Control 19, 201-208 (1974). [2] Kalman, R. E. Mathematical description of linear dynamical systems. Journal of the Society for Industrial and Applied Mathematics, Series A: Control 1, 152-192 (1963). [3] Luenberger, D. Introduction to dynamic systems: theory, models, and applications.(1979). [4] Delpini, D. et al. Evolution of controllability in interbank networks. Scientific reports 3, 1626 (2013). [5] Razakanirina, R. M. & Chopard, B. Risk analysis and controllability of credit market. ESAIM: Proceedings and Surveys 49, 91-101 (2015). [6] Kumar, A., Vlachos, I., Aertsen, A. & Boucsein, C. Challenges of understanding brain function by selective modulation of neuronal subpopulations. Trends in neurosciences 36, 579-586 (2013). [7] Gu, S. et al. Controllability of structural brain networks. Nature communications 6 (2015). [8] Tang, E. & Bassett, D. S. Control of Dynamics in Brain Networks. ArXiv preprint 1701.01531 (2017 ). [9] Wuchty, S. Controllability in protein interaction networks. Proceedings of the National Academy of Sciences 111, 7156-7160 (2014). [10] Amand, M. M. S., Tran, K., Radhakrishnan, D., Robinson, A. S. & Ogunnaike, B. A. Controllability analysis of protein glycosylation in CHO cells. PloS one 9, e87973 (2014). [11] Zhang, X.-F., Ou-Yang, L., Zhu, Y., Wu, M.-Y. & Dai, D.-Q. Determining minimum set of driver nodes in protein-protein interaction networks. BMC bioinformatics 16, 146 (2015). [12] Ishitsuka, M., Akutsu, T. & Nacher, J. C. Critical controllability in proteome-wide protein interaction network integrating transcriptome. Scientific reports 6 (2016). [13] Vinayagam, A. et al. Controllability analysis of the directed human protein interaction network identifies disease genes and drug targets. Proc Natl Acad Sci U S A 113, 4976-4981, doi:10.1073/pnas.1603992113 (2016). [14] Asgari, Y., Salehzadeh-Yazdi, A., Schreiber, F. & Masoudi-Nejad, A. Controllability in cancer metabolic networks according to drug targets as driver nodes. PLoS One 8, e79397 (2013). [15] Wu, L., Shen, Y., Li, M. & Wu, F.-X. Network output controllability-based method for drug target identification. IEEE transactions on nanobioscience 14, 184-191 (2015). [16] Zhang, X., Lv, T. & Pu, Y. Input graph: the hidden geometry in controlling complex networks. Scientific reports 6 (2016). [17] Zhang, X., Wang, H. & Lv, T. Efficient target control of complex networks based on preferential matching. PloS one 12, e0175375 (2017). [18] Liu, Y.-Y., Slotine, J.-J. & Barabási, A.-L. Controllability of complex networks. Nature 473, 167- 173 (2011). [19] Jia, T. et al. Emergence of bimodality in controlling complex networks. Nature communications 4 (2013). [20] Liu, X. & Pan, L. Identifying driver nodes in the human signaling network using structural controllability analysis. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) 12, 467-472 (2015). [21] Liu, Y.-Y. & Barabási, A.-L. Control principles of complex systems. Reviews of Modern Physics 88, 035006 (2016). [22] Murota, K. Matrices and matroids for systems analysis. Vol. 20 (Springer Science & Business Media, (2009). [23] Ruths, J. & Ruths, D. Control profiles of complex networks. Science 343, 1373-1376 (2014). [24] Campbell, C., Ruths, J., Ruths, D., Shea, K. & Albert, R. Topological constraints on network control profiles. Scientific reports 5 (2015). [25] Menichetti, G., Dall'Asta, L. & Bianconi, G. Network controllability is determined by the density of low in-degree and out-degree nodes. Physical review letters 113, 078701 (2014). [26] Ravindran, V., Sunitha, V. & Bagler, G. Identification of critical regulatory genes in cancer signaling network using controllability analysis. Physica A: Statistical Mechanics and its Applications 474, 134-143 (2017). [27] Goh, K.-I., Kahng, B. & Kim, D. Universal behavior of load distribution in scale-free networks. Physical Review Letters 87, 278701 (2001). [28] A. Vinayagam, T. E. Gibson, H. J. Lee, B. Yilmazel, C. Roesel, Y. Hu, Y. Kwon, A. Sharma, Y. Y. Liu, N. Perrimon, and A. L. Barabasi, Controllability analysis of the directed human protein interaction network identifies disease genes and drug targets, Proc Natl Acad Sci U S A, vol. 113, no. 18, pp. 4976-81, May 03, 2016. [29] A. Vinayagam, U. Stelzl, R. Foulle, S. Plassmann, M. Zenkner, J. Timm, H. E. Assmus, M. A. Andradenavarro, and E. E. Wanker, A directed protein interaction network for investigating intracellular signal transduction, Science Signaling, vol. 4, no. 189, pp. rs8-rs8, 2011. [30] C. Knox, V. Law, T. Jewison, P. Liu, S. Ly, A. Frolkis, A. Pon, K. Banco, C. Mak, and V. Neveu, DrugBank 3.0: a comprehensive resource for 'omics' research on drugs, Nucleic acids research, vol. 39, no. suppl 1, pp. D1035-D1041, 2011.
1907.09668
1
1907
2019-07-23T03:03:11
Efficient Approximation Algorithms for Adaptive Seed Minimization
[ "cs.SI", "cs.DS" ]
As a dual problem of influence maximization, the seed minimization problem asks for the minimum number of seed nodes to influence a required number $\eta$ of users in a given social network $G$. Existing algorithms for seed minimization mostly consider the non-adaptive setting, where all seed nodes are selected in one batch without observing how they may influence other users. In this paper, we study seed minimization in the adaptive setting, where the seed nodes are selected in several batches, such that the choice of a batch may exploit information about the actual influence of the previous batches. We propose a novel algorithm, ASTI, which addresses the adaptive seed minimization problem in $O\Big(\frac{\eta \cdot (m+n)}{\varepsilon^2}\ln n \Big)$ expected time and offers an approximation guarantee of $\frac{(\ln \eta+1)^2}{(1 - (1-1/b)^b) (1-1/e)(1-\varepsilon)}$ in expectation, where $\eta$ is the targeted number of influenced nodes, $b$ is size of each seed node batch, and $\varepsilon \in (0, 1)$ is a user-specified parameter. To the best of our knowledge, ASTI is the first algorithm that provides such an approximation guarantee without incurring prohibitive computation overhead. With extensive experiments on a variety of datasets, we demonstrate the effectiveness and efficiency of ASTI over competing methods.
cs.SI
cs
Efficient Approximation Algorithms for Adaptive Seed Minimization∗ Jing Tang† Keke Huang† Dept. of Ind. Syst. Engg. and Mgmt. National University of Singapore School of Comp. Sci. and Engg. Nanyang Technological University [email protected] [email protected] Xiaokui Xiao School of Computing National University of Singapore [email protected] Laks V.S. Lakshmanan Department of Computer Science University of British Columbia [email protected] Xueyan Tang Engineering School of Computer Science and School of Computer Science and Nanyang Technological University Nanyang Technological University [email protected] [email protected] Aixin Sun Engineering Andrew Lim Dept. of Ind. Syst. Engg. and Mgmt. National University of Singapore [email protected] ABSTRACT As a dual problem of influence maximization, the seed min- imization problem asks for the minimum number of seed nodes to influence a required number η of users in a given social network G. Existing algorithms for seed minimiza- tion mostly consider the non-adaptive setting, where all seed nodes are selected in one batch without observing how they may influence other users. (cid:16) η·(m+n) (cid:17) expected time and In this paper, we study seed minimization in the adaptive setting, where the seed nodes are selected in several batches, such that the choice of a batch may exploit information about the actual influence of the previous batches. We propose a novel algorithm, ASTI, which addresses the adaptive seed minimization problem in O ln n offers an approximation guarantee of (1−(1−1/b)b)(1−1/e)(1−ε) in expectation, where η is the targeted number of influenced nodes, b is size of each seed node batch, and ε ∈ (0, 1) is a user-specified parameter. To the best of our knowledge, ASTI is the first algorithm that provides such an approximation guarantee without incurring prohibitive computation over- head. With extensive experiments on a variety of datasets, we demonstrate the effectiveness and efficiency of ASTI over competing methods. (ln η+1)2 ε2 ∗A short version of the paper appeared in 2019 International Conference on Management of Data (SIGMOD '19), June 30 -- July 5, 2019, Amsterdam, Netherlands. ACM, New York, NY, USA, 18 pages. https://doi.org/10.1145/ 3299869.3319881 †These authors have contributed equally to this work. 1 CCS CONCEPTS • Information systems → Data mining; Social advertising; Social networks; • Theory of computation → Probabilistic computation; Submodular optimization and polymatroids. KEYWORDS Seed Minimization; Sampling; Approximation Algorithm 1 INTRODUCTION Social networks are becoming increasingly popular for peo- ple to discuss and share their thoughts and comments to- wards public topics. Based on the established relations among individuals, ideas and opinions can be spread over social net- works via a word-of-mouth effect. To exploit this effect for advertising, advertisers often provide free samples of their products to selected social network users, in exchange for those users to promote those products and create a cascade of influence to other users. In such a setting, advertisers might want to know the minimum number of free samples required to be given away, so as to draw sufficient attention. Goyal et al. [19] are the first to formulate this problem as a seed min- imization problem, which asks for the minimum number of seed nodes (i.e., users who receive free samples) needed to influence at least a required number η of users, taking into account the randomness in the influence propagation process. Existing work on seed minimization mostly focuses on the non-adaptive setting [19, 22, 47], which requires that all seed nodes should be selected in one batch without observing Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim the actual influence of any node, i.e., no randomness in the influence propagation process can be removed until all seed nodes are fixed. As a consequence of the non-adaptiveness, these solutions may return a seed set that fails to influence at least η nodes in the actual propagation process, or may select an excessive number of seed nodes that generate an actual influence spread much larger than required. To address the above issues, Vaswani and Laksh- manan [42] propose to consider seed minimization under the adaptive setting, where (i) the seed nodes are selected one by one, and (ii) before selecting the i-th seed node, the actual influence of the first i −1 seed nodes can be observed, i.e., we may optimize the choice of the i-th seed node to influence those users that have not been influenced by the previous i − 1 seed nodes. Such an adaptive strategy ensures that (i) the seed set returned always achieves the required number of influenced users (since the actual influence of each seed node is known after selection), and (ii) the number of seed nodes would not be excessive (because we can stop selecting seed nodes as soon as the targeted influence is achieved). We note that similar adaptive approaches have also been adopted by other practical problems, such as influence maximization [46], sensor placement [2], active learning [10], and object detection [11]. To our knowledge, the only existing solution for adaptive seed minimization is by Vaswani and Lakshmanan [42]. As we discuss in Section 2.4, however, the solution in [42] re- quires that the expected influence of any seed set should be estimated with extremely high accuracy, which results in prohibitive computation overhead. Furthermore, the solution does not provide any non-trivial approximation guarantee, due to an ineffective approach used to select each seed node under the adaptive setting. Therefore, it remains an open problem to devise efficient approximation algorithms for adaptive seed minimization. In this paper, we address the above open problem with ASTI, a novel framework tailored for adaptive seed mini- mization. The key idea of ASTI is to adaptively choose the seed node with the maximum expected truncated influence spread in each round of seed selection. Specifically, given a diffusion model M that captures the uncertainty of influ- ence propagation in G, we consider the set Ω of all possible realizations, each of which represents a possible scenario of influence propagation among the nodes in G. For each possible realization ϕ ∈ Ω, the influence spread of a seed set S, denoted as Iϕ(S) is the number of nodes influenced by S, while the truncated influence spread of S is defined as Γϕ(S) = min{η, Iϕ(S)}. We consider Γϕ(S) instead of Iϕ(S) because, intuitively, the extra influence spread beyond η is useless for fulfilling the requirement on influence. (In fact, as we show in Section 2.4, the extra influence spread may 2 even lead to incorrect choice of seed nodes, and hence, it has to be ignored.) When developing algorithms under the ASTI framework, the key challenge that we face is the design of methods to ac- curately estimate a seed set S's expected truncated influence spread over a given set of possible realizations. We show that existing methods [5, 25, 33, 37, 40, 41] for estimating un-truncated influence spread cannot be applied in our trun- cated setting, since they are unable to take into account the effect of truncation by η. Motivated by this, we propose a novel sampling method based on the concept of multi-root reverse reachable (mRR) sets, and prove that our method pro- vides non-trivial guarantees in terms of the efficiency and accuracy of truncated influence estimation. Building upon this sampling method, we develop TRIM, an algorithm for maximizing truncated influence spread with a provable ap- proximation guarantee of (1 − 1/e)(1 − ε). We show that instantiating ASTI using TRIM leads to strong theoretical guarantees for adaptive seed minimization, and TRIM can be extended into a batched version TRIM-B that selects a batch of b nodes in each round, so as to accelerate seed selection. In summary, we make the following contributions: • ASTI, a general framework. We analyze the charac- teristics of adaptive seed minimization, based on which we propose a general framework ASTI tailored for the problem. • mRR-set, a novel sampling method. ASTI requires accurate estimation of truncated influence spreads, for which the existing sampling methods are either ineffi- cient or ineffective. To address this challenge, we pro- pose a novel sampling method, mRR, which is able to es- timate the truncated influence spread in a cost-effective manner. • TRIM, an efficient algorithm for truncated influ- ence maximization. A key step of ASTI is to identify a set of nodes with the maximum expected truncated influence spread, for which we propose the TRIM algo- rithm based on mRR-sets. With a rigorous theoretical analysis, we show that ASTI instantiated by TRIM re- (ln η+1)2 turns a (1−1/e)(1−ε)-approximate solution for adaptive seed minimization with expected time complexity of • TRIM-B, the batched version of TRIM. For further performance gain, we extend TRIM into a batched version TRIM-B that selects seed nodes in a prede- fined batch size b in each round. ASTI instantiated by TRIM-B provides an approximation guarantee of (1−(1−1/b)b)(1−1/e)(1−ε) with the same time complexity as TRIM. (ln η+1)2 O(cid:0) η·(m+n) ε2 ln n(cid:1). Efficient Approximation Algorithms for Adaptive Seed Minimization Table 1: Frequently used notations. Notation G = (V , E) n, m η I(S), E[I(S)] Γ(S), E[Γ(S)] Gi = (Vi , Ei) ni , mi ηi I(S Si−1) Γ(S Si−1) Γ(S Si−1) R, R ΛR(v) v∗, v⋄, v◦ OPTi ϕ, Φ, Ω π , π∗ Description a graph G with node set V and edge set E the number of nodes and edges in G the threshold for the targeted number of nodes to be activated the spread of a seed set S and its expectation the truncated spread of S and its expectation the i-th residual graph, where G1 = G the number of nodes and edges in Gi the shortfall in activating η nodes in the i-th round, i.e., ηi = η − (n − ni) the marginal spread of S on top of Si−1, i.e., the spread of S in Gi the marginal truncated spread of S on top of Si−1, i.e., Γ(S Si−1) = min{I(S Si−1), ηi} a binary estimator with value ηi if S ∩ R (cid:44) ∅ and 0 otherwise a random mRR-set and a set of mRR-sets the number of mRR-sets in R covered by v the optimal node maximizing ΛR(v), E[ Γ(v Si−1)], and E[Γ(v Si−1)], respectively the optimum of E[ Γ(v Si−1)], i.e., OPTi = maxv E[ Γ(v Si−1)] a specific realization, a random realization, and the realization space a random policy, and an optimal policy • An extensive set of experiments. We experimentally evaluate ASTI instantiated by TRIM and TRIM-B against the state-of-the-art non-adaptive algorithm ATEUC [22], and show that (i) our solutions are much more effective in minimizing the number of seed nodes needed and ensuring that the required influence spread is achieved, and (ii) our solutions are able to efficiently handle social networks with millions of nodes and edges. 2 PRELIMINARIES This section formally defines the problem of adaptive seed minimization, and reviews the existing solutions. Table 1 summarizes the notations that are frequently used. For ease of exposition, our discussions focus on the independent cas- cade (IC) model [27], which is one of the most widely adopted propagation models in the literature. But we note that our al- gorithms can be easily extended to other propagation models, such as the linear threshold model [27] and the topic-aware models [4]. 2.1 Influence Propagation and Realization Let G be a social network with a node set V and a directed edge set E, where V = n and E = m. For any edge ⟨u, v⟩ ∈ E, we refer to u as an incoming neighbor of v, and v as an 3 outgoing neighbor of u. Each edge e = ⟨u, v⟩ is associated with a propagation probability p(e) ∈ (0, 1]. We refer to such a social network as a probabilistic social network. Given a node set S ⊆ V , the influence propagation initiated by S under the independent cascade (IC) model [27] is modeled as a discrete-time stochastic process as follows. At time slot t0 (the subscript indicates the index of the time slot), all nodes in S are activated while all other nodes are inactive. Suppose that node u is first activated at slot ti, then u has one chance to activate each outgoing neighbor v with the probability p(u, v) at slot ti +1, after which u remains active. This influence propagation process continues until no more inactive nodes can be activated. As to the linear threshold (LT) model, it demands that for each node v ∈ G, the propagation probabilities of all edges ending at v sum up to no more than 1. With a given node set S, LT model works in a similar discrete-time stochastic procedure as follows. At time slot t0, each node v ∈ G is assigned with a threshold λv sampled uniformly from [0, 1], and only nodes in S are activated. At time slot ti, we check all inactive node u of its incoming edges from activated neighbors that if the sum of their propagation probabilities is no smaller than λu. If it is, then u is activated; otherwise u remains inactive. This influence propagation process terminates once there is no further node activated. Let I(S) be the total number of active nodes in G when the influence propagation terminates. We refer to S as the seed set, and I(S) as the spread of S. Alternatively, the influence propagation process can also be described by the live edge procedure [27]. Specifically, for each edge e ∈ E, we independently flip a coin of head proba- bility p(e) to decide whether the edge e is live or blocked to generate a sample of influence propagation. All the blocked edges are removed and the remaining graph is referred to as a realization of the probabilistic social network G, denoted as ϕ. Note that there are 2m distinct possible realizations. Let Ω be the set of all possible realizations (i.e., the sample space) such that Ω = 2m, and Φ ∼ Ω denote that Φ is a realization randomly sampled from Ω. Given a realization ϕ ∈ Ω, the spread of any seed set S ⊆ V under ϕ is the total number of nodes that are reachable from S, denoted as Iϕ(S). Thus, for any seed set S, its expected spread E[I(S)] is defined as E[I(S)] := EΦ∼Ω[IΦ(S)] = where p(ϕ) is the probability for realization ϕ to occur. In other words, the expected spread of S is the (weighted) aver- age spread over all the realizations in Ω. 2.2 Adaptive Seed Minimization Given a probabilistic social network G = (V , E) and a thresh- old η ∈ [1, n], the seed minimization problem aims to select a minimum number of seed nodes to influence at least η nodes. Iϕ(S) · p(ϕ), (1) ϕ∈Ω Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim (a) A social graph G (b) A possible realization ϕ (c) v1 as the first seed Figure 1: An adaptive seed minimization process. (d) v3 as the second seed In the conventional "non-adaptive" setting, seed minimiza- tion requires selecting a node set S such that E[I(S)] ≥ η, without any knowledge of realization that would occur in the actual influence propagation process. As a consequence, the selected S may influence fewer than η nodes for some realiza- tions or much more than η nodes for some other realizations, both of which are undesirable scenarios. Meanwhile, the adaptive strategy (i.e., a recursive select- observe-select procedure) has been shown to be more effective than the non-adaptive (i.e., just select based on model) strat- egy in many real-world applications [2, 10, 11]. Specifically, an adaptive strategy first selects a node u from graph G, and then observes the set of nodes activated by choosing node u as a seed node. Based on this observation, the strategy would choose the next node as one that could influence as many currently inactive nodes as possible. This procedure is carried out in an recursive manner, until at least η active nodes are observed. Figure 1 illustrates the adaptive strategy. Figures 1(a) and 1(b) show a social graph G and one possible realization ϕ of G, respectively. Let η = 4 and ϕ be the actual realization of influence propagation (which is unknown apriori). Fig- ure 1(c) indicates that we first select node v1 (in dark gray) as a seed node. Note that node v1 influences nodes v4 and v6 (in light gray), with each bold (resp. dashed) arrow denoting a successful (resp. failed) step of influence. In addition, the thin arrows in Figures 1(c) -- 1(d) correspond to influence attempts which are not yet revealed. Since the number of nodes influ- enced by v1 is less than η, we continue to select the second seed node. Figure 1(d) shows that we select v3, which results in a total of 5 active nodes, reaching the threshold η. Then, the adaptive seed selection process terminates. In this paper, we aim to study seed selection strategies (referred to as policies) for adaptive seed minimization (ASM), which is formally defined as follows: Definition 2.1 (Adaptive Seed Minimization). Given a prob- abilistic social graph G = (V , E) and a threshold η ∈ [1, n], the adaptive seed minimization problem aims to identify a policy π that minimizes the expected number of seed nodes required to achieve an influence spread of at least η on pos- sible realizations ϕ ∈ Ω, i.e., E[S(π , ϕ)] subject to Iϕ(S(π , ϕ)) ≥ η for all ϕ, min π ϕ and E[S(π , ϕ)] = where S(π , ϕ) is the seed set selected by π under realization ϕ∈ΩS(π , ϕ) · p(ϕ). Note that when the propagation probability of every edge in G is 1, ASM reduces to the deterministic version of seed minimization, which is shown to be NP-hard [19]. Therefore, finding an optimal policy for ASM is also NP-hard. 2.3 Truncated Influence Spread Note that, in ASM, the influence spread in excess of the threshold η has no value. Accordingly, we introduce the notion of truncated influence spread as follows. Γϕ(S) := min{Iϕ(S), η}. Definition 2.2 (Truncated Influence Spread). Given a seed set S and a threshold η, the truncated influence spread Γϕ(S) of S under a realization ϕ is the smaller one between Iϕ(S) and η, i.e., (2) Recall that ASM requires considering the influence spreads of nodes when the actual influence of some other nodes has been observed. Therefore, we also introduce the notion of marginal truncated influence spread as follows. Let V1 = V and G1 = G. Let Vi be the subset of nodes that remain inactive after round (i − 1), Gi be the subgraph of G induced by Vi. We refer to Gi as the i-th residual graph. For example, in Figure 1, after round 1, only nodes v2, v3, v5 remain inactive, so V2 = {v2, v3, v5} and G2 = (V2, E2) denotes the induced subgraph containing the thin edge ⟨v3, v5⟩. Let Si be the set of nodes selected as seeds by a policy in the first i rounds. Similar to the definition of Ω, we denote Ωi as the set of all possible realizations in the i-th round. Then, for a node set S ⊆ Vi, we define the marginal spread Iϕ(S Si−1) as the additional spread that S provides on top of Si−1 under realization ϕ ∈ Ωi, and define truncated marginal spread Γϕ(S Si−1) accordingly, i.e., and Iϕ(S Si−1) := Iϕ(S ∪ Si−1) − Iϕ(Si−1), Γϕ(S Si−1) := Γϕ(S ∪ Si−1) − Γϕ(Si−1). (3) (4) Note that Iϕ(S Si−1) is exactly the influence spread of S in the residual graph Gi under realization ϕ. Let ni = Vi be the number of nodes in Gi, i.e., Iϕ(Si−1) = n − ni nodes have been activated by the end of round i − 1, based on the partial realization revealed so far. Define ηi = 4 0.90.30.40.60.7v1v2v6v5v4v30.10.5v1v2v6v5v4v30.40.6v1v2v6v5v4v30.10.50.4v1v2v6v5v4v3 Efficient Approximation Algorithms for Adaptive Seed Minimization η−(n−ni). This is the amount by which the policy falls short of the target η in the beginning of round i. Before reaching the threshold η, i.e., Γϕ(Si−1) = Iϕ(Si−1) < η, we can rewrite Γϕ(S Si−1) as Γϕ(S Si−1) = min{Iϕ(S ∪ Si−1), η} − Iϕ(Si−1) = min{Iϕ(S Si−1), ηi}. (5) Then, Γϕ(S Si−1) can be easily computed in the residual graph Gi. For brevity, we define Γϕ(v Si−1) := Γϕ({v} Si−1) for a singleton node set {v}. Finally, we define the expected marginal truncated spread ∆(v Si−1) as ∆(v Si−1) := EΦ∼Ωi[ΓΦ(v Si−1)]. (6) In other words, the expected marginal truncated spread of a node v is defined based on the "lift" in the expected number of active nodes that v brings on top of previously selected seeds, over all realizations consistent with what has been observed in previous rounds. 2.4 Existing Solutions Golovin and Krause [18] study the adaptive stochastic min- imum cost coverage problem, which can be regarded as a variant of ASM in the case where there exists an oracle that accurately reports the expected marginal truncated spread for any given seed set. They propose to adopt a greed policy as follows. First, select the node s1 with the largest expected truncated spread, i.e., ∆(s1 S0) ≥ ∆(v S0) for all v ∈ V . Then, observe the actual nodes that are activated by s1 during the stochastic process, and remove them from G to induce the residual graph G2. After that, identify the node s2 with the maximum expected marginal truncated spread ∆(s2 S1) in the residual graph G2. This process continues, such that each round selects the node with the largest expected mar- ginal truncated spread, until we observe that no less than η nodes have been influenced. Golovin and Krause [18] show that the above greedy policy returns a (ln η + 1)2-approximate solution to the optimum.1 This approximation guarantee, however, does not lead to a practical algorithm for the ASM problem, because (i) it requires the help from an oracle to exactly identify the node with the maximum expected marginal truncated spread in each round, but (ii) computing the exact expected spread of any node set is #P-hard [7]. Motivated by this observation, Vaswani and Laksh- manan [42] attempt to extend Golovin and Krause's method by replacing the oracle with an spread estimator with bounded errors. In particular, they assume that for any 1Golovin and Krause claim that the approximation guarantee is (ln η + 1) in an earlier version of their work [17], but point out that the proof has gaps in a revised version [18]. Whether the logarithmic bound holds is an interesting open problem. α ⊥E[I(v S)] ≤ E[I(v S)] ≤ α node set S, the estimation E[I(v S)] of the marginal gain E[I(v S)] := E[I(S ∪ {v})] − E[I(S)] should satisfy ⊤E[I(v S)], (7) where α⊤/α⊥ denotes the multiplicative error in calculating the marginal gains. Unfortunately, this requirement on the spread estimation is so stringent that no existing methods for influence estimation could fulfill the requirement without in- curring prohibitive estimation overhead. To explain, suppose that the expected marginal spread E[I(v S)] of a node v on top of S is small. In that case, Equation (7) would only allow a trivial amount of estimation error, which is rather difficult to achieve by existing methods for spread estimation. In addition, the algorithm in [42] attempts to select the node with the largest marginal spread in each round, instead of the node with the maximum marginal truncated spread. As a consequence, even when there exists an efficient esti- mator that provides highly accurate spread estimation, the algorithm in [42] would still fail to achieve the type of approx- imation guarantee in [18], which the theoretical analysis in [18] is based on the notion of truncated spreads. We illustrate this issue with an example. Example 2.3. Consider Figure 2(a), which shows a social graph G with four nodes and four directed edges. The number on each edge indicates the propagation probability of the edge. G has four possible realizations ϕ1, ϕ2, ϕ3, and ϕ4 in total, as shown in Figures 2(b) -- 2(e). Each realization has an equal probability of 0.25 to happen. Assume that η = 2. Then, the expected spread of node v1 is E[I(v1)] = 0.25 × (3 + 3 + 4 + 1) = 2.75, which is larger than that of the other three nodes. Thus, when the vanilla expected spread is adopted as the measure, node v1 will be selected as the first seed node. On realizations ϕ1, ϕ2, and ϕ3, v1 is qualified to influence at least η = 2 users. However, there is a probability of 0.25 that ϕ4 happens, in which case v1 can only influence itself, and hence, one additional seed node is required. Overall, 2 × 0.25 + 1 × (1 − 0.25) = 1.25 seed nodes are selected in expectation. Now observe that the expected truncated spread of nodes v1, v2, v3, and v4 are 1.75, 2, 2, and 1, respectively. There- fore, when the expected truncated spread is adopted as the measure, either v2 or v3 is selected as the first seed node, which can influence 2 users under all four realizations. This demonstrates that, for ASM, choosing nodes based on ex- pected truncated spreads is more effective than that based □ on vanilla expected spreads. In recent work [23], Han et al. study the problem of adap- tive influence maximization, which also considers the adap- tive setting, but aims to identify a predefined number of k seed nodes that could influence the maximum number of users in G in expectation. At the first glance, it may seem 5 Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim (a) A social graph G (b) Realization ϕ1 (d) Realization ϕ3 Figure 2: A social graph and all of its possible realizations. (c) Realization ϕ2 (e) Realization ϕ4 Algorithm 1: ASTI(G, η) Input: an input graph G and a theshlod η. Output: a seed set S such that Γ(S) = η. 1 initialize S ← ∅, Γ(S) ← 0, i ← 1; 2 repeat 3 4 5 6 select si from Vi such that ∆(si Si−1) ≥ α ∆(v Si−1) for all v ∈ Vi; observe the influence of si in Gi; insert si into S and increase Γ(S) acoordingly; remove all nodes in Gi that are influenced by si, and denote the resulting graph as Gi +1; i ← i + 1; 7 8 until Γ(S) ≥ η; 9 return S; that we can modify the adaptive influence maximization algorithms to solve the adaptive seed minimization prob- lem, in the same way that existing work [19] transforms non-adaptive influence maximizing algorithms to address non-adaptive seed minimization. This approach, however, does not work because the algorithm in [23] is designed based on vanilla expected marginal spreads. Instead, ASM requires considering truncated expected marginal spreads, as we previously discussed. As a consequence, the algorithm in [23] cannot be adopted in our setting. 3 OUR SOLUTION 3.1 Algorithmic Framework We propose a general framework, referred to as ASTI, to address the ASM problem. Algorithm 1 shows the details. Given a probabilistic social graph G and a threshold η, ASTI aims to return a seed set S such that Γ(S) ≥ η, where Γ(S) is the truncated influence spread of S (i.e., the smaller one of the threshold η and the number of active nodes influenced by S). In a nutshell, ASTI iteratively (i) selects the node to maximize the expected marginal truncated spread (Line 3), (ii) observes the newly influenced nodes (Line 4), and then (iii) updates the corresponding information (Lines 5 -- 7). The process stops when at least η nodes are activated (Line 8). The key step of ASTI is truncated influence maximization that targets at identifying a node to maximize the expected marginal truncated spread (Line 3). If an α-approximate solu- tion for truncated influence maximization is obtained in each 6 round (Line 3), ASTI provides a non-trivial approximation guarantee, as shown in the following theorem. Theorem 3.1. Suppose π is an α-approximate greedy policy, for some α ∈ (0, 1], i.e., for any Gi and v ∈ Vi, it selects a node si satisfying (8) to the opti- ∆(si Si−1) ≥ α ∆(v Si−1). Then π achieves an approximation ratio of (ln η+1)2 mal adaptive seed minimization policy. α The proof2 of Theorem 3.1 is based on adaptive submodu- lar optimization [18]. Theorem 3.1 requires that the policy should be an α-approximate greedy one with respect to the expected marginal truncated spread ∆(v Si−1). The chal- lenge for designing such an α-approximate greedy policy lies in how to develop a proper sampling method for estimating the truncated influence spread. 3.2 Truncated Influence Maximization According to Theorem 3.1, in order to provide the theoreti- cal guarantee, the algorithm is supposed to identify a node whose truncated marginal spread is an α-approximation to the maximum truncated marginal spread in each round. At a first glance, it seems that we can utilize Borgs et al.'s reverse influence sampling method [5]. Unfortunately, in what fol- lows, we show that Borgs et al.'s sampling method [5] fails to estimate the truncated influence spread accurately. Specifically, Borgs et al. [5] propose to generate random reverse reachable (RR) sets for influence maximization. Com- pared with the Monte-Carlo simulation [27], RR-sets can dramatically accelerate the seed selection process while re- taining the same approximation guarantees for influence maximization [5]. In particular, a random RR-set of G is gen- erated by first selecting a node v ∈ V uniformly at random, and then taking the nodes that can reach v in a random re- alization. Evidently, a random RR-set is a subgraph of the corresponding random realization Φ, which is generated by performing a reverse breadth first search (BFS) on Φ starting from the random node v. A random RR-set R is an unbiased spread estimator, i.e., for any seed set S, E[I(S)] = n · Pr[R ∩ S (cid:44) ∅]. 2The formal proofs of all theoretical results are given in Appendix B. 0.5v1v2v4v30.511v1v2v4v3v1v2v4v3v1v2v4v3v1v2v4v3 Efficient Approximation Algorithms for Adaptive Seed Minimization Unfortunately, RR-sets fail to estimate truncated influence spread accurately. Intuitively, the expectation of this estima- tor for truncated influence spread of S is η n η · Pr[R ∩ S (cid:44) ∅] = Iϕ(S) · p(ϕ). · E[I(S)] =  ϕ∈Ω Recall that the true expected truncated influence spread is η n E[Γ(S)] = Γϕ(S) · p(ϕ). Obviously, for any ϕ ∈ Ω, unless Iϕ(S) = n, ϕ∈Ω · Iϕ(S) < min{Iϕ(S), η} = Γϕ(S). η n Specifically, consider the case that Iϕ(S) ≤ η for all ϕ. Then, this estimator is biased with a discount η/n, which is ex- tremely inaccurate when η ≪ n. In practice, η is likely to be a fraction of n, since even a set of ten thousand seed nodes has been found to influence less than half population on many datasets [34]. These facts indicate that RR-sets are highly biased for estimating truncated influence spread. As a con- sequence, the state-of-the-art algorithms [25, 33, 37, 40, 41] for influence maximization that utilize RR-sets [5] cannot provide theoretical guarantees for truncated influence maxi- mization. In turn, this means that these algorithms cannot be fashioned to solve ASM with approximation guarantees. To address this issue, we propose a novel sampling approach that generates multi-root reverse reachable (mRR) sets which can estimate the truncated influence spread efficiently and effectively. The algorithm utilizing mRR-sets is referred to as TRIM3. We rigorously show that TRIM can provide strong theoretical guarantees for truncated influence maximization and thus ASTI instantiated with TRIM is guaranteed to ap- proximate ASM within a constant ratio. 3.3 Multi-Root Reverse Reachable Set If we generate n correlated RR-sets such that (i) they start from n distinct nodes, and (ii) the materialization of each edge is consistent in all the RR-sets, then merging these RR- sets (with duplicates removed) as well as the edge statuses forms a realization sample. Based on this observation, if we generate k (k < n) correlated RR-sets using the same rule, then merging them as a k-root RR-set is likely to estimate the truncated influence spread more accurately compared against a vanilla RR-set. To explain how multi-root reverse reachable (mRR) set works, we first introduce its definition. Definition 3.2 (Random mRR-set). Let Φ be a random re- alization of G sampled from the realization space and K be a size-k node set selected uniformly at random from V . A random mRR-set is the set of nodes in Φ that can reach K. 3TRuncated Influence Maximization. (That is, for each node v in the mRR-set, there is a directed path in Φ from v to some node in K.) By definition, the key difference between an mRR-set and an RR-set is that the former has multiple roots whereas the latter has one single root only. Similar to the generation of RR-sets, a random mRR-set can be generated by: (1) Choose a set of k nodes K ⊆ V uniformly at random; (2) Perform a stochastic reverse breadth first search (BFS) that starts from K and follows the incoming edges of each node. Insert into R all nodes that are traversed during the stochastic BFS. A natural question is how to decide the size of k for trun- cated spread estimation? The setting of k yields a tradeoff between efficiency and accuracy in that a larger k provides more accurate estimation but takes more computational re- sources. Through the aforementioned analysis of RR-set, we find that the high-efficiency of RR-set comes from its "bi- nary" property. In particular, a random RR-set R estimates the influence spread of any node set S as n if R ∩ S (cid:44) 0, and as 0 otherwise. To avoid maintaining the edge statuses, our mRR-set estimator shall retain this binary property. That is, it estimates the truncated influence spread of S as η if and only if S intersects this mRR-set, and as 0 otherwise. For a given k-RR-set R, if a node v ∈ R, then v can reach at least one of the k starting nodes. Then, its influence spread is estimated to be at least n/k and thus its estimated truncated influence spread is at least min{n/k, η}. By setting n/k ≥ η, the estimated truncated influence spread is η. On the other hand, to improve the accuracy, k should be set as large as possible. So we choose k = n/η. However, n/η is not an integer in general. To address this issue, we adopt a randomized rounding approach. To generate a mRR-set, we randomly choose a set K of nodes such that its size k equals ⌊ n η ⌋ + 1 with probability n η ⌋ otherwise. Then, the expectation of k is n/η. However, we note that η ⌋ + 1, the possible value of the estimated trun- when k = ⌊ n cated influence spread is no longer binary (i.e., 0 or η). To address such a new challenge, we define an estimator Γ(S) as Γ(S) = η if and only if S ∩ R (cid:44) ∅, and Γ(S) = 0 otherwise. At the first glance, it seems that the relationship between E[Γ(S)] and E[ Γ(S)] is unclear. Fortunately, the following theorem shows that under the above setting of k such that E[k] = n/η, the ratio of E[ Γ(S)] and E[Γ(S)] is in the range of [1 − 1/e, 1]. η ⌋, and equals ⌊ n η − ⌊ n Theorem 3.3. Let k⊥ = ⌊ n η ⌋ and r = n/η−k⊥ be the integer and fractional part of n/η, respectively. For any mRR-set, if we sample k nodes such that k = k⊥ + 1 with probability r and k = k⊥ otherwise, then (1 − 1/e)E[Γ(S)] ≤ E[ Γ(S)] ≤ E[Γ(S)]. (9) 7 Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim Algorithm 2: TRIM(Gi , ε) Input: Graph Gi and error threshold ε. Output: A (1 − 1/e)(1 − ε)-approximate solution v∗ for 1 δ ← ε/(cid:0)100(1 − 1/e)(1 − ε)ηi(cid:1), and ε ← 99ε/(100 − ε); 2 θmax ← 2ni(cid:0)(cid:112)ln(6/δ) +(cid:112)ln ni + ln(6/δ)(cid:1)2 · ε−2; truncated influence maximization. 2/ni; θ◦ ⌉ + 1; 3 θ◦ ← θmax · ε 4 T ← ⌈log2 θmax 5 a1 ← ln(3T/δ) + ln ni, and a2 ← ln(3T/δ); 6 generate a set R of θ◦ random mRR-sets; 7 for t ← 1 to T do 8 9 10 Λl(v∗) ← ((cid:112)ΛR(v∗) + 2a1/9 −(cid:112)a1/2)2 − a1/18; Λu(v◦) ← ((cid:112)ΛR(v∗) + a2/2 +(cid:112)a2/2)2; find v∗ ← arg maxv ∈Vi ΛR(v); 11 12 Λu(v◦) ≥ 1 − ε or t = T then return v∗; if Λl(v∗) double the size of R; ηi (10) Theorem 3.3 states that Γ is a biased but sufficiently ac- curate estimator of the expected truncated influence spread E[Γ(S)]. In fact, this estimator also works for any residual graph Gi. Specifically, let Γ(S Si−1) be the estimated trun- cated spread of S in Gi with respect to ηi, the lowered target corresponding to graph Gi. Recall that ηi = η − (n − ni). We have the following corollary. Corollary 3.4. In the residual graph Gi, let k⊥ = ⌊ ni ⌋ and r = ni/ηi − k⊥ be the integer and fractional part of ni/ηi, respectively. For each mRR-set, if we sample k nodes such that k = k⊥ + 1 with probability r and k = k⊥ otherwise, then (1 − 1/e)E[Γ(S Si−1)] ≤ E[ Γ(S Si−1)] ≤ E[Γ(S Si−1)]. Furthermore, for any two sets S, S′ ⊆ Vi, it holds that E[Γ(S Si−1)] E[Γ(S′ Si−1)] ≥ (1 − 1/e) E[ Γ(S Si−1)] E[ Γ(S′ Si−1)] . (11) Now, we can construct a (1 − 1/e)(1 − ε)-approximate greedy policy using the estimator Γ built upon mRR-sets. Remark. It is worth pointing out that our randomized round- ing approach for choosing k is critical for achieving the above approximation bound. Specifically, if we fix k to be η ⌋, following the proof methodology of Theorem 3.3, we ⌊ n may derive that the ratio of E[ Γ(S)] to E[Γ(S)] will be in the range of [1 − 1/√e, 1]. On the other hand, if we fix k to be η ⌋ + 1, the ratio of E[ Γ(S)] to E[Γ(S)] will be in the range ⌊ n of [1 − 1/e, 2]. Both settings yield much coarser bounds than our setting that uses a smart randomized rounding approach. 3.4 The Design of TRIM Algorithm 2 presents the details of TRIM that can return a (1− 1/e)(1− ε)-approximate solution for truncated influence maximization for any input graph Gi and error threshold ε. TRIM is similar in spirit to OPIM-C which is the state-of-the- art algorithm for influence maximization [37]. Specifically, OPIM-C uses two disjoint groups of random RR-sets, among which one group is used to derive the solution and the other is used to verify its quality. We customize TRIM by utilizing one group of mRR-sets, which would be more efficient for selecting a singleton seed set as pointed out in [25]. In a nutshell, TRIM starts from a small number of mRR-sets and iteratively increases the mRR-set number until a satisfactory solution is identified. Next, we discuss the details of TRIM. In the mRR-set sampling stage (Lines 6 and 12), each mRR- set is started from a random set K of nodes whose size k is an independent random number. Recall that k is ⌊ ni ⌋ + 1 ηi ⌋ otherwise. Given a set with probability ni ηi R of random mRR-sets, we say that a node v covers a mRR- set R ∈ R if v ∈ R, and we define the coverage of v in R, denoted as ΛR(v), as the number of mRR-sets in R that are covered by v. Based on the mRR-sets generated, TRIM identifies the node v∗ ∈ Vi that covers the largest number of mRR-sets in R (Line 8). Let v◦ be the optimal node such that ∆(v◦ Si−1) = maxv ∈Vi ∆(v Si−1). Then, ΛR(v◦) is bounded by ΛR(v∗). According to Lemma A.2 in Appendix A, with high probability, Λl(v∗) (Line 9) is a lower bound on the expected coverage of v∗ in R, which indicates that ⌋ and ⌊ ni ηi − ⌊ ni ηi ηi Λl(v∗) (12) Similarly, with high probability, Λu(v◦) (Line 10) is an upper bound on the expected coverage of v◦ in R. Thus, R ∗ Si−1)]. ≤ E[ Γ(v In addition, by Equation (11) in Corollary 3.4, we know that ∆(v∗ Si−1) ∆(v◦ Si−1) ≥ (1 − 1/e) E[ Γ(v∗ Si−1)] E[ Γ(v◦ Si−1)] . (14) Combining Equations (12) -- (14), we can derive a quantitative relationship between ∆(v∗ Si−1) and ∆(v◦ Si−1) such that with high probability ∗ Si−1) ≥ Λl(v∗) ∆(v ◦ Si−1). Λu(v◦) · (1 − 1/e) · ∆(v (15) Therefore, the final guarantee is (1−1/e)Λl(v∗)/Λu(v◦). Note that in our stopping condition of Λl(v∗)/Λu(v◦) ≥ 1 − ε (Line 11), we use ε (defined in Line 1) to correct the error on Equations (12) and (13) (with low failure probability). This proves the (1−1/e)(1−ε) approximation ratio of ∆(v∗ Si−1). 3.5 Theoretical Analysis Before we proceed to the theoretical analysis, we first present the hardness of ASM. 8 ηi Λu(v◦) R ≥ E[ Γ(v ◦ Si−1)]. (13) Efficient Approximation Algorithms for Adaptive Seed Minimization Lemma 3.5. Given a probabilistic social network G = (V , E) with V = n and a threshold η ∈ [1, n], for any ξ > 0, adaptive seed minimization cannot be approximated within a ratio of (1 − ξ) ln η in polynomial time unless NP ⊆ DTIME(nO(log log n)). Approximation Guarantee. Theorem 3.1 indicates that any α-approximation greedy policy π could achieve an ap- proximation ratio of (ln η+1)2 . We examine the potential of TRIM to serve the role of such a policy. To cope with the ran- domness of seed selection algorithms (due to sampling), we use the notion of expected approximation guarantee, which considers the average case. We first obtain the approximation ratio of TRIM for each round of seed selection. α Lemma 3.6. For the i-th round of seed selection in Gi, TRIM returns a (1−1/e)(1−ε)-approximate solution to the optimum.4 Combining Theorem 3.1 and Lemma 3.6, we obtain the approximation guarantee of ASTI. (cid:1) + ln 6 2 θmax ← 2ni 3 θ◦ ← θmax · b ε 4 T ← ⌈log2 θmax Algorithm 3: TRIM-B(Gi , ε, b) Input: Graph Gi, error threshold ε, and batch size b. Output: A ρb(1 − 1/e)(1 − ε)-approximate solution Sb with size-b for truncated influence maximization, where ρb = 1 − (1 − 1/b)b. 1 δ ← ε/(cid:0)100(1 − 1/e)(1 − ε)ηi(cid:1), and ε ← 99ε/(100 − ε); (cid:113)(cid:0) ln(cid:0)ni (cid:16)(cid:113)ln 6 (cid:17)2/(b ε (cid:1)/ρb (cid:1), and a2 ← ln(3T/δ); 5 a1 ← ln(3T/δ) + ln(cid:0)ni Λl(Sb) ← ((cid:112)ΛR(Sb) + 2a1/9 −(cid:112)a1/2)2 − a1/18; b) ← ((cid:112)ΛR(Sb)/ρb + a2/2 +(cid:112)a2/2)2; 6 generate a set R of θ◦ random mRR-sets; 7 for t ← 1 to T do 8 9 10 δ 2/ni; θ◦ ⌉ + 1; 2); + b b δ find Sb ← Greedy(R); Λu(S◦ if Λl(Sb) Λu(S◦ double the size of R; b) ≥ ρb(1 − ε) or t = T then return Sb; 11 12 O(cid:0) OPTi (cid:1). mi Theorem 3.7. ASTI with the instantiation of TRIM achieves (ln η+1)2 (1−1/e)(1−ε). an expected approximation ratio of Time Complexity. The time complexity of TRIM is domi- nated by the procedure for generating mRR-sets. Intuitively, this is based on (i) how much time is used for generating a random mRR-set, and (ii) how many mRR-sets are generated. In what follows, we show their relationship. In particular, for the i-th round of seed selection in Gi, let OPTi (resp. v⋄) be the optimum (resp. optimal node) of E[ Γ(v Si−1)], i.e., OPTi = E[ Γ(v⋄ Si−1)] = maxv E[ Γ(v Si−1)]. (Note that v∗ maximizes ΛR(v), v⋄ maximizes E[ Γ(v Si−1)], and v◦ maximizes ∆(v Si−1).) We first show the expected time used for generating a random mRR-set in the following lemma. Lemma 3.8. For the i-th round of seed selection in Gi, the expected time complexity for generating a random mRR-set is (cid:1).5 Finally, we provide the expected time complexity of TRIM ηi Now, we present the following lemma that gives the ex- pected number of mRR-sets generated by TRIM. The proof is similar to that of OPIM-C [37]. Lemma 3.9. For the i-th round of seed selection in Gi, the expected number of mRR-sets TRIM generated is O(cid:0) ηi ln ni (cid:1). achieves an expected time complexity of O(cid:0) mi +ni poly(ni)(cid:1). (cid:1). Here, we assume that ε ∈ Ω(cid:0) 5In general, it is O(cid:0) ηi ln(ni/ε) 4Here, α-approximation indicates that E[ ∆(v◦Si−1) , which is required by Theorem 3.1 for a randomized algorithm through a detailed check of the proof of Theorem 40 in [18]. Lemma 3.10. For the i-th round of seed selection in Gi, TRIM ln ni ∆(v∗Si−1)] ≤ 1 α · in the following lemma. ε2OPTi ε2 ε2OPTi 1 1 1 At the first glance, the expected time complexity of TRIM is counterintuitive. In particular, the expected root size of ni/ηi in the i-th round is increasing with i. It seems that the time complexity of TRIM is more likely to increase with i. However, Lemma 3.10 just tells us the opposite. This is due to either the residual graph Gi being reduced significantly (Lemma 3.8) or the mRR-set size being reduced considerably (Lemma 3.9). Overall, the time complexity of TRIM in each round can be independent of the number of initially selected nodes. There are at most η rounds in total, we can derive the expected time complexity of ASTI instantiated with TRIM. Theorem 3.11. ASTI with the instantiation of TRIM has an expected time complexity of O(cid:0) η·(m+n) ln n(cid:1). ε2 4 EXTENSIONS TRIM selects one node in each round until at least η users are influenced. Therefore, the seed selection phase in ASTI instantiated by TRIM can be quite time consuming due to that the marginal (truncated) spread of a singleton node set is potentially small which may (i) involve in many rounds to achieve the target η, and (ii) generate a large number of mRR-sets for constructing an α-approximate solution in each round. To mitigate the enormous overhead, we propose a batched version of TRIM, referred to as TRIM-B6 algorithm, to accelerate the node selection process of ASTI. 4.1 Batched Version of TRIM Algorithm 3 shows the details of the TRIM-B algorithm. TRIM-B generalizes TRIM by selecting a fixed number of 6TRuncated Influence Maximization in the Batched model. 9 Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim b seeds in each round, where b is an input parameter to de- termine the batch size. Specifically, TRIM-B first generates a small number of random mRR-sets and then uses a greedy al- gorithm for maximum coverage [43] to identify a size-b seed set Sb to cover mRR-sets with an approximation guarantee of ρb = 1−(1−1/b)b (Line 8). If Sb meets the condition (Line 11), TRIM-B terminates; otherwise, the number of mRR-sets is doubled until a qualified Sb is derived. Consequently, the approximation ratio of TRIM-B is ρb(1 − 1/e)(1 − ε). Note that when the batch size b is 1, TRIM-B degenerates to TRIM. The major differences in the design between TRIM-B and TRIM are as follows. First, in TRIM-B, the definitions of variables θmax and θ◦ are involved with ρb and b for general- ization, as shown in Line 2 and Line 3, respectively. Second, to obtain the upper bound on the coverage of the optimal in R, the coverage of ΛR(Sb) is divided by ρb solution S◦ (Line 10). Third, the ratio in the stop condition is updated to be ρb(1 − ε) (Line 11). 4.2 Theoretical Analysis The theoretical analysis of TRIM-B can be obtained by gen- eralizing the properties of TRIM. Approximation Guarantee. To establish the overall ap- proximation guarantee, we first analyze the approximation ratio of TRIM-B in each round of seed selection. b Lemma 4.1. For the i-th round of seed selection in Gi, TRIM- B returns a ρb(1 − 1/e)(1 − ε)-approximate solution, where ρb = 1 − (1 − 1/b)b. Combining Theorem 3.1 and Lemma 4.1, we obtain the approximation guarantee of TRIM-B. Theorem 4.2. ASTI with the instantiation of TRIM-B achieves an expected approximation ratio of (ln η+1)2 ρb(1−1/e)(1−ε). Remark. Note that there exists a gap between the optimal policy in the sequential model and the optimal policy in the batched model, which is known as the adaptivity gap [18]. Adaptivity gap quantifies the performance difference be- tween the optimal adaptive policy and the optimal non- adaptive policy. To explain, a size-b seed set is selected as a batch (b ≥ 1) in TRIM-B without observing the realization of any seed therein. This selection is an non-adaptive process compared to that of b = 1 in TRIM. As a consequence, there exists an adaptivity gap between the two algorithms if the batch size b > 1. However, to the best of our knowledge, this adaptivity gap remains unknown in viral marketing applica- tions, which makes it hard to quantify the difference between the optimal policy in the sequential model and that in the batched model. Meanwhile, the existing bound of adaptivity gap of (1 − 1/e) in [10] is not applicable to adaptive seed 10 (cid:16) ηi ln(ni (cid:17), minimization. It holds only if the nodes in social graph G are independent, which, however, is not true. Time Complexity. The time complexity of TRIM-B de- pends on three factors: (i) the time for generating a random mRR-set, (ii) the number of mRR-sets generated, and (iii) the time to derive a size-b seed set. The expected time used for generating a random mRR-set is given in Lemma 3.8. We now show the number of mRR-sets generated. ε2 Lemma 4.3. For the i-th round of seed selection in Gi, the b ) expected number of mRR-sets TRIM-B generates is O ε2OPTb,i where OPTb,i denotes the maximum expected truncated spread among all the size-b seed sets in Gi. its input [43], i.e., On the other hand, the greedy algorithm for identifying the size-b seed set runs in time linear to the total size of R∈RR. Meanwhile, the total number of mRR-sets examined in all the iterations is within twice of that in the last iteration. According to Wald's equation [44], the expected time complexity of the greedy procedure is O(E[R] · E[R]), which is dominated by that for generat- ing mRR-sets. Consequently, by Lemma 3.8 and Lemma 4.3, the expected time used in the i-th round of TRIM-B is O(cid:0) b(mi +ni) ln ni achieves an expected time complexity of O(cid:0) η·(m+n) (cid:1). There are at most O(η/b) rounds in total. ln n(cid:1). Based on the analysis above, the expected time complexity of TRIM-B is given in the following theorem. Theorem 4.4. ASTI with the instantiation of TRIM-B ε2 5 ADDITIONAL RELATED WORK In Section 2.4, we have discussed the work [42] most related to ours. In what follows, we survey other relevant work in the literature. Influence maximization, as the dual problem of seed mini- mization, seeks to identify a set of k seed nodes with the max- imum expected spread. Domingos and Richardson [14, 35] are the first to study viral marketing from an algorithmic perspective. After that, Kempe et al. [27] formulate the influ- ence maximization problem and propose a greedy algorithm that returns (1 − 1/e − ϵ)-approximation for several influ- ence diffusion models, by utilizing Monte Carlo simulations. Subsequently, there has been a large body of research on improved algorithms for influence maximization [1, 5, 7 -- 9, 12, 13, 16, 20, 21, 25 -- 30, 33, 37 -- 41, 45, 48]. Among them, some recent work [5, 25, 33, 37, 40, 41] focuses on algorithms that ensure (1 − 1/e − ε)-approximations by utilizing the re- verse influence sampling technique [5]. Seed minimization, which has mainly been studied from the non-adaptive perspective, aims at finding a minimum- size set of seed nodes to achieve a given threshold of expected spread. Chen [6] investigates seed minimization under a Efficient Approximation Algorithms for Adaptive Seed Minimization Table 2: Dataset details. (K = 103, M = 106) Type Avg. deg. LWCC size Dataset NetHEPT Epinions Youtube LiveJournal 4.85M 69.0M m n 15.2K 31.4K undirected 132K 841K directed 1.13M 2.99M undirected directed 4.18 13.4 5.29 28.5 6.80K 119K 1.13M 4.84M (a) NetHEPT & Youtube Figure 3: Degree distribution of tested datasets. (b) Epinions & LiveJournal variant of the linear threshold model, where each node is as- signed with a fixed threshold. Chen shows that the problem cannot be approximated within a ratio of O(2log1−ϵ n) unless NP ⊆ DTIME(n polylog(n)) as the expected spread function under the fixed threshold model is not submodular. After that, Long and Wong [32] study seed minimization under the widely used independent cascade and linear threshold models. Goyal et al. [19] provide a bi-criteria approximation algorithms for seed minimization. Zhang et al. [47] then improve the theoretical results by removing the bi-criteria restriction. However, the requirements of these algorithms are either impractical or extremely stringent, which makes these algorithms vastly ineffective in practice. Han et al. [22] propose the ATEUC algorithm for non-adaptive seed min- imization by utilizing reverse influence sampling for esti- mating the spreads of nodes. However, the expected time complexity of the algorithm is unknown, and its worst-case time complexity is prohibitively large. As we show in the experiments, our adaptive algorithm is more effective than these non-adaptive algorithms in terms of the number of seed nodes required. Finally, there is a series of recent work [3, 23, 24, 36, 42] that focuses on adaptive influence maximization. Recall that, as analyzed in Section 3.1, to construct approximate solutions for adaptive seed minimization, some approximation algo- rithms for truncated influence maximization are required. However, the algorithms for adaptive influence maximiza- tion generally target at maximizing the influence spread in each round, which cannot provide theoretical guarantees for truncated influence maximization, as we point out in Sec- tion 3.2. As a consequence, techniques developed for adap- tive influence maximization are inapplicable to the adaptive seed minimization problem. In addition, in the case of in- fluence maximization, going adaptive does not really boost the spread significantly, as confirmed by the experiments in [23]. However, it shall be observed in our experiments that going adaptive provides a substantial advantage for seed minimization. 6 EXPERIMENTS This section evaluates the performance of the proposed al- gorithms against the state of the art. All the experiments are conducted on a Linux machine with an Intel Xeon 2.6GHz 11 CPU and 64GB RAM. For fair comparison, we first randomly generate 20 possible realizations for each dataset, and then measure the performance of each algorithm on those 20 realizations and report the average performance. 6.1 Experimental Setting Datasets. The experiments are conducted on four datasets, i.e., NetHEPT, Epinions, Youtube, and LiveJournal. NetHEPT [8] represents the academic collaboration networks of "High Energy Physics - Theory" area. The rest of the three are real- life social networks from [31]. Table 2 summarizes the details of the four datasets. Note that an undirected edge is trans- formed into two directed edges. There does exist any isolated node in the four tested datasets. Furthermore, the number of nodes in the largest weakly connected component (LWCC) indicates that nodes are highly interconnected, especially for the three social networks. As shown in Figure 3, all the four datasets have a power law degree distribution. The largest dataset that has been used for adaptive seed minimization in the literature contains 75k nodes and 500k edges [42], which is far smaller than LiveJournal. To the best of our knowl- edge, LiveJournal with millions of nodes and edges is the largest dataset ever tested in adaptive seed minimization experiments. Algorithms. We evaluate six algorithms: ASTI, ASTI-2, ASTI-4, ASTI-8, AdaptIM and ATEUC [22]. ASTI-b is ASTI instantiated by TRIM-B with the batch sizes of b. (Note that ASTI is the version with a batch size of 1.) AdaptIM is modified from the AdaptIM-1 method proposed in [23] for the adaptive influence maximization problem. It itera- tively runs a non-adaptive influence maximization algorithm (i.e., EPIC [23]) to select the node that maximizes the ex- pected marginal influence spread on the residual graphs, until the desired threshold is reached. AdaptIM differs from our ASTI algorithm in that it greedily selects the node to maximize the influence spread instead of the truncated influ- ence spread. The batch size of AdaptIM is set to 1 by default. As introduced in Section 5, ATEUC is the state of the art for the non-adaptive seed minimization problem. By comparing ASTI with ATEUC, we aim to prove the advantage of adaptiv- ity over non-adaptivity in terms of the effectiveness. Mean- while, three batched algorithms, i.e., ASTI-2, ASTI-4, ASTI-8, are compared with both ASTI and ATEUC to study how the batch size would affect the efficiency and effectiveness. For 10-710-610-510-410-310-210-1100100101102103104105degreefraction of nodesNetHEPTYoutube10-710-610-510-410-310-210-1100100101102103104105degreefraction of nodesEpinionsLiveJournal Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim (a) NetHEPT (b) Epinions Figure 4: Number of seed nodes vs. threshold under the IC model. (c) Youtube (d) LiveJournal AdaptIM, we obtain the source code of AdaptIM-1 from the authors [23] with some necessary modifications (e.g., stop condition). For the other five algorithms, we implement them in C++ strictly following the algorithm description and compile them with the same optimization options. Parameter Settings. In our experiments, all the algorithms are tested under both the Independent Cascade (IC) model and the Linear Threshold (LT) model. Following the common set- ting in the literature [1, 41], we set the approximation param- eter ε = 0.5 for the five adaptive algorithms. For those param- eters in ATEUC, we use the values recommended in [22]. For each dataset, we set the edge probability p(⟨u, v⟩) = indegv where indeg v The performance metrics measured include the number of seeds selected and the corresponding running time. To better understand the performance of the algorithms, we design the large η setting of the threshold for NetHEPT, Epinions, = {0.01, 0.05, 0.1, 0.15, 0.2}, where n is and Youtube, i.e., η n the number of nodes in the social network. Observing that around 2K nodes are required on LiveJournal under the large η setting which is not convenient for exhibition, we thus use = {0.01, 0.02, 0.03, 0.04, 0.05} a tailored small η setting, i.e., η n for LiveJournal. is the in-degree of node v. 1 6.2 Results under the IC model Seed Size vs. Threshold. Figure 4 reports the number of seeds selected by the six algorithms for different thresholds η under the IC model. As can be seen, ASTI selects far fewer seed nodes than ATEUC does, especially when the threshold η becomes larger. In general, ATEUC selects around 30% -- 40% more nodes than ASTI does on all the four datasets. In par- ticular, with a threshold η/n = 0.2 on dataset Epinions, ASTI selects 116.95 seed nodes on average while ATEUC needs 193.8 seed nodes (i.e., 65.7% more nodes). For the sake of clarity, Table 3 shows the exact improvement ratio of ASTI over ATEUC on the number of seed nodes for the correspond- ing five thresholds under both the IC and LT model. Note that there exist many points (indicated by N/A) where the actual number of nodes activated by the seed set returned by ATEUC does not reach the required threshold under some realizations. This is because ATEUC selects a node set S such 12 Table 3: Improvement ratio of ASTI over ATEUC 0.05 0.1 0.15 η/n 0.01 0.2 N/A 40.8% 43.8% 43.0% 43.7% l NetHEPT N/A N/A 50.7% N/A 65.7% Epinions Youtube 0.0% 24.3% N/A 37.5% 41.7% LiveJournal N/A 43.0% 34.9% N/A 33.0% N/A 44.3% 47.5% N/A N/A N/A N/A N/A N/A 0.0% 39.5% 54.1% N/A 47.9% N/A e d o M C I l NetHEPT Epinions Youtube LiveJournal N/A N/A e d o M T L N/A N/A N/A N/A: ATEUC does not meet the threshold for some realizations. that E[I(S)] ≥ η but may influence fewer than η nodes under some realizations, whereas our adaptive algorithms always ensure that at least η nodes are influenced by the returned node set under every realization. We shall explore this in more detail in Section 6.4. These facts support the superiority of adaptive algorithms over non-adaptive algorithms. We also observe that the number of nodes selected by Adap- tIM is close to that of ASTI, which indicates that AdaptIM is empirically effective in seed minimization. However, it does not provide any approximation guarantees in terms of the number of nodes selected. Another interesting obser- vation is that ASTI-2, ASTI-4, and ASTI-8 slightly increase the number of seed nodes selected compared with ASTI and still select nodes far less than ATEUC does for most of the cases. This confirms that adaptive algorithms by utilizing the information of partial realizations are more effective than non-adaptive algorithms. Running Time vs. Threshold. Figure 5 presents the re- sults of running time against the threshold under the IC model. As the results show, ATEUC runs faster than the other five adaptive algorithms on the four datasets when the threshold η is large. The main reason is that adaptive algo- rithms involve multiple rounds of seed selection whereas only one round is required for non-adaptive algorithms. Ob- serve that the running time of ATEUC generally decreases with the increase of the threshold η, unlike the results of the five adaptive algorithms. The reason lies in the design of ATEUC. Specifically, ATEUC selects two seed set candi- dates Su and Sl, which are taken as the upper bound and lower bound on the number of seed nodes in the optimal ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM 0 100 200 300 4000.010.050.10.150.2threshold η/nnumber of seed 0 40 80 120 160 2000.010.050.10.150.2threshold η/nnumber of seed 0 40 80 120 160 2000.010.050.10.150.2threshold η/nnumber of seed 0 120 240 360 480 600 7200.010.020.030.040.05threshold η/nnumber of seed Efficient Approximation Algorithms for Adaptive Seed Minimization (a) NetHEPT (a) NetHEPT (b) Epinions (c) Youtube Figure 5: Running time vs. threshold under the IC model. (b) Epinions (c) Youtube Figure 6: Number of seed nodes vs. threshold under the LT model. (d) LiveJournal (d) LiveJournal solution. Only when the condition Su ≤ 2Sl is satisfied, the candidate set Su is returned as the solution; otherwise ATEUC will continue to refine Su and Sl [22]. The larger the threshold, the more seed nodes are required, and the more easily this stop condition is met, which explains the unique running time pattern of ATEUC. We also observe that AdaptIM runs around 10 -- 20 times slower than ASTI for all cases. Particularly, AdaptIM cannot finish within 72 hours when η/n = 0.05 under the IC model on the LiveJournal dataset (see Figure 5(d)). This demonstrates that AdaptIM is significantly inferior to ASTI in terms of computational over- heads. The reason behind this is that ASTI selects the node to maximize the expected marginal truncated spread, while AdaptIM attempts to maximize the expected marginal in- fluence spread. Specifically, recall that the expected number of mRR-sets generated by ASTI is proportional to ηi/OPTi. Meanwhile, the expected number of RR-sets generated by AdaptIM is proportional to ni/OPT′ is the max- imum expected marginal influence spread in the i-th round of seed selection in Gi. For the last few rounds of seed selection, i ≈ OPTi ≈ ηi ≪ ni, which indicates that the we have OPT′ number of mRR-sets generated by ASTI is much smaller than the number of RR-sets generated by AdaptIM. Consequently, ASTI runs remarkably faster than AdaptIM. As such, ASTI is more preferable than AdaptIM, as the former provides significantly better efficiency and approximation guarantees than the latter, while offering similar empirical effectiveness. Note that the batched algorithms, i.e., ASTI-2, ASTI-4, and ASTI-8, reduce the running time significantly, to around 30%, 10%, and 5% of ASTI, which makes them quite competitive with ATEUC in terms of the efficiency, not to mention Adap- tIM. In addition, as explained earlier, the terminal condition , where OPT′ i i Su ≤ 2Sl in ATEUC is easier satisfied when the threshold η is larger, and hence, ATEUC runs faster along with the increase of η. On the other hand, the running times of the adaptive algorithms increase with η. Therefore, ASTI-4 and ASTI-8 outperform ATEUC on datasets Epinions and Youtube when η is relatively small, but when the threshold η/n = 0.2, the running times of all three algorithms become similar, as shown in Figures 5(b) and 5(c). Recall that ASTI-8 selects far fewer seed nodes than ATEUC does. Therefore, ASTI-8 strikes a good balance between efficiency and effectiveness in the current setting. We also observe that the running time of ASTI-8 fluctuates from η/n = 0.01 to η/n = 0.05 on datasets Epinions and Youtube. This is due to the combined effects of the threshold and the batch size. In these cases, it needs no more than 8 nodes to reach the thresholds. Consequently, ASTI-8 finishes selecting seed nodes within just one round. However, when η/n increases from 0.01 to 0.05, the root size of mRR-sets decreases. As a consequence, it takes relatively less time to generate a random mRR-set in practice, which leads to the decrease in running time. 6.3 Results under the LT model Seed Size vs. Threshold. Figure 6 reports the number of nodes selected by different algorithms under the LT model. In general, the results show similar trends to those observed in Figure 4. Similarly, AdaptIM selects a close number of nodes as ASTI does on the four datasets, with negligible difference. ATEUC requires around 40% more nodes than the five adaptive algorithms do. Details are displayed in Table 3. In addition, we also observe that ASTI-8 selects more nodes than ATEUC for several settings (e.g., η/n = 0.01 on the Epionions and Youtube datasets). Through a careful analysis, 13 ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021031040.010.050.10.150.2threshold η/nrunning time (sec)1011021031041051060.010.020.030.040.05threshold η/nrunning time (sec)ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM 0 100 200 3000.010.050.10.150.2threshold η/nnumber of seed 0 20 40 600.010.050.10.150.2threshold η/nnumber of seed 0 40 80 1200.010.050.10.150.2threshold η/nnumber of seed 0 60 120 180 2400.010.050.10.150.2threshold η/nnumber of seed Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim (a) NetHEPT (b) Epinions Figure 7: Running time vs. threshold under the LT model. (c) Youtube (d) LiveJournal we find that (i) all the algorithms select less nodes under the LT model than those under the IC model, and (ii) ASTI-8 selects 8 seed nodes in a batch with influence spread much higher than the requirements. These observations clearly tell us that there is a tradeoff in the setting of batch size. Increasing the batch size will speed up the algorithms but may result in more nodes selected. Running Time vs. Threshold. Figure 7 shows the results of running time for different thresholds under the LT model. The conclusions we summarize for Figure 5 are generally applicable to Figure 7 as well. The major differences lie in two aspects: (i) the running time under the LT model is shorter than that under the IC model under the same setting as it takes less time to generate a random mRR-set under the LT model than that under the IC model (as mentioned and analyzed in previous work [1, 37]), which is consistent with the results in Figure 6, (ii) ASTI-4 outperforms ATEUC on Epinions and ASTI-8 outperforms ATEUC on both Epinions and Youtube for all cases under the LT model. This fact indicates (i) the batched version of ASTI is more scalable than ATEUC does, and (ii) when the batch size b is well-calibrated, ASTI can beat ATEUC in both efficiency and effectiveness. 6.4 Discussions on Spread Distribution As discussed previously, non-adaptive algorithms may find solutions with influence spread far away from the require- ment (i.e., either under-qualified or over-qualified). Figure 8 reports the spread distribution of 20 realizations achieved by the ASTI and ATEUC algorithms on the NetHEPT dataset under the IC and LT models, respectively. The solid (red) line in the figure represents the spread threshold (153) re- quired. As shown, ATEUC fails to reach the threshold for 5 and 6 realizations under the IC and LT models, respectively, with corresponding percentages of 25% and 30%. In addi- tion, for 5 and 6 realizations under the IC and LT models, respectively, the seed nodes selected by ATEUC produce in- fluence spread much higher (over 50%) than the requirement. In contrast, ASTI meets the spread requirement for all the realizations under both the IC and LT models. Moreover, the spread produced by ASTI is generally kept close to the requirement. The spread exceeds the requirement by more (a) IC model (b) LT model Figure 8: Spread for 20 realizations on NetHEPT. than 50% for only 2 realizations under the LT model. These two over-qualified exceptions are due to that the last seed node selected achieves much higher spread than the gap to reach η, which is rare to happen in practice. These observa- tions indicate that non-adaptive algorithms are unreliable for seed minimization. 7 CONCLUSION This paper studies the problem of adaptive seed minimiza- tion, and proposes algorithms that provide both strong theo- retical guarantees and superior empirical effectiveness. Our approach is based on a novel ASTI framework instantiated by a truncated influence maximization algorithm TRIM, which has a provable approximation guarantee. The core of our TRIM algorithm is an elegant sampling method that gen- erates random multi-root reverse reachable (mRR) sets for estimating the truncated influence spread. We also extend TRIM into its batched version TRIM-B to further improve the efficiency of seed selection. With extensive experiments on real data, we show that our solutions considerably outper- form the state of the art for seed minimization under both the IC and LT diffusion models. ACKNOWLEDGMENTS This research is supported by Singapore National Research Foundation under grant NRF-RSS2016-004, by Singapore Ministry of Education Academic Research Fund Tier 2 under grant MOE2015-T2-2-069, by National University of Singa- pore under an SUG, by Singapore Ministry of Education Aca- demic Research Fund Tier 1 under grant MOE2017-T1-002- 024, and by a Discovery grant and a Discovery Accelerator Supplement grant from the Natural Sciences and Engineering Research Council of Canada (NSERC). 14 ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-210-11001011020.010.050.10.150.2threshold η/nrunning time (sec)10-210-11001011021030.010.050.10.150.2threshold η/nrunning time (sec)10-11001011021031041050.010.020.030.040.05threshold η/nrunning time (sec) 50 100 150 200 250 300 35015101520realization indexspreadASTIATEUC 100 150 200 250 30015101520realization indexspreadASTIATEUC Efficient Approximation Algorithms for Adaptive Seed Minimization REFERENCES [1] Akhil Arora, Sainyam Galhotra, and Sayan Ranu. 2017. Debunking the Myths of Influence Maximization: An In-Depth Benchmarking Study. In Proc. ACM SIGMOD. 651 -- 666. [2] Arash Asadpour, Hamid Nazerzadeh, and Amin Saberi. 2008. Stochastic Submodular Maximization. In Proc. WINE. 477 -- 489. [3] Ashwinkumar Badanidiyuru, Christos Papadimitriou, Aviad Rubin- stein, Lior Seeman, and Yaron Singer. 2016. Locally Adaptive Opti- mization: Adaptive Seeding for Monotone Submodular Functions. In Proc. SODA. 414 -- 429. [4] Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2012. Topic- Aware Social Influence Propagation Models. In Proc. IEEE ICDM. 81 -- 90. [5] Christian Borgs, Michael Brautbar, Jennifer Chayes, and Brendan Lucier. 2014. Maximizing Social Influence in Nearly Optimal Time. In Proc. SODA. 946 -- 957. [6] Ning Chen. 2009. On the Approximability of Influence in Social Net- works. SIAM Journal on Discrete Mathematics 23, 3 (2009), 1400 -- 1415. [7] Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable Influence Maxi- mization for Prevalent Viral Marketing in Large-Scale Social Networks. In Proc. ACM KDD. 1029 -- 1038. [8] Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient Influence Maxi- mization in Social Networks. In Proc. ACM KDD. 199 -- 208. [9] Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable Influence Maxi- mization in Social Networks Under the Linear Threshold Model. In Proc. IEEE ICDM. 88 -- 97. [10] Yuxin Chen and Andreas Krause. 2013. Near-optimal Batch Mode Active Learning and Adaptive Submodular Optimization. In Proc. ICML. 160 -- 168. [11] Yuxin Chen, Hiroaki Shioi, Cesar Fuentes Montesinos, Lian Pin Koh, Serge Wich, and Andreas Krause. 2014. Active Detection via Adaptive Submodularity. In Proc. ICML. 55 -- 63. [12] Suqi Cheng, Huawei Shen, Junming Huang, Wei Chen, and Xueqi IMRank: Influence Maximization via Finding Self- Cheng. 2014. consistent Ranking. In Proc. ACM SIGIR. 475 -- 484. [13] Edith Cohen, Daniel Delling, Thomas Pajor, and Renato F. Werneck. 2014. Sketch-Based Influence Maximization and Computation: Scaling Up with Guarantees. In Proc. ACM CIKM. 629 -- 638. [14] Pedro Domingos and Matt Richardson. 2001. Mining the Network Value of Customers. In Proc. ACM KDD. 57 -- 66. [15] Uriel Feige. 1998. A Threshold of ln n for Approximating Set Cover. J. ACM 45, 4 (1998), 634 -- 652. [16] Sainyam Galhotra, Akhil Arora, and Shourya Roy. 2016. Holistic Influence Maximization: Combining Scalability and Efficiency with Opinion-Aware Models. In Proc. ACM SIGMOD. 743 -- 758. [17] Daniel Golovin and Andreas Krause. 2011. Adaptive Submodularity: Theory and Applications in Active Learning and Stochastic Optimiza- tion. Journal of Artificial Intelligence Research 42, 1 (2011), 427 -- 486. [18] Daniel Golovin and Andreas Krause. 2017. Adaptive Submodularity: Theory and Applications in Active Learning and Stochastic Optimiza- tion. arXiv preprint, https://arxiv.org/abs/1003.3967. [19] Amit Goyal, Francesco Bonchi, Laks V.S. Lakshmanan, and Suresh Venkatasubramanian. 2013. On Minimizing Budget and Time in Influ- ence Propagation over Social Networks. Social Network Analysis and Mining 3, 2 (2013), 179 -- 192. [20] Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2011. A Data-Based Approach to Social Influence Maximization. Proc. VLDB Endowment 5, 1 (2011), 73 -- 84. [21] Amit Goyal, Wei Lu, and Laks V.S. Lakshmanan. 2011. CELF++: Op- timizing the Greedy Algorithm for Influence Maximization in Social Networks. In Proc. WWW Companion. 47 -- 48. [22] Kai Han, Yuntian He, Xiaokui Xiao, Shaojie Tang, Jingxin Xu, and Liusheng Huang. 2017. Cost-Effective Seed Selection for Online Social Networks. arXiv preprint, https://arxiv.org/abs/1711.10665. [23] Kai Han, Keke Huang, Xiaokui Xiao, Jing Tang, Aixin Sun, and Xueyan Tang. 2018. Efficient Algorithms for Adaptive Influence Maximization. Proc. VLDB Endowment 11, 9 (2018), 1029 -- 1040. [24] Thibaut Horel and Yaron Singer. 2015. Scalable Methods for Adaptively Seeding a Social Network. In Proc. WWW. 441 -- 451. [25] Keke Huang, Sibo Wang, Glenn Bevilacqua, Xiaokui Xiao, and Laks V. S. Lakshmanan. 2017. Revisiting the Stop-and-Stare Algorithms for Influence Maximization. Proc. VLDB Endowment 10, 9 (2017), 913 -- 924. [26] Kyomin Jung, Wooram Heo, and Wei Chen. 2012. IRIE: Scalable and Robust Influence Maximization in Social Networks. In Proc. IEEE ICDM. 918 -- 923. [27] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the Spread of Influence Through a Social Network. In Proc. ACM KDD. 137 -- 146. [28] David Kempe, Jon Kleinberg, and Éva Tardos. 2005. Influential Nodes in a Diffusion Model for Social Networks. In Proc. ICALP. 1127 -- 1138. [29] Jinha Kim, Seung-Keol Kim, and Hwanjo Yu. 2013. Scalable and Paral- lelizable Processing of Influence Maximization for Large-Scale Social Networks. In Proc. IEEE ICDE. 266 -- 277. [30] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective Outbreak Detection in Networks. In Proc. ACM KDD. 420 -- 429. [31] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford.edu/data. [32] Cheng Long and Raymond Chi-Wing Wong. 2011. Minimizing Seed Set for Viral Marketing. In Proc. IEEE ICDM. 427 -- 436. [33] Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 2016. Stop-and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion-Scale Networks. In Proc. ACM SIGMOD. 695 -- 710. [34] Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 22 Feb 2017. Stop- and-Stare: Optimal Sampling Algorithms for Viral Marketing in Billion- Scale Networks. arXiv preprint, https://arxiv.org/abs/1605.07990v3. [35] Matthew Richardson and Pedro Domingos. 2002. Mining Knowledge- Sharing Sites for Viral Marketing. In Proc. ACM KDD. 61 -- 70. [36] Lior Seeman and Yaron Singer. 2013. Adaptive Seeding in Social Networks. In Proc. IEEE FOCS. 459 -- 468. [37] Jing Tang, Xueyan Tang, Xiaokui Xiao, and Junsong Yuan. 2018. On- line Processing Algorithms for Influence Maximization. In Proc. ACM SIGMOD. 991 -- 1005. [38] Jing Tang, Xueyan Tang, and Junsong Yuan. 2017. Influence Maximiza- tion Meets Efficiency and Effectiveness: A Hop-Based Approach. In Proc. IEEE/ACM ASONAM. 64 -- 71. [39] Jing Tang, Xueyan Tang, and Junsong Yuan. 2018. An Efficient and Effective Hop-Based Approach for Inluence Maximization in Social Networks. Social Network Analysis and Mining 8, 10 (2018). [40] Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence Maxi- mization in Near-Linear Time: A Martingale Approach. In Proc. ACM SIGMOD. 1539 -- 1554. [41] Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence Maxi- mization: Near-optimal Time Complexity Meets Practical Efficiency. In Proc. ACM SIGMOD. 75 -- 86. [42] Sharan Vaswani and Laks V. S. Lakshmanan. 2016. Adaptive Influence Maximization in Social Networks: Why Commit when You can Adapt? arXiv preprint, https://arxiv.org/abs/1604.08171. [43] Vijay V. Vazirani. 2003. Approximation Algorithms. Springer. [44] Abraham Wald. 1947. Sequential Analysis. Wiley. [45] Yu Wang, Gao Cong, Guojie Song, and Kunqing Xie. 2010. Community- Based Greedy Algorithm for Mining Top-K Influential Nodes in Mobile Social Networks. In Proc. ACM KDD. 1039 -- 1048. 15 Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim [46] Amulya Yadav, Hau Chan, Albert Xin Jiang, Haifeng Xu, Eric Rice, and Milind Tambe. 2016. Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization Under Uncertainty. In Proc. AAMAS. 740 -- 748. [47] Peng Zhang, Wei Chen, Xiaoming Sun, Yajun Wang, and Jialin Zhang. 2014. Minimizing Seed Set Selection with Probabilistic Coverage Guarantee in a Social Network. In Proc. ACM KDD. 1306 -- 1315. [48] Chuan Zhou, Peng Zhang, Jing Guo, Xingquan Zhu, and Li Guo. 2013. UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Networks. In Proc. IEEE ICDM. 907 -- 916. T A CONCENTRATION BOUNDS We show some useful martingale concentration bounds, i.e., the Chernoff-like bounds [40] and their variants [37]. Lemma A.1 ([40]). Let X1 − E[X1], . . . , XT − E[XT] be a martingale difference sequence such that Xi ∈ [0, 1] for each i =1 Xi. If E[Xi] is identical for every i, i.e., i. Let ¯X = 1 E[Xi] = E[ ¯X], then for any λ ≥ 0, we have 2 T Pr[ ¯X > E[ ¯X] + λ] ≤ exp(cid:16) − Pr[ ¯X < E[ ¯X] − λ] ≤ exp(cid:16) − λ . (17) 2E[ ¯X] + 2λ/3 (16) (cid:17) (cid:17) λ T , 2 T 2E[ ¯X] T Lemma A.2 ([37]). Let X1 − E[X1], . . . , XT − E[XT] be a martingale difference sequence such that Xi ∈ [0, 1] for each i =1 Xi. If E[Xi] is identical for every i, i.e., i. Let ¯X = 1 E[Xi] = E[ ¯X], then for any λ ≥ 0, we have T 9 −(cid:113) λ (cid:16)(cid:113) ¯XT + 2λ (cid:16)(cid:113) ¯XT + λ (cid:113) λ 2 + 2 2 (cid:105) ≤ e−λ, (cid:17)2 − λ (cid:17)2(cid:105) ≤ e−λ . 18 (18) (19) Pr(cid:104) Pr(cid:104) E[ ¯X] · T < E[ ¯X] · T > B PROOFS We first introduce the following lemma that is used to prove Theorem 3.1. Lemma B.1 ([18]). If function Γ satisfies all the following conditions: • there exists Q such that Γϕ(V) = Q for all ϕ; • Γ is integer-valued; • Γ is self-certifying; • Γ is strong adaptive monotone; • Γ is strong adaptive submodular; then an α-approximate greedy policy π achieves an approxi- mation ratio of (ln η+1)2 . α Proof of Theorem 3.1. Obviously, Γϕ(V) = η for all ϕ and Γ is an integer-valued function. Now, we need to prove 16 that for any v ∈ Vi, ϕ, ϕ′ ∈ Ωi, and j ≤ i Γϕ(Si−1) = Γϕ(V) if and only if Γϕ′(Si−1) = Γϕ′(V), Γϕ(v Si−1) ≥ 0, ∆(v Sj−1) ≥ ∆(v Si−1), ∆(v Sj−1; Si−1) ≥ ∆(v Si−1), (20) (21) (22) (23) where ∆(v Sj−1; Si−1) := EΦ∼Ωi[ΓΦ(v Sj−1)]. Equation (20) represents self-certifying, Equation (21) describes strong monotonicity, Equations (22) and (23) capture strong adap- tive submodularity. Equation (20) obviously holds, i.e., if Γϕ(Si−1) = Γϕ(V) = η, we must have Γϕ′(Si−1) = η = Γϕ′(V), and vice versa. Equation (21) holds naturally as "selecting more nodes never hurts" the function Γ. Next, we prove Equation (22). Let ϕi be a realization of Gi with probability p(ϕi) according to the influence propagation. Let Ωj(ϕi) be the subset realizations of Ωj that are consistent with ϕi. That is, for every ϕ ∈ Ωj(ϕi) and every edge e ∈ Ei, the statuses of e are the same in ϕ and ϕi such that both are either live or blocked. Then, for any ϕi, p(ϕ) = p(ϕi).  In addition, for any ϕ ∈ Ωi, let Vϕ(v Si−1) be the set of nodes activated by v in Gi. Thus, Vϕ(v Si−1) is the spread of v in Gi under realization ϕ. As a consequence, the marginal truncated spread of v in Gi under ϕ is Γϕ(v Si−1) = min{Vϕ(v Si−1), ηi}. Similarly, for any ϕ ∈ Ωj, we have Γϕ(v Sj−1) = min{Vϕ(v Sj−1), ηj} ≥ Γϕ(v Si−1), where the inequality is due to Gi ⊆ Gj and ηi ≤ ηj. There- fore, ϕ∈Ωj(ϕi) ϕ∈Ωj Γϕ(v Sj−1) · p(ϕ) ∆(v Sj−1) =  ≥   = = Γϕ(v Si−1) ·  = Γϕ(v Si−1) · p(ϕ) Γϕ(v Si−1) · p(ϕi) ϕ∈Ωj(ϕi) ϕ∈Ωj ϕi ϕi Γϕ(v Si−1) · p(ϕ) p(ϕ) ϕ∈Ωj(ϕi) ϕi = ∆(v Si−1). Finally, we prove Equation (23). For any ϕ ∈ Ωi, we have Γϕ(v Sj−1) ≥ Γϕ(v Si−1). Taking the expectation over Φ ∼ Ωi completes the proof. □ Efficient Approximation Algorithms for Adaptive Seed Minimization Proof of Theorem 3.3. We prove the elementary version of Equation (9), i.e., for any given realization ϕ, (1 − 1/e)Γϕ(S) ≤ E[ Γϕ(S)] ≤ Γϕ(S), Thus, д(x) decreases with x, which indicates that д(x) ≤ д(0) = 0. This implies that f ′(x) ≤ 0. As a consequence, f (x) ≤ f (1) = η(1 − E[p(1)]) = η(1 − E[(n − k)/n]) = 1, f (x) ≥ f (η) = 1 − E[p(η)] ≥ 1 − 1/e, where the last step above follows from the analysis for the case x ≥ η, by considering the special case x = η. Hence, the theorem is proved. □ Proof of Corollary 3.4. Equation (10) follows directly from Theorem 3.3. By Equation (10), E[Γ(S Si−1)] ≥ E[ Γ(S Si−1)], 1 − 1/e E[Γ(S′ Si−1)] ≥ Hence, Equation (11) holds. E[ Γ(S′ Si−1)] . 1 □ Proof of Lemma 3.5. We consider the special case of the adaptive seed minimization problem in which the probability p(e) = 1 for each edge e ∈ E. In this case, for any node v ∈ V , the set of nodes influenced by v is the set of nodes that can be reached by v in G, denoting as the cover set Sv. Thus, for each node v ∈ V , its cover set Sv is deterministic. As a consequence, the adaptive seed minimization problem reduces to a set cover problem, i.e., aiming to find as few nodes as possible to cover at least η nodes. Feige [15] has shown that no polynomial time algorithm can approximate the optimal solution of set cover within a ratio of (1−ε) ln η for any ε > 0 unless NP ⊆ DTIME(nO(log log n)). Hence, lemma 3.5 holds on noting that ASM generalizes set cover. □ Proof of Lemma 3.6. Let E be the following event: ◦ Si−1)]. ∗ Si−1)] ≥ (1 − ε)E[ Γ(v ∗): E[ Γ(v E(v u∈Ut such that Note that v∗ is the seed node returned by the policy which is a random variable. Let Ut be the set of possible seed nodes selected (but not necessarily returned) by TRIM in the t-th iteration in which each node u ∈ Ut has a probability Pr[u] Pr[u] = 1, where 1 ≤ t ≤ T . Let U ∗ t denote the set of random seed nodes returned at the t-th iteration t ⊆ Ut. Therefore, the event E(v∗) does of TRIM, where U ∗ not happen only if there exists a node v∗ t at iteration t ∈ [1,T] satisfying that E(v∗ If TRIM stops at the iteration t = T , according to the setting of θmax and by [40], we have t )] ≤ δ/3. Pr[(t = T) ∧ ¬E(v ∗ (25) If TRIM stops at the iteration t < T , for any node v ∈ Vi, we define two events E1(v) and E2(v) as t ∈ U ∗ t ) does not happen. ΛR(v) + 2a1/9 −(cid:112) a1/2(cid:1)2 − a1/18, ΛR(v) + a2/2 +(cid:112) a2/2(cid:1)2 E1(v): E[ΛR(v)] ≥(cid:0)(cid:112) E2(v): E[ΛR(v)] ≤(cid:0)(cid:112) . 17 where the expectation is only taken over the randomness of root size K. Let x = Iϕ(S) denote the number of nodes influenced by S under ϕ. Let p(x) be the probability that none of the k nodes sampled can be influenced by S, which is given by p(x) := Pr[ Γϕ(S) = 0] =(cid:0)n−x n − x − i n − i . k k i =0 k−1 (cid:1)/(cid:0)n (cid:1) = E[ Γϕ(S)] = η(cid:0)1 − E[p(x)](cid:1), η(cid:0)1 − E[p(x)](cid:1) E[ Γϕ(S)] Γϕ(S) = min{x, η} . Γϕ(S), with probability p(x), Then, by the definition of Γϕ(S) = 0; and with probability 1 − p(x), Γϕ(S) = η. As a consequence, we have (24) where the expectation on the right hand side is taken with respect to the randomness of k. Let f (x) be the ratio of E[ Γϕ(S)] to Γϕ(S), which is given by f (x) := = i =0 i =0 n − k⊥ E[p(x)] = r n − x − i n − i n − x − i n − i n − x − i n − i Now, we need to prove that 1− 1/e ≤ f (x) ≤ 1. We consider the following two scenarios: (i) x ≥ η, and (ii) x < η. (i) x ≥ η: In this case, f (x) = 1− E[p(x)] ≤ 1. Meanwhile, k⊥ + (1 − r) k⊥−1 (cid:16)r(n − x − k⊥) + (1 − r)(cid:17) k⊥−1 (cid:16)1 − rx (cid:17) k⊥−1 r .h.s. ≤ e−r x/(n−k⊥) k⊥−1 (ii) x < η: In this case, f (x) = η(cid:0)1 − E[p(x)](cid:1)/x. Take the e−x/(n−i) ≤ e−(r x/n+k⊥x/n) = e−x/η . As x ≥ η by assumption, this implies that f (x) ≥ 1 − 1/e. derivative, As 1 − y ≤ e−y for any 0 ≤ y ≤ 1, in the above equation, i =0 n − x − i n − i n − k⊥ i =0 i =0 = . (cid:0)E[p(x)] − 1 − xE[p ′(x)](cid:1). ′(x) = f Let д(x) = p(x)−1− xp′(x). Take the derivative, when x > 0, η 2 x д ′(x) − p ′(x) = p ′(x) − xp ′′(x) = −xp ′′(x). According to the definition of p(x), we can get that (n − x − i)(n − x − j) ≥ 0. k−1 k−1 ′′(x) = p(x) p i =0 j=0, j(cid:44)i Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim where E[ΛR(v)] = R · E[ Γ(v Si−1)]/ηi is the expected cov- erage of v in R. Then, if v is independent of R, by Lemma A.2, we have where the expectation is over the randomness of both k and Φ. In addition, we already know that E[ηi(1 − p(xv))] = E[ Γ(v Si−1)] ≤ OPTi , (30) , (26) (27) 3Tni . By a union bound that ensures all the ni nodes satisfying Equation (26), we have ∗ Pr(cid:2)¬E1(v Pr[¬E1(u)] · Pr[u] 3T Pr(cid:2)¬E1(v)(cid:3) ≤ δ Pr(cid:2)¬E2(v)(cid:3) ≤ δ t )(cid:3) =  ≤  ≤  u∈U ∗ u∈Ut t u∈Ut = δ/(3T) Pr[¬E1(u)] · Pr[u] δ/(3T) · Pr[u] Meanwhile, v◦ is independent of R naturally. Thus, together with the fact that ΛR(v◦) ≤ ΛR(v∗), by Equation (27) ◦)(cid:3) ≤ Pr(cid:2)¬E2(v ◦)(cid:3) ≤ δ/(3T). Pr(cid:2)E[ΛR(v ◦)] > Λu(v As a consequence, when TRIM stops at Λl(v∗ if the event E(v∗ events E1(v∗ E(v∗ t )/Λu(v◦) ≥ 1−ε, t ) does not happen, then at least one of the t ) and E2(v◦) does not happen. Thus, the event t ) does not happen for all t < T with probability at most: Pr ¬E(v t ) ∗ ≤ (T − 1)( δ 3T + δ 3T ) ≤ 2δ 3 . (28) (cid:21) (cid:20)T−1 t =1 Combining Equations (25) and (28) shows that the event E(v∗) holds with probability at least 1 − δ. Thus, together with the Equation (11) in Corollary 3.4, we have (cid:104) E 1 ∆(v∗ Si−1) (cid:105) ≤(cid:16) (1 − 1/e)(1 − ε) + δ · ηi 1 (1 − 1/e)(1 − ε) · 1 − δ ≤ 1 (cid:17) · ∆(v◦ Si−1) . 1 ∆(v◦ Si−1) Hence, the lemma is proved. □ Proof of Lemma 3.8. For any node v, v is not visited by a random mRR-set R if and only if v (cid:60) R. The probability for not visiting v under a realization ϕ is p(xv), where xv = Iϕ(v Si−1) is the number of nodes that can be activated by v in Gi under ϕ. On the other hand, if a node is visited, all of its incoming edges will be examined. Let indeg denote v the number of v's incoming edges. Then, the expected time complexity for generating a random mRR-set is  v ∈V indeg v · E[1 − p(xv)], (29) 18 Combining (29) and (30) gives  indeg v ∈V Hence, the lemma is proved. v · E[1 − p(xv)] ≤ (cid:115) v ∈V ε2 = a(2 + 2ε2/3) E[ΛR(v∗)] , Proof of Lemma 3.9. Let ε1 = ε/2 and ε2 be the root of indeg v OPTi ηi = OPTi ηi mi . □ where a = c ln(4niT/δ) for any c ≥ 1 and δ = 1/ni. Let . θ ∗ := 12ηi ln(4niT/δ) (1 − ε)ε 2OPTi events E1, E2, E3, E4 as follows: As ε = O(ε), one can verify that θ∗ = O(cid:0) ηi ln ni ⋄)](cid:9), ∗)](cid:9), ∗)](cid:9). ⋄) ≥ (1 − ε1)E[ΛR(v ∗) ≤ E[ΛR(v ∗) ≥ (1 − ε2) · E[ΛR(v ∗) ≤ (1 + ε2) · E[ΛR(v E1 =(cid:8)ΛR(v E2 =(cid:8)ΛR(v E3 =(cid:8)ΛR(v E4 =(cid:8)ΛR(v ∗)] + ε1E[ΛR(v ε2OPTi (cid:1).7 Define the ⋄)](cid:9), Then, when a number of R = cθ∗ mRR-sets are gener- ated, by Lemma A.1, it is easy to verify that any event Ej (1 ≤ j ≤ 4) does not happen with probability at most Pr[¬Ej] ≤(cid:0)δ/4(cid:1)c . By the union bound, the probability that all the events E1, E2, E3, E4 happen is at least 1 − δ c. If the events E1, E2 happen, E[ΛR(S ⋄)] ⋄)] ∗) − ε1 · E[ΛR(v ⋄) − ε1 · E[ΛR(v ∗)] ≥ ΛR(v ≥ ΛR(v ⋄)] − ε1 · E[ΛR(v ≥ (1 − ε1) · E[ΛR(v = (1 − ε) · E[ΛR(v ⋄)], = (1 − ε) · OPTi R. ⋄)] Thus, we have (cid:115) ε2 = a(2 + 2ε2/3) E[ΛR(v∗)] ≤ ηi (cid:114)(2 + 2ε2/3)ε 2 12 < ε/2. (31) In addition, let Λl := (1 + ε2) · E[ΛR(v a higher approximation of 0.5 with O(cid:0) ηi ln ni (cid:1) mRR-sets. 7Without loss of generality, we assume ε ≤ 0.5. If ε > 0.5, TRIM achieves ∗)]. OPTi Efficient Approximation Algorithms for Adaptive Seed Minimization According to the definition of ε2, we have E[ΛR(v ∗)] =(cid:0)(cid:112) ΛR(v∗) + 2a/9 −(cid:112) Λl + 2a/9 −(cid:112) a/2(cid:1)2 − a/18. a/2(cid:1)2 − a/18 − E[ΛR(v ∗) − E[ΛR(v ∗)] Λl(v ≥(cid:0)(cid:112) Since a1 ≤ a, if event E4 happens (i.e., ΛR(v∗) ≤ Λl), then ∗)] ≥ ΛR(v ∗) − Λl . As a consequence, if event E3 also happens, we have ∗). ∗) − ε2E[ΛR(v ∗) ≥ ΛR(v ΛR(v Λl(v ∗)] ≥ 1 − 2ε2 1 − ε2 Similarly, let Since a2 ≤ a, if event E3 happens (i.e., ΛR(v∗) ≥ Λu), then ∗)]. Λu := (1 − ε2) · E[ΛR(v According to the definition of ε2, we have E[ΛR(v Λu(v◦) Λu Λu + a/2 +(cid:112) ∗)] ≥(cid:0)(cid:112) a/2(cid:1)2 (cid:0)(cid:112)ΛR(v∗) + a/2 +(cid:112)a/2(cid:1)2 . (1 − ε2) · E[ΛR(v∗)] ΛR(v∗) (1 − ε2) · Λu . ≤ ≤ As a consequence, we have Λu(v ◦) ≤ ΛR(v∗) 1 − ε2 Λl(v∗) Λu(v◦) ≥ (1 − 2ε2)ΛR(v∗) Putting it all together of (31), (32) and (33), we have · 1 − ε2 ΛR(v∗) ≥ 1 − ε. 1 − ε2 . (33) Therefore, when a number of cθ∗ mRR-sets are generated, TRIM does not stop only if at least one of the events in E1, E2, E3, E4 does not happen, with probability at most δ c. Let t be the first iteration that the number of mRR-sets generated by TRIM reaches θ∗ such that 2t−2 · θ◦ < θ∗ and 2t−1 · θ◦ ≥ θ∗. From this iteration onward, the expected number of mRR-sets further generated is at most 2z · δ 2z 2z−t = 2t−1 · θ◦ θ◦ · 2z−1 · δ   z≥t ∗ ∗ z=0 z=0 . ∗ ≤ 2θ ≤ 2θ ≤ 4θ z=0 2−2z +z 2−z O(cid:0) ηi ln ni (cid:1). θ∗ random samples generated. Therefore, the expected num- ber of random samples generated is less than 5θ∗, which is ε2OPTi Hence, the lemma is proved. □ (32) Proof of Lemma 3.10. The time complexity of TRIM is determined by that for generating mRR-sets. By Wald's equa- tion [44], the expected total time used for generating mRR- sets equals the expected number of mRR-sets generated, times the expected time used for generating one mRR-set. Thus, according to Lemmas 3.8 and 3.9, the expected time complexity of TRIM is O( mi +ni □ ε2 ln ni). Proof of Lemma 4.1. Let S∗ be the seed set returned by the batched policy with S∗ = b and S◦ be the corresponding optimal seed set in the i-th round. Let Eb be the following event: ∗): E[ Γ(S ∗ Si−1)] ≥ ρb(1 − ε)E[ Γ(S Eb(S t be the generalized definition of v∗ Let S∗ t in Section 3.5. If S∗ is returned at T -th iteration, based on the setting of T and by [40], we still have ◦ Si−1)]. Pr[(t = T) ∧ ¬Eb(S (34) If TRIM-B stops at the iteration t < T , for any node S ⊆ Vi obtained by greedy method with S = b, we define two events Eb,1(S) and Eb2(v) as t )] ≤ δ/3. ∗ ΛR(S) + 2a1/9 −(cid:112) ΛR(S)/ρb + a2/2 +(cid:112) a1/2(cid:1)2 − a1/18, a2/2(cid:1)2 Eb,1(S) : E[ΛR(S)] ≥(cid:0)(cid:112) Eb,2(S) : E[ΛR(S)] ≤(cid:0)(cid:112) . b δ (35) Based on Lemma A.2, we could have b node set, we could immediately have where E[ΛR(S)] = R · E[ Γ(S Si−1)]/ηi is the expected coverage of S in R. Pr(cid:2)¬Eb,1(S)(cid:3) ≤ 3T(cid:0)ni (cid:1) . Similarly, by union bound for all(cid:0)ni (cid:1) candidates of size-b t )(cid:3) ≤ δ/(3T). Pr(cid:2)¬Eb,1(S (36) Let S◦ R be the size-b seed set that could cover largest number of mRR-sets in R. Since S is derived by Greedy method from R, by the property of greedy method, we have ΛR(S) ≥ ρb ΛR(S◦ R) ≥ ρb ΛR(S◦). Then ΛR(S)/ρb can be taken as the upper bound of ΛR(S◦). Similarly, by Lemma A.2, we have following equation ∗ Pr(cid:2)¬Eb,2(S ◦)(cid:3) ≤ δ/(3T). (37) By following the analysis in Section 3.5, we acquire the fact that event Eb holds with at least 1 − δ probability where The first inequality is due to 2t−1 · θ◦ < 2θ∗ and δ ≤ 1/2, and the second inequality is due to −2z + z ≤ −z. If the algorithm stops before the t-th iteration, there are at most 19 Jing Tang, Keke Huang, Xiaokui Xiao, Laks V.S. Lakshmanan, Xueyan Tang, Aixin Sun, and Andrew Lim (a) NetHEPT (a) NetHEPT (b) Epinions (c) Youtube Figure 9: Spread vs. threshold under the IC model. (b) Epinions (c) Youtube Figure 10: Marginal truncated spread under the IC model. (d) LiveJournal (d) LiveJournal δ = 1/ni. By Corollary 3.4, the expected approximation ratio of TRIM-B is at least (1 − δ) · (1 − ε) · ρb · (1 − 1/e) = ρb(1 − 1/e)(1 − ε). Hence, the lemma is proved. □ C DISCUSSIONS ON INFLUENCE SPREAD Figure 9 reports the spread of the tested algorithms under the IC model (results under the LT model are similar). For the most parts, all the algorithms achieve a comparable spread on the four datasets. The major differences lie in η/n = 0.01 on Epinions and Youtube. As observed, ASTI-8 (resp. ATEUC) achieves the largest (resp. smallest) spread among all algo- rithms. This is because the batch size b is relatively large with regard to the small threshold, owing to which the spread of the 8-size seed set selected by ASTI-8 significantly over- shoots 0.01n on Epinions and Youtube. Another interesting observation is that the spread achieved by ATEUC is slightly larger than each of the other five adaptive algorithms as the threshold becomes larger (not quite noticeable in the figure). This is because ATEUC selects considerably more seeds than the adaptive algorithms do, resulting in a larger spread at the cost of an excessive number of seeds. This is also supported by the results in Table 3. D DISCUSSIONS ON MARGINAL TRUNCATED SPREAD To explore the property of the marginal truncated spread, we record the marginal spread of each seed node selected by adaptive algorithms under the 20 realizations sampled. Figures 10 shows the result of each realization with η/n = 0.2 on corresponding datasets (or η/n = 0.05 on the LiveJournal dataset) under the IC model. (The result under the LT model is similar.) In general, the marginal spread diminishes along the index of the seed node, which is consistent with the property of submodularity as expected. Note that the spread fluctuation is due to the randomness of the tested realizations, i.e., in some particular realizations, some seed node selected later may influence more nodes than some seed node selected earlier. 20 ATEUCASTIASTI-4 ASTI-2ASTI-8 ADAPTIM1021031040.010.050.10.150.2threshold η/nspread1031041050.010.050.10.150.2threshold η/nspread1041051060.010.050.10.150.2threshold η/nspread1041051060.010.020.030.040.05threshold η/nspread 0 40 80 120 160 0 50 100 150 200 250 300seed indexspread 0 20 40 60 80 0 20 40 60 80 100 120 140seed indexspread (102) 0 10 20 30 40 0 30 60 90 120 150seed indexspread (103) 0 10 20 30 0 100 200 300 400 500seed indexspread (103)
1907.04503
1
1907
2019-07-10T04:13:43
Pairwise Link Prediction
[ "cs.SI", "physics.soc-ph" ]
Link prediction is a common problem in network science that transects many disciplines. The goal is to forecast the appearance of new links or to find links missing in the network. Typical methods for link prediction use the topology of the network to predict the most likely future or missing connections between a pair of nodes. However, network evolution is often mediated by higher-order structures involving more than pairs of nodes; for example, cliques on three nodes (also called triangles) are key to the structure of social networks, but the standard link prediction framework does not directly predict these structures. To address this gap, we propose a new link prediction task called "pairwise link prediction" that directly targets the prediction of new triangles, where one is tasked with finding which nodes are most likely to form a triangle with a given edge. We develop two PageRank-based methods for our pairwise link prediction problem and make natural extensions to existing link prediction methods. Our experiments on a variety of networks show that diffusion based methods are less sensitive to the type of graphs used and more consistent in their results. We also show how our pairwise link prediction framework can be used to get better predictions within the context of standard link prediction evaluation.
cs.SI
cs
PA I RW I S E L I N K P R E D I C T I O N Huda Nassar, Austin R. Benson, David F. Gleich 9 1 0 2 l u J 0 1 ] I S . s c [ 1 v 3 0 5 4 0 . 7 0 9 1 : v i X r a Link prediction is a common problem in network science that transects many disciplines. The goal is to forecast the appearance of new links or to find links missing in the network. Typical methods for link prediction use the topology of the network to predict the most likely future or missing connections between a pair of nodes. However, network evolution is often mediated by higher-order structures involving more than pairs of nodes; for example, cliques on three nodes (also called triangles) are key to the structure of social networks, but the standard link prediction framework does not directly predict these structures. To address this gap, we propose a new link prediction task called "pairwise link prediction" that directly targets the prediction of new triangles, where one is tasked with finding which nodes are most likely to form a triangle with a given edge. We develop two PageRank-based methods for our pairwise link prediction problem and make natural extensions to existing link prediction methods. Our experiments on a variety of networks show that diffusion based methods are less sensitive to the type of graphs used and more consistent in their results. We also show how our pairwise link prediction framework can be used to get better predictions within the context of standard link prediction evaluation. 1 introduction Networks are a standard tool for data analysis in which links between data points are the primary object of study. A fundamental problem in network analysis is link prediction [Liben-Nowell and Kleinberg, 2007; Lü and Zhou, 2011], which is typically formulated as a problem of identifying pairs of nodes that will either form a link in the future (when viewing the network as evolving over time) or whose connection is missing from the data [Clauset et al., 2008]. The link prediction problem has applications in a variety of domains. For instance, in online social networks of friendships, predicting that two people will form a connection can be used for friendship recommendation [Backstrom and Leskovec, 2011]. Similarly, predicting new links between users and items on platforms such as Amazon and Netflix can be used for product recommendation [Gomez-Uribe and Hunt, 2015]. And in biology, link prediction is used to identify novel interactions between genes, diseases, and drugs within interaction networks [Lin et al., 2018]. In the settings above, the link prediction problem is oriented around -- and evaluated in terms of -- the identification of pairs of nodes that are likely to be connected. However, there is mounting evidence that the organization and evolution of networks is centered around higher-order interactions involving more than two nodes [Milo et al., 2002; Milo, 2004; Benson et al., 2016, 2018; Lambiotte et al., 2019]. In the case of social networks, triangles (cliques on three nodes) are extremely common due to various sociological mechanisms driving triadic closure [Easley et al., 2010; Holland and Leinhardt, 1977; Granovetter, 1977; Rapoport, 1953]. Methods for link prediction are indeed motivated by these ideas. For instance, the Jaccard similarity between the sets of neighbors of two nodes -- a common heuristic for link prediction [Liben-Nowell and Kleinberg, 2007] -- measures the number of triangles that would be created if the two nodes are linked, normalized by the total number 1 Huda Nassar, Purdue University [email protected] Austin R. Benson, Cornell University [email protected] David F. Gleich, Purdue University [email protected] of neighbors of the two nodes. Still, such methods are used to make predictions on pairs of nodes, rather than a prediction on the appearance of the higher-order structures directly. Here, we develop a framework for directly predicting the appearance of a higher-order structure. We focus on the case of triangles, which is one of the simplest higher-order structures while also being critical to social network analysis. Again, classical link prediction is centered around the following question: given a node u in the network, which nodes are likely to link to u? This scenario is illustrated in Figure 1A. Our framing of the problem is similar, but we instead ask the following: given an edge (u, v) in the network, which nodes are likely to connect to both u and v? We call this the pairwise link prediction problem, and it is illustrated in Figure 1B. There are several scenarios where the pairwise link prediction problem is natural, such as recommending a new friend to a couple on an online social network, recommending a movie to a couple in a video site, or predicting an effective drug given a disease-gene pair. We devise two new algorithms for the pairwise link prediction problem. The first is based on a variant of seeded (personalized) PageRank that uses multiple seeds, namely, one seed at each end point of the edge for which we are trying to predict new triadic connections. The second is based on a PageRank-like iteration that puts more weight on edges that participate in many triangles. In this sense, the method reinforces triangles, and we call the method "Triangle Reinforced PageRank" (TRPR). We compare these algorithms to natural extensions of local similarity measures that are common in link prediction, such as Jaccard similarity [Liben- Nowell and Kleinberg, 2007], Adamic-Adar similarity [Adamic and Adar, 2003], and preferential attachment [Newman, 2001]. For a given edge, each of the above methods produces a score for the remaining nodes in the graph. We find that our proposed diffusion based methods are the least sensetive to the graph type and degree distribution and often produce the top results. We provide code for all the methods used in this paper in the repository: https://github.com/nassarhuda/pairseed 2 background and related work We now briefly review some related work in link prediction and higher-order structure. As part of this, we will go over methods that we will generalize in the next section for the pairwise link prediction problem. All of these methods assign some similarity score between pairs of nodes, where a larger similarity is indicative of pairs that are likely to connect. For notation, we use Γ(u) to denote the set of neighbors of node u in the graph. 2.1 LOCAL METHODS Several approaches to link prediction are based on local information in the graph, namely a score is assigned to a pair of nodes w and u based on their 1-hop neighborhoods Γ(w) and Γ(u). One approach that falls under this category stems from the idea that as Γ(w)∩Γ(u) increases, the chance that u and v are connected also increases [Newman, 2001]. Here, Γ(w)∩ Γ(u) is the number of triangles that would be formed if u and v were connected. Often, this number is normalized by the size of the neighborhoods, which gives rise to the Jaccard similarity between two nodes w and u: Γ(w) ∩ Γ(u) Γ(w) ∪ Γ(u) . The Adamic -- Adar similarity measure [Adamic and Adar, 2003] is a local score that assigns similarity between two nodes based on how important their common neighbors are, where importance is measured by the degree of a given node. 2 FIGURE 1 -- (A) In standard link pre- diction, we are tasked with finding nodes that are likely to link to a given node u. (B) In this paper, we study pairwise link prediction, where we are tasked with finding nodes that are likely to form a triangle with a given edge (v, w). ABuvw Formally, the Adamic -- Adar similarity measure between nodes u and v is: (cid:88) 1 log(Γ(z)) . z∈Γ(w)∩Γ(u) A third local method is based on preferential attachment, where nodes are more likely to connect to established nodes in the network, and, established nodes have a higher chance to connect to each other [Barabási and Albert, 1999; Newman, 2001]. Using degree as a proxy for how established a node is, the preferential attachment score between nodes w and u is: Γ(w) · Γ(u). 2.2 GLOBAL METHODS Another set of approaches for link prediction are based on aggregating (weighted or normalized) path counts of varying lengths. In contrast to the local methods described above, these methods use global information about the entire network. For example, the Katz similarity counts the number of paths between two nodes, weighting paths of length-k by βk [Katz, 1953; Liben-Nowell and Kleinberg, 2007]. Another class of global methods are methods based on conservative diffusions such as PageRank [Page et al., 1999]. Such diffusion methods are typically seeded by a particular node u, and the similarity of u to all other nodes is given by the amount of "mass" that diffuses to each other node. We will make use of PageRank-like methods in the next section. 2.3 HIGHER-ORDER STRUCTURE Since a network encodes pairwise relationships (edges) between elements (nodes), the link prediction problem is natural in many cases. Nevertheless, recent studies have shown that networks evolve through higher-order interactions, i.e., much of the structure in evolving networks involves interactions between more than just two nodes [Benson et al., 2018]. Recent research has also introduced the problem of predicting the time when an edge addition will close a triangle [Dave and Hasan, 2019]. Furthermore, random graph models constructed from distributions of triangles have shown to be good fits for real-world data [Eikmeier et al., 2018], providing additional evidence that triadic relationships are important to the assembly of networks. 3 methods We propose several methods for the pairwise link prediction problem. First, we extend the three local methods described above to measure node-edge similarity. After, we propose diffusion-based methods akin to seeded PageRank. 3.1 LOCAL SIMILARITY MEASURES FOR PAIRWISE PREDICTION Our goal here is to extend common local methods for link prediction to the scenario of pairwise link prediction. In other words, instead of computing similarity between nodes, we now compute similarity between an edge and a node. To do this, we simply replace the neighborhood of one node with the neighborhood of an edge. This requires that we specify what the neighborhood of an edge (u, v) should capture. We define: Γ((u, v)) = {node z z is connected to either or both nodes u, and v} = Γ(u) ∪ Γ(v) \ {u, v}. Note that this is akin to the boundary of a set of vertices in the graph that is often used to define the size of a cut, which -- for an edge -- would correspond to the union of neighborhoods. This definition is contrary to what we use in [Nassar 3 et al., 2019], where we define the neighborhood to be the intersection. Initially, the intersection of neighborhoods was a natural choice, but in practice the intersection set is very limiting specially in scenarios when an edge is connected to the rest of the graph, yet does not participate in any triangles. We should still be able to make predictions on such edges, and our choice of the union of neighborhoods handles this. Using the substitution gives us three similarity measures that will compute the similarity of an edge to a node. · Jaccard Similarity (JS). JS(w, (u, v)) = Γ(w) ∩ Γ((u, v)) Γ(w) ∪ Γ((u, v)) · Adamic -- Adar (AA). AA(w, (u, v)) = (cid:88) 1 logΓ(z) z∈Γ(w)∩Γ((u,v)) · Preferential Attachment (PA). PA(w, (u, v)) = Γ(w) · Γ((u, v)) Further, we extend the Jaccard Similarity and Adamic -- Adar measures to account for a combination of the single link prediction results. We use the maximum value of the single similarity score of both end points of an edge (u, v) with another node w, as well as the product of similarity values. We state these measure below. · Jaccard Similarity. JS -- MAX(w, (u, v)) = max(JS(w, u), JS(w, v)) JS -- MUL(w, (u, v)) = JS(w, u) · JS(w, v) · Adamic -- Adar. AA -- MAX(w, (u, v)) = max(AA(w, u), AA(w, v)) AA -- MUL(w, (u, v)) = AA(w, u) · AA(w, v) Next, we develop two new methods for pairwise link prediction based on seeded PageRank, and use a combination of the single seeded PageRank results to compute a new measure of similarity between an edge and a node. 3.2 PAIR-SEEDED PAGERANK Seeded PageRank is a foundational concept in network analysis that models a flow of information in a network to predict links and communities on a network [An- dersen et al., 2006; Gleich, 2015]. Seeded PageRank models information flow from the seed node to other nodes in the network via a Markov chain, and the stationary distribution of the chain provides the scores on the nodes. A high score on a node is a signal that the node should be connected to the seed node. More formally, let A be the symmetric adjacency matrix of an undirected graph, and let P be the column stochastic matrix of a random walk on that graph. Specifically, P (i, j) = A(i, j)/Γ(j). Let u be the seed node. Then the seeded PageRank scores are entries of the solution vector x to the linear system (I − αP )x = (1 − α)eu. Here, eu is the vector of all zeros, except at index u, where eu(u) = 1 (i.e., eu is the indicator vector on node u). The parameter α is the probability of transitioning according to the probability distribution in P and (1 − α) is the probability of teleporting according to the probability distribution in eu. The 4 entries of x provide similarities between node u and the other nodes and thus can be used for standard link prediction. In the same way seeded PageRank predicts the relevance of other nodes in the network to a single seed node, we propose pair-seeded PageRank to predict the relevance of nodes to a single edge; with these similarities, we are able to make predictions for the pairwise link prediction problem. For a given edge (u, v), pair-seeded PageRank solves the following linear system: (I − αP )x = (1 − α)eu,v. In this case, eu,v is the vector of all zeros, except at indices u and v, where eu,v(u) = eu,v(v) = 1/2. The solution x can be interpreted as the similarity of each node to the edge (u, v). We now note that pair-seeded PageRank is equivalent to the sum of single- seeded PageRank on each of the nodes, up to a scalar multiple. This follows quickly from linearity of the PageRank problem. To see this, let xu and xv be the seeded PageRank solutions corresponding to nodes u and v respectively. Then, Adding the above two equations yields (I − αP )xu = (1 − α)eu (I − αP )xv = (1 − α)ev (I − αP )(xu + xv) = (1 − α)(eu + ev) (I − αP )(xu + xv) = (1 − α)(2eu,v) (I − αP )(xu + xv) = (1 − α)eu,v (I − αP )x = (1 − α)eu,v 1 2 Hence, 2x = xu + xv, and the pair-seeded PageRank solution is equivalent to the summation of the single seeded PageRank equations, up to scaling. Indeed, this is a useful and helpful observation as there are many systems designed to estimate large seeded PageRank values for single-seeds by using highly scalable random walk methods [Lofgren et al., 2016]. Thus, this technique could be used wherever a PageRank-style prediction is already employed. 3.3 TRIANGLE REINFORCED PAGERANK (TRPR) We now propose a PageRank-like method that uses a weighting scheme on edges based on the number of triangles that contains each edge, which we call Triangle Reinforced PageRank (TRPR). For an unweighted graph, the PageRank solution is highly affected by the degree of nodes in the network. Here, we reinforce the influence of triangles by giving edges participating in many triangles a higher weight. Figure 2 presents a motivating example for the usefulness of reinforcing triangles. To develop our TRPR method, we first introduce a tensor T , that encodes all triangles in a network: (cid:40) T (i, j, k) = 1 if (i, j, k) is a triangle 0 otherwise. we compute the matrix X = T [x], where X(i, j) = (cid:80) Again, in our derivation, we assume that the graph is undirected so that T is fully symmetric in all permutations of indices. A typical way to solve the PageRank linear system is the power method. With TRPR, we modify the power method by adding a step that redistributes the weights in the network. Specifically, k T (i, j, k)x(k), which measures the relevance of edge (i, j) to the distribution of node scores in the vector x. We then run an iteration of the power method on a weighted adjacency 5 FIGURE 2 -- Motivating social network example for the TRPR algorithm. If all of the friends of the blue couple know the red node, we want to predict that the red node must know the blue couple as well. Running TRPR on the above example with eu,v as the seed vector on the blue nodes reveals that the red node has the third highest score after the two blue nodes. After 10 iterations of Algorithm 1 with α = 0.85, the output vector assigns a score of 0.120 to the red node, 0.062 to the black nodes, and 0.252 to the blue nodes. Algorithm 1: TRPR Input: T , adjacency matrix of undirected graph A, α, eu,v, nb. iterations n Output: x x0 = eu,v for i = 1, 2, . . . , n do r,s =(cid:80) k T (r, s, k)xi−1(k) + A) # column stochastic (i) = T [xi−1] # i.e., X (i) X P i = normalize( X xi = αP ixi−1 + (1 − α)x0 (i) return xn matrix X = X + A, where the columns are re-normalized to make the matrix column stochastic. Algorithm 1 shows the idealized algorithm. TRPR can be implemented efficiently. Although TRPR involves the tensor T , we do not need to form it explicitly, and we show an alternative derivation here. We first unwrap one iteration of TRPR. Let Ai = T [xi−1] + A, then, at iteration i, we can translate xi = αP ixi−1 + (1 − α)x0 into xi = α((T [xi−1] + A)D−1 Ai )xi−1 + (1 − α)x0 where D−1 is a diagonal matrix with the ith diagonal entry being the inverse of the sum of edge weights connected to node i in Ai (again, we assume a connected graph so these values are all non-zero). Then, Ai xi = αT [xi−1]D−1 Ai xi−1 + αAD−1 Ai xi−1 + (1 − α)x0. Set yi−1 = D−1 Ai xi−1. Then xi = αT [xi−1]yi−1 + αAyi−1 + (1 − α)x0. j Ai (cid:80) zi = (cid:80) and The relevant computationally expensive pieces to compute are T [xi−1]yi−1 the entries of D−1 . Both involve the same type of operation. Using the definition of T [x] we have that the matrix-vector product z = T [x]y has k T (i, j, k)y(j)x(k). Consequently, if we have any means of iterat- ing over the triangles of a graph, then we can compute T [x]y for any pair x and y in a fashion akin to a sparse-matrix-vector product but in runtime proportional to the number of triangles in the graph. Ai Ai This directly enables us to compute T [xi−1]yi−1 . To compute the entries in D−1 , note that T [x] is a symmetric matrix because it can be written as a sum of symmetric matrices (since T is fully symmetric in all permutations). Thus, the row-sums of Ai are the vertex-degrees we need to build D−1 . Let e be the vector of all ones; these row sums are computed as Aie = T [xi]e + Ae. Since A is not changing, we only need to compute the column sums of T [xi]e at each iteration. Again, we can use an implicit tensor-vector-vector product operation to compute the column sums. And thus, all operations involving the tensor T are linear in terms of the number of triangles in the network, and we use a fast routine to iterate through triangles in a graph. For ease of reuse, we provide the code for TRPR at https://github.com/nassarhuda/pairseed/blob/master/trpr.jl. We experimentally validate the running time of TRPR on a preferential attachement graph while varying the size of the graph. We specifically use the generalized preferential attachment model [Avin et al., 2015] that generalizes the classical preferential attachment model [Newman, 2001]. In this experiment we vary the edge addition probability pe, and allow the node addition probability to be 1 − pe. Figure 3 shows the running time in seconds and empirically verifies that TRPR is a fast method when implemented efficiently and thus, is scalable to large graphs. A weighted version of TRPR. Although TRPR introduces higher weights to edges participating in many triangles by forming a new adjacency matrix 6 FIGURE 3 -- Time in seconds as we run TRPR for 10 iterations on generalized preferential attachement graphs as we vary the size of the network and the edge addition probability. 0.50.60.70.80.9edge addition prob100020005000100002000050000100000number of nodes0.20.010.040.120.544.1215.760.030.020.060.160.614.4516.140.010.030.080.20.774.9417.610.020.050.120.31.025.3119.120.020.050.160.391.36.3821.55 Algorithm 2: TRPR-Weighted Input: T , adjacency matrix of undirected graph A, α, eu,v, nb. iterations n Output: x x0 = eu,v for i = 1, 2, . . . , n do r,s =(cid:80) (i) = T [xi−1] # i.e., X (i) X γ = sum(A)/sum( X P i = normalize(γ X xi = αP ixi−1 + (1 − α)x0 return xn k T (r, s, k)xi−1(k) (i) (i) ) + A) # column stochastic X + A, these weights are often dominated by the weights in the adjacency matrix A. To give a fair contribution to these edges, we introduce a scalar multiple to X. A straightforward scalar we choose is γ = sum(A)/sum( X). This scalar will guarantee that the sum of weights in A and γ X are equal. We present the idealized algorithm of the weighted version of TRPR in Algorithm 2. Convergence of TRPR. Convergence of this type of nonlinear system of equations is theoretically delicate with bounds that are often insufficient for practice [Benson et al., 2017]. Empirically, we observe that the iterations converge. However, absent a robust theory, this method is only run for a small and fixed number of iterations (10). This will produce a unique deterministic and reproducible set of scores that locally capture the influence of both the graph and the reinforced triangles. In Figure 4, we show the 1-norm difference decay from two consecutive iterates from TRPR on 4 datasets used in the experiments section. Figure 4 shows that the method converges experimentally. Even though the norm convergence seems to happen after around 100 iterations in these datasets, the ordering of nodes in these vectors does not change much after a few iterations. We run another experiment to study the ordering of the nodes from every iteration and notice that the order does not change much after just a few iterations. In Figure 5, we show the Spearman's rank correlation coefficient and the Kendall rank correlation coefficient between two consecutive iterates from TRPR on the same four graphs used in Figure 4. We notice that after a few iterations (10) the orderings of the vectors no longer change, and especially the order of the top 100 nodes does not change (solid lines in the plot in Figure 5). 3.4 EXTENSIONS OF SINGLE-SEEDED PAGERANK We also use the single seeded PageRank solution of each endpoint of the edge we are interested in predicting links to and produce two more metrics for relating an edge to a node. Denote xu, and xv to be the seeded PageRank solutions for nodes u and v respectively. Then, we define MAX and MUL as follows. MAX(u, v) = max(xu, xv) (element-wise maximum) MUL(u, v) = xu (cid:12) xv (element-wise multiplication) 4 experimental setup We now perform a series of experiments on synthetic as well as real-world graphs from a variety of disciplines, including online social networks, communication networks, and biological interaction networks. We also include experiments for static networks as well as a temporal network. For evaluation, we use the Success Probability (SP) measure, which we define for one experiment as follows: 7 FIGURE 4 -- 1-norm convergence of TRPR on 4 datasets used in the ex- periments section. These figures show that TRPR converges experimentally. FIGURE 5 -- Spearman's rank correla- tion coefficient and the Kendall rank correlation coefficient between two consecutive iterates from TRPR. The solid plots show the consecutive cor- relation values when truncating the vectors to take the top 100 nodes, and the dashed lines compare the order- ings in the full vectors. The vertical red line represents the 10th iterate. The text in the figures is the corre- lation between the 10th iterate and the 200th iterate. These correlations support our choice of 10 iterations in the experiments involving TRPR. 05010015020010151010105100norm differencePP-Pathways1e-4.81e-7.61e-9.21e-10.81e-12.405010015020010151010105100email1e-3.81e-6.51e-9.21e-11.81e-14.4050100150200iteration10151010105100norm differenceGPA1e-3.31e-6.51e-9.31e-12.11e-14.7050100150200iteration10151010105100FB-Penn1e-4.01e-7.01e-9.91e-12.91e-15.801020300.000.250.500.751.00correlation valuePP-PathwaysCorrelation(iter10,iter200)Spearman = 1.0Kendall = 1.0SpearmanKendallSpearman-top100Kendall-top10001020300.000.250.500.751.00emailCorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.99SpearmanKendallSpearman-top100Kendall-top1000102030iteration number0.000.250.500.751.00correlation valueGPACorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.98SpearmanKendallSpearman-top100Kendall-top1000102030iteration number0.000.250.500.751.00FB-PennCorrelation(iter10,iter200)Spearman = 1.0Kendall = 0.98SpearmanKendallSpearman-top100Kendall-top100 1 if at least one ground truth node w appears in the top k predictions for edge (u, v) 0 otherwise. SP((u, v), k) = Note that the top k predictions is the set of k nodes that are not connected to either end point of the seed edge with the highest scores. For our experiments, we will have training data and validation data, and the ground truth nodes that should be connected to an edge from the training data can be deduced from the validation data. For each training dataset, we run 500 random experiments, where we try to predict links to 500 randomly chosen edges (we call them seed edges). For each experiment, an SP value (0 or 1) is computed, and the overall score is the mean value over all the experiments. The main choice for this measure in contrast to the area under ROC curve (AUC score) measure for instance, is the small number of nodes that we often want to recover. For a given edge (u, v) in the training data, the validation data must have the edges (u, w) and (v, w) for w to be considered a correct ground truth node for recovery. In subsequent sections, we will see that the number of nodes that satisfy this property in the validation data is often small (1 in most instances), and thus a measure such as the AUC score does not fully capture the performance of our methods. 4.1 LEAVE ONE EDGE'S TRIANGLES OUT (LOETO) The LOETO experiments are akin to the leave-p-out cross validation metric, in the sense that we will use p edges as a validation set and the remaining edges of the network as a training set; here, p = (2 × number of nodes that form a triangle with a randomly chosen edge). An experimental trial in this setting is designed as follows. Randomly pick an edge in the graph (call it the seed edge) and find all the wedges (path of length 2) that form a triangle with this edge. Next, drop all these wedges and place them in the validation set. Figure 6 visualizes this experiment. The graph used will be the one in panel B of Figure 6 (the grey dashed edges no longer appear in the network and the goal is to recover the connections with the green nodes in the graph). We then use the pairwise link prediction methods on the seed edge, which produces an ordering on the nodes, and given this ordering, we compute the success probability. Since this method leaves a big portion of the graph in the training data, we compute its Success Probability with top k = 5. 4.2 HOLD-OUT CROSS VALIDATION The hold-out cross validation method that keeps a certain percentage of the data as training set and the remaining set as validation is a standard way of evaluating the classical link prediction problem. In this setup, for a given network, we remove 30% of the edges and label them as validation data, and use the remaing 70% as training data to make predictions. Then, for random edges in the training data (seed edges), we use the pairwise link prediction methods to predict which nodes will form triangles with each edge that is selected. Again, for a given edge, each method produces a similarity score on all nodes, and we use the ordering of the nodes induced by the scores to calculate the Success Probability with top k values = 5, 25. We also perform a similar experiment on temporal networks with timestamps on the edge arrivals. In this scenario, the dropped 30% edges are not chosen at random. Instead, we split the data into training and test sets based on the time -- the first 70% of the edges to appear in time are the training data and the remaining 30% are the test data. In this set of experiments, we perform one more processing step to guaran- tee that the network we will use for training is connected. If the network is disconnected, we extract the largest connected component. 8 FIGURE 6 -- Illustration of the Leave One Edge's Triangles Out (LOETO) exper- iment. For a given graph (subfigure A), randomly pick an edge (red edge in subfigure B) and remove all edges that form a triangle with it (dashed gray lines in subfigure B). Run all our methods on this new graph. The nodes to predict are the green nodes. (A)(B)(C) 4.3 SUMMARY OF METHODS AND PARAMETER SETTINGS Finally, we summarize all of the methods that we use for pairwise link prediction. · Pairseed: This is our method described in Section 3.2. We use the imple- mentation from MatrixNetworks.jl [Nassar and Gleich, 2018] with α = 0.85. This implementation solves the linear system until convergence to machine precision. · TRPR: This is our method described in Section 3.3. We use α = 0.85 and number of iterations n = 10. · TRPRW: This is the modified weighted version of the TRPR algorithm described in Section 3.3 as well. We use α = 0.85 and number of iterations n = 10. · MUL, MAX: These are the methods from Section 3.4 that extend the single-seeded PageRank solutions. We use the same implementation used by Pairseed, with α = 0.85. · AA, PA, JS: For a seed edge, we compute the generalized Adamic-Adar, Preferential Attachment, and Jaccard similarity scores, respectively (as presented in Section 3.1) between the seed edge and all remaining nodes in the graph. · AA -- MUL, AA -- MAX, JS -- MUL, JS -- MAX: These are the methods from Section 3.1, and they use the single node similarity from both endpoints of a seed edge to compute a new measure of similarity. 5 pairwise link prediction results In all of the results in this section, we report the success probability from our predictions over 500 random experiments. We use seven real-world graphs from different disciplines in this section and give a summary of their statistics in Table 1. We also use a synthetic graph generated from the generalized preferential attachment model (GPA) [Avin et al., 2015]. Synthetic graph. Generalized Preferential Attachment (GPA) [Newman, 2001] is a synthetic graph generation model that generalizes the classical preferne- tial attachment model to allow for the addition of new components at each step of the algorithm. For our experiments, we generate a graph with 5000 nodes and allow the event of node addition with probability 1/2, and we allow the event of edge addition with probability 1/2. The starting graph structure is a clique of size 5. At each step of the graph generation process, an edge or node is added by attaching proportionally to the degrees of the existing nodes. Real world graphs. We use various real world graphs to test our methods and provide statistics about them in Table 1. Penn94 and Caltech36 are online social networks from the Facebook100 collection of datasets [Traud et al., 2011]. These two datasets are the biggest and smallest networks in terms of number of nodes respectively from this collection. Ch-Ch-Miner is a biological network of drug (chemical) interactions [Wishart et al., 2017; Stanford SNAP Group, 2017]. P-P-Pathways is a biological network of physical interactions between proteins in humans [Agrawal et al., 2018]. email is an email communication network [Guimerà et al., 2003]. Finally, CollegeMsg [Panzarasa et al., 2009] and email-EU [Panzarasa et al., 2009] are temporal networks representing private messages (CollegeMsg) or emails (email-EU) between users in a network. Results. We show the results of all methods in Figures 7, 8, 9, and 10. Overall, we notice that the diffusion methods have more consistency in performance compared to local measures. For instance, AA-MUL -- which is one of the best performers on some datasets (P-P-Pathways in top 25 and top 5 metrics) -- drops 9 Ch-Ch-Miner (Bio) nodes = 1510 edges = 48512 triangles = 569466 median(nodes to predict) = 3 P-P-Pathways (Bio) nodes = 21521 edges = 338624 triangles = 2394642 median(nodes to predict) = 2 Facebook - Penn94 (social) nodes = 41536 edges = 1362220 triangles = 7207796 median(nodes to predict) = 2 Facebook - Caltech36 (social) nodes = 762 edges = 16651 triangles = 119562 median(nodes to predict) = 2 email (communication) nodes = 1133 edges = 5451 triangles = 5343 median(nodes to predict) = 1 GPA graph (synthetic) p(node addition) = 0.5 p(edge addition) = 0.5 triangles = 5897 median(nodes to predict) = 1 FIGURE 7 -- Success probability results for the two biological datasets. In both datasets, we notice that TRPRW outperforms the remaining diffusion type methods and performs best on the top k predictions metric on the Ch-Ch-Miner dataset. Another method that stands out in these two datasets is AA-MUL which is the best method in terms of top k predictions in the P-P-Pathways dataset, with TRPRW performing worse than AA-MUL by around 5% on the top k measures. FIGURE 8 -- Success probability results for the two social networks datasets. In both datasets, we notice that local methods generally outperform diffusion type methods. This is mainly due to how social networks grow and the influence of neighbors of nodes for making new connections. Here too, TRPRW outperforms other diffusion type methods and produces comparable results to the best local methods on the top 25 and LOETO measures. FIGURE 9 -- Success probability results for the two networks, email and an instance of a GPA graph. We group these two graphs together because they have a very small number of trian- gles compared to the other networks. In these datasets TRPRW does not contribute an im- provement over the other diffusion type methods. In the email network, TRPR performs best in the top k metric, and TRPRW performs best after the PA method on the GPA graph. 10 top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.860.860.870.860.860.870.570.830.840.890.710.780.630.640.710.610.660.650.280.570.580.650.410.460.940.940.940.930.950.930.750.860.90.920.770.83top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.630.640.630.60.640.650.270.640.640.680.60.660.290.310.50.270.340.50.070.480.470.530.430.50.550.550.610.520.610.690.380.650.680.650.560.57top 5top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.670.670.720.660.670.710.050.70.650.80.680.790.270.280.490.240.340.510.030.510.460.560.440.560.510.520.680.420.670.780.160.80.760.770.730.86top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.760.770.820.760.780.880.480.870.840.90.840.90.480.490.610.480.510.640.190.650.60.690.530.630.950.960.970.950.960.980.80.960.960.970.910.96top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.790.790.730.790.780.780.170.750.750.70.720.690.50.490.440.50.480.530.060.50.50.510.430.470.740.740.690.750.720.790.160.740.730.680.620.61top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.770.760.780.780.730.710.810.510.70.70.260.430.540.540.60.560.50.510.610.330.50.520.120.20.880.880.890.910.870.890.930.520.880.840.350.42 TABLE 1 -- Statistics of the real-world datasets used in this paper. Network name Penn94 Caltech36 Ch-Ch-Miner P-P-Pathways email CollegeMsg Email-EU nodes 41536 762 1510 21521 1133 1899 1005 edges 1362220 16651 48512 338624 5451 13838 32128 triangles 7207796 119562 568466 2394642 5343 14319 105461 type Social Social Biology Biology Communication Temporal Temporal CollegeMsg (temporal) nodes = 1899 edges = 13838 triangles = 14319 median(nodes to predict) = 1 Email-EU (temporal) nodes = 1005 edges = 32128 triangles = 105461 median(nodes to predict) = 1 FIGURE 10 -- Binary Mean Value results for the two temporal networks, CollegeMsg and Email- EU. The results on temporal networks are generally worse than the results on static networks, and this can be an indicator that our methods are stronger in predicting missing links rather than future links. to be one of the worst performers in the top 25 metric on the email dataset. PA is the best performer on the GPA model, but drops to be the worst performer on all other graphs. In cotrast, TRPRW performs best on the Ch-Ch-Miner and email datasets but never drops to be one of the worst methods on any of the datasets. Temporal graphs (CollegeMsg and Email-EU) both suffered from lower top k scores as compared to static graphs, which suggests that our methods are possibly stronger in detecting missing links rather than future links. Upon further investigation on the temporal graphs, we found that most of the top k predictions were at least two hops away from the seed edges. In the temporal data, these wedges (length-2 paths) did not close to form triangles and thus the prediction was incorrect according to the timestamped data. TRPRW seemed to improve the performance of TRPR in general but did not contribute an improvement on the email and GPA networks. Upon looking closely at these two networks, we found that the number of triangles is very small and thus using the unweighted TRPR version which is close in performance to Pairseed, is more ideal on datasets that do not contain many triangles. 6 back to standard link prediction In this section we bring our attention back to the standard link prediction problem and show how the methods we presented in this paper can also be used to further enhance standard link prediction. We split our data in the same way to the previous experiments except that here we use an 80-20 split (often, keeping a higher percentage of the data in the training set produces higher quality results, but in the previous section, we needed to generate more data in the validation set so that we have higher chances of finding paths of length 2 to predict, and 11 top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.160.160.150.160.170.230.140.220.230.220.130.170.070.070.070.070.070.060.070.060.060.060.040.050.50.50.490.50.490.470.450.390.450.460.290.24top 25top 5LOETOPairseedTRPRTRPRWTRPRWMULMAXAAAAPAJSAA-MAXAA-MULAA-MULJS-MAXJS-MULLOETO00.20.40.60.81Success probability0.520.530.540.510.540.580.380.590.590.610.560.60.20.20.260.190.210.270.130.280.270.290.240.280.890.880.880.870.910.950.680.930.940.920.870.9 TABLE 2 -- description of methods inspired by pairwise link to perform the standard link predic- tion task sum(cid:78) For a certain node i, aggregate the pair-seeded PageRank results from all edges adjacent to i. This is equivalent to performing PageRank with a normalized initial vector valued 1 at the indices of all the neighbors of i, and degree(i) at index i. This is similar to the previous approach, but here, we instead take the element-wise maximum value of the pair-seeded PageRank vectors. max• star-seed+ This is similar to pair-seeded PageRank, except that we start PageRank with a normalized initial vector valued 1 at the index of the seed node and all its neighbors. This uses the same starting vector used by star-seed, but instead, applies the TRPR algorithm on it. TRPR(cid:7) thus we increased the size of the testing data by 10 percent). Then, for the top 100 nodes with the largest degree in the training data, we perform different types of seeded PageRank diffusion for link prediction on these nodes. This choice of nodes serves the purpose of identifying nodes that have a higher chance of making connections in the test data. We measure performance in terms of Area Under the ROC curve (henceforth, AUC score). Our baseline is single-seeded PageRank. Our results on pairwise link prediction suggest that multiple seeds with PageRank-like methods are effective for prediction. Here, we consider four different multiple-seeding strategies and compare them to single-seeded PageRank for the classical link prediction problem. We summarize the four new methods in Table 2. The methods sum, max, and star-seed are motivated by the double seeding idea used in the previous sections. We use real-world networks from Section 5, and present our results in Figure 11. The scatter plots compare the AUC score of the neighborhood-based seeding methods to the AUC scores from single-seeded PageRank. These results suggest that neighborhood-based seeding is superior to single-seeded PageRank as a link prediction method. 7 discussion and future work Having a reliable link prediction algorithm is a well-studied research topic due to its utility in many disciplines. Traditional link prediction methods aim to find pairs of nodes that are likely to form a link. Here, we have studied a higher-order version of the problem called pairwise link prediction where we predict nodes that are likely to form a triangle with an edge. We generalized local link-prediction methods and we developed two PageRank-based methods for this problem. These PageRank-based methods generally remained consistent in behavior on a variety of datasets. Using these results as inspiration, we then developed multiple-seeding strategies for PageRank in classical link prediction, which outperform their standard single-seeded counterparts. TRPR (Triangle Reinforced PageRank) is our new principled method for the task of pairwise link prediction. We demontrated that TRPR is computationally efficient, and demonstarted the implementation details of TRPR can improve on the idealized algorithm by taking advantage of a triangle iterator that avoids building a tensor. We note that highly efficient implementations of our procedures are possible given their close relationships with traditional PageRank methods. Scaling to billions of nodes and edges is simply not a problem given current abilities to compute PageRank (e.g. [Lofgren et al., 2016]), and especially that we have an existing routine to iterate through triangles in a graph quickly. 12 FIGURE 11 -- Results of standard link prediction experiment on four real-world networks. Each scatter plot shows the link prediction AUC results of 100 experiments of methods inspired by our pairwise link prediction proposal with respect to the AUC scores of single-seeded PageRank. The solid black line is the plot of f (x) = x. Points above the line are cases where our proposed methods have superior performance to standard single-seeded PageRank. We see that in most cases the four methods outperform the classical seeded PageRank method. This study suggests that it is useful to consider a node's neighborhood for the purposes of seeding for link prediction with PageRank. The values in the legend serve as a summary performance measure, which is the average distance to the f (x) = x line. The space of higher-order prediction problems also has limitless sub-structure. An alternate problem is to predict an edge that is important when given a single node. In the future, we intend to extend this work to the latter scenario, and TRPR can be adapted for this purpose. acknowledgements Supported by NSF IIS-1422918, IIS-1546488, CCF-1909528, NSF Center for Science of Information STC, CCF-0939370, NASA, Sloan Foundation, DARPA SIMPLEX, NSF DMS-1830274, ARO W911NF-19-1-0057, and ARO MURI. references [Adamic and Adar, 2003] L. A. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25 (3), pp. 211 -- 230, 2003. Cited on page 2. partitioning using PageRank vectors. In 2006 47th Annual IEEE Symposium on Foundations of Computer Science. 2006. Cited on page 4. [Agrawal et al., 2018] M. Agrawal, M. Zit- nik, and J. Leskovec. Large-scale analy- sis of disease pathways in the human in- teractome. In Pacific Symposium on Bio- computing, p. 111. 2018. Cited on page 9. [Andersen et al., 2006] R. Andersen, F. Chung, and K. Lang. Local graph [Avin et al., 2015] C. Avin et al. Core size and densification in preferential attach- ment networks. In International Collo- quium on Automata, Languages, and Pro- gramming, pp. 492 -- 503. 2015. Cited on pages 6 and 9. [Backstrom and Leskovec, 2011] L. Back- strom and J. Leskovec. Supervised ran- dom walks: Predicting and recommending links in social networks. pp. 635 -- 644. 2011. Cited on page 1. [Barabási and Albert, 1999] A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286 (5439), pp. 509 -- 512, 1999. Cited on page 3. [Benson et al., 2017] A. Benson, D. F. Gle- ich, and L.-H. Lim. The spacey random walk: a stochastic process for higher-order data. SIAM Review, 59 (2), pp. 321 -- 345, 2017. Cited on page 7. [Benson et al., 2018] A. R. Benson, 13 0.50.60.70.80.50.60.70.80.9Caltech36sum, 0.14max, 0.16starseed, 0.18TRPR, 0.20.4750.5000.5250.5500.5750.6000.6250.50.60.70.80.9Ch-Ch-Minersum, 0.09max, 0.15starseed, 0.25TRPR, 0.280.480.500.520.540.560.580.600.30.40.50.60.70.80.9CollegeMsgsum, 0.04max, 0.03starseed, 0.04TRPR, 0.050.50.60.70.80.90.50.60.70.80.9emailsum, 0.1max, 0.11starseed, 0.14TRPR, 0.14 R. Abebe, M. T. Schaub, A. Jadbabaie, and J. Kleinberg. Simplicial closure and higher-order link prediction. Proceedings of the National Academy of Sciences, 2018. Cited on pages 1 and 3. [Holland and Leinhardt, 1977] P. W. Hol- land and S. Leinhardt. A method for detecting structure in sociometric data. In Social Networks, pp. 411 -- 432. Elsevier, 1977. Cited on page 1. [Benson et al., 2016] A. R. Benson, D. F. Gleich, and J. Leskovec. Higher-order organization of complex networks. Science, 353 (6295), pp. 163 -- 166, 2016. Cited on page 1. [Clauset et al., 2008] A. Clauset, C. Moore, and M. E. J. Newman. Hierarchical struc- ture and the prediction of missing links in networks. Nature, 453, pp. 98 EP -- , 2008. Cited on page 1. [Dave and Hasan, 2019] V. Dave and M. Hasan. Triangle completion time pre- diction using time-conserving embedding. ECMLPKDD, 2019. Cited on page 3. [Easley et al., 2010] D. Easley, J. Klein- berg, et al. Networks, crowds, and markets, Cambridge university press Cam- bridge, 2010. Cited on page 1. [Eikmeier et al., 2018] N. Eikmeier, A. S. Ra- mani, and D. F. Gleich. The hyperkron graph model for higher-order features. In IEEE International Conference on Data Mining, ICDM 2018, Singapore, Novem- ber 17-20, 2018. 2018. Cited on page 3. [Gleich, 2015] D. F. Gleich. PageRank be- yond the web. SIAM Review, 57 (3), pp. 321 -- 363, 2015. Cited on page 4. [Gomez-Uribe and Hunt, 2015] C. A. Gomez- Uribe and N. Hunt. The netflix rec- ommender system: Algorithms, business value, and innovation. ACM Trans. Man- age. Inf. Syst., 6 (4), pp. 13:1 -- 13:19, 2015. Cited on page 1. [Katz, 1953] L. Katz. A new status index derived from sociometric analysis. Psy- chometrika, 18 (1), pp. 39 -- 43, 1953. Cited on page 3. [Lambiotte et al., 2019] R. Lambiotte, M. Rosvall, and I. Scholtes. From net- works to optimal higher-order models of complex systems. Nature Physics, 15 (4), pp. 313 -- 320, 2019. Cited on page 1. [Liben-Nowell and Kleinberg, 2007] D. Liben- Nowell and J. Kleinberg. The link- prediction problem for social networks. Journal of the American Society for In- formation Science and Technology, 58 (7), 2007. Cited on pages 1, 2, and 3. [Lin et al., 2018] C.-H. Lin, D. M. Ko- necki, M. Liu, S. J. Wilson, H. Nas- sar, A. D. Wilkins, D. F. Gleich, and O. Lichtarge. Multimodal network dif- fusion predicts future diseaseâĂŞgeneâĂŞ- chemical associations. 2018. Cited on page 1. [Lofgren et al., 2016] P. Lofgren, S. Baner- jee, and A. Goel. Personalized pagerank estimation and search: A bidirectional ap- proach. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, pp. 163 -- 172. 2016. Cited on pages 5 and 12. [Nassar et al., 2019] H. Nassar, A. Benson, and D. F. Gleich. Pairwise link predic- tion. ASONAM, 2019. Cited on page 3. [Nassar and Gleich, 2018] H. Nassar and https: D. Gleich. Matrixnetworks.jl. //github.com/nassarhuda/MatrixNetworks.jl, 2018. Cited on page 9. [Newman, 2001] M. E. J. Newman. Cluster- ing and preferential attachment in grow- ing networks. Phys. Rev. E, 64, p. 025102, 2001. Cited on pages 2, 3, 6, and 9. [Page et al., 1999] L. Page, S. Brin, R. Mot- wani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical Report 1999-66, Stanford InfoLab, 1999. Previous number = SIDL- WP-1999-0120. Cited on page 3. [Panzarasa et al., 2009] P. Panzarasa, T. Op- sahl, and K. M. Carley. Patterns and dynamics of users' behavior and interac- tion: Network analysis of an online com- munity. Journal of the American Society for Information Science and Technology, 60 (5), pp. 911 -- 932, 2009. Cited on page 9. [Rapoport, 1953] A. Rapoport. Spread of in- formation through a population with socio- structural bias: I. assumption of transi- tivity. The Bulletin of Mathematical Bio- physics, 15 (4), pp. 523 -- 533, 1953. Cited on page 1. [Lü and Zhou, 2011] L. Lü and T. Zhou. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and its Applications, 390 (6), 2011. Cited on page 1. [Stanford SNAP Group, 2017] Stanford SNAP Group. Miner: Gigascale mul- timodal biological network. https://github. com/snap-stanford/miner-data, 2017. Cited on page 9. [Granovetter, 1977] M. S. Granovetter. The strength of weak ties. In Social Net- works, pp. 347 -- 367. Elsevier, 1977. Cited on page 1. [Milo, 2004] R. Milo. Superfamilies of evolved and designed networks. Science, 303 (5663), pp. 1538 -- 1542, 2004. Cited on page 1. [Guimerà et al., 2003] R. Guimerà, L. Danon, A. DÃŋaz-Guilera, F. Gi- ralt, and A. Arenas. Self-similar com- munity structure in a network of human interactions. Phys. Rev. E, 68, p. 065103, 2003. Cited on page 9. S. [Milo et al., 2002] R. Milo, S. Shen- Orr, Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network motifs: Simple building blocks of com- plex networks. Science, 298 (5594), pp. 824 -- 827, 2002. Cited on page 1. [Traud et al., 2011] A. L. Traud, P. J. Social Mucha, and M. A. Porter. structure of facebook networks. CoRR, abs/1102.2166, 2011. arXiv:1102.2166. Cited on page 9. [Wishart et al., 2017] D. S. Wishart et al. DrugBank 5.0: a major update to the DrugBank database for 2018. Nucleic Acids Research, 2017. Cited on page 9. 14
1911.06861
1
1911
2019-11-15T20:21:44
Large-Scale Parallel Matching of Social Network Profiles
[ "cs.SI" ]
A profile matching algorithm takes as input a user profile of one social network and returns, if existing, the profile of the same person in another social network. Such methods have immediate applications in Internet marketing, search, security, and a number of other domains, which is why this topic saw a recent surge in popularity. In this paper, we present a user identity resolution approach that uses minimal supervision and achieves a precision of 0.98 at a recall of 0.54. Furthermore, the method is computationally efficient and easily parallelizable. We show that the method can be used to match Facebook, the most popular social network globally, with VKontakte, the most popular social network among Russian-speaking users.
cs.SI
cs
Large-Scale Parallel Matching of Social Network Profiles Alexander Panchenko1, Dmitry Babaev2, and Sergei Obiedkov3 1 TU Darmstadt, FG Language Technology, Darmstadt, Germany [email protected] 2 Tinkoff Credit Systems Inc., Moscow, Russia 3 National Research University Higher School of Economics, Moscow, Russia [email protected]. [email protected] Abstract. A profile matching algorithm takes as input a user profile of one social network and returns, if existing, the profile of the same person in another social network. Such methods have immediate applications in Internet marketing, search, security, and a number of other domains, which is why this topic saw a recent surge in popularity. In this paper, we present a user identity resolution approach that uses minimal supervision and achieves a precision of 0.98 at a recall of 0.54. Furthermore, the method is computationally efficient and easily paral- lelizable. We show that the method can be used to match Facebook, the most popular social network globally, with VKontakte, the most popular social network among Russian-speaking users. Keywords: User identify resolution, entity resolution, profile matching, record linkage, social networks, social network analysis, Facebook, Vkontakte. 1 Introduction Online social networks enjoy a tremendous success with general public. They have even become a synonym of the Internet for some users. While there are clear global leaders in terms of the number of users, such as Facebook4, Twitter5 and LinkedIn6, these big platforms are constantly challenged by a plethora of niche and/or local social services trying to find their place on the market. For instance, VKontakte7 is an online social network, similar to Facebook in many respects, that enjoys a huge popularity among Russian-speaking users. Current situation leads to the fact that many users are registered in sev- eral social networks. People use different services in parallel as they provide complimentary features and user bases. For instance, one common pattern for 4 http://www.facebook.com 5 http://www.twitter.com 6 http://www.linkedin.com 7 http://www.vk.com 9 1 0 2 v o N 5 1 ] I S . s c [ 1 v 1 6 8 6 0 . 1 1 9 1 : v i X r a 2 A. Panchenko and D. Babaev and S. Objedkov Russian-speaking users is to communicate with Russian-speaking peers with help of Vkontakte and with foreign friends with help of Facebook. Another common pattern is to use LinkedIn for professional and Facebook for private contacts. Publicly available user information can help in building the next gener- ation of personalised web services, such as search, recommendation systems, targeted marketing, and messaging, to name a few. For instance, Bartunov et al. [1] suggest to use profile matching to perform automatic contact merging on mobile phones. Actually, a similar technology is already integrated in the Android mobile operative system8. On the other hand, profile information may be subject to de-anonymization attacks, undesirable for a user [2,3,4]. No won- der several researchers from information retrieval and security communities re- cently tried to study methods of user profile correlation across online social networks [5,6,7,8,9,4,10]. As information about a single user can be scattered across different networks, integration of data from various platforms can lead to a more complete user rep- resentation. Therefore, in many applications it makes sense to build an integral profile, featuring information from several sources. In order to do so, it is nec- essary to perform user identity resolution, i.e., to find the same person across various networks. In this paper, we propose a simple, yet efficient method for matching profiles of online social networks. The contribution of our work is two-fold: 1. We present a new method for matching profiles of social networks. The method has only four meta-parameters. Unlike most existing approaches (see Section 2), the method is easily parallelisable and can be used to process the profiles from an entire social network in a matter of hours. We provide an open-source implementation of the method.9 2. We present results of the largest matching experiment to date known to us. While most prior experiments operated on datasets ranging from thousands to hundreds of thousands of profiles, we performed a match of 3 million profiles of Facebook (FB) to 90 million profiles of VKontakte (VK), demon- strating that third parties can perform matching on the scale of entire social network. To the best of our knowledge, we are the first to present a matching of FB to VK. 2 Related Work 2.1 Profile Matching Bartunov et al. [1] developed a probabilistic model that relies on profile attributes and friendship links. The algorithm was tested on roughly 2 thousand Twitter users and 9 thousand Facebook users. The method achieves F-measure up to 0.89 (precision of 1.0 and recall of 0.8). However, the this is a local identity resolution 8 https://www.android.com 9 https://github.com/dmitrib/sn-profile-matching Large-Scale Parallel Matching of Social Network Profiles 3 method, that requires profiles to be ego-networks of the seed user. From the other hand, in this paper we present a global identity resolution method that can potentially match any user of one network with any user of another network. Veldman [6] conducted a set of extensive experiments with profile matching algorithms. She used profile similarity metrics based on both attributes (name, email and birth date) and friendship relations. The author performed experi- ments on 2 thousand profiles of LinkedIn and Hyves social networks. Malhotra et al. [9] used 30 thousand of paired Twitter and LinkedIn profiles to train several supervised models based on attributes, such as name, user id and location. The authors report an F-measure up to 0.98 with precision up to 0.99. Sironi [5] also used supervised models based on features stemming from sim- ilarity of profile attributes. This experiment was done on 34 thousand of Face- book, Twitter and LinkedIn profiles where 2 thousand were paired. Their ap- proach yields precision and recall around 0.90. Narayanan and Shmatikov [7] proposed an approach that establishes connec- tions between users based on their friendship relations. This incremental method requires a small initial number of matched profiles and access to a graph of friend- ship links. The authors used the method to match 224 thousand Twitter users with 3.3 million Flickr users and observed an error rate of 12%. Balduzzi et al. [2] showed that matching can be done effectively based on email addresses. Jain et al. [10] developed a system that takes as input a Twitter account and finds a corresponding Facebook account. The system relies on profile, content, self-mention and network-based similarity metrics. Goga et al. [4] present a comprehensive study on profile matching technology. The authors try to correlate accounts of Facebook, Twitter, Google+, Flickr, and MySpace to check a feasibility of a de-anonymization attack. They show that up to 80% of Twitter, Facebook and Google+ profiles from their ground truth can be matched with a nearly zero false positive rate. Their matching method is based on features extracted from user names, locations and pictures unified with help of a binary classifier taking as input two profiles. Two key differences of this method from ours are the following. First, Goga et al. [4] perform no candidate selection. Therefore, in this approach all pairwise comparisons should be done, which is not efficient if one deals with the entire social network. Second, this approach uses no features based on friends similarity, which are core of our approach. 2.2 Name Similarity Matching Our method heavily relies on name similarity matching. In its simplest form a name can be considered as a string. There is a large body of literature on how to define string similarity [11] and use it to extract similar names from a data set with some works focusing specifically on personal names; see a survey and experimental comparison in [12]. According to this survey, one of the best algorithms for approximate name matching is the algorithm from [13], which 4 A. Panchenko and D. Babaev and S. Objedkov uses a prefix tree to efficiently compute the Levenshtein distance. In [14], three generations of name matching methods are identified, with only third-generation methods showing good results in terms of both precision and recall. 3 Dataset Two social networks were used in our profile matching experiment. One is the biggest Russian social network VKontakte; the other is Facebook, which is also very popular among Russian-speaking users. In our experiments, we used publicly available data from VK and FB. The matching algorithm is based on name similarity and the friendship relation: each profile is represented by the first and/or last name of the user and by a list of names of his or her friends in the social network. No other characterising features of profiles were used. 3.1 VKontakte We collected about 90 million VK profiles that set Russia as their current lo- cation. We gathered first and second name of each user along with list of her friends using the "users.get" method of the social network API10. Therefore, we can assume that in our experiment VK friend lists are complete. 3.2 Facebook We deal with 3 million public Facebook profiles from Russia. User's name can be obtained via the official API11, but not list of her friends. That is why friend lists were generated from events displayed in user's feed. Users A and B were considered as friends if a message "A and B are now friends" appeared in feeds of A and B. Profile feeds were collected via the "user/feed" method of the FB API. The problems with this approach is that (1) access to users's feed can be restricted by privacy settings; (2) one need to download all wall posts to gather list of friends, which is not always possible due to API restrictions and requires multiple API calls. Therefore, we should assume that in our experiment FB friend lists are incomplete. 3.3 Test data VKontakte provides a field where a used can specify a link to her FB page. We gathered about 850 thousand known VK-FB profile pairs. However, only 92,488 Facebook users were found in our Facebook dataset out of these 850 thousand profiles. These pairs were used as a ground truth to check correctness of the matching algorithm. A subset of the test data used in our experiments is publicly available12. 10 https://vk.com/dev/users.get 11 https://developers.facebook.com/docs/graph-api 12 https://github.com/dmitrib/sn-profile-matching Large-Scale Parallel Matching of Social Network Profiles 5 3.4 Name romanisation Names of Russian FB and VK users can be spelled in both Latin and Cyrillic alphabets i.e. "Alexander Ivanov" or "Aleksandr Ivanov". To enable correct name matching, all user names in both networks were converted to Latin script using the Russian-Latin BGN transliteration rules13. 4 Profile matching algorithm The algorithm consists of three phases: 1. Candidate generation. For each VK profile we retrieve a set of FB profiles with similar first and second names. 2. Candidate ranking. The candidates are ranked according to similarity of their friends. 3. Selection of the best candidate. The goal of the final step is to select the best match from the list of candidates. Each profile from VK network is processed independently and hence this operation can be easily parallelised (we rely on MapReduce framework14). It is possible to perform matching in both directions (VK→FB and FB→VK). However, all profiles from the target network must be stored at each computa- tional node. Therefore, direction of matching VK → FB minimises the memory footprint of such nodes. Below we describe each step of the method in detail. 4.1 Candidate generation It is computationally inefficient to calculate similarity of each VK profile with each FB profile. This operation would require about 1.3 · 1020 pairwise compar- isons. This first step reduces the search space retrieving FB users with names similar to the input VK profile. Two names are considered similar if the first letter is the same and the edit distance [14] between names is less than two. This should be true for both first and last names. We use an index based on Levenshtein Automata [15] to perform fuzzy match between a VK user name and all FB user names. In particular, we relied on the Lucene implementation of this approach15. However, the edit distance does not provide a complete solution for name matching, since many first names have several rather different variants, e.g., "Robert" and "Bob", or "Mikhail" and "Misha". One way to address this problem is to use a dictionary of proper names prepared by linguists, e.g., [16], to decide whether two names are synonyms. However, such dictionaries often skip some name variants. For example, the entry for the Russian name "Alexander" in [16] 13 http://earth-info.nga.mil/gns/html/romanization.html 14 http://hadoop.apache.org 15 org.apache.lucene.util.automaton.LevenshteinAutomata 6 A. Panchenko and D. Babaev and S. Objedkov includes "Sanya", but not "Sanek". In addition, they do not include variants based on similarity with names from other languages: e.g., "Alejandro" is not in the entry for "Aleksandr" in [16]. Therefore, we decided to build our own dictionary using pairs of profiles known to belong to the same person. We do this by taking the transitive clo- sure of the symmetric binary relation over names given by these pairs. Every two names from the same equivalence class are considered to be synonyms. The fundamental deficiency of this approach is that, being a variant is not an equiva- lence relation, since transitivity does not always hold. For example, two different Russian names, "Alexander" and "Alexey", are often abbreviated as "Alex". With our approach, this results in declaring "Alexander" and "Alexey" variants of each other, which they are not. Nevertheless, we let this happen and use shared friends to disambiguate between persons erroneously declared to have similar names. Another problem is that some people use totally unrelated first names (such as "Andrey" and "Vladimir" or even "Max" and "Irina") in different networks. We solve this problem by removing "strange" pairs based on the number of times such a pair occurs in the list (unique or infrequent pairs can safely be removed). The final list of synonym clusters was quickly checked manually. While candidate generation step greatly reduces search space, a person that indicated different name or a pseudonym in two social networks will not be recognised with our approach. From the other hand, in this situation a person is probably prefers to hide his or her identity and therefore it is more appropriate to perform no matching for this user at all. 4.2 Candidate ranking The higher the number of friends with similar names in VK and FB profiles, the larger the similarity of these profiles. Two friends are considered to be similar if: -- First two letters of their last names match, and -- The similarity between their first names and the similarity between their last names are both greater than thresholds α and β, correspondingly. We empirically set α to 0.6 and β to 0.8. String similarity sims is calculated as follows: sims(si, sj) = 1 − lev(si, sj) max(si,sj) , where lev is edit distance of string si and sj. At this step we use the standard algorithm for calculation of Levenstein distance16, not Levenstein Automata. Matching friends with rare names should be weighted higher than a match of friend with matching friends with common names. Indeed, two unrelated profiles can easily have several friends with similar common names. Probability of a user with first name sf and second name ss, provided than ss N . Here sf and these events are independent is P (sf , ss) = P (sf )P (ss) = sf N 16 org.apache.lucene.search.spell.LevensteinDistance Large-Scale Parallel Matching of Social Network Profiles 7 ss are frequencies of respectively first and second names and N is the total number of profiles. Thus, expectation of name frequency equals to sf·ss N . In our approach, contribution of each friend to similarity simp of two profiles pvk and pf b is inverse of name expectation frequency, but not greater than one: (cid:88) simp(pvk, pf b) = j:sims(sf i ,sf j )>α∧sims(ss i ,ss j )>β min(1, N sf j · ss j ). Here sf i and ss i are first and second names of a VK profile, correspondingly, while sf j and ss j refer to a FB profile. 4.3 Best candidate selection FB candidates are ranked according to their similarity simp to an input profile pvk. There are two thresholds the best candidate pf b should pass to match: -- its score should be higher than the similarity threshold γ: simp(pvk, pf b) > γ. -- it should be either the only candidate or score ratio between it and the next best candidate p(cid:48) f b should be higher than the ratio threshold δ: simp(pvk, pf b) simp(pvk, p(cid:48) f b) > δ. The δ threshold enforces the fact that a VK user has only one account in FB. On the other hand, one FB profile can be linked with several VK profiles. Still, in this case only the match with the highest score is kept. 5 Results and Discussion We performed matching of VKontakte and Facebook profiles (c.f. Table 1) with the approach described above. Results of the candidate ranking step were saved. At this point, we conducted a series of experiments varying the similarity thresh- old γ and the ratio threshold δ. Results of these experiments in terms of precision and recall with respect to the test collection (see Section 3.3 are presented in Figure 1. The bold line denotes the best precision at certain level of recall. Table 1. Statistics of VKontakte and Facebook. VKontakte Facebook Number of users in our dataset 89,561,085 2,903,144 Number of Russian-speaking users17 100,000,000 13,000,000 User overlap 88% 29% 8 A. Panchenko and D. Babaev and S. Objedkov Fig. 1. Precision-recall plot of our matching method. Here we perform a grid search of two method parameters: profile similarity threshold γ ∈ [1; 4] and profile similarity ratio threshold δ ∈ [3; 6]. The bold line denotes the best precision at a given recall. As one may observe, our method yields very good results achieving precision of 0.97 at recall of 0.58. Furthermore, a configuration of the approach yielding 99% precision recalls roughly 50% of relevant profiles. In order to perform the final matching of VK and FB we chose a version of the algorithm that provides precision of 0.98 and recall of 0.54 (see Table 2). Results were obtained in 4 hours on a Hadoop cluster with 100 nodes of type m2.xlarge (2 vCPU, 17 GB RAM) on the AWS EC2 cloud18. The mentioned above configuration of the method mentioned above retrieved 644,334 VK pro- files of FB users. Thus, we found corresponding VK pages of 22% Facebook users present in our collection. While our approach makes only few errors, reaching precision of 0.98, it is not able to match a significant fraction of 40-50% of user profiles. The key factors hampering correct retrieval are the following: -- In our method, we perform fuzzy search with name synonyms that can lead to semantic drift. For instance, "Maria" is expanded with its alias "Masha". According to fuzzy search "Masha" and "Misha" are related. But the latter is a shortcut for "Michael" in Russian. -- Implementation of the Levenstein Automata used in our experiments re- trieves candidates with distance lower or equal than two. Thus, people with long names and surnames can be missed during candidate generation. 17 http://www.comscore.com/Insights/Data-Mine/Which-Sites-Capture-The-Most-Screen-Time-in-Russia and http://vk.com/about provide statistics on number of Russian-speaking users. 18 http://aws.amazon.com Large-Scale Parallel Matching of Social Network Profiles 9 Table 2. Matching of user profiles of Facebook and VKontakte social networks. The upper table presents four main parameters of our profile matching method. The lower part of the table presents results of the final matching of the two networks. Value Parameter First name similarity threshold, α 0.8 Second name similarity threshold, β 0.6 Profile similarity threshold, γ Profile ratio threshold, δ Number of matched profiles Expected precision Expected recall 3 5 644,334 (22% of 2,903,144 FB users) 0.98 0.54 -- People often intentionally indicate different names in two social networks or use different aliases. Our approach is not designed to identify and match such profiles. -- First letter mismatch. Different variants of the same name/surname in Rus- sian can start from different letters. Furthermore, transliteration can lead to such mismatches as well, e.g. surname "Efimov" can be spelled in Latin as "Efimov" or "Yefimov". -- People often use transliterated versions of their names in one network, but stick to the original Cyrillic versions in the other. The method always works with transliterated names, but our transliteration can be quite different from the one done by a user. -- Due to nature of the friend collection method used, some FB friends can be absent in our dataset. In order to improve performance of the method, one would need to tackle the problems mentioned above. 6 Conclusion In this paper, we presented a new user identity matching method. Unlike most previous approaches, our method is able to work on the scale of real online social networks, such as Facebook, matching tens of millions of users in several hours on a medium-sized computational cluster. The method yields excellent precision (up to 98%). At the same time it is able to recall up to 54% of correct matches. The method was used to perform the most largest-scale matching experi- ment up to date. We matched 90 millions of VKontakte users with 3 million of Facebook users. A prominent direction for the future work, is to use supervised learning in order to improve candidate ranking. One way pionered by [4] is to use a binary classifier predicting if two profiles match; profile similarity in this case would be the confidence of positive class. Learning to rank methods [17] is another way to 10 A. Panchenko and D. Babaev and S. Objedkov cast profile matching as a supervised problem. The supervised models provide a convenient framework where name similarity features, used in our method, can be mixed with attribute-, network-, and image-based features. Acknowledgements This research was conducted as part of a project funded by Digital Society Laboratory LLC. We thank Prof. Chris Biemann and three anonymous reviewers for their thorough comments that significantly improved quality of this paper. References 1. Bartunov, S., Korshunov, A., Park, S.T., Ryu, W., Lee, H.: Joint link-attribute user identity resolution in online social networks. In: Proc. of the Sixth SNA-KDD Workshop at KDD. (2012) 2. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing In: Recent Advances in Intrusion social networks for automated user profiling. Detection, Springer (2010) 422 -- 441 3. Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de- anonymize social network users. In: 2010 IEEE Symposium on Security and Privacy (SP), IEEE (2010) 223 -- 238 4. Goga, O., Perito, D., Lei, H., Teixeira, R., Sommer, R.: Large-scale correlation of accounts across social networks. Technical report, International Computer Science Institute (2013) 5. Sironi, G.: Automatic alignment of user identities in heterogeneous social networks. Master's thesis, Politechnico di Milano, Italy (2012) 6. Veldman, I.: Matching profiles from social network sites: Similarity calculations with social network support. Master's thesis, University of Twente, Italy (2009) 7. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Security and Privacy, 2009 30th IEEE Symposium on, IEEE (2009) 173 -- 187 8. Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: 13th International Conference on Network-Based Information Systems (NBiS), IEEE (2010) 297 -- 304 9. Malhotra, A., Totti, L., Meira Jr, W., Kumaraguru, P., Almeida, V.: Studying user footprints in different online social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), IEEE Computer Society (2012) 1065 -- 1070 10. Jain, P., Kumaraguru, P., Joshi, A.: @I seek 'fb.me': Identifying users across multi- ple online social networks. In: Proceedings of the 22nd international conference on World Wide Web companion, International World Wide Web Conferences Steering Committee (2013) 1259 -- 1268 11. Boytsov, L.: Indexing methods for approximate dictionary searching: Comparative analysis. Journal of Experimental Algorithmics (JEA) 16 (2011) 1 -- 1 12. Du, M.: Approximate name matching. NADA, Numerisk Analys och Datalogi, KTH, Kungliga Tekniska Högskolan. Stockholm: un (2005) 13. Navarro, G., Baeza-Yates, R., Marcelo Azevedo Arcoverde, J.: Matchsimile: a flexible approximate matching tool for searching proper names. Journal of the American society for Information Science and Technology 54(1) (2003) 3 -- 15 Large-Scale Parallel Matching of Social Network Profiles 11 14. Lisbach, B., Meyer, V.: Linguistic Identity Matching. Springer Verlag. Heidelberg. (2013) 15. Schulz, K., Mihov, S.: Fast string correction with Levenshtein-automata. Interna- tional Journal of Document Analysis and Recognition 5 (2002) 67 -- 85 16. Petrovsky, N.: Dictionary of Russian personal names. http://www.gramota.ru/ slovari/info/petr. M.: In Russian Dictionaries (2000) 17. Trotman, A.: Learning to rank. Information Retrieval 8(3) (2005) 359 -- 381
1611.07769
3
1611
2017-02-15T19:40:18
The many facets of community detection in complex networks
[ "cs.SI", "physics.data-an", "physics.soc-ph" ]
Community detection, the decomposition of a graph into essential building blocks, has been a core research topic in network science over the past years. Since a precise notion of what constitutes a community has remained evasive, community detection algorithms have often been compared on benchmark graphs with a particular form of assortative community structure and classified based on the mathematical techniques they employ. However, this comparison can be misleading because apparent similarities in their mathematical machinery can disguise different goals and reasons for why we want to employ community detection in the first place. Here we provide a focused review of these different motivations that underpin community detection. This problem-driven classification is useful in applied network science, where it is important to select an appropriate algorithm for the given purpose. Moreover, highlighting the different facets of community detection also delineates the many lines of research and points out open directions and avenues for future research.
cs.SI
cs
The many facets of community detection in complex networks Michael T. Schaub,1, 2, 3, ∗ Jean-Charles Delvenne,2, 4 Martin Rosvall,5, † and Renaud Lambiotte3, ‡ 1Institute for Data, Systems, and Society, Massachusetts Institute of Technology, Cambridge, MA 02139, USA 3naXys and Department of Mathematics, University of Namur, B-5000 Namur, Belgium 2ICTEAM, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve, Belgium 4CORE, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve, Belgium§ 5Integrated Science Lab, Department of Physics, Umea University, SE-901 87 Umea, Sweden Community detection, the decomposition of a graph into essential building blocks, has been a core research topic in network science over the past years. Since a precise notion of what constitutes a community has remained evasive, community detection algorithms have often been compared on benchmark graphs with a particular form of assortative community structure and classified based on the mathematical techniques they employ. However, this comparison can be misleading because apparent similarities in their mathematical machinery can disguise different goals and reasons for why we want to employ community detection in the first place. Here we provide a focused review of these different motivations that underpin community detection. This problem-driven classification is useful in applied network science, where it is important to select an appropriate algorithm for the given purpose. Moreover, highlighting the different facets of community detection also delineates the many lines of research and points out open directions and avenues for future research. Keywords: community detection, graph partitioning, Modularity; block models I. INTRODUCTION Sparked by the work of Newman and Girvan [1, 2] on Modularity in Complex Systems, the area of community detection has become one of the main pillars of network science research. The promise that we can gain a deeper understanding of a system by discerning important struc- tural patterns within a network has spurred a huge num- ber of studies in this area. However, as has become abundantly clear by now, this problem has no canoni- cal solution. In fact, even a general definition of what constitutes a community is still lacking. The reasons for this are not only grounded in the computational diffi- culties of tackling community detection. Furthermore, various research areas view community detection from different perspectives, which the lack of a consistent ter- minology illustrates: 'network clustering', 'graph parti- tioning', 'community', 'block' or 'module detection' all carry slightly different connotations. This jargon barrier creates confusion as soon as readers and authors have dif- ferent preconceptions and intuitive notions are not made explicit. We argue that community detection should not be con- sidered as a well-defined problem, but rather as an um- brella term with many facets. These facets emerge from different goals and motivations of what it is about the network that we want to understand or achieve, which lead to different perspectives on how to formulate the problem of community detection. Therefore, it is critical to be aware of these underlying motivations when select- ing and comparing community detection methods. Thus, ∗ [email protected]; corresponding author † [email protected][email protected] § [email protected] rather than an in-depth discussion of the technical details of different algorithmic implementations [3–10], here we focus on the conceptual differences between different per- spectives on community detection. By providing a problem-driven classification, however, we do not argue that the different perspectives are unre- lated. In fact, in some situations, different mathematical problem formulations can lead to similar algorithms and methods, and the different perspectives can offer valu- able insights. For example, for undirected networks, op- timizing the objective function Modularity [1], initially proposed from a clustering perspective, can be inter- preted both as optimizing a particular stochastic block model [11] and a particular diffusion process on the net- works [12], In other situations, however, such relations are not apparent. Neither do we argue that there is a particular perspec- tive that is a priori better suited for any given network. In fact, no method can consistently perform best on all kinds of networks [13]. Community detection is an un- supervised learning task and we cannot know what are the quantities of interest for the analysis. Instead, to understand how useful a particular method is, we must take into account the context of why the researcher is interested in the communities [14]. In the following, we unfold different aims underpinning community detection and discuss how the resulting prob- lem perspectives relate to various applications. We focus on four broad perspectives that have served as motivation for community detection in the literature: (i ) community detection as minimization of some form of constraint vi- olation; (ii ) community detection framed as a discretised analogue of data clustering, in which densely knit groups of nodes are to be found; (iii ) community detection aim- ing to identify structurally equivalent nodes in a network, leading to notions such as stochastic block models; and (iv ) community detection looking for simplified descrip- tions of the dynamical flows occurring on the network, that is, some form of dynamical model reduction (see Figure 1). While this categorization is not unique, we believe that it can help clarifying concepts about com- munity detection and be a guide to using an appropriate method for a particular purpose. 2 such as (2), or other related objective functions such as the average or normalized cuts. This can be best seen when rewriting the above optimzation problem as fol- lows: min f f T Lf subject to f ⊥ 1 (cid:107)f(cid:107) = n √ (cid:40)−(cid:112)V2/V1 (cid:112)V1/V2 (2) (3) (4) if i ∈ V1 if i ∈ V2 II. MINIMIZING CONSTRAINT VIOLATIONS: A CUT BASED PERSPECTIVE where fi := One of the earliest graphs partitioning applications was in the area of circuit layout and design [4, 15]. This spurred the development of the now classical Kernighan- Lin algorithm [16] and the work by Donath and Hoff- mann [17, 18], who were among the first to suggest the use of eigenvectors for graph partitioning. For instance, we might be confronted with a graph which describes the signal flows between different components of a cir- cuit. To implement the circuit in an efficient way, our goal is now to partition the graph into a fixed number of approximately equally sized groups with a small number of edges between those groups. The edges that run be- tween the groups are commonly denoted as the cut. Our aim is thus to minimize this cut while keeping some kind of balanced groups, which is an important ingredient in this context. To make this more precise let us consider one specific variant of this scheme, known as ratio cut [19]. Let us denote the adjacency matrix of an undirected network with n nodes by A, where Aij = 1 if there is a connection from node i to node j, and Aij = 0 if the nodes are not connected. We can now write the problem of optimizing the ratio cut for a bipartition of all vertices V into two communities V1 and V2 = V\V1 as follows [19, 20]: cut(Vi,V\Vi) (cid:88) minVi RatioCut(V1,V2) := minVi where cut(V1,V2) := (cid:80) i i∈V1,j∈V2 (Aij + Aji)/2 is the sum of the (weighted) edges between the two vertex sets V1,V2. Related problem formulations also occur in the context of parallel computations and load schedul- ing [21, 22], where approximately equally sized portions of work are to be sent to different processors, while keep- ing the dependencies between those tasks minimal. Fur- ther applications include scientific computing [21, 22], where partitioning algorithms can be used to divide the coordinate meshes arising in the context of discretizing and solving partial differential equations. Image segmen- tation problems may also be phrased in terms of cut- based measures [20, 23]. Investigating these types of problems, has led to many important contributions for partitioning graphs, in par- ticular in relation to spectral methods. The connection of spectral algorithms to cut-based problem formulations arises naturally by considering relaxations of the origi- nal, combinatorially hard discrete optimization problems Vi , (1) matrix with Dii = (cid:80) Here the Laplacian matrix of the network has been de- fined as L = D − A, where D is the diagonal degree j Aij. We mention here the semi- nal work of Fiedler [24, 25], who realized already in the 70s that the second smallest eigenvalue of the Laplacian is associated to the connectivity of the graph, and that the associated eigenvector can thus be used to compute spectral bi-partitions. Such spectral ideas led to many in- fluential algorithms and methods, see, for example, von Luxburg [20] for a tutorial on spectral algorithms. In this cut-based problem formulation, there is no specification as to how the found groups in the parti- tion should be connected internally. While there is the implicit constraint that the groups must not split into groups with an even smaller cut, there is no specification that the found groups of nodes are densely connected internally. Indeed, the type of graphs considered in the context of cut-based partitions are often of a mesh or grid like form, and for these kind of graphs several guarantees can be given in terms of the quality of the partitions ob- tained by spectral algorithms [21]. While such non-dense groupings emerging from 'non-clique structures' [26] can also be dynamically relevant (see section V), they are likely to be missed when employing a community notion that focuses on finding dense groupings as discussed next. III. MAXIMIZING INTERNAL DENSITY: THE CLUSTERING PERSPECTIVE A different motivation for community detection arises when considered in the context of data clustering. We use the term clustering, which itself has been a synonym for many different things, in the following sense: For a set of given data points in a possibly high-dimensional space, the goal here is to partition the points into a number of groups, such that points within a group are 'close' (or 'similar'); and points in different groups are more distant to each other. To achieve this goal one often constructs a proximity or similarity graph between the points and tries to group nodes together that are closer to each other than they are to the rest of the graph. This approach results again in a form of community detection problem where the closeness between nodes is described by the presence and weight of the edges between them. Although minimizing the cut size and maximizing the internal number of links are closely related, there are dif- 3 (i) The cut based perspective aims at FIG. 1. Schematic of four different approaches to community detection. minimising the number of links between modules, independently of their intrinsic structure. (ii) The clustering perspective produces groups of densely connected modules. (iii) The stochastic equivalence perspective looks for modules in which nodes are stochastically equivalent, typically as inferred via a generative statistical graph model. (iv ) The dynamical perspective focuses on the impact of communities on dynamical processes and searches for dynamically relevant coarse grained descriptions. ferences here contrasting with the cut-based perspective outlined above, pertaining to the typical constraints and search space associated with these objective functions. First, when employing a clustering perspective there is normally no a priori information as to the number of groups we are looking for. Second, we do not necessar- ily require the groups to be balanced in any way, rather we would like to find an 'optimal' split into densely knit groups irrespective of their relative sizes. Unsurprisingly, finding an optimal clustering is again a computationally hard problem. Further, as Kleinberg has shown [27], there are no clustering algorithms sat- isfying a certain set of intuitive properties we might re- quire from a clustering algorithm in continuous spaces; and similar problems also arise in the discrete setting for clustering of graphs [28]. Nevertheless, there exists a large number of methods that follow a clustering like paradigm and separate the nodes of a graph into cohesive groups of nodes, often by optimizing a quality function. An important clustering metric in this context is the so called conductance [29– 32]. Optimizing the (global) conductance has been ini- tially introduced as a way to produce a global bi-partition similarly to the 2-way ratio-cut. However, more lately this quantity has been successfully employed as a local quality function to find localized clusters around one or more seed nodes. Given a set of nodes Vk ⊂ V, a po- tential community, its local conductance can be written as: φ(Vk) := where vol(Vk) :=(cid:80) i∈Vk,j /∈Vk Aij min{vol(Vk), vol(V\Vk)} , (5) i∈Vk j Aij is the total degree of the nodes in set Vk, commonly termed its volume in analogy with (continuous) geometric objects. Interestingly, it has been shown that in specific contexts the conductance can be a good predictor of some latent group structures in several real-world applications [33][34]. Moreover, a local perspective on community detection has two appealing properties: First, the definition of a cluster does not depend on the global graph structure (cid:80) (cid:80) but only on the relative local density. Second, only a portion of a graph needs to be accessed, which is advan- tageous if there are computational constraints (very large graphs), or we are only interested in a particular subsys- tem. In such cases, we would like to avoid having to apply a method to the whole graph to find, for example, the cluster containing a particular node in the graph. The Newman-Girvan Modularity [1, 2] is arguably one of the most common clustering measures used in the lit- erature and was originally proposed from the clustering perspective discussed here. It is a global quality function and aims to find the community structure of the network as a whole. Given a partition P = {V1, . . . ,Vk} of a graph into k groups, the Modularity of P can be written as: (cid:20) k(cid:88) (cid:88) q=1 i,j∈Vq (cid:21) Aij − didj 2m , (6) 1 2m Q(P) := where di = (cid:80) 2m =(cid:80) j Aij is the degree of node i and i di is the total weight of all edges in the graph. By optimizing the Modularity measure over the space of all partitions, one aims to identify groups of nodes that are more densely connected to each other than one would expect according to a statistical null model of the graph. This statistical null model is commonly chosen to be the configuration model with preserved degree sequence. However, a by-product of this choice of a global null- model is the tendency of Modularity to balance the size of the modules in terms of their total connectivity. While different variants of Modularity aim to account for this effect [4], this makes Modularity also interpretable as a trade-off between a cut-based measures and an en- tropy [12]. In fact, Modularity can be seen as a proxy for all the perspectives discussed in this article. The op- timization of Modularity is usually performed by means of spectral or greedy algorithms [4, 35, 36]. While there are problems with this approach, such as its resolution limit [37] and other spurious effects [37–40], the general idea has triggered development of a plethora of algo- rithms that follow a similar strategy [4]. Several works have addressed some of these shortcomings, for instance by incorporating a resolution parameter, or explicitly ac- counting for the density inside each group [41, 42]. By grouping similar nodes that link to similar nodes into communities, we constrain ourselves to finding as- sortative group structure [10]. Stated differently, if we ordered the nodes in the network according to the un- derlying group structure, the adjacency matrix would be close to block diagonal. While we may also have hier- archical clusters with clusters of clusters etc., such an assortative structural organisation might be too restric- tive if we want to analyse, for example, social networks or capture the organisation of bipartite networks. If we aim to define groups based on more general connectiv- ity patterns, this leads naturally to notions such as the stochastic equivalence, which we will consider in the next section. IV. NODES WITH SIMILAR STRUCTURAL ROLES AND STOCHASTIC BLOCK MODELS Within social network analysis, a common goal is to identify nodes within a network that serve a similar struc- tural role in terms of their connectivity profile. Accord- ingly, nodes are similar if they share the same kind of connection patterns to other nodes. This idea is captured in notions such as regular equivalence, which states that nodes are regularly equivalent if they are equally related to equivalent others [43, 44]. A relaxation of this idea is stochastic equivalence [45], which means that nodes are equivalent if they connect to equivalent nodes with equal probability. One of the most popular techniques to model and de- tect such kind of relationship in network data is the use of stochastic block models (SBMs) [45, 46] and associ- ated inference techniques. These models have their roots in the social networks literature [45, 47], and provide a flexible framework for modelling block structures within a network. When considering block models, we are inter- ested in identifying node groups such that nodes within a community connect to nodes in other communities in an 'equivalent way' [10]. Consider a network composed of n nodes divided into k classes. The standard SBM is defined by the set of node class labels and the affinity matrix Ω. More precisely, the link probability between two nodes i, j belonging to class ci and cj is given by: pij := P(Aij) = Ωcicj . Under an SBM, nodes within the same class thus have exactly the same probabilities to connect to nodes of another class. This is the mathematical formulation of having stochastically equivalent nodes within each class. Finding the latent groups of nodes in a network now amounts to inferring the model parameters that provide the best fit for the observed network. That is, find the SBM with the highest likelihood. 4 The standard SBM assumes that the expected degree of each node is a Poisson binomial random variable (a Bi- nomial random variable with possibly non-identical suc- cess probabilities in each trial). Because inferring the most likely SBM typically results in grouping nodes based on their degree in empirical networks with broad degree distributions, it can be advantageous to include a de- gree correction into the model. In the degree corrected SBM [48], the probability pij for a link to appear between two nodes i, j depends both on their class labels ci, cj and their respective degree parameters di, dj (each entry Aij might be a Bernoulli or a Poisson random variable such as in [48]): pij ∼ didjΩcicj . Thus, while edges in real-world networks tend to be cor- related from effects such as triadic closure [4], by con- struction edges are conditionally independent random variables in SBMs. Moreover, most common SBMs are defined for unweighted networks or networks with inte- ger weights by modelling the network as a multi-graph. Though there are generalizations [49, 50], this is still an area comparably less studied. In contrast to the notions of community considered above, with stochastic equivalence we are no longer in- terested in maximising some internal density or minimis- ing a cut. To see this, consider a bipartite graph that from a cut- or density-based perspective contains no com- munities (one may even see bipartite structure as 'anti- communities'). From the stochastic equivalence perspec- tive, however, we would say that this graph contains two groups because nodes in each set only connect to nodes in the other set. When adopting an SBM to detect such structural or- ganisation of the links, we explicitly adopt a statistical model for the networks. The network is essentially an instance of an ensemble of possible networks generated from such a model [51]. This model based approach comes with several advantages: First, by defining the model we effectively declare what is signal and what is noise in the data under the SBM. We can thus provide a statistical assessment of the observed data with, for example, p-values under the SBM. In other words, we can identify patterns that cannot be reasonably explained from density fluctuations of edges inherent to any reali- sation of this model. Second, we are, for example, able to generate new networks from our model with a sim- ilar group structure, or predict missing edges and im- pute data. Third, we can make strong statements about the detectability of groups within a graph. For example, precise criteria specify when any algorithm can recover the planted group structure for a graph created by an SBM [52, 53]. By fitting an SBM to an observed adja- cency matrix it is possible to recover such a planted group structure down to its theoretical limit [53, 54]. While these criteria apply to networks generated with SBMs and not real networks in general, in which case we do not know what kind of process created the network [13], it is nevertheless a remarkable result since it highlights that there are networks with undetectable block patterns. Many benchmark graphs proposed in the literature, such as the commonly used LFR benchmarks [55], can be seen as specific types of SBMs. Results on these bench- marks graphs should therefore be interpreted with the SBM perspective in mind, especially with respect to the detectability limit. Finally, this model based approach also offers ways to estimate the number of communities from the data by some form of model selection, including hypothesis testing [56], spectral techniques [57, 58], the minimum description length principle [59], or Bayesian inference [60]. V. COMMUNITIES AS DYNAMICAL BUILDING BLOCKS Let us now consider a fourth alternative motivation for community detection, focusing on the processes that take place on the network. All notions of community outlined above are effectively structural in the sense that they are mainly concerned with the composition of the graph itself or its representation as an adjacency matrix, re- spectively. However, in many cases one of the main goals of applying tools from network science is to understand the behavior of a system. While the topology of a system puts constraints on the dynamics that can take place on the network, the network topology alone cannot explain the system behavior. Whence, instead of finding a coarse grained description of the adjacency matrix, we might be interested in finding a coarse grained description of the dynamics acting on top of the network. Take air traffic as an example. An airline network, with weighted links connecting cities according to the number of flights between them, can offer some interesting in- sights about air traffic. For instance, in the US air traffic network, Las Vegas and Atlanta form two major hubs. However, if we instead focus on the passenger flows based on actual itineraries, the two cities show very different be- havior: Las Vegas is a tourist destination and typically the final destination of itineraries, whereas Atlanta is a transfer hub onto other final destinations [61, 62]. Thus, these airports play dynamically quite different roles in the network. Focusing on interconnection patterns alone can thus give an incomplete picture if we are interested in the dynamical behavior of a system, for which additional dy- namical information should be taken into account. Con- versely, a concentration of edges with high impact on the dynamics may just arise from a statistical fluctuation, if the network is seen as a realization of a particular ran- dom graph model. In this way, structural and dynamical approaches can offer complementing information. Flow-based community detection approaches focus on specifying the modular dynamics on a given, fixed net- work. Consequently, depending on the dynamics of in- terest, the modular building blocks may look different. In general, however, they are blocks of nodes with dif- 5 ferent identities that trap the flow or channel it in spe- cific directions. That is, they form reduced models of the dynamics where blocks of nodes are aggregated to single meta nodes with similar dynamical function with respect to the rest of the network. In this view, the goal of community detection is to find effective coarse-grained system descriptions of how the dynamics take place on the network structure. This dynamical take on community detection has pri- marily focused on modelling the dynamics with Marko- vian diffusion processes [63–65], though work of topolog- ical scales and synchronization share the same common ground [66]. Interestingly, for a simple diffusion dynamics such as a random walk on an undirected network, which is essentially determined by the spectral properties of the network Laplacian, this perspective is tightly connected with the clustering perspective discussed in section III. This is because the presence of densely knit groups within the network can introduce a time-scale separation in the diffusion dynamics: A random walker traversing the net- work will initially be trapped for a significant time in- side a community corresponding to the fast time-scale, before it can escape and explore the larger network cor- responding to a slower time-scale. However, already for directed networks this connection between link density and dynamical behavior breaks down, even for a simple diffusion process [26, 63, 65]. This apparent relation- ship breaks down completely when focusing on longer pathways, possibly with memory effects in the dynam- ics [61, 67]. A dynamical perspective is useful especially in appli- cations in which the network itself is well defined, but the emergent dynamics are hard to grasp. For instance, consider the nervous system of the roundworm C. ele- gans for which there exists a distinct network. A ba- sic generative network model, such as a Barabasi-Albert graph or an SBM, might be too simple to capture the complex architecture of the network, and sampling alter- native networks from such a model will not create valid alternative roundworm connectomes. Indeed, some more complicated network generative models have been pro- posed to model the structure of the network [68], and may be used to assess the significance of individual pat- terns compared to the background of the assumed model. However, if instead we are interested in assessing the dy- namical implications of the evolutionary conserved net- work structure, it may be fruitful to engineer differences in the actual network and investigate how they affect the dynamical flows in the system. For instance, one can replicate experimental node ablations in silico and assess their dynamical impact [69]. In the dynamical perspective we are typically inter- ested in how short term dynamics are integrated into long term behavior of the system and seek a coarse grained de- scription of the dynamics occurring on a given network. The network itself represents the true structure, save for empirical imperfections. This dynamical viewpoint is not tied to a particular method: for instance, it is possible to formulate generative statistical models for empirically observed pathways [62][70]. Compared to some the pre- vious perspectives, the dynamical viewpoint has received somewhat less attention and has been confined mainly to diffusion dynamics. A key challenge is to extend this perspective to other types of dynamics and link it more formally to approaches of model order reduction consid- ered in control theory. In light of the recently growing interest in control of complex systems, this could help us better understanding complex systems. VI. DISCUSSION Community detection can be viewed through a range of different lenses. Rather than looking at community detection as a generic tool that is supposed to work in a generic context, considering the application in mind is important when choosing between or comparing different methods. Each of the perspectives outlined above has its own particularities, which may or may not be suitable for the problem of interest. We emphasize the different perspectives in the follow- ing example. Given a real-world graph generated by a possibly complex random assignment of edges, we assume that we are interested in some particular dynamics taking place on this graph such as epidemic spreading. We also assume that the graph is structured such that the dy- namics exhibit a time-scale separation. If, for instance, we want to coarse grain an epidemic and identify critical links that should be controlled to confine the epidemics, then it does not matter whether or not random fluctua- tions generated the modules that induces the time-scale separation. In any case, these modules will be relevant for the dynamics. Assume now that the same graph encodes interdepen- dency of tasks in a load scheduling problem. In such a circumstance, a cut-based approach will find a relevant community structure, in that it allows an optimally bal- anced assignment of tasks to processors that minimises communication between processors. These communities may be very different from the ones attached to the epi- demic spreading. In these two cases, we considered a sin- gle realisation of the network, and the goal was to extract useful information about its structure, independently of the possible mechanisms that generated it. Let us now consider the same network from a stochastic equivalence perspective, and assume for simplicity that the graph is a particular realization of an Erdos-R´enyi graph. In this case, an approach based on the SBM is expected to declare that there is no significant pattern to be found here at all, as the encountered structural vari- ations can already be explained by random fluctuations rather than by hidden class labels. Thus, communities in the SBM picture are defined via the latent variables within the statistical model of the network structure, and not via their impact on the behavior of the system. In this way, different motivations for community detection 6 can find different answers even for the very same network. In addition to the differences between these perspec- tives, there are also variations within each perspective. For instance, distinct plausible generative models such as the standard SBM or the degree corrected SBM will for a given graph lead to different inferred community struc- ture. Similar variations exist in the dynamical paradigm as well: distinct natural assumptions for the dynamics, such as dynamics with memory or not, uniform across nodes or edges, etc., applied to a given graph will lead to different partitions. Also different balancing criteria, see section II, or different concepts of high internal density, see section III, will be valid in different contexts. As a matter of fact, some of the internal variations make the perspectives overlap in particular scenarios. For instance, one can compare all algorithms on simple, undirected LFR benchmark graphs [55]. However, the LFR benchmark clearly imposes a density-based notion of communities. Similarly, for simple undirected net- works, optimizing Modularity corresponds to the infer- ence of a particular SBM [11] or may be reinterpreted as a diffusion process on a graph [12]. Nevertheless, this overlap of concepts, typically present on unweighted undirected networks, is only partial, and breaks down, for example, for directed, weighted networks, or for more complex dynamics. VII. CONCLUSIONS In summary, no general purpose algorithm will ever serve all applications or data types [13], because each per- spective emphasizes a particular core aspect: a cut-based method provides good separation of balanced groups, a clustering method provides strong cohesiveness of groups with high internal density, stochastic block models pro- vide strong similarity of nodes inside a group in terms of their connectivity profiles, and methods that view com- munities as dynamical building blocks aim to provide node groups that influence or are influenced by some dy- namics in the same way. As more and more diverse types of data are collected, leading to ever more complex net- work structures, including directed [8], temporal [71, 72], multi-layer or multiplex networks [73], the differences be- tween the perspectives presented here will become even more striking-the same network might have multiple valid partitions depending on what question about the network we are interested in. We might moreover not only be interested in partitioning the nodes, but also in partitioning edges [74], or even motifs [75]. Rather than striving to find a 'best' community-detection algorithm for a better understanding of complex networks, we ar- gue for a more careful treatment of what network aspects that we seek to understand when applying community detection. ACKNOWLEDGEMENTS We thank Aaron Clauset, Leto Peel and Daniel Lar- remore for fruitful discussions. M.R. was supported by the Swedish Research Council grant 2012-3729. MTS, 7 JCD, and RL acknowledge support from: FRS-FNRS; the Belgian Network DYSCO (Dynamical Systems, Con- trol and Optimisation) funded by the Interuniversity At- traction Poles Programme initiated by the Belgian State Science Policy Office; and the ARC (Action de Recherche Concerte) on Mining and Optimization of Big Data Mod- els funded by the Wallonia- Brussels Federation. [1] M. E. J. Newman and M. Girvan, Phys. Rev. E 69, [26] M. T. Schaub, J.-C. Delvenne, S. N. Yaliraki, and 026113 (2004). [2] M. E. J. Newman, Proceedings of the National Academy of Sciences 103, 8577 (2006). [3] S. E. Schaeffer, Computer science review 1, 27 (2007). [4] S. Fortunato, Physics reports 486, 75 (2010). [5] M. Coscia, F. Giannotti, and D. Pedreschi, Statistical M. Barahona, PloS one 7, e32210 (2012). [27] J. M. Kleinberg, in Advances in Neural Information Pro- cessing Systems 15 , edited by S. Becker, S. Thrun, and K. Obermayer (MIT Press, 2003) pp. 463–470. [28] A. Browet, J. M. Hendrickx, and A. Sarlette, arXiv:1603.00621 (2016). Analysis and Data Mining 4, 512 (2011). [29] R. Kannan, S. Vempala, and A. Vetta, Journal of the [6] S. Parthasarathy, Y. Ruan, and V. Satuluri, in Social ACM (JACM) 51, 497 (2004). network data analytics (Springer, 2011) pp. 79–113. [7] M. E. Newman, Nature Physics 8, 25 (2012). [8] F. D. Malliaros and M. Vazirgiannis, Physics Reports 533, 95 (2013). [30] R. Andersen, F. Chung, and K. Lang, in 2006 47th An- nual IEEE Symposium on Foundations of Computer Sci- ence (FOCS'06) (IEEE, 2006) pp. 475–486. [31] D. A. Spielman and S.-H. Teng, SIAM Journal on Com- [9] J. Xie, S. Kelley, and B. K. Szymanski, ACM Computing puting 42, 1 (2013). Surveys (csur) 45, 43 (2013). [10] S. Fortunato and D. Hric, Physics Reports 659, 1 (2016), community detection in networks: A user guide. [11] M. E. J. Newman, Phys. Rev. E 94, 052315 (2016). [12] J.-C. Delvenne, M. T. Schaub, S. N. Yaliraki, and M. Barahona, in Dynamics On and Of Complex Net- works, Volume 2 (Springer, 2013) pp. 221–242. [13] L. Peel, D. B. Larremore, and A. Clauset, arXiv:1608.05878 (2016). [14] U. Von Luxburg, R. C. Williamson, and I. Guyon, in JMLR Workshop and Conference Proceedings: ICML Unsupervised and Transfer Learning, Vol. 27 (2012) pp. 65–80. [15] C. J. Alpert and A. B. Kahng, Integration, the VLSI journal 19, 1 (1995). [32] K. Kloster and D. F. Gleich, in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (ACM, 2014) pp. 1386–1395. [33] J. Yang and J. Leskovec, Knowledge and Information Systems 42, 181 (2015). [34] Let us emphasize here again that this fact does not mean that conductance is a more meaningful algorithm in any way, or able to reveal some generic 'ground truth'; see [13] for an extensive discussion on the relation of meta-data and structure. [35] M. E. Newman, Physical review E 74, 036104 (2006). [36] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Journal of statistical mechanics: theory and experiment 2008, P10008 (2008). [37] S. Fortunato and M. Barth´elemy, Proceedings of the Na- [16] B. W. Kernighan and S. Lin, Bell system technical jour- tional Academy of Sciences 104, 36 (2007). nal 49, 291 (1970). [38] B. H. Good, Y.-A. de Montjoye, and A. Clauset, Phys. [17] W. E. Donath and A. J. Hoffman, IBM Technical Disclo- Rev. E 81, 046106 (2010). sure Bulletin 15, 938 (1972). [39] R. Guimera, M. Sales-Pardo, and L. A. N. Amaral, Phys- [18] W. E. Donath and A. J. Hoffman, IBM Journal of Re- ical Review E 70, 025101 (2004). search and Development 17, 420 (1973). [40] A. Lancichinetti and S. Fortunato, Phys. Rev. E 84, [19] L. Hagen and A. B. Kahng, IEEE transactions on computer-aided design of integrated circuits and systems 11, 1074 (1992). [20] U. Von Luxburg, Statistics and computing 17, 395 (2007). [21] D. A. Spielman and S.-H. Teng, in Foundations of Com- puter Science, 1996. Proceedings., 37th Annual Sympo- sium on (IEEE, 1996) pp. 96–105. [22] A. Pothen, in Parallel Numerical Algorithms (Springer, 1997) pp. 323–368. 066122 (2011). [41] M. Chen, K. Kuzmin, and B. K. Szymanski, IEEE Trans- actions on Computational Social Systems 1, 46 (2014). [42] M. Chen, T. Nguyen, arXiv:1507.04308 (2015). and B. K. Szymanski, [43] M. G. Everett and S. P. Borgatti, Journal of mathemat- ical sociology 19, 29 (1994). [44] R. A. Hanneman and M. Riddle, Introduction to so- cial network methods (University of California Riverside, 2005). [23] J. Shi and J. Malik, IEEE Transactions on pattern anal- [45] P. W. Holland, K. B. Laskey, and S. Leinhardt, Social ysis and machine intelligence 22, 888 (2000). networks 5, 109 (1983). [24] M. Fiedler, Czechoslovak mathematical journal 23, 298 [46] K. Nowicki and T. A. B. Snijders, J. Amer. Statist. Assoc. (1973). 96, 1077 (2001). [25] M. Fiedler, Czechoslovak Mathematical Journal 25, 619 [47] C. J. Anderson, S. Wasserman, and K. Faust, Social (1975). networks 14, 137 (1992). 8 [48] B. Karrer and M. E. Newman, Physical Review E 83, 016107 (2011). [49] C. Aicher, A. Z. Jacobs, and A. Clauset, Journal of Com- plex Networks 3, 221 (2014). [50] T. P. Peixoto, Physical Review E 92, 042807 (2015). [51] This ensemble assumption is also reflected in the Mod- ularity formalism, where the observed network is com- pared to a null model. [64] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona, Pro- ceedings of the National Academy of Sciences 107, 12755 (2010). [65] R. Lambiotte, J.-C. Delvenne, and M. Barahona, IEEE Transactions on Network Science and Engineering 1, 76 (2014). [66] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente, Phys. Rev. Lett. 96, 114102 (2006). [52] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, [67] V. Salnikov, M. T. Schaub, and R. Lambiotte, Scientific Phys. Rev. Lett. 107, 065701 (2011). Reports 6, 23194 (2016). [53] E. Mossel, J. Neeman, and A. Sly, arXiv:1311.4115 (2013). [54] L. Massouli´e, in Proceedings of the 46th Annual ACM Symposium on Theory of Computing (ACM, 2014) pp. 694–703. [55] A. Lancichinetti, S. Fortunato, and F. Radicchi, Phys. Rev. E 78, 046110 (2008). [56] P. J. Bickel and P. Sarkar, Journal of the Royal Statis- tical Society: Series B (Statistical Methodology) 78, 253 (2016). [57] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborov´a, and P. Zhang, Proceedings of the National Academy of Sciences 110, 20935 (2013). [58] A. Saade, F. Krzakala, and L. Zdeborov´a, in Advances in Neural Information Processing Systems 27 , edited by Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Curran Associates, Inc., 2014) pp. 406–414. [59] T. P. Peixoto, Physical review letters 110, 148701 (2013). [60] X. Yan, arXiv:1605.07057 (2016). [61] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West, [68] V. Nicosia, P. E. V´ertes, W. R. Schafer, V. Latora, and E. T. Bullmore, Proceedings of the National Academy of Sciences 110, 7880 (2013). [69] K. A. Bacik, M. T. Schaub, M. Beguerisse-Daz, Y. N. and M. Barahona, PLoS Comput Biol 12, 1 Billeh, (2016). [70] Note, however, that whereas the generative approach in [62] tries to explicitly model the underlying state space of the trajectories, we may simply be interested in effec- tively compressing the long term behavior of the system, which is a somewhat different goal. See, for instance, the discussion in Ref. [62, 76]. [71] P. Holme and J. Saramaki, Physics reports 519, 97 (2012). [72] V. Sekara, A. Stopczynski, and S. Lehmann, Proceedings of the National Academy of Sciences 113, 9977 (2016). [73] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Ge- nio, J. G´omez-Gardenes, M. Romance, I. Sendina-Nadal, Z. Wang, and M. Zanin, Physics Reports 544, 1 (2014). [74] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, Nature 466, 761 (2010). and R. Lambiotte, Nature communications 5 (2014). [75] A. R. Benson, D. F. Gleich, and J. Leskovec, Science [62] T. P. Peixoto and M. Rosvall, arXiv:1509.04740 (2015). [63] M. Rosvall and C. T. Bergstrom, Proceedings of the Na- 353, 163 (2016). [76] C. Persson, L. Bohlin, D. Edler, and M. Rosvall, arXiv tional Academy of Sciences 105, 1118 (2008). preprint arXiv:1606.08328 (2016).
1207.0561
3
1207
2013-12-31T12:32:02
Suicide ideation of individuals in online social networks
[ "cs.SI", "physics.soc-ph" ]
Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation on suicide in the context of explicit social networks of individuals is scarcely explored. To address this question, we examined a large data set obtained from a social networking service dominant in Japan. The social network is composed of a set of friendship ties between pairs of users created by mutual endorsement. We carried out the logistic regression to identify users' characteristics, both related and unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user as the membership to at least one active user-defined community related to suicide. We found that the number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide ideation in this order. Other characteristics including the age and gender contributed little to suicide ideation. We also found qualitatively the same results for depressive symptoms.
cs.SI
cs
1 Suicide ideation of individuals in online social networks Naoki Masuda1∗, Issei Kurahashi2, Hiroko Onari2 1 Department of Mathematical Informatics, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-8656, Japan 2 iAnalysis LLC, 2-2-15 Minamiaoyama, Minato-ku, Tokyo 107-0062, Japan ∗ Email: [email protected] Abstract Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation on suicide in the context of explicit social networks of individuals is scarcely explored. To address this question, we examined a large data set obtained from a social networking service dominant in Japan. The social network is composed of a set of friendship ties between pairs of users created by mutual endorsement. We carried out the logistic regression to identify users' characteristics, both related and unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user as the membership to at least one active user-defined community related to suicide. We found that the number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide ideation in this order. Other characteristics including the age and gender contributed little to suicide ideation. We also found qualitatively the same results for depressive symptoms. Introduction Suicide is a major cause of death in many countries. Japan possesses the highest suicide rate among the OECD countries in 2009 [1]. In fact, suicide explains the largest number of death cases for Japanese adolescents in their twenties and thirties [1]. Suicide is also a major cause of death for youths in other countries including the United States [2]. Since the seminal sociological study by Durkheim in the late nineteenth century [3], suicides have 2 been studied for both sociology interests and public health reasons. In particular, Durkheim and later scholars pointed out that social isolation, also referred to as the lack of social integration, is a significant contributor to suicidal behavior [3 -- 6]. Roles of social isolation in inducing other physical and mental illnesses have also been examined [7]. Conceptual models that inherit Durkheim's idea also claim that social networks affect general health conditions including tendency to suicide [8 -- 11]. Social network analysis provides a pragmatic method to quantify social isolation [12, 13]. In their seminal work, Bearman and Moody explicitly studied the relationship between suicidal behavior and egocentric social networks for American adolescents using data obtained from a national survey (National Longitudinal Study of Adolescent Health) [14]. They showed that, among many independent variables including those unrelated to social networks, a small number of friends and a small fraction of triangles to which an individual belongs significantly contribute to suicide ideation and attempts. A small number of friends is an intuitive indicator of social isolation. Another study derived from self reports from Chinese adolescents also supports this idea in a quantitative manner [15]. The paucity of triangles, or intransitivity [12], also characterizes social isolation [14]. Individuals without triangles are considered to lack membership to social groups even if they have many friends [16]; social groups are often approximated by overlapping triangles [17, 18]. Nevertheless, the structure of the Bearman -- Moody study [14] implies that our understanding of relationships between social networks and suicide is still limited. First, in the survey, a respondent was allowed to list best five friends of each gender. However, many respondents would generally have more friends. The imposed upper limit may distort network-related personal quantities such as the number of friends and triangles. Second, their study was confined inside each school in the sense that only in- school names are matched. If a respondent X named two out-school friends that were actually friends of each other, the triangle composed of these three individuals was dismissed from the analysis. Therefore, the accuracy of the triangle counts in their study may be limited such that the relationship between intransitivity and suicidal behavior remains elusive. In the present study, we examine the relationship between social networks and suicide ideation using a data set obtained from a dominant social networking service (SNS) in Japan, named mixi. Our approach addresses limitations in the previous study [14]. First, an entire social network of users is available, where a link between two users represents explicit bidirectional friendship endorsed by both users. Some users have quite a large number of friends, as in general social networks [13]. Second, for the same reason, 3 we can accurately calculate the number of triangles for each user. An additional feature of the present data set is that the sample is relatively diverse because anybody can register for free. In contrast, the respondents were 7 to 12 graders in schools in the Bearman -- Moody study. A function of mixi relevant to this study is user-defined communities. A community is a group of users that get together under a common interest, such as hobby, affiliation, or creed. A user-defined community of mixi is often composed of users that have not known each other beforehand. Although some SNSs have user-defined communities, and their dynamics were studied [19], major SNSs including Facebook do not own this type of user-defined communities. We define suicide ideation by the membership of a user to at least one community related to suicide. Then, we statistically compare users with and without suicide ideation in terms of users' properties including those related to egocentric networks. Results Multivariate logistic regression We defined the group of users with suicide ideation and the control group of users, as described in Methods. Table 1 indicates that the difference in the mean of each independent variable (see Methods for the definition of the independent variables) between the suicide and control groups is significant (p < 0.001, Student's t-test). We also verified that the distributions of each independent variable are also significantly different between the two groups (p < 0.0001, Kolmogorov-Smirnov test). The results obtained from the multivariate logistic regression are summarized in Table 2. The VIF values (see Methods) are much less than 5 for all the independent variables. The three types of correlation coefficients between pairs of the independent variables are also sufficiently small (Table 3). On these bases, we justify the application of the multivariate logistic regression to our data. The odds ratio (OR) values shown in Table 2 suggest the following. A one-year older user is 1.00463 times more likely to belong to the suicide group than the control group on average. Likewise, being female, membership to one community, having one friend, an increase in Ci by 0.01, an increase in the fraction of friends in the suicide group (i.e., homophily variable) by 0.01, and one day of the registration period make a user 0.821, 1.00733, 0.99790, 0.00930.01 = 0.95, (cid:0)2.22 × 1012(cid:1)0.01 = 1.33, and 0.999383 times more likely to belong to the suicide group, respectively. For all the independent variables, the 95 % confidence intervals of the ORs do not contain unity, and the p-values are small. Therefore, all 4 the independent variables significantly contribute to the regression. In addition, because the AUC (see Methods) is large (i.e. 0.873), the estimated multivariate logistic model captures much of the variation in the user's behavior, i.e., whether to belong to the suicide group or not. Univariate logistic regression All the independent variables significantly contribute to the multivariate regression probably because of the large sample size of our data set. Therefore, we carried out the univariate logistic regression between the dependent variable (i.e., membership to the suicide versus control group) and each independent variable to better clarify the contribution of each independent variable. The results obtained from the univariate logistic regression are shown in Table 4. Although the p-value for each independent variable is small, the AUC value considerably varies between different independent variables. The ORs for the community number, local clustering coefficient, homophily, and registration period are consistent between the multivariate and univariate regressions. For example, both regressions indicate that a user with a large community number tends to belong to the suicide group. These independent variables also yield large AUC values under the univariate regression. The community number makes by far the largest contribution among the seven independent vari- ables. The AUC value obtained from the univariate regression (0.867) is close to that obtained by the multivariate regression (0.873). The independent variable with the second largest explanatory power is the local clustering coefficient (AUC = 0.690). The results are consistent with the previous ones [14]. We stress that we reach this conclusion using a data set whose full social network is available. The homophily variable makes the third largest contribution (AUC = 0.643). Although we refer to this independent variable as homophily (see Methods), the effect of this variable is in fact interpreted as either homophily or contagion [20, 21]. Nevertheless, the result is consistent with previous claims that suicide is contagious (for recent accounts, see [6, 22 -- 26]; but see [27] for a critical review) and that other related states such as depressive symptoms are contagious [28, 29] (but see [30, 31]). The effect of the age, gender, and degree (i.e., number of friends), on suicide ideation is small, yielding small AUC values, close to the minimum value 0.5 (Table 4). In addition, the ORs for these variables are inconsistent between the multivariate and univariate regressions. For example, a female user is more likely to belong to the suicide group according to the univariate regression and vice versa according to the multivariate regression. Therefore, we conclude that these three independent variables do not explain suicide ideation. The registration period also yields a small AUC value (i.e., 0.545). Therefore, suicide ideation depends on the community number, local clustering coefficient, and homophily variable not because they commonly 5 depend on the registration period. Depressive symptoms Our data set allows us to investigate correlates between users' other characteristics and the independent variables if the characteristics have corresponding used-defined communities in the SNS. We repeated the same series of analysis for depressive symptoms, which are suggested to be implicated in suicidal behavior [5, 22, 32]. A user is defined to own depressive symptoms when the user belongs to at least one of the seven depression-related communities (Methods). The statistics of the independent variables for the depression group are compared with those for the control group in Figures 1, 2, 3, and Table 5. Each independent variable in the depression and control groups is significantly different in terms of the mean (p < 0.0001, Student's t-test; see Table 5) and distribution (p < 0.0001, Kolmogorov-Smirnov test). We applied the multivariate and univariate logistic regressions to identify independent variables that contribute to depressive symptoms (i.e., membership to the depression group). The control group is the same as that used for the analysis of suicide ideation. The results are shown in Tables 6 and 7. The VIF values shown in Table 6 and the correlation coefficient values shown in Table 3 qualify the use of the multiple logistic regression. The results are qualitatively the same as those for the suicide case. Discussion We investigated relationships between suicide ideation and personal characteristics including social net- work variables using the data obtained from a major SNS in Japan. We found that an increase in the community number (i.e., the number of user-defined communities to which a user belongs), decrease in the local clustering coefficient (i.e., local density of triangles, or transitivity), and increase in the homophily variable (i.e., fraction of neighboring users with suicide ideation) contribute to suicide ideation by the largest amounts in this order. In addition, the results are qualitatively the same when we replaced suicide 6 ideation by depressive symptoms. Remarkably, the most significant three variables represent online social behavior of users rather than demographic properties such as the age and gender. Our result that the age and gender little influence suicide ideation is inconsistent with previous findings [6]. The weak age effect in our result may be because the majority of registered users is young; the mean age of the users in the control group is 27.7 years old (Table 1). Nevertheless, we stress that suicide is a problem particularly among young generations to which a majority of the users belong. We concluded that the node degree little explains suicide ideation. In contrast, previous studies showed that suicidal behavior is less observed for individuals with more friends [14, 15]. It has also been a long-standing claim that social isolation elicits suicidal behavior [3 -- 6]. As compared to typical users, some users may spend a lot of time online to gain many ties with other users and belong to many communities on the SNS. Such a user may be active exclusively online and feel lonely, for example, to be prone to suicide ideation. Although this is a mere conjecture, such a mechanism would also explain the strong contribution of the community number to suicide ideation revealed in our analysis. In contrast, many people nowadays, especially the young, regularly devote much time to online activities including SNSs [33]. Therefore, the data obtained from SNSs may capture a significant part of users' real lives. Because mixi enjoys a large number of users and implements the user-defined community as a main function, its user-defined communities cover virtually all major topics. Therefore, applying the present methods to other psychiatric illness and symptoms, such as schizophrenia, bipolar disorder, and alcohol abuse, as well as positive symptoms may be profitable. Our studies are limited in some aspects. First, we identified suicide ideation with the membership to a relevant community, but not with suicide attempts or committed suicides. Second, membershipship to a relevant community may not even imply suicide ideation. Users may enter the suicide group because they have encountered suicide among their friends or family. Third, our data are a specific sample of individuals from a general population. This criticism applies to any work that relies on SNS data. However, it is particularly pertinent when one focuses on individuals' chracteristics (e.g., personality and attitudes) rather than collective phenomena online (e.g., contagion on SNSs). Although it is beyond the scope of the current study, quantifying the extent to which our sample accurately represents general populations remains a future challenge. 7 Methods Data Mixi is a major SNS in Japan. It started to operate on March 2004 and enjoys more than 2.7 × 107 registered users as of March 2012. Similar to other known SNSs, users of mixi can participate in various activities such as making friendship with other users, writing microblogs, sending instant messages to others, uploading photos, and playing online games. Registration is free. See [34] for a previous study of the mixi social network. In mixi, there were more than 4.5 × 106 user-defined communities on various topics as of April 2012. Users can join a user-defined community if the owner personally permits or the owner allows anybody to join it. We identified suicide ideation with the membership of a user to at least one suicidal community. To define suicidal community, which is sufficiently active, we first selected communities satisfying the following five criteria: (1) The name included the word "suicide" ("jisatsu" in Japanese), (2) there were at least 1000 members on November 2, 2011, (3) there were at least 100 comments posted on October, 2011, which were directed to other comments or topics, (4) there were at least three independent topics on which comments were made on October, 2011, and (5) the condition for admission was made open to public. Seven communities met these criteria. Then, we excluded one community whose name indicated that it concentrated on methodologies of committing suicide and two communities whose names indicated that they encouraged members to live with hopes (one contained the word "want to live", and the other contained the word "have a fun" in their names; translations by the authors). As a result, four communities were qualified as suicidal communities. The user statistics of these communities are shown in Table 8. A user that belongs to at least one suicidal community is defined to possess suicide ideation. To exclude inactive users, we restricted ourselves to the set of active users. The active user was defined as users that existed as of January 23, 2012 and logged on to mixi in more than 20 days per month on average from August through December 2011. A similar definition was used in a previous study of the Facebook social network [35]. We also discarded users with zero or one friend on mixi because the triangle count described below was undefined for such users. Despite this exclusion, the remaining data allowed us to examine the effect of social isolation in terms of the degree, i.e., number of neighbors, because the degree was widely distributed between 2 and 1000. There were 9990 active users 8 with suicide ideation (suicide group). We statistically compared the users in the suicide group with users without suicide ideation. Because the number of users was huge, we randomly selected 228949 active users that possessed at least two friends and belonged to neither of the seven candidates of the suicidal community defined above nor the ten candidates of the depression-related community defined below. We call this set of users the control group. The employees of mixi deleted private information irrelevant to the present study and encrypted the relevant private information before we analyzed the data. In addition, we conducted all the analysis in the central office of mixi located in Tokyo using a computer that was not connected to Internet. Statistical models The dependent variable that represents the level of suicide ideation is binary, i.e., whether a user belongs to a suicidal community or not. Therefore, we used univariate and multivariate logistic regressions. To check the multicollinearity between independent variables to justify the use of the multivariate logistic regression, we carried out two subsidiary analysis. First, we measured the variance inflation factor (VIF) for each independent variable (see [36, 37] and references therein). The VIF is the reciprocal of the fraction of the variance of the independent variable that is not explained by linear combinations of the other independent variables. It is recommended that the VIF value for each independent variable is smaller than 10 (preferably smaller than 5) for the multivariate logistic regression to be valid. Second, we measured the Pearson, Spearman, and Kendall correlation coefficients between the independent variables. To quantify the explanatory power of the logistic model, we measured the area under the receiver operating characteristic curve (AUC) for each fit (e.g., [37]). The receiver operating characteristic curve is the trajectory of the false positive (i.e., fraction of users in the control group that are mistakenly classified into the suicide group on the basis of the linear combination of the independent variables) and the true positive (i.e., fraction of users in the suicide group correctly classified into the suicide group), when the threshold for classification is varied. The AUC value falls between 0.5 and 1. A large AUC value indicates that the logistic regression fits well to the data in the sense that users are accurately classified into suicide and control groups. 9 Independent Variables We considered seven independent variables. Their univariate statistics for the suicide and control groups are shown in Table 1. Demographics. Demographic independent variables include age and gender. Our analysis does not include ethnic components because most users are Japanese-speaking Japanese; mixi provides services in Japanese. Other demographic, socioeconomic, and personal characteristic variables such as residence area, occupation, company/school, and hobby, were not used because they were unreliable. In fact, many users leave them blank or do not fill them consistently, probably because they do not want to disclose them. Community number. The number of user-defined communities that a user belongs to was adopted as an independent variable. We refer to this quantity as community number. The community number obeys a long tailed distribution for both suicide and control groups (Figure 1). The mean is quite different between the two groups (Table 1). Degree. When a user sends a request to another user and the recipient accepts the request, the pair of users form an undirected social tie, called Friends. A web of Friends defines a social network of mixi. We adopted degree as the most basic network-related independent variable. The degree is the number of neighbors (i.e., Friends), and denoted by ki for user i. The system of mixi allows a user to own at most degree 1000. As is consistent with the previous analysis of a much smaller data set of mixi [34], the degree distributions for both groups are long tailed (Figure 2). A small degree is an indicator of social isolation. Local clustering coefficient We quantified transitivity, or the density of triangles around a user, by the local clustering coefficient, denoted by Ci for user i. A directed-link version of the same quantity was used in the Bearman -- Moody study. For user i having degree ki, there can be maximum ki(ki − 1)/2 triangles that include user i. We defined Ci as the actual number of triangles that included i divided by ki(ki − 1)/2. Examples are shown in Figure 4. By definition, 0 ≤ Ci ≤ 1. We discarded the users with ki ≤ 1 because Ci was defined only for users with ki ≥ 2. Ci quantifies the extent to which neighbors of user i are adjacent to each other [13, 38]. If Ci is large, the user is probably embedded in close-knit social groups [12,13,38]. A small Ci value is an indicator of social isolation. As in many networks [13], Ci decreases with ki in both suicide and control groups (Figure 3). The results are consistent with those in the previous study in which the average Ci obtained without categorizing users is roughly proportional 10 to k−0.6 i [34]. Therefore, we carefully distinguished the influence of ki and Ci on suicide ideation by combining univariate and multivariate regressions. Homophily. Suicide may be a contagious phenomenon (e.g., [6, 22 -- 26]). If so, a user is inclined to suicide ideation when a neighbor in the social network is. Therefore, we adopted the fraction of neighbors with suicide ideation as an independent variable. It should be noted that, even if a user with suicide ideation has relatively many friends with suicide ideation, it does not necessarily imply that suicide is contagious. Homophily may be a cause of such assortativity. In this study, we did not attempt to distinguish the effect of imitation and homophily. The differentiation would require analysis of temporal data [20,21]. Nevertheless, for a notational reason, we refer to the fraction of neighbors as the homophily variable. Registration period. A user that registered to mixi long time ago may be more active and own more resources in mixi than new users. Such an experienced user may tend to simultaneously have, for example, a large community number, large degree, and perhaps high activities in various communities including suicidal ones. To control for this factor, we measured the registration period defined as the number of days between the registration date and January 23, 2012. Analysis of depressive symptoms To define depression-related community, we identified the communities satisfying the five criteria as in the case of suicidal community, but with the term suicide in the community name replaced by depression ("utsu" in Japanese). There were ten such communities. We excluded three of them because their names include positive words (let's overcome, resume one's place in society, cure; translations by the authors). We defined the remaining seven communities, summarized in Table 9, to represent depressive symptoms of users. The depression group is the set of active users that belongs to at least one depression-related community listed in Table 9. The depression group contains 24410 users. Ethics statement Mixi approved the provision of the data. Acknowledgments We thank mixi, Inc. for providing us with their data and Taro Takaguchi for careful reading of the 11 manuscript. References 1. Chambers A (2010) Japan: ending the culture of the 'honourable' suicide. The Guardian (3 August 2010). 2. US Bureau of the Census (2012). Statistical abstract of the United States. 3. Durkheim E (1951) Suicide. New York: Free Press. 4. Trout DL (1980) The role of social isolation in suicide. Suicide Life-Threatening Behav 10: 10 -- 23. 5. Joiner Jr TE, Brown JS, Wingate LR (2005) The psychology and neurobiology of suicidal behavior. Annu Rev Psychol 56: 287 -- 314. 6. Wray M, Colen C, Pescosolido B (2011) The sociology of suicide. Annu Rev Sociol 37: 505 -- 528. 7. Putnam RD (2000) Bowling Alone. New York: Simon & Schuster. 8. Pescosolido BA, Georgianna S (1989) Durkheim, suicide, and religion: toward a network theory of suicide. Amer Sociol Rev 54: 33 -- 48. 9. Bearman PS (1991) The social structure of suicide. Sociol Forum 6: 501 -- 524. 10. Berkman LF, Glass T, Brissette I, Seeman TE (2000) From social integration to health: Durkheim in the new millennium. Soc Sci Med 51: 843 -- 857. 11. Kawachi I, Berkman LF (2001) Social ties and mental health. J Urban Health 78: 458 -- 467. 12. Wasserman S, Faust K (1994) Social Network Analysis. New York: Cambridge University Press. 13. Newman MEJ (2010) Networks -- An Introduction. Oxford: Oxford University Press. 14. Bearman PS, Moody J (2004) Suicide and friendships among American adolescents. Amer J Public Health 94: 89 -- 95. 12 15. Cui S, Cheng Y, Xu Z, Chen D, Wang Y (2010) Peer relationships and suicide ideation and attempts among Chinese adolescents. Child Care Health Dev 37: 692 -- 702. 16. Krackhardt D (1999) The ties that torture: Simmelian tie analysis in organizations. Research in the Sociology of Organizations 16: 183 -- 210. 17. Palla G, Der´enyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435: 814 -- 818. 18. Onnela JP, Saramaki J, Hyvonen J, Szab´o G, Lazer D, et al. (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci USA 104: 7332 -- 7336. 19. Backstrom L, Huttenlocher D, Kleinberg J, Lan X (2006) Group formation in large social net- works: membership, growth, and evolution. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining : 44 -- 54. 20. Aral S, Muchnik L, Sundararajan A (2009) Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc Natl Acad Sci USA 106: 21544 -- 21549. 21. Shalizi CR, Thomas AC (2011) Homophily and contagion are generically confounded in observa- tional social network studies. Sociol Methods Res 40: 211 -- 239. 22. Mann JJ (2002) A current perspective of suicide and attempted suicide. Ann Intern Med 136: 302 -- 311. 23. Baller RD, Richardson KK (2002) Social integration, imitation, and the geographic patterning of suicide. Amer Soc Rev 67: 873 -- 888. 24. Romer D, Jamieson PE, Jamieson KH (2006) Are news reports of suicide contagious? A stringent test in six U. S. cities. J Communication 56: 253 -- 270. 25. Hedstrom P, Liu KY, Nordvik MK (2008) Interaction domains and suicide: a population-based panel study of suicides in Stockholm, 1991 -- 1999. Soc Forces 87: 713 -- 740. 26. Baller RD, Richardson KK (2009) The "dark side" of the strength of weak ties: the diffusion of suicidal thoughts. J Health Soc Behav 50: 261 -- 276. 13 27. Gould MS, Wallenstein S, Davidson L (1989) Suicide clusters: a critical review. Suicide Life- Threatening Behav 19: 17 -- 29. 28. Christakis NA, Fowler JH (2009) Connected. New York: Little, Brown and Company. 29. Rosenquist JN, Fowler JH, Christakis NA (2011) Social network determinants of depression. Mol Psychiatry 16: 273 -- 281. 30. Lyons R (2011) The spread of evidence-poor medicine via flawed social-network analysis. Stat Politics Policy 2: Article 2. 31. VanderWeele TJ (2011) Sensitivity analysis for contagion effects in social networks. Sociol Methods Res 40: 240 -- 255. 32. Brezo J, Paris J, Turecki G (2006) Personality traits as correlates of suicidal ideation, suicide attempts, and suicide completions: a systematic review. Acta Psychiatr Scand 113: 180 -- 206. 33. Martin D (2010) What Americans do online: social media and games dominate activity. Nielsen News, Online (2 August 2010). 34. Yuta K, Ono N, Fujiwara Y (2007). A gap in the community-size distribution of a large-scale social networking site. arXiv:physics/0701168. 35. Ugander J, Karrer B, Backstrom L, Marlow C (2011). The anatomy of the Facebook social graph. arXiv:1111.4503. 36. Stine RA (1995) Graphical interpretation of variance inflation factors. Am Stat 49: 53 -- 56. 37. Tuff´ery S (2011) Data Mining and Statistics for Decision Making (2nd edition). Chichester: Willey. 38. Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393: 440 -- 442. 14 Figure captions Figure 1: Distribution of the community number (i.e., number of communities to which a user belongs) for the suicide, depression, and control groups. We set the bin width for generating the histogram to 50. The abrupt increase in the distribution at 1000 communities for the suicide and depression groups is owing to the restriction that a user can belong to at most 1000 communities. Figure 2: Complementary cumulative distribution of the degree (i.e., fraction of users having the degree larger than a specified value) for the suicide, depression, and control groups. Figure 3: Dependence of the mean local clustering coefficient on the degree for the suicide, depression, and control groups. Each data point C(k) for degree k is obtained by averaging Ci over the users in a group with degree k. Large fluctuations of C(k) at large k values are caused by the paucity of users having large k. Figure 4: Examples of the degree (ki) and the local clustering coefficient (Ci). The shown values of ki and Ci are for the nodes shown by the filled circles. 15 Table captions Table 1: Univariate statistics of independent variables for the suicide and control groups. The p-value for the gender is based on the Chi-square test. The p-values for the other independent variables are based on the Student's t-test. Also shown are the statistics of two auxiliary variables that are not used in the logistic regression, i.e., the number of suicidal communities to which the user belongs and the number of days on which the user logged on to mixi. The p-value for the number of log-on days is based on the Student's t-test. SD: standard deviation. Table 2: Multivariate logistic regression of suicide ideation on individual and network variables. OR: odds ratio; CI: 95 % confidence interval; VIF: variance inflation factor. Table 3: Correlation coefficients between pairs of independent variables for the suicide, depression, and control groups. P: Pearson; S: Spearman; K: Kendall correlation coefficients. Table 4: Univariate logistic regression of suicide ideation on individual and network variables. OR: odds ratio; CI: 95 % confidence interval; AUC: area under the curve. Table 5: Univariate statistics of independent variables for the depression and control groups. The values for the control group are equal to those shown in Table 1 except for those of the homophily variable. The homophily is defined as the fraction of neighbors belonging to the depression group in this table, whereas it is defined as the fraction of neighbors belonging to the suicide group in Table 1. The p-value for the gender is based on the Chi-square test. The p-values for the other variables are based on the Student's t-test. SD: standard deviation. Table 6: Multivariate logistic regression of depressive symptoms on individual and network variables. OR: odds ratio; CI: 95 % confidence interval; VIF: variance inflation factor. Table 7: Univariate logistic regression of depressive symptoms on individual and network variables. OR: odds ratio; CI: 95 % confidence interval; AUC: area under the curve. Table 8: Statistics of suicidal communities. Table 9: Statistics of depression-related communities. For a technical reason, we collected the number of members for communities 1, 2, 3, and 6 on November 2, 2011 and communities 4, 5 and 7 on November 4, 2011. 16 Figure 1 17 s r e s u f o n o i t c a r f 0.8 0.6 0.4 0.2 0.0 Suicide Depression Control 0 200 400 600 800 1000 community number Figure 2 18 n o i t c n u f r o v i v r u S 1.0 0.8 0.6 0.4 0.2 0.0 Suicide Depression Control 101 102 103 degree Figure 3 19 Figure 4 20 ) k ( C 10- 1 10- 2 10- 3 10- 4 Suicide Depression Control 101 102 103 degree 21 Table 1 Variable Suicide group (N = 9, 990) Control group (N = 228, 949) Mean±SD Range (min,max) Mean±SD Range (min,max) p-value Age 27.4±10.3 (17, 97) 27.7±9.2 (14, 96) 0.000652 Community number 283.7±284.3 (1, 1000) 46.3±79.4 (1, 1000) < 0.0001 ki Ci 82.9±98.7 (2, 1000) 65.8±67.6 (2, 1000) < 0.0001 0.087±0.097 (0, 1) 0.150±0.138 (0, 1) < 0.0001 Homophily (suicide) 0.0110±0.0329 (0, 1.000) 0.0012±0.0080 (0, 0.667) < 0.0001 Registration period 1235.7±638.9 (122, 2878) 1333.5±670.5 (102, 2891) < 0.0001 Gender (female) 5,786 (57.9%) 126,941 (55.4%) < 0.0001 No. suicidal communities 1.20±0.51 (1, 4) N/A N/A N/A No. login days 28.9±4.4 (1, 31) 26.9±6.3 (1, 31) < 0.0001 22 Table 2 Variable OR CI p-value VIF Age 1.00463 (1.00211, 1.00716) 0.000313 1.091 Gender (female = 1) 0.821 (0.783, 0.861) < 0.0001 1.028 Community number 1.00733 (1.00720, 1.00747) < 0.0001 1.197 ki Ci 0.99790 (0.99758, 0.99821) < 0.0001 1.156 0.0093 (0.0069, 0.0126) < 0.0001 1.081 Homophily (suicide) 2.22 × 1012 (0.57 × 1012, 8.65 × 1012) < 0.0001 1.016 Registration period 0.999383 (0.999346, 0.999420) < 0.0001 1.135 23 Table 3 Variable 1 Variable 2 Suicide Depression Control P S K P S K P S K Age Age Age Age Age Age Age Gender Gender Gender Gender Gender Gender Gender −.094 −.137 −.116 −.166 −.174 −.145 −.053 −.026 −.022 Community number −.045 −.105 −.073 −.089 −.131 −.091 −.032 .023 .015 ki Ci −.103 −.224 −.157 −.168 −.268 −.187 −.279 −.385 −.271 −.048 −.220 −.154 −.092 −.273 −.192 .041 −.152 −.111 Homophily (suicide) .031 −.037 −.029 N/A N/A N/A −.011 −.090 .074 Homophily (depression) N/A N/A N/A .166 .121 −.089 −.007 −.083 −.066 Registration period .159 .356 .259 .203 .364 .266 .278 .460 .337 Community number .205 .204 .166 .086 .083 .068 .110 .116 .095 ki Ci .048 .046 .038 .048 .046 .038 .015 .014 .011 −.109 −.097 −.080 −.061 −.030 −.024 −.084 −.085 −.069 Homophily (suicide) −.007 .031 .028 N/A N/A N/A −.012 −.017 −.017 Homophily (depression) N/A N/A N/A −.053 −.021 −.018 .000 .009 .008 Registration period −.064 −.061 −.050 −.078 −.079 −.065 .025 .025 .020 Community number Community number ki Ci .348 .338 .231 .375 .360 .248 .375 .372 .258 −.231 −.200 −.136 −.201 −.171 −.116 −.376 −.399 −.277 Community number Homophily (suicide) −.034 .140 .105 N/A N/A N/A .027 .113 .091 Community number Homophily (depression) N/A N/A N/A −.150 .034 .025 .038 .166 .132 Community number Registration period .166 .152 .102 .187 .172 .115 .339 .338 .230 ki ki ki ki Ci Ci Ci Ci −.251 −.116 −.085 −.240 −.105 −.074 −.363 −.248 −.175 Homophily (suicide) −.175 .174 .107 N/A N/A N/A −.013 .191 .150 Homophily (depression) N/A N/A N/A −.210 .076 .029 −.027 .254 .188 Registration period .170 .154 .103 .172 .152 .101 .102 .081 .055 Homophily (suicide) −.047 −.213 −.162 N/A N/A N/A −.026 −.100 −.080 Homophily (depression) N/A N/A N/A −.055 −.243 −.182 −.031 −.145 −.114 Registration period −.143 −.112 −.162 −.133 −.099 −.068 −.221 −.249 −.168 Homophily (suicide) Registration period −.104 −.059 −.044 N/A N/A N/A −.039 −.031 −.025 Homophily (depression) Registration period N/A N/A N/A −.120 −.049 −.036 −.024 .011 .009 24 Table 4 Variable OR CI p-value AUC Age 0.99604 (0.99377, 0.99832) 0.000651 0.515 Gender (female = 1) 1.106 (1.062, 1.152) < 0.0001 0.512 Community number 1.00728 (1.00716, 1.00741) < 0.0001 0.867 ki Ci 1.00259 (1.00237, 1.00280) < 0.0001 0.549 0.000581 (0.000428, 0.000789) < 0.0001 0.690 Homophily (suicide) 1.57 × 1016 (0.41 × 1016, 6.08 × 1016) < 0.0001 0.643 Registration period 0.999783 (0.999753, 0.999813) < 0.0001 0.545 25 Table 5 Variable Depression group (N = 24, 410) Control group (N = 228, 949) Mean±SD Range (min,max) Mean±SD Range (min,max) p-value Age 28.8±9.4 (16, 97) 27.7±9.2 (14, 96) < 0.0001 Community number 249.6±263.1 (1, 1000) 46.3±79.4 (1, 1000) < 0.0001 ki Ci 81.9±88.1 (2, 1000) 65.8±67.6 (2, 1000) < 0.0001 0.085±0.089 (0, 1) 0.150±0.138 (0, 1) < 0.0001 Homophily (depression) 0.0196±0.0501 (0, 1.000) 0.0031±0.0131 (0, 0.667) < 0.0001 Registration period 1389.4±659.2 (122, 2885) 1333.5±670.5 (102, 2891) < 0.0001 Gender (female) 16,872 (69.1%) 126,941 (55.4%) < 0.0001 No. suicidal communities 1.16±0.47 (1, 6) N/A N/A N/A No. login days 28.8±4.4 (1, 31) 26.9±6.3 (1, 31) < 0.0001 26 Table 6 Variable OR CI p-value VIF Age 1.0141 (1.0124, 1.0158) < 0.0001 1.104 Gender (female = 1) 1.532 (1.481, 1.585) < 0.0001 1.019 Community number 1.00790 (1.00778, 1.00803) < 0.0001 1.155 ki Ci 0.99833 (0.99810, 0.99856) < 0.0001 1.154 0.0145 (0.0118, 0.0178) < 0.0001 1.079 Homophily (depression) 1.98 × 1010 (0.99 × 1010, 4.02 × 1010) < 0.0001 1.022 Registration period 0.999744 (0.999720, 0.999769) < 0.0001 1.117 27 Table 7 Variable OR CI p-value AUC Age 1.0110 (1.0097, 1.0123) < 0.0001 0.551 Gender (female = 1) 1.799 (1.748, 1.850) < 0.0001 0.568 Community number 1.00826 (1.00814, 1.00837) < 0.0001 0.860 ki Ci 1.00258 (1.00243, 1.00274) < 0.0001 0.566 0.000415 (0.000338, 0.000509) < 0.0001 0.692 Homophily (depression) 2.12 × 1012 (1.05 × 1012, 4.28 × 1012) < 0.0001 0.658 Registration period 1.000126 (1.000106, 1.000145) < 0.0001 0.522 28 Table 8 Date of creation No. active Fraction of No. No. active (day/month/year) No. users users active users (%) comments topics 18/01/2008 21/09/2006 01/12/2004 04/02/2008 8367 5135 3459 1445 5985 3192 1883 965 69.9 62.9 53.2 62.4 741 318 279 105 16 6 12 9 ID 1 2 3 4 29 Table 9 Date of creation No. active Fraction of No. No. active ID (day/month/year) No. users users active users (%) comments topics 1 2 3 4 5 6 7 06/04/2004 15618 06/02/2006 13082 08/12/2004 22/04/2006 28/01/2008 09/12/2004 21/12/2004 4948 4606 3406 3464 2440 8605 9674 2845 2907 2321 2039 1367 54.7 72.8 56.5 60.4 65.0 58.2 54.2 14466 1008 782 221 1350 851 535 52 16 17 30 24 20 5
1603.01511
1
1603
2016-03-04T15:59:06
Hoaxy: A Platform for Tracking Online Misinformation
[ "cs.SI", "physics.soc-ph" ]
Massive amounts of misinformation have been observed to spread in uncontrolled fashion across social media. Examples include rumors, hoaxes, fake news, and conspiracy theories. At the same time, several journalistic organizations devote significant efforts to high-quality fact checking of online claims. The resulting information cascades contain instances of both accurate and inaccurate information, unfold over multiple time scales, and often reach audiences of considerable size. All these factors pose challenges for the study of the social dynamics of online news sharing. Here we introduce Hoaxy, a platform for the collection, detection, and analysis of online misinformation and its related fact-checking efforts. We discuss the design of the platform and present a preliminary analysis of a sample of public tweets containing both fake news and fact checking. We find that, in the aggregate, the sharing of fact-checking content typically lags that of misinformation by 10--20 hours. Moreover, fake news are dominated by very active users, while fact checking is a more grass-roots activity. With the increasing risks connected to massive online misinformation, social news observatories have the potential to help researchers, journalists, and the general public understand the dynamics of real and fake news sharing.
cs.SI
cs
Hoaxy: A Platform for Tracking Online Misinformation ∗ Chengcheng Shao School of Computer National University of Defense Technology, China Giovanni Luca Ciampaglia1, Alessandro Flammini1,2, Filippo Menczer1,2 1 Indiana University Network Science Institute 2 School of Informatics and Computing Indiana University, Bloomington, USA 6 1 0 2 r a M 4 ] I S . s c [ 1 v 1 1 5 1 0 . 3 0 6 1 : v i X r a ABSTRACT Massive amounts of misinformation have been observed to spread in uncontrolled fashion across social media. Exam- ples include rumors, hoaxes, fake news, and conspiracy the- ories. At the same time, several journalistic organizations devote significant efforts to high-quality fact checking of on- line claims. The resulting information cascades contain in- stances of both accurate and inaccurate information, un- fold over multiple time scales, and often reach audiences of considerable size. All these factors pose challenges for the study of the social dynamics of online news sharing. Here we introduce Hoaxy, a platform for the collection, detection, and analysis of online misinformation and its related fact- checking efforts. We discuss the design of the platform and present a preliminary analysis of a sample of public tweets containing both fake news and fact checking. We find that, in the aggregate, the sharing of fact-checking content typi- cally lags that of misinformation by 10–20 hours. Moreover, fake news are dominated by very active users, while fact checking is a more grass-roots activity. With the increas- ing risks connected to massive online misinformation, social news observatories have the potential to help researchers, journalists, and the general public understand the dynamics of real and fake news sharing. Keywords Misinformation; hoaxes; checking; Twitter fake news; rumor tracking; fact 1. INTRODUCTION The recent rise of social media has radically changed the way people consume and produce information online [21]. Approximately 65% of the US adult population accesses the news through social media [2, 30], and more than a billion ∗Work performed as a visiting scholar at Indiana University. Email: [email protected] Preprint version . people worldwide are active on a daily basis on Facebook alone [16]. The possibility for normal consumers to produce content on social media creates new economies of attention [10] and has changed the way companies relate to their customers [35]. Social media allow users to participate in the propagation of the news. For example, in Twitter, users can rebroad- cast, or retweet, any piece of content to their social circles, creating a competition among posts for our limited atten- tion [37]. This has the implication that no individual author- ity can dictate what kind of information is distributed on the whole network. While such platforms have brought about a more egalitarian model of information access according to some [4], the inevitable lack of oversight from expert jour- nalists makes social media vulnerable to the unintentional spread of false or inaccurate information, or misinformation. Large amounts of misinformation have been indeed ob- served to spread online in viral fashion, oftentimes with wor- rying consequences in the offline world [8, 22, 29, 23, 27, 7]; examples include rumors [18], false news [8, 23], hoaxes, and even elaborate conspiracy theories [1, 13, 19]. Due to the magnitude of the phenomenon, media orga- nizations are devoting increasing efforts to produce accu- rate verifications in a timely manner. For example, during Hurricane Sandy, false reports that the New York Stocks Exchange had been flooded were corrected in less than an hour [36]. These fact-checking assessments are consumed and broadcast by social media users like any other type of news content, leading to a complex interplay between 'memes' that vie for the attention of users [37]. Examples of such organizations include Snopes.com, PolitiFact, and FactCheck.org. Structural features of the information exchange networks underlying social media create peculiar patterns of infor- mation access. Online social networks are characterized by homophily [25], polarization [12], algorithmic ranking [3], and social bubbles [28] - information environments with low content diversity and strong social reinforcement. All of these factors, coupled with the fast news life cy- cle [14, 10], create considerable challenges for the study of the dynamics of social news sharing. To address some of these challenges, here we present Hoaxy, an upcoming Web platform for the tracking of social news sharing. Its goal is to let researchers, journalists, and the general public moni- tor the production of online misinformation and its related fact checking. As a simple proof of concept for the capabilities of this kind of systems, here we present the results of a prelimi- nary analysis on a dataset of public tweets collected over the course of several months. We focus on two aspects: the temporal relation between the spread of misinformation and fact checking, and the differences in how users share them. We find that, in absolute terms, misinformation is produced in much larger quantity than fact-checking content. Fact checks obviously lag misinformation, and we present evi- dence that there exists a characteristic lag of approximately 13 hours between the production of misinformation and that of fact checking. Finally, we show preliminary evidence that fact-checking information is spread by a broader plurality of users compared to fake news. 2. RELATED WORK Tracking abuse of social media has been a topic of in- tense research in recent years. Beginning with the detection of simple instances of political abuse like astroturfing [31], researchers noted the need for automated tools for monitor- ing social media streams. Several such systems have been proposed in recent years, each with a particular focus or a different approach. The Truthy system [32], which relies on network analysis techniques, is among the best known of such platforms. The TweetCred system [9] focuses instead on content-based features and other kind of metadata, and distills a measure of overall information credibility. More recently, specific systems have been proposed to detect rumors. These include RumorLens [33], Twitter- Trails [26], and FactWatcher [20]. The fact-checking capa- bilities of these systems range from completely automatic (TweetCred), to semi-automatic (TwitterTrails, RumorLens). In addition, some of them let the user explore the prop- agation of a rumor with an interactive dashboard (Twit- terTrails, RumorLens). However, they do not monitor the social media stream automatically, but require the user to input a specific rumor to investigate. Compared with these, the objective of the Hoaxy system is to track both accurate and inaccurate information in automatic fashion. Automatic attempts to perform fact checking have been recently proposed for simple statements [11], and for multi- media content [6]. At this initial stage, because our focus is on automatic tracking of news sharing, the Hoaxy system does not perform any kind of fact checking. Instead, we fo- cus on tracking news shares from sources whose accuracy has been determined independently. There have been investiga- tions on the related problems of finding reliable information sources [15] and news curators [24]. 3. SYSTEM ARCHITECTURE Our main objective is to build a uniform and extensible platform to collect and track misinformation and fact check- ing. Fig. 1 shows the architecture of our system. Currently our efforts have been focused on the 'Monitors' part of the system. We have implemented a tracker for the Twitter API, and a set of crawlers for both fake news and fact checking websites, as well as a database. We begin by describing the origin of our data. The sys- tem collects data from two main sources: news websites and social media. From the first group we can obtain data about the origin and evolution of both fake news stories and their fact checking. From the second group we collect instances of these news stories (i.e., URLs) that are being shared online. Figure 1: Architecture of the Hoaxy system. To collect data from such disparate sources, we make use of a number of technologies: Web scraping, Web syndica- tion, and, where available, APIs of social networking plat- forms. For example, we use the Twitter streaming API to do real-time tracking of news sharing. Because tweets are limited to 140 characters, the most common method to share a news story on Twitter is to include directly a link to its Web article. This means that we can focus only on tweets containing links to specific domains (websites), a task that is performed efficiently by the filter endpoint of the Twitter streaming API.1 To collect data on news stories we rely on RSS, which al- lows us to use a unified protocol instead of manually adapt- ing our scraper to the multitude of Web authoring systems used on the Web. Moreover, RSS feeds contain information about updates made to news stories, which let us track the evolution of news articles. We collect data from news sites using the following two steps: when a new website is added to our list of monitored sources, we perform a 'deep' crawl of its link structure using a custom Python spider written with the Scrapy framework2; at this stage, we also identify the URL of the RSS feed, if available. Once all existing sto- ries have been acquired, we perform every two hours a 'light' crawl by checking its RSS feed only. To perform the 'deep' crawl, we use a depth-first strategy. The 'light' crawl is in- stead performed using a breadth-first approach. We store all these structured data into a database; this allows convenient retrieval for future analysis, which we plan to implement as an interactive Web dashboard. Unfortunately, URLs do not make for good, unique identifiers, since URLs with different protocol schema, query parameters, or fragments may all refers to the same page. We rely on canonical URLs where possible, and adopt a simple URL canonization technique in other cases (see below). 1dev.twitter.com/streaming/reference/post/ statuses/filter 2scrapy.org DATABASEStoreMonitorsURL Tracker(stream api)RSS ParserScrapy SpiderFetchNews SitesSocial NetworksAPICrawlerAnalysis Dashboard Figure 2: Lagged cross correlation (Pearson's r) be- tween news sharing activity of misinformation and fact-checking, with peak value at lag = −13 hours. Figure 3: Daily volume of tweets. The gaps corre- spond to two windows with missing data when our collection script crashed. Table 1: Summary statistics of tweet data. Nusers NURLs source Nsites Ntweets fake news fact checking 71 6 1,287,769 154,526 171,035 78,624 96,400 11,183 4. PRELIMINARY ANALYSIS In this section we report results from a preliminary anal- ysis performed on a large set of public tweets collected over the course of several months. Since we are interested in characterizing the relation between the overall social shar- ing activity of misinformation and fact checking, we begin our analysis by focusing on the overall aggregate volume of tweets, without breaking activity down to the level of an in- dividual story or set of stories. We take aggregate volume as a proxy for the overall social sharing activity of news stories. 4.1 Data We collect tweets containing URLs from two lists of Web domains: the first, fake news, covers 71 domains and was taken from a comprehensive resource on online misinforma- tion.3 We manually removed known satirical sources like The Onion. The second list is composed of the six most popular fact-checking websites: Snopes.com, PolitiFact. com, FactCheck.org, OpenSecrets.org, TruthOrFiction. com, and HoaxSlayer.com. The keywords we used to collect all these tweets correspond to the domain names of these websites. To convert the URLs to canonical form we perform the following steps: first, we transform all text into lower case; then we remove the protocol schema (e.g. 'http://'); then we remove, if present, any prefix instance of the strings 'www.' or 'm.'; finally, we remove all URL query parameters. We collected about 3 months of filtered tweets traffic from Oct 14, 2015 to Jan 24, 2016. The summary statistics for the numbers of tweets, unique users, and unique canonical 3fakenewswatch.com URLs (Table 1) illustrate the imbalance between the sets of fake news and fact-checking sites. 4.2 Tweet Volume Fig. 3 plots the daily volume of tweets. As described be- fore, we track more fake sites than fact checking ones, so the volume of fake news tweets is larger than that of fact checking ones by approximately one order of magnitude. While both time series display significant fluctuations, the presence of aligned peaks (Nov 16) and valleys (Nov 2) sug- gests the presence of cross-correlated activity. To better understand this, we perform a lagged cross-correlation anal- ysis, which measures the similarity between two time series signals as a function of the lag. Fig. 2 shows the results of the cross correlation analysis, with lags ranging from −48 hours to +48 hours. A higher correlation at a negative lag indicates that the sharing of fake news precedes that of fact checking. To eliminate circa- dian fluctuations, we use a simple moving average method with centered window of size equal to 24 hours. The results suggest that, in the limited number of examples at our dis- posal, there is a characteristic time lag between fake news and fact checking of approximately 13 hours. Because the moving average cleaning could only remove circadian fluc- tuations, we do not exclude the presence of correlations at larger lags (e.g., weekly). While this cross-correlation is suggestive of a temporal relation between misinformation and fact-checking, it is im- portant to understand that it is based on aggregate data. We selected a subset of URLs from both data sets to see if these correlations also hold at the level of individual events. We followed two strategies: (1) we selected a single URL from our pool of fake news stories and a matching URL from that of fact-checking stories; (2) we considered a small set of keywords and used them to perform pattern matching on the lists of URLs. Table 2 displays the two URLs (A1, A2) used in the first strategy. The reported story focuses on the current Syr- ian conflict, and contains several inaccuracies that were de- bunked in a piece by Snopes.com. For the second strategy, −40−2002040Lag (hours)0.000.050.100.150.200.250.300.350.40rNovDecJan2016103104105Number of tweetsFake newsFact checking Table 2: A1: An example of inaccurate news story. A2: Corresponding fact checking page. B1: News articles reporting inaccurate information about the death of actor Alan Rickman. B2: Corresponding fact-checking pages. A1 A2 B1 www.infowars.com/white-house-gave-isis-45-minute-warning-before-bombing-oil-tankers/ www.snopes.com/2015/11/23/obama-dropped-leaflets-warning-isis-airstrikes/ en.mediamass.net/people/alan-rickman/deathhoax.html www.disclose.tv/forum/david-bowie-alan-rickman-death-hoax-100-staged-t108254.html worldtruth.tv/david-bowie-and-alan-rickman-death-hoax-100-staged/ beforeitsnews.com/alternative/2016/01/ alan-rickman-the-curse-of-the-69-takes-another-victim-january-man-predicts-his-death-video-3277444. html beforeitsnews.com/celebrities/2016/01/ david-bowie-alan-rickman-death-hoax-100-staged-both-69-died-from-cancer-2474208.html age-69.beforeitsnews.com/alternative/2016/01/ harry-potter-star-alan-rickman-dead-at-age-69-3277454.html from-cancer.beforeitsnews.com/celebrities/2016/01/ david-bowie-alan-rickman-death-hoax-100-staged-both-69-died-from-cancer-2474208.html B2 www.snopes.com/2016/01/14/alan-rickman-dies-at-69/ www.snopes.com/alan-rickman-potter-meme/ Figure 4: Daily volume of tweets for (a) A1 and A2 (cf. Table 2); (b) B1 and B2. Semi-log scale was used for the plot. we focused on a recent event: the death of famous actor Alan Rickman on January 14, 2016. We used the keywords 'alan' and 'rickman' to match URLs from our database, and found 15 matches (B1) among fake news sources and two from fact-checking ones (B2). The fake news, in particu- lar, were spreading the rumor that the actor had not died. Fig. 4 plots the volume of tweets containing URLs from both strategies. Despite low data volumes, the spikes of activity and the successive decay show fairly strong alignment. 4.3 User Activity and URL Popularity We measure the activity a of users by counting the num- ber of tweets they posted, and the popularity of a given story (either fake news or fact checking) by counting ei- ther the total number n of times its URL was tweeted, or the total number p of people who tweeted it. Fig. 5 shows that these quantities display heavy-tailed, power-law distri- butions P (x) ∼ x−γ. We estimated the power-law decay exponents, obtaining the following results: for user activity γfn a = 2.3, γfc a = 2.7; for URL popularity by tweets (tail fit for n ≥ 200) γfn n = 2.5; and for URL popularity by users (tail fit for p ≥ 200) γfn p = 2.5. These observations suggest that fake news and fact checking have p = 2.9, γfc n = 2.7, γfc similar popularity profiles, with fake news being spread by accounts that, in some cases, can generate huge numbers of tweets. While it is expected that active users are responsible for producing a majority of news shares, the strong differ- ence between fake news and fact checking deserves further scrutiny. In Twitter there are four types of content: original tweets, retweets, quotes, and replies. In our data, original tweets and retweets were the most common category (80–90%) while quotes and replies correspond to only 10–20% of the total, usually with slightly more replies than quotes. However, we observe differences between fact checking and misinforma- tion tweets. The first is that there are more replies and quotes among fact checking tweets (> 20%) than misinfor- mation (≈ 10%), suggesting that fact checking is a more conversational task. The second difference has to do with how content genera- tion is shared among the top active users and the remaining user base. To investigate this difference, we select for both fake news and fact checking the tweets generated by the top active users, which we define as the 1% most active user by number of tweets. In Fig. 6 we plot the ratio ρ between origi- nal tweets and retweets for all users and top active ones. For DecJan2016252330071421280411180100101102103104Frequency of URL occurrence(a)A1, fake newsA2, fact checking13Jan2016231415161718192021220100101102103104Frequency of URL occurrence(b)B1, fake newsB2, fact checking Figure 5: Complementary cumulative distribution function (CCDF) of (a) user activity a (tweets per user) (b) URL popularity n (tweets per URL) and (c) URL popularity p (users per URL). active accounts, and grass-roots responses that spread fact checking information several hours later. In the future we plan to study the active spreaders of fake news to see if they are likely social bots [17, 34]. We will also expand our analysis to a larger set of news stories and investigate how the lag between misinformation and fact checks varies for different types of news. Acknowledgments CS was supported by the China Scholarship Council while visiting the Center for Complex Networks and Systems Re- search at the Indiana University School of Informatics and Computing. GLC acknowledges support from the Indiana University Network Science Institute (iuni.iu.edu) and from the Swiss National Science Foundation (PBTIP2–142353). This work was supported in part by the NSF (award CCF- 1101743) and the J.S. McDonnell Foundation. 6. REFERENCES [1] A. Anagnostopoulos, A. Bessi, G. Caldarelli, M. Del Vicario, F. Petroni, A. Scala, F. Zollo, and W. Quattrociocchi. Viral misinformation: the role of homophily and polarization. arXiv preprint arXiv:1411.2893, 2014. [2] M. Anderson and A. Caumont. How social media is reshaping news. http://www.pewresearch.org/fact-tank/2014/09/ 24/how-social-media-is-reshaping-news/, 2014. [Online; accessed December 2015]. [3] E. Bakshy, S. Messing, and L. A. Adamic. Exposure to ideologically diverse news and opinion on facebook. Science, 348(6239):1130–1132, 2015. [4] Y. Benkler. The wealth of networks: How social production transforms markets and freedom. Yale University Press, 2006. [5] T. Berners-Lee, W. Hall, J. Hendler, N. Shadbolt, and D. J. Weitzner. Creating a science of the web. Science, 313(5788):769–771, 2006. [6] C. Boididou, S. Papadopoulos, Y. Kompatsiaris, S. Schifferes, and N. Newman. Challenges of computational verification in social multimedia. In Proceedings of the 23rd International Conference on World Wide Web, WWW '14 Companion, pages 743–748, 2014. Figure 6: Ratio of original tweets to retweets for all vs. top active users. all users, the ratio is similar; there are more retweets than original tweets. This is also the case for the top spreaders of fact checking. However, for top spreaders of fake news, this ratio is much higher: these users do not retweet as much but post many original messages promoting the misinformation. Taken together, these observations strongly suggest that rumor-mongering is dominated by few very active accounts that bear the brunt of the promotion and spreading of mis- information, whereas the propagation of fact checking is a more distributed, grass-roots activity. 5. CONCLUSIONS & FUTURE WORK Social media provide excellent examples of marketplaces of attention where different memes vie for the limited time of users [10]. A scientific understanding of the dynamics of the Web is increasingly critical [5], and the dynamics of on- line news consumption exemplify this need, as the risk of massive uncontrolled misinformation grows. Our upcoming Hoaxy platform for the automatic tracking of online misin- formation may provide an important tool for the study of these phenomena. Our preliminary results suggest an inter- esting interplay between fake news promoted by few very 100101102103104a10-610-510-410-310-210-1100Pr©A¸aªa100101102103104n10-510-410-310-210-1100Pr©N¸nªbFake newsFact checking100101102103p10-510-410-310-210-1100Pr©P¸pªcFake newsFact checking0.00.51.01.52.0½AllTop [7] A. M. Buttenheim, K. Sethuraman, S. B. Omer, A. L. Hanlon, M. Z. Levy, and D. Salmon. {MMR} vaccination status of children exempted from school-entry immunization mandates. Vaccine, 33(46):6250 – 6256, 2015. [8] C. Carvalho, N. Klagge, and E. Moench. The persistent effects of a false news shock. Journal of Empirical Finance, 18(4):597 – 615, 2011. [9] C. Castillo, M. Mendoza, and B. Poblete. Information credibility on Twitter. In Proceedings of the 20th International Conference on World Wide Web, page 675, 2011. [10] G. L. Ciampaglia, A. Flammini, and F. Menczer. The production of information in the attention economy. Scientific Reports, 5:9452, 2015. [11] G. L. Ciampaglia, P. Shiralkar, L. M. Rocha, J. Bollen, F. Menczer, and A. Flammini. Computational fact checking from knowledge networks. PLoS ONE, 10(6):e0128193, 06 2015. [12] M. Conover, J. Ratkiewicz, M. Francisco, B. Gon¸calves, A. Flammini, and F. Menczer. Political polarization on Twitter. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011. [13] M. Del Vicario, A. Bessi, F. Zollo, F. Petroni, A. Scala, G. Caldarelli, H. E. Stanley, and W. Quattrociocchi. The spreading of misinformation online. Proceedings of the National Academy of Sciences, 113(3):554–559, 2016. [23] T. Lauricella, C. S. Stewart, and S. Ovide. Twitter hoax sparks swift stock swoon. The Wall Street Journal, 23, 2013. [24] J. Lehmann, C. Castillo, M. Lalmas, and E. Zuckerman. Finding news curators in twitter. In Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, pages 863–870, 2013. [25] M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(1):415–444, 2001. [26] P. T. Metaxas, S. Finn, and E. Mustafaraj. Using twittertrails.com to investigate rumor propagation. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, CSCW'15 Companion, pages 69–72, 2015. [27] D. Mocanu, L. Rossi, Q. Zhang, M. Karsai, and W. Quattrociocchi. Collective attention in the age of (mis)information. Computers in Human Behavior, 51, Part B:1198–1204, 2015. [28] D. Nikolov, D. Fregolente, A. Flammini, and F. Menczer. Measuring online social bubbles. PeerJ Computer Science, 1:e38, 2015. [29] B. Nyhan, J. Reifler, and P. A. Ubel. The hazards of correcting myths about health care reform. Medical Care, 51(2):127–132, 2013. [30] A. Perrin. Social media usage: 2005-2015. http://www.pewinternet.org/2015/10/08/2015/ Social-Networking-Usage-2005-2015/. [14] Z. Dezso, E. Almaas, A. Luk´acs, B. R´acz, I. Szakad´at, [31] J. Ratkiewicz, M. Conover, M. Meiss, B. Gon¸calves, and A.-L. Barab´asi. Dynamics of information access on the web. Phys. Rev. E, 73:066132, Jun 2006. [15] N. Diakopoulos, M. De Choudhury, and M. Naaman. Finding and assessing social media information sources in the context of journalism. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, pages 2451–2460, 2012. [16] Facebook Newsroom. Company info. https://web.archive.org/web/20151222043012/ http://newsroom.fb.com/company-info/. Online; accessed December 2015. [17] E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini. The rise of social bots. Comm. ACM, Forthcoming. preprint arXiv:1407.5225. A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011. [32] J. Ratkiewicz, M. Conover, M. Meiss, B. Gon¸calves, S. Patil, A. Flammini, and F. Menczer. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference Companion on World Wide Web, WWW '11, pages 249–252, 2011. [33] P. Resnick, S. Carton, S. Park, Y. Shen, and N. Zeffer. Rumorlens: A system for analyzing the impact of rumors and corrections in social media. In Proc. Computational Journalism Conference, 2014. [18] A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng. [34] V. Subrahmanian, A. Azaria, S. Durst, V. Kagan, Rumor cascades. In Proc. Eighth Intl. AAAI Conf. on Weblogs and Social Media (ICWSM), 2014. [19] S. Galam. Modelling rumors: the no plane pentagon A. Galstyan, K. Lerman, L. Zhu, E. Ferrara, A. Flammini, F. Menczer, et al. The DARPA Twitter Bot Challenge. arXiv preprint arXiv:1601.05140, 2016. french hoax case. Physica A: Statistical Mechanics and Its Applications, 320:571–580, 2003. [35] D. Tapscott and A. D. Williams. Wikinomics: How mass collaboration changes everything. Penguin, 2008. [20] N. Hassan, A. Sultana, Y. Wu, G. Zhang, C. Li, [36] E. Wemple. Hurricane Sandy: NYSE NOT flooded! J. Yang, and C. Yu. Data in, fact out: Automated monitoring of facts by factwatcher. Proc. VLDB Endow., 7(13):1557–1560, Aug. 2014. [21] A. M. Kaplan and M. Haenlein. Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1):59 – 68, 2010. [22] A. Kata. Anti-vaccine activists, web 2.0, and the postmodern paradigm–an overview of tactics and tropes used online by the anti-vaccination movement. Vaccine, 30(25):3778–3789, 2012. http://wapo.st/1QiG16A, October 2012. Last accessed 2016-02-04. [37] L. Weng, A. Flammini, A. Vespignani, and F. Menczer. Competition among memes in a world with limited attention. Scientific Reports, 2, 2012.
1501.04579
2
1501
2015-04-15T20:55:26
Stability of Influence Maximization
[ "cs.SI" ]
The present article serves as an erratum to our paper of the same title, which was presented and published in the KDD 2014 conference. In that article, we claimed falsely that the objective function defined in Section 1.4 is non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example to that claim. Subsequent to becoming aware of the counter-example, we have shown that the objective function is in fact NP-hard to approximate to within a factor of $O(n^{1-\epsilon})$ for any $\epsilon > 0$. In an attempt to fix the record, the present article combines the problem motivation, models, and experimental results sections from the original incorrect article with the new hardness result. We would like readers to only cite and use this version (which will remain an unpublished note) instead of the incorrect conference version.
cs.SI
cs
Stability of Influence Maximization Xinran He ∗ David Kempe † April 17, 2015 Abstract The present article serves as an erratum to our paper of the same title, which was presented and published in the KDD 2014 conference. In that article, we claimed falsely that the objective function defined in Section 1.4 is non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example to that claim. in fact NP-hard to approximate to within a factor of O(n1−) for any  > 0. Subsequent to becoming aware of the counter-example, we have shown that the objective function is In an attempt to fix the record, the present article combines the problem motivation, models, and experimental results sections from the original incorrect article with the new hardness result. We would like readers to only cite and use this version (which will remain an unpublished note) instead of the incorrect conference version. 5 1 0 2 r p A 5 1 ] I S . s c [ 2 v 9 7 5 4 0 . 1 0 5 1 : v i X r a ∗Department of Computer Science, University of Southern California; [email protected] †Department of Computer Science, University of Southern California; [email protected] 1 1 Introduction The processes and dynamics by which information and behaviors spread through social networks have long interested scientists within many areas. Understanding such processes has the potential to shed light on hu- man social structure, and to impact the strategies used to promote behaviors or products. While the interest in the subject is long-standing, recent increased availability of social network and information diffusion data (through sites such as Facebook, Twitter, and LinkedIn) has raised the prospect of applying social network analysis at a large scale to positive effect. Consequently, the resulting algorithmic questions have received widespread interest in the computer science community. Among the broad algorithmic domains, Influence Maximization has been repeatedly held up as having the potential to be of societal and financial value. The high-level hope is that based on observed data — such as social network information and past behavior — an algorithm could infer which individuals are likely to influence which others. This information could in turn be used to effect desired behavior, such as refraining from smoking, using superior crops, or purchasing a product. In the latter case, the goal of effecting desired behavior is usually termed viral marketing. Consequently, both the problem of inferring the influence between individuals [11, 12, 13, 14, 23] and that of maximizing the spread of a desired behavior have been studied extensively. For the Influence Maximization problem, a large number of models have been proposed, along with many heuristics with and without approximation guarantees [5, 8, 9, 17, 18, 20, 22, 25, 26]. (See the monograph [7] for a recent overview of work in the area.) However, one crucial aspect of the problem has — with very few exceptions discussed in Section 1.6 — gone largely unstudied. Contrary to many other algorithmic domains, noise in social network data is not an exception, but the norm. Indeed, one could argue that the very notion of a “social link” is not properly defined in the first place, so that any representation of a social network is only an approximation of reality. This issue is much more pronounced for a goal such as Influence Maximization. Here, the required data include, for every pair (u, v) of individuals, a numerical value for the strength of influence from u to v and vice versa. This influence strength will naturally depend on context (e.g., what exact product or behavior is being spread); furthermore, it cannot be observed directly, and must therefore be inferred from observed behavior or individuals’ reports; all of these are inherently very noisy. When the inferred influence strength parameters differ from the actual ground truth, even an optimal algorithm is bound to return suboptimal solutions, for it will optimize the wrong objective function: a solution that appears good with respect to the incorrect parameters may be bad with respect to the actual ones. If relatively small errors in the inferred parameters could lead to highly suboptimal solutions, this would cast serious doubts on the practical viability of algorithmic influence maximization. Therefore, in the present paper, we begin an in-depth study of the effect of noise on the performance of Influence Maximization algorithms. 1.1 The Independent Cascade Model We study this question under two widely adopted models for influence diffusion [17]: the Independent Cascade (IC) Model and the Linear Threshold (LT) Model. Both of these models fit in the following framework: The algorithm selects a seed set A0 of k nodes, which begin active (having adopted the behavior). Starting with A0, the process proceeds in discrete time steps: in each time step, according to a probabilistic process, additional nodes may become active based on the influence from their neighbors. Active nodes never become inactive, and the process terminates when no new nodes become active in a time step. The goal is to maximize the expected number of active nodes when the process terminates; this expected number is denoted by σ(A0). To illustrate the questions and approaches, we describe the IC model in this section. (A formal description of the LT model and general definitions of all concepts are given in Section 2.) Under the IC model, the probabilistic process is particularly simple and intuitive. When a node u becomes active in step t, it attempts to activate all currently inactive neighbors in step t + 1. For each neighbor v, it succeeds with a known probability pu,v. If it succeeds, v becomes active; otherwise, v remains inactive. Once u has made all these attempts, it does not get to make further activation attempts at later times. It was shown in [17] that 2 the set of nodes active at the end can be characterized alternatively as follows: for each ordered pair (u, v) independently, insert the directed edge (u, v) with probability pu,v. Then, the active nodes are exactly the ones reachable via directed paths from A0. 1.2 Can Instability Occur? Suppose that we have inferred all parameters pu,v, but are concerned that they may be slightly off: in reality, u,v ≈ pu,v. Are there instances in which a seed set A0 that is very influential the influence probabilities are p(cid:48) with respect to the pu,v may be much less influential with respect to the p(cid:48) u,v? It is natural to suspect that this might not occur: when the objective function σ varies sufficiently smoothly with the input parameters (e.g., for linear objectives), small changes in the parameters only lead to small changes in the objective value; therefore, optimizing with respect to a perturbed input still leads to a near-optimal solution. However, the objective σ of Influence Maximization does not depend on the parameters in a smooth way. To illustrate the issues at play, consider the following instance of the IC model. The social network consists of two disjoint bidirected cliques Kn, and pu,v = p for all u, v in the same clique; in other words, for each directed edge, the same activation probability p is observed. The algorithm gets to select exactly k = 1 node. Notice that because all nodes look the same, any algorithm essentially chooses an arbitrary node, which may as well be from Clique 1. Let p = 1/n be the sharp threshold for the emergence of a giant component in the Erdos-R´enyi Random Graph G(n, p). It is well known [4, 10] that the largest connected component of G(n, p) has size O(log n) for any p ≤ p − Ω(1/n), and size Ω(n) for any p ≥ p + Ω(1/n). Thus, if unbeknownst to the algorithm, all true activation probabilities in Clique 1 are p ≤ p − Ω(1/n), while all true activation probabilities in Clique 2 are p ≥ p + Ω(1/n), the algorithm only activates O(log n) nodes in expectation, while it could have reached Ω(n) nodes by choosing Clique 2. Hence, small adversarial perturbations to the input parameters can lead to highly suboptimal solutions from any algorithm.1 1.3 Diagnosing Instability The example of two cliques shows that there exist unstable instances, in which an optimal solution to the observed parameters is highly suboptimal when the observed parameters are slightly perturbed compared to the true parameters. Of course, not every instance of Influence Maximization is unstable: for instance, when the probability p in the Two-Clique instance is bounded away from the critical threshold of G(n, p), the objective function varies much more smoothly with p. This motivates the following algorithmic ques- tion, which is the main focus of our paper: Given an instance of Influence Maximization, can we diagnose efficiently whether it is stable or unstable? To make this question precise, we formulate a model of perturbations. We assume that for each edge (u, v), in addition to the observed activation probability pu,v, we are given an interval Iu,v (cid:51) pu,v of values that the actual probability p(cid:48) u,v are chosen from the intervals Iu,v by an adversary; they induce an objective function σ(cid:48) which the algorithm would like to maximize, while the observed values induce a different objective function σ which the algorithm actually has access to. An instance (pu,v, Iu,v)u,v is stable if σ(S) − σ(cid:48)(S) is small for all objective functions σ(cid:48) induced by legal probability settings, and for all seed sets S of size k. Here, “small” is defined relative to the objective function value σ(A∗ u,v could assume. The true values p(cid:48) 0) of the optimum set. When σ(S) − σ(cid:48)(S) is small compared to σ(A∗ 0) for all sets S, a user can have confidence that his optimization result will provide decent performance guarantees even if his input was perturbed. The converse 1The example reveals a close connection between the stability of an IC instance and the question whether a uniform activation probability p lies close to the edge percolation threshold of the underlying graph. Characterizing the percolation threshold of families of graphs has been a notoriously hard problem. Successful characterizations have only been obtained for very few specific classes (such as d-dimensional grids [19] and d-regular expander graphs [2]). Therefore, it is unlikely that a clean characterization of stable and unstable instances can be obtained. The connection to percolation also reveals that the instability was not an artifact of having high node degrees. By the result of Alon et al. [2], the same behavior will be obtained if both components are d-regular expander graphs, since such graphs also have a sharp percolation threshold. 3 is of course not necessarily true: even in unstable instances, a solution that was optimal for the observed input may still be very good for the true input parameters. 1.4 Influence Difference Maximization Trying to determine whether there are a function σ(cid:48) and a set S for which σ(S) − σ(cid:48)(S) is large motivates the following optimization problem: Maximize σ(S) − σ(cid:48)(S) over all feasible functions σ(cid:48) and all sets S. For any given set S, the objective is maximized either by making all probabilities (and thus σ(cid:48)(S)) as small as possible, or by making all probabilities (and thus σ(cid:48)(S)) as large as possible.2 We denote the resulting two objective functions by σ− and σ+, respectively. The following definition then captures the optimization goal. Definition 1 (Influence Difference Maximization) Given two instances with probabilities pu,v ≥ p(cid:48) for all u, v, let σ and σ(cid:48) be their respective influence functions. Find a set S of size k maximizing δ(S) := σ(S) − σ(cid:48)(S). u,v In this generality, the Influence Difference Maximization problem subsumes the Influence Maximization problem, by setting p(cid:48) u,v ≡ 0 (and thus also σ(cid:48) ≡ 0). While Influence Difference Maximization subsumes Influence Maximization, whose objective function is monotone and submodular, the objective function of Influence Difference Maximization is in general neither. To see non-monotonicity, notice that δ(∅) = δ(V ) = 0, while generally δ(S) > 0 for some sets S. The function is also not in general submodular, a fact brought to our attention by Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer, and in contrast to the main result claimed in a prior version of the present article. The following example shows non-submodularity for both the IC and LT Models. The graph has four nodes V = {u, v, x, y} and three edges (u, v), (v, x), (x, y). The edges (v, x) and (x, y) are known to have an activation probability of 1, while the edge (u, v) has an adversarially chosen activation probability in the interval [0, 1]. With S = {u} and T = {u, x}, we obtain that δ(S + v) − δ(S) = ∅ − {v, x, y} = −3, while δ(T + v) − δ(T ) = ∅ − {v} = −1, which violates submodularity. In fact, we establish a very strong hardness result here, in the form of the following theorem, whose proof is given in Section 3. Theorem 1 Under the Independent Cascade Model, the Influence Difference Maximization objective func- tion δ(S) cannot be approximated better than n1− for any  > 0 unless NP ⊆ ZPP. 1.5 Experiments Next, we investigate how pervasive instabilities are in real data. We evaluate frequently used synthetic models (2D grids, random regular graphs, small-world networks, and preferential attachment graphs) and real-world data sets (computer science theory collaborations and retweets about the Haiti earthquake). We focus on the Independent Cascade Model, and vary the influence strengths over a broad range of commonly studied values. We consider different relative perturbation levels ∆, ranging from 1% to 50%. The adversary can thus choose the actual activation probability to lie in the interval [(1 − ∆)pu,v, (1 + ∆)pu,v]. To calculate a value for the maximum possible Influence Difference, we use the random greedy algorithm of Buchbinder et al. [6]. This choice of algorithm was motivated by the false belief that the objective function is submodular, in which case the algorithm would have provided a 1/e approximation. Notice, however, that the algorithm can only underestimate the maximum possible objective function value. Thus, when the Random Greedy algorithm finds a set with large influence difference, it suggests that the misestimations due to parameter misestimates may drown out the objective value, rendering Influence Maximization outputs very spurious. On the other hand, when the objective value obtained by the Random Greedy algorithm is small, no positive guarantees can be provided. 2This observation relies crucially on the fact that each pu,v can independently take on any value in Iu,v. If the adversary were constrained by the total absolute deviation or sum of squares of deviations of parameters, this would no longer be the case. This issue is discussed in Section 5. 4 Our experiments suggest that perturbations can have significantly different effects depending on the network structure and observed values. As a general rule of thumb, perturbations above 20% relative to the parameter values could significantly distort the optimum solution. For smaller errors (10% or less relative error), the values obtained by the algorithm are fairly small; however, as cautioned above, the actual deviations may still be large. Since errors above 20% should be considered quite common for estimated social network parameters, our results suggest that practitioners exercise care in evaluating the stability of their problem instances, and treat the output of Influence Maximization algorithms with a healthy dose of skepticism. 1.6 Adversarial vs. Random Perturbations One may question why we choose to study adversarial instead of random perturbations. This choice is for three reasons: Theoretical: Worst-case analysis provides stronger guarantees, as it is not based on particular assumptions about the distribution of noise. Practical: Most random noise models assume independence of noise across edges. However, we believe that in practice, both the techniques used for inferring model parameters as well as the data sources they are based on may well exhibit systematic bias, i.e., the noise will not be independent. For instance, a particular subpopulation may systematically underreport the extent to which they seek others’ advice, or may have fewer visible indicators (such as posts) revealing their behavior. Modeling Interest: Perhaps most importantly, most natural random noise models do not add anything to the IC and LT models. As an illustration, consider the random noise models studied in recent work by Goyal, Bonchi and Lakshmanan [15] and Adiga et al. [1]. Goyal et al. assume that for each edge (u, v), the value of pu,v is perturbed with uniformly random noise from a known interval. Adiga et al. assume that each edge (u, v) that was observed to be present is actually absent with some probability , while each edge that was not observed is actually present with probability ; in other words, each edge’s presence is independently flipped with probability . The standard Independent Cascade Model subsumes both models straightforwardly. Suppose that a decision is to be made about whether u activates v. In the model of Goyal et al., we can first draw the actual (perturbed) value of p(cid:48) u,v from its known distribution; subsequently, u activates v with probability p(cid:48) u,v; in total, u activates v with probability E(cid:2)p(cid:48) (cid:3). Thus, we obtain an instance of the (cid:3). In the special case when the IC model in which all edge probabilities pu,v are replaced by E(cid:2)p(cid:48) u,v u,v noise has mean 0, this expectation is exactly equal to pu,v, which explains why Goyal et al. observed the noise to not affect the outcome at all. In the model of Adiga et al., we first determine whether the edge is actually present; when it was observed present, this happens with probability 1 − ; otherwise with probability . Subsequently, the activation succeeds with probability p. ([1] assumed uniform probabilities). Thus, the model is an instance of the IC model in which the activation probabilities on all observed edges are p(1 − ), while those on unobserved edges are p. This reduction explains the theoretical results obtained by Adiga et al. More fundamentally, practically all “natural” random processes that independently affect edges of the graph can be “absorbed into” the activation probabilities themselves; as a result, random noise does not at all play the result of actual noise. 2 Models and Preliminaries The social network is modeled by a directed graph G = (V, E) on n nodes. All parameters for non-existing edges are assumed to be 0. We first describe models of influence diffusion, and then models of parameter perturbation. 5 2.1 Influence Diffusion Models Most of the models for Influence Maximization have been based on the Independent Cascade Model (see Section 1.1) and Linear Threshold Model studied in [17] and their generalizations. Like the Independent Cascade Model, the Linear Threshold Model also proceeds in discrete rounds. Each edge (u, v) is equipped u→v cu,v ≤ 1 for all nodes v. (By u → v, we denote that there is a directed edge (u, v).) Each node v initially draws a threshold ψv independently and uniformly at random from [0, 1]. A set A0 of nodes is activated at time 0, and we use At to denote the set of nodes active at time u∈At−1,u→v cu,v ≥ ψv. If so, v becomes active at time t, with a weight cu,v ∈ [0, 1], satisfying(cid:80) t. In each discrete round t, each node v checks if(cid:80) and remains active subsequently. Any instance of the Influence Maximization problem is characterized by its parameters. For the LT model, the parameters are the n2 edge weights cu,v for all edges (u, v). Similarly, for the IC model, the parameters are the edge activation probabilities pu,v for all edges (u, v). To unify notation, we write θ = (θu,v)(u,v)∈E for the vector of all parameter values, where θu,v could be either cu,v or pu,v. Both the IC and LT model define random processes that continue until the diffusion process quiesces, i.e., no new activations occur. Let τ ≤ n be the (random) time at which this happens. It is clear that τ ≤ n always, since at least one more node becomes active in each round. We denote the stochastic process by t=0, with Mod ∈ {IC, LT} denoting the model. The final set of active nodes is Aτ . We can P Mod now formally define the Influence Maximization problem: (A0) = (At)τ θ Definition 2 (Influence Maximization) The Influence Maximization problem consists of maximizing the objective σ(A0) := E[Aτ] (i.e., the expected number of active nodes in the end3), subject to a cardinality constraint A0 ≤ k. The key insight behind most prior work on algorithmic Influence Maximization is that the objective function σ(S) is a monotone and submodular function of S. This was proved for the IC and LT models in [17], and subsequently for a generalization called Generalized Threshold Model (proposed in [17]) by Mossel and Roch [22]. 2.2 Models for Perturbations resulting activation functions are always submodular, we require that (cid:80) To model adversarial input perturbations, we assume that for each of the edges (u, v), we are given an interval Iu,v = [(cid:96)u,v, ru,v] ⊆ [0, 1] with θu,v ∈ Iu,v. For the Linear Threshold Model, to ensure that the u→v ru,v ≤ 1 for all nodes v. We write Θ = ×(u,v)∈EIu,v for the set of all allowable parameter settings. The adversary must guarantee that the ground truth parameter values satisfy θ(cid:48) ∈ Θ; subject to this requirement, the adversary can choose the actual parameter values arbitrarily. Together, the parameter values θ determine an instance of the Influence Maximization problem. We will usually be explicit about indicating the dependence of the objective function on the parameter setting. We write σθ for the objective function obtained with parameter values θ, and only omit the parameters when θ ∈ argmaxS σθ(S) they are clear from the context. For a given setting of parameters, we will denote by A∗ a solution maximizing the expected influence under parameter values θ. 2.3 Influence Difference Maximization In order to capture to what extent adversarial changes in the parameters can lead to misestimates of any set’s influence, we are interested in the quantity 3Our results carry over unchanged if we assign each node a non-negative value rv, and the goal is to maximize (cid:80) S (1) v∈Aτ rv. max max θ(cid:48)∈Θ σθ(S) − σθ(cid:48) (S), We focus on the case of uniform values for notational convenience only. 6 where θ denotes the observed parameter values. For two parameter settings θ, θ(cid:48) with θ ≥ θ(cid:48) coordinate- wise, it is not difficult to show using a simple coupling argument that σθ(S) ≥ σθ(cid:48) (S) for all S. Therefore, for any fixed set S, the maximum is attained either by making θ(cid:48) as large as possible or as small as possible. Hence, solving the following problem is sufficient to maximize (1). Definition 3 Given an influence model and two parameter settings θ, θ(cid:48) with θ ≥ θ(cid:48) coordinate-wise, define Given the set size k, the Influence Difference Maximization (IDM) problem is defined as follows: δθ,θ(cid:48) (S) = σθ(S) − σθ(cid:48) (S). Maximize subject to δθ,θ(cid:48)(S) S = k. (2) (3) 3 Approximation hardness In this section, we prove Theorem 1. Proof of Theorem 1. We establish the approximation hardness of Influence Difference Maximization without any constraint on the cardinality of the seed set A0. From this version, the hardness of the con- strained problem is inferred easily as follows: if any better approximation could be obtained for the con- strained problem, one could simply enumerate over all possible values of k from 1 to n, and retain the best solution, which would yield the same approximation guarantee for the unconstrained problem. i ∈ V (cid:48)(cid:48). The edge set is E(cid:48) ∪ E(cid:48)(cid:48), where E(cid:48) = {(v(cid:48) i, v(cid:48)(cid:48) j ) (vi, vj) ∈ E}, and E(cid:48)(cid:48) = {(v(cid:48) i, v(cid:48)(cid:48) First, let S be an independent set in G. Consider the set S(cid:48) = {v(cid:48) We give an approximation-preserving reduction from the Maximum Independent Set problem to the Influence Difference Maximization problem. It is well known that Maximum Independent Set cannot be approximated better than O(n1−) for any  > 0 unless NP ⊆ ZPP [16]. Let G = (V, E) be an instance of the Maximum Independent Set problem, with V = n. We construct from G a directed bipartite graph G(cid:48) with vertex set V (cid:48) ∪ V (cid:48)(cid:48). For each node vi ∈ V , there are nodes v(cid:48) i ∈ V (cid:48) i ) vi ∈ V }. and v(cid:48)(cid:48) All edges of E(cid:48) are known to have an activation probability of 1, while all edges of E(cid:48)(cid:48) have an activation probability from the interval [0, 1]. The difference is maximized by making all probabilities as large for one function (meaning that all edges in E(cid:48) ∪ E(cid:48)(cid:48) are present deterministically), while making them as small as possible for the other (meaning that exactly the edges in E(cid:48) are present). i with vi ∈ S is i in G(cid:48), but not in (V (cid:48) ∪ V (cid:48)(cid:48), E(cid:48)), because S is independent. Hence, the reachable from the corresponding v(cid:48) objective function value obtained in Influence Difference Maximization is at least S. Conversely, consider an optimal solution S(cid:48) to the Influence Difference Maximization problem. Without loss of generality, we may assume that S(cid:48) ⊆ V (cid:48): any node v(cid:48)(cid:48) j ∈ V (cid:48)(cid:48) can be removed from S(cid:48) without lowering i ∈ S(cid:48)} is not independent, and that (vi, vj) ∈ E for the objective value. Assume that S := {vi ∈ V v(cid:48) vi, vj ∈ S. Then, removing v(cid:48) j from S(cid:48) cannot lower the Influence Difference Maximization objective value of S(cid:48): all of v(cid:48) j also does not contribute, as it is reachable using E(cid:48) from v(cid:48) i. Thus, any node with a neighbor in S can be removed from S(cid:48), meaning that S is without loss of generality independent in G. At this point, all the neighbors of S(cid:48) contribute 0 to the Influence Difference Maximization objective function (because they are reachable under E(cid:48) already), and the objective value of S(cid:48) is exactly S(cid:48) = S. j’s neighbors in V (cid:48)(cid:48) contribute 0, as they are reachable using E(cid:48) already; furthermore, v(cid:48)(cid:48) i vi ∈ S}. Each node v(cid:48)(cid:48) 4 Experiments While we saw in Section 1.2 that examples highly susceptible (with errors of magnitude Ω(n)) to small perturbations exist, the goal of this section is to evaluate experimentally how widespread this behavior is for realistic social networks. 7 4.1 Experimental Setting We carry out experiments under the Independent Cascade Model, for six classes of graphs — four synthetic and two real-world. In each case, the model/data give us a simple graph or multigraph. Multigraphs are converted to simple graphs by collapsing parallel edges to a single edge with weight ce equal to the number of parallel edges; for simple graphs, all weights are ce = 1. The observed probabilities for edges are pe = ce · p; across experiments, we vary the base probability p to take on the values {0.01, 0.02, 0.05, 0.1}. The resulting parameter vector is denoted by θ. The uncertainty interval for e is Ie = [(1 − ∆)pe, (1 + ∆)pe]; here, ∆ is an uncertainty parameter for the estimation, which takes on the values {1%, 5%, 10%, 20%, 50%} in our experiments. The parameter vectors θ+ and θ− describe the settings in which all parameters are as large (as small, respectively) as possible. 4.2 Network Data We run experiments on four synthetic networks and two real social networks. Synthetic networks provide a controlled environment in which to compare observed behavior to expectations, while real social networks may give us indications about the prevalence of vulnerability to perturbations in real networks that have been studied in the past. Synthetic Networks. We generate synthetic networks according to four widely used network models. In all cases, we generate undirected networks with 400 nodes. The network models are: (1) the 2-dimensional grid, (2) random regular graphs, (3) the Watts-Strogatz Small-World (SW) Model [27] on a ring with each node connecting to the 5 closest nodes on each side initially, and a rewiring probability of 0.1. (4) The Barab´asi-Albert Preferential Attachment (PA) Model [3] with 5 outgoing edges per node. For all synthetic networks, we select k = 20 seed nodes. Real Networks. We consider two real networks to evaluate the susceptibility of practical networks: one (STOCFOCS ) is a co-authorship network of theoretical CS papers; the other (Haiti ) is a Retweet network. The co-authorship network, STOCFOCS, is a multigraph extracted from published papers in the con- ferences STOC and FOCS from 1964–2001. Each node in the network is a researcher with at least one publication in one of the conferences. For each multi-author paper, we add a complete undirected graph among the authors. As mentioned above, parallel edges are then compressed into a single edge with corre- sponding weight. The resulting graph has 1768 nodes and 10024 edges. Due to its larger size, we select 50 seed nodes. The Haiti network is extracted from tweets of 274 users on the topic Haiti Earthquake in Twitter. For each tweet of user u that was retweeted by v, we add a directed edge (u, v). We obtain a directed multigraph; after contracting parallel edges, the directed graph has 383 weighted edges. For this network, due to its smaller size, we select 20 seeds. In all experiments, we work with uniform edge weights p, since — apart from edge multiplicities — we have no evidence on the strength of connections. It is a promising direction for future in-depth experiments to use influence strengths inferred from real-world cascade datasets by network inference methods such as [11, 14, 23]. 4.3 Algorithms Our experiments necessitate the solution of two algorithmic problems: Finding a set of size k of maximum influence, and finding a set of size k maximizing the influence difference. The former is a well-studied problem, with a monotone submodular objective function. We simply use the widely known 1 − 1/e approximation algorithm due to Nemhauser et al. [24], which is best possible unless P=NP. For the goal of Influence Difference Maximization, we established (in Section 3) that the objective function is hard to approximate better than a factor O(n1−) for any  > 0. For experimental purposes, we use the Random Greedy algorithm of Buchbinder et al. [6], given as Algorithm 1 below. It is a natural generalization of the simple greedy algorithm of Nemhauser et al.: Instead of picking the best single element to add in each iteration, it first finds the set of the k individually best single elements (i.e., the elements which when added 8 to the current set give the largest, second-largest, third-largest, . . ., kth-largest gain). Then, it picks one of these k elements uniformly at random and continues. This particular choice of algorithm was motivated by an incorrect claim included in a prior version of this work, namely, that the Influence Difference Maximization objective is (non-monotone) submodular. For such functions, the Random Greedy algorithm guarantees at least an 0.266-approximation, and the guarantee improves to nearly 1/e when k (cid:28) n. Furthermore, the Random Greedy algorithm is simpler and more efficient than other algorithms with slightly superior approximation guarantees. We stress that these guarantees are not obtained for our objective function, as submodularity does not hold. Let Mi ⊆ V \ Si−1 be the subset of size k maximizing(cid:80) Algorithm 1 Random Greedy Algorithm 1: Initialize: S0 ← ∅ 2: for i = 1, . . . , k do 3: 4: Draw ui uniformly at random from Mi. 5: 6: end for 7: Return Sk Let Si ← Si−1 ∪ {ui}. g(Si−1 ∪ {u}) − g(Si−1). u∈Mi The running time of the Random Greedy Algorithm is O(kCV ), where C is the time required to estimate g(S ∪ {u}) − g(S). In our case, the objective function is #P-hard to evaluate exactly [25, 9], but arbitrarily close approximations can be obtained by Monte Carlo simulation. Since each simulation takes time O(V ), if we run M = 2000 iterations of the Monte Carlo simulation in each iteration, the overall running time of the algorithm is O(kMV 2). A common technique for speeding up the greedy algorithm for maximizing a submodular function is the CELF heuristic of Leskovec et al. [21]. When the objective function is submodular, the standard greedy algorithm and CELF obtain the same result. However, when it is not, the results may be different. In the previous version of this article, we had used the CELF heuristic due to the incorrect belief that the objective function was submodular. In this revised version, we instead report the results from rerunning all the experiments without the use of the CELF heuristic. The single exception is the largest input, the STOCFOCS network. (Here, the greedy algorithm without CELF did not finish in a reasonable amount of time.) For all networks other than STOCFOCS, the results using CELF are not significantly different from the reported results without the CELF optimization. For STOCFOCS, we instead report the result including the CELF heuristic. 4.4 Results In all our experiments, the results for the Grid and Small-World network are sufficiently similar that we omit the results for grids here. As a first sanity check, we empirically computed maxS:S=1 δθ+,θ− (S) for the complete graph on 200 nodes with Ie = [1/200 · (1 − ∆), 1/200 · (1 + ∆)] and k = 1. According to the analysis in Section 1.2, we would expect extremely high instability. The results, shown in Table 1, confirm this expectation. σθ+ ∆ 50% 66.529 20% 23.961 10% 15.071 σθ− 1.955 4.253 6.204 Table 1: Instability for the clique K200. Next, Figure 1 shows the (approximately) computed values maxS:S=k δθ+,θ− (S), and — for calibration purposes — maxA0:A0=k σθ(A0) for all networks and parameter settings. Notice that the result is obtained by running the Random Greedy algorithm without any approximation guarantee. However, as the algorithm’s 9 (a) Small World (b) PA (c) STOCFOCS (d) Haiti Figure 1: Comparison between Influence Difference Maximization and Influence Maximization results for four different networks. (The result of STOCFOCS network is obtained with CELF optimization.) α = −20% α = 0 α = 20% Figure 2: Ratio between the computed values of Influence Difference Maximization and Influ- ence Maximization under random regular graphs with different degree. output provides a lower bound on the maximum influence difference, a large value suggests that Influence Maximization could be unstable. On the other hand, small values do not guarantee that the instance is stable, as the algorithm provides no approximation guarantee. While individual networks vary somewhat in their susceptibility, the overall trend is that larger estimates of baseline probabilities p make the instance more susceptible to noise, as do (obviously) larger uncertainty parameters ∆. In particular, for ∆ ≥ 20%, the noise (after scaling) dominates the Influence Maximization objective function value, meaning that optimization results should be used with care. Next, we evaluate the dependence of the noise tolerance on the degrees of the graph, by experimenting with random d-regular graphs whose degrees vary from 5 to 25. It is known that such graphs are expanders with high probability, and hence have percolation thresholds of 1/d [2]. Accordingly, we set the base prob- ability to (1 + α)/d with α ∈ {−20%, 0, 20%}. We use the same setting for uncertainty intervals as in the previous experiments. Figure 2 shows the ratio between Influence Difference Maximization and Influence , with α ∈ {−20%, 0, 20%}. It indicates that for random regular graphs, Maximization, i.e., the degree does not appear to significantly affect stability, and that again, noise around 20% begins to pose a significant challenge. Moreover, we observe that the ratio reaches its minimum when the edge activation probability is exactly at the percolation threshold 1/d. This result is in line with percolation theory and also the analysis of Adiga et al. [1]. θ+ ,θ− (S) maxS δ maxS σθ (S) As a general takeaway message, for larger amounts of noise (even just a relative error of 20%) — which may well occur in practice — a lot of caution is advised in using the results of algorithmic Influence Maximization. 10 5 Discussion We began a study of the stability of Influence Maximization when the input data are adversarially noisy. We showed that estimating the susceptibility of an instance to perturbations can be cast as an Influence Difference Maximization problem. Unfortunately, the Influence Difference Maximization problem under the Independent Cascade Model is as hard to approximate as the Independent Set problem. While we do not at present have a comparable approximation hardness result for the Linear Threshold Model, we consider it unlikely that the Influence Difference Maximization objective could be much better approximated for that model. We used the Random Greedy algorithm of Buchbinder et al. to gain an empirical understanding of the prevalence of instability on several synthetic and real networks. The results suggest that 20% relative error could lead to a significant risk of suboptimal outputs. Given the noise inherent in all estimates of social network data, this suggests applying extreme caution before relying heavily on results of algorithmic Influence Maximization. The fact that our main theorem is negative (i.e., a strong approximation hardness result) is somewhat disappointing, in that it rules out reliably categorizing data sets as stable or unstable. This suggests searching for models which remain algorithmically tractable while capturing some notion of adversarially perturbed inputs. The issue of noise in social network data will not disappear, and it is necessary to understand its impact more fundamentally. While we begin an investigation of how pervasive susceptibility to perturbations is in Influence Maxi- mization data sets, our investigation is necessarily limited. Ground truth data are by definition impossible to obtain, and even good and reliable inferred data sets of actual influence probabilities are currently not available. The values we assigned for our experimental evaluation cover a wide range of parameter values studied in past work, but the community does not appear to have answered the question whether these ranges actually correspond to reality. At an even more fundamental level, the models themselves have received surprisingly little thorough experimental validation, despite having served as models of choice for hundreds of papers over the last decade. In addition to verifying the susceptibility of models to parameter perturbations, it is thus a pressing task to verify how susceptible the optimization problems are to incorrect models. The verification or falsification of sociological models for collective behavior likely falls outside the expertise of the computer science community, but nonetheless needs to be undertaken before any significant impact of work on Influence Maximization can be truthfully claimed. Acknowledgments We are deeply indebted to Debmalya Mandal, Jean Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example to a theorem incorrectly claimed in the previous version of this article. Furthermore, we would like to thank Shaddin Dughmi for useful pointers and feedback, Shishir Bharathi and Mahyar Salek for useful discussions, and anonymous reviewers for useful feedback on prior versions. Xinran He was supported in part by the grant ONR MURI W911NF-11-1-0332 and DARPA SMISC W911NF- 12-1-0034. References [1] A. Adiga, C. J. Kuhlman, H. S. Mortveit, and A. K. S. Vullikanti. Sensitivity of diffusion dynamics to network uncertainty. In Proc. 28th AAAI Conf. on Artificial Intelligence, 2013. [2] N. Alon, I. Benjamini, and A. Stacey. Percolation on finite graphs and isoperimetric inequalities. Annals of Probability, 32:1727–1745, 2004. [3] A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286:509–512, 1999. [4] B. Bollob´as. Random Graphs. Cambridge University Press, second edition, 2001. 11 [5] C. Borgs, M. Brautbar, J. T. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In Proc. 25th ACM-SIAM Symp. on Discrete Algorithms, pages 946–957, 2014. [6] N. Buchbinder, M. Feldman, J. S. Naor, and R. Schwartz. Submodular maximization with cardinality constraints. In Proc. 25th ACM-SIAM Symp. on Discrete Algorithms, pages 1433–1452, 2014. [7] W. Chen, L. V. Lakshmanan, and C. Castillo. Information and Influence Propagation in Social Net- works. Synthesis Lectures on Data Management. Morgan & Claypool, 2013. [8] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proc. 15th Intl. Conf. on Knowledge Discovery and Data Mining, pages 199–208, 2009. [9] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In Proc. 10th Intl. Conf. on Data Mining, pages 88–97, 2010. [10] P. Erdos and A. R´enyi. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci., 5:17–61, 1960. [11] M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering the temporal dynamics of diffusion networks. In Proc. 28th Intl. Conf. on Machine Learning, pages 561–568, 2011. [12] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(4), 2012. [13] M. Gomez-Rodriguez and B. Scholkopf. Submodular inference of diffusion networks from multiple trees. In Proc. 29th Intl. Conf. on Machine Learning, 2012. [14] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. Learning influence probabilities in social networks. In Proc. 3rd ACM Intl. Conf. on Web Search and Data Mining, pages 241–250, 2010. [15] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. A data-based approach to social influence maximization. Proc. VLDB Endow., 5(1):73–84, Sept. 2011. [16] J. Hastad. Clique is hard to approximate within n1−ε. Acta Mathematica, 182:105–142, 1999. [17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence in a social network. In Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pages 137–146, 2003. [18] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In Proc. 32nd Intl. Colloq. on Automata, Languages and Programming, pages 1127–1138, 2005. [19] H. Kesten. Asymptotics in high dimension for percolation. In G. Grimmett and D. Welsh, editors, Disorder in Physical System, pages 219–240. Oxford University Press, 1990. [20] S. Khanna and B. Lucier. Influence maximization in undirected networks. In Proc. 25th ACM-SIAM Symp. on Discrete Algorithms, pages 1482–1496, 2014. [21] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. S. Glance. Cost-effective outbreak detection in networks. In Proc. 13th Intl. Conf. on Knowledge Discovery and Data Mining, pages 420–429, 2007. [22] E. Mossel and S. Roch. Submodularity of influence in social networks: From local to global. SIAM J. Comput., 39(6):2176–2188, 2010. [23] S. A. Myers and J. Leskovec. On the convexity of latent social network inference. In Proc. 22nd Advances in Neural Information Processing Systems, pages 1741–1749, 2010. [24] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, 14:265–294, 1978. 12 [25] C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery Journal, 25(3):545–576, 2012. [26] Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In Proc. 16th Intl. Conf. on Knowledge Discovery and Data Mining, pages 1039–1048, 2010. [27] D. J. Watts and S. Strogatz. Collective dynamics of ‘small-world’ networks. Nature, 393:440–442, 1998. 13
1606.00715
1
1606
2016-06-02T15:05:18
Measure of Node Similarity in Multilayer Networks
[ "cs.SI", "physics.soc-ph" ]
The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships.
cs.SI
cs
PLoS Submission 6 1 0 2 n u J 2 ] I S . s c [ 1 v 5 1 7 0 0 . 6 0 6 1 : v i X r a Measure of Node Similarity in Multilayer Networks Anders Mollgaard1, Ingo Zettler2, Jesper Dammeyer2, Mogens H. Jensen1, Sune Lehmann3, Joachim Mathiesen1,* 1 University of Copenhagen, Niels Bohr Institute , 2100 Copenhagen, Denmark 2 University of Copenhagen, Department of Psychology, 1353 Copenhagen, Denmark 3 Technical University of Denmark, 2800 Kgs. Lyngby, Denmark * [email protected] Abstract The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships. Introduction Are two connected individuals more similar than a pair of strangers? Over the last decades, advances in data collection methods have provided new opportunities for research on human behavior [1] including the topic of homophily, i.e., whether a pair of connected individuals tends to be more similar than pairs of randomly selected individuals. For instance, it is now possible to observe social interaction across multiple channels, e.g., by combining data describing face-to-face contacts, with data from online social organizations or smartphone data [2–5]. Multiple networks formed from the simultaneous interaction in different channels are often called multiplex or multilayer networks [6]. Homophily has been observed with regard to many different variables. PLOS 1/12 PLoS Submission Figure 1. The phone call, the text message, and the proximity networks. The size of a node is determined by the sum of the weights of in-going links. The width and the darkness of a link is given by the square root of the link weight. For visual clarity, we show the nodes in the same positions in each panel and we do not show the weakest links (wij < 0.01). Examples span across socio-demographic variables (e.g., age, gender, ethnicity), variables describing behavioral patterns (e.g., drinking behavior, smoking behavior, physical activity), variables representing attitudes, beliefs, or opinions (e.g., about politics and sport), and personality traits such as extraversion [7–12]. It is an open question though, if homophily is becoming more pronounced between stronger connected individuals. Here, we introduce an extended similarity measure with a tunable parameter, which allows us to check for homophily across links with a broad spectrum of weights. Based on the measure, we find a moderate degree of homophily with respect to behavioral patterns but no significant homophily with regard to the basic personality traits conscientiousness, agreeableness, and neuroticism. Most commonly, homophily is investigated via likeability ratings about strangers, via a comparison of personality reports from a dyad, triplet etc. of acquaintances, or via network analyses. Recent studies based on personality reports by well-acquainted persons did find overlap between acquaintances concerning the levels of some of the basic personality traits [13–15]. Network studies focusing on observable variables such as gender or cigarette use have suggested that similarity in this regard is important for friendly acquaintanceship [16]. Overall, research so far suggests similarity between pairs of friends or acquaintances, but the detailed conclusions concerning homophily tend to differ depending on the methodology. In addition, the similarity of nodes, as we shall see below, is strongly related to the strength of the link connecting them. For an accurate understanding of homophily, a long-term and detailed monitoring of social networks is needed for several reasons. In order to reveal a complete picture of homophily, it is essential to gain insights into the similarity at all levels, e.g., from best friends, acquaintances, to people in the network one hardly likes or spends time with. These distinctions are possible in weighted network analyses. Here, we investigate the similarity of connected individuals in a multilayer social network, with connections based on phone calls, text messages, and physical proximity (Bluetooth). We estimate the similarity between connected persons within a specified network with regard to socio-demographic variables (sex, age, body mass index), behavioral patterns (physical activity, alcohol drinking, and smoking behavior), attitudes concerning politics and religion, and, ultimately, basic personality traits in terms of the Big Five, i.e., conscientiousness (e.g., being organized, precise, thorough), agreeableness (e.g., being kind, sympathetic, warm), neuroticism (e.g., being anxious, moody, touchy), openness to experience (e.g., being creative, philosophical, unconventional), and extraversion (e.g., being active, sociable, talkative). We focus on the Big Five as personality traits since PLOS 2/12 PLoS Submission Figure 2. Similarity of connected individuals in the network. The bars show the intraclass correlation coefficient for the different variables and for the networks formed from call activity, SMS activity and proximity data. The lines have a range of one standard deviation. We find no similarity with regard to the personality traits conscientiousness, agreeableness and neuroticism but we find a weak similarity with regard to extraversion and dissimilarity with respect to openness. In general a stronger similarity is found for socio-demographic, behavior- and attitudes-related variables. they reflect an 'integrative descriptive taxonomy for personality research' [17]. Results This work rests on a unique dataset. We have mapped out the social network between 659 freshman students starting in the year 2013 at the Technical University of Denmark and running over 24 months [5]. Using state-of-the-art smartphones equipped with custom data collection software, we have collected the communication patterns within this densely connected population across a number of channels [18]. Specifically, we measure telecommunication networks (phone calls, text messages), online social networks (Facebook connections and interactions), and networks based on physical proximity. The physical proximity networks are measured via the Bluetooth signal strength, and can be used as a proxy for face-to-face meetings [19]. As a complement to the network data, we also collect information on geo-spatial mobility using GPS, as well as a number of more technical probes. In addition to the automated data collection, we have also acquired extensive questionnaire-based data on participants' personality and behavior, comprising the following questionnaires: Big Five Inventory [17], Rosenberg Self Esteem Scale [20], Narcissistic Admiration and Rivalry Questionnaire [21], Satisfaction With Life Scale [22], Rotter's Locus of Control Scale [23], UCLA Loneliness scale [24], Self-efficacy [25], Perceived Stress Scale [26], Major Depression Inventory [27], The Copenhagen Social Relation Questionnaire [28], and Positive and Negative Affect Schedule [29], as well as several general health-, attitudes- and behavior-related questions. Here, we consider three different types of social interaction networks based on calls, text messages, and physical proximity, respectively. We introduce a tunable link weight based on the strength of the interactions. To explain our definition of a link weight, let us start by considering the call network. The weight of a directed link from person i to PLOS 3/12 PLoS Submission person j is given by (cid:88) k nα ik, wij(α) = nα ij/ where nij represents the total number of accepted calls from person i to person j. Links therefore take a value in the interval, wij ∈ [0, 1], and the sum of weights of outgoing links from any person equals unity. The power α is used to test if homophily is more pronounced between individuals who interact more frequently than for individuals who do not interact that often. The case α = 0 corresponds to a network where all links have equal weight. For intermediate α values, we predominantly test for similarity on the strongest links and, ultimately, for large values, e.g., for α ≈ 2, we only consider the strongest out-going link for each individual. The network of text-messages (SMS network) is constructed in the similar fashion, but with nij, representing the number of text messages sent from person i to person j. From the data on physical proximity, we can determine the time a pair of individuals has spent together. We say that a person i has spent an amount of time ∆t together with person j if two consecutive Bluetooth scans are separated by a time ∆t and, in addition, both scans estimate person j to be within approximately three meters distance. The link weight between i and j is (cid:88) wij(α) = T α ij/ T α ik, k where Tij is the total time that j has been within the three meter limit of i. In general, the proximity data contains information about a large number of more or less random encounters during lectures and classes. In order to prevent that these encounters dominate our data, we make use of proximity data sampled only in the weekends or from 6pm to 12am during the weekdays. We place no such restrictions on the call and SMS data. Finally, we construct a symmetric weight from the two directed weights by taking the average weight of the two directed links. From these three types of interaction, we construct the corresponding networks, see Fig. 1. Here the size and color of the nodes are determined by the sum of link weights connecting to the node, while the width of a link is given by the square root of the link weight. The visual representation reveals that the networks tend to be dominated by a relatively small set of links with strong weights. In order to analyze homophily, we construct vectors (xi, xj, wij) for each link in the network where xi represents a variable (e.g., of a personality trait) associated with person i. The degree of homophily is estimated by a generalization of the intraclass correlation coefficient (ICC). The ICC quantifies the similarity of the variables xi and xj for the connected persons i and j in the network. Similarly to the Pearson correlation coefficient, the ICC is a measure of the tendency for xi and xj to assume similar values relative to their average value. Normally, the ICC is computed under the assumption that persons are either connected or not. Here we modify the ICC by including the weight of interactions wij between persons. The weighted ICC, here denoted by r, is then computed for a network, (xi, xj, wij), from the expressions, PLOS 4/12 PLoS Submission i>j wij (xi + xj) , i>j 2wij (cid:80) (cid:80) (cid:80) (cid:80) i>j wij (xi − ¯x) (xj − ¯x) (xi − ¯x)2 + (xj − ¯x)2(cid:17) (cid:80) i>j 2wij , i>j 2wij , r = t2/s2 ¯x = s2 = t2 = i>j wij (cid:16) (cid:80) The auxiliary variable s measures the variance within the sample, including both variables xi and xj, and the variable t is a measure of the co-variance of xi and xj. Please note how the contribution to the variance for each link is weighted by wij. In general, the weighted correlation coefficient provides a basic measure of the importance of homophily in social interactions. In Fig. 2, we show the ICC where all weights are proportional to the activity on the link, i.e., α = 1. The error bars are estimated using bootstrapping, where we for each value of α and for each network layer (Call, SMS, and BlueTooth), generate 10,000 reference networks by randomly reshuffling the links. We then measure the correlation coefficient in these reference network. The fraction of networks with an ICC larger than that of the true network provides us with a measure of the p-value. We observe in Fig. 2 that there is no pronounced homophily for the personality traits conscientiousness, agreeableness and neuroticism, even when we consider only the strongest links. In Fig. 3, we test the importance of link strength by varying the parameter α, i.e., we test for homophily by considering all social interactions equally important (α = 0) or by weighting frequent interactions higher (α > 0). We see that for the Big Five personality traits, only extraversion have ICCs which are significantly different (p < 0.05) from zero in all layers. List of p-values for the computed ICCs are listed in the Supporting Information S3 and a description of how the p-values are computed can be found in Materials and Methods. In the sms layer, the ICC for extraversion ranges from values around zero when all links have equal weights to values around 0.2 for α = 2. For both the extraversion and openness traits, the proximity and call layers result in ICCs that are lower than the ICC of the text message layer. The ICCs for agreeableness, conscientiousness and neuroticism are for almost all values of α not significantly different from zero and are bounded above by approximately 0.12. Homophily is pronounced in the phone call network for the variables capturing smoking and drinking behaviors. Here the ICCs are significantly different (p < 0.05) from zero and achieve values larger than 0.3 in the call layer and values up to 0.2 in the sms layer. This is in contrast to the other variables in our study, where homophily is most pronounced in the sms layer. The variables representing attitudes concerning politics and religion show a weak or no correlation. Less surprisingly, we see an over-representation of social interaction between individuals of the same sex for calls and text messages when α = 0; the ICCs attain values around 0.2. Moreover, we observe that for increasing values of α, the stronger links in the text message network more frequently connect individuals of different sex, i.e. we see a transition from a positive ICC to a negative ICC as alpha is increased. Interestingly, albeit the correlation is slightly smaller, the proximity data at the same time shows that individuals with frequent face-to-face encounters tend to be of same sex. PLOS 5/12 PLoS Submission Figure 3. Computed similarity of individuals with different levels of social interaction. The computed similarity is shown as function of the parameter α, which tunes the weight of the individual links in the networks. The case α = 0 corresponds to the case of links having equal weight, whereas increasing values of α enhances the contribution from the stronger links in the calculation, e.g., for α = 2 the strongest links of each individual dominates. The envelope is the estimate of the standard deviation (see text). In the Supporting Information S3, a table is included of p-values for the individual traits and for different α-values. In general, the p-values are large (> 0.05) for the traits Conscientiousness, Agreeableness, Neuroticism and Openness. The estimates of Extraversion attains lower p-values, e.g. for the BlueTooth, p ≈ 0.01, and for SMS the p-value varies in the interval 0.02 − 0.08 for different α-values. PLOS 6/12 PLoS Submission Discussion Multilayer networks – The overlap between the three layers in the multilayer network can be estimated from the pairwise Pearson correlation coefficients rp,k(cid:96) of the link weights wL ij in two layers Lk and L(cid:96). ij − ¯wLk )(wL(cid:96) (cid:105)1/2(cid:104)(cid:80) ij − ¯wL(cid:96)) i>j(wL(cid:96) ij − ¯wL(cid:96))2 (cid:105)1/2 (1) (cid:104)(cid:80) rp,k(cid:96) = (cid:80) i>j(wLk ij − ¯wLk )2 i>j(wLk We find that for α = 1 the correlation coefficient is 0.75 between the call and SMS layers, 0.53 between the call and proximity layers, and 0.47 between the SMS and proximity layers. A similar approach has previously been suggested in Ref. [30] where, instead of the link weights, the degree of the nodes in the individual layers was considered. Using the link weights, we can now by tuning the parameter α test the overlap between the layeres for different levels of acquaintanceships. In Fig. 4, we show the pairwise correlation between the three layers for different values of α. As expected there is a significant overlap between the layers, but they certainly also differ enough to be treated as more than a fluctuation of a single network. Interestingly, the overlap changes with the factor α, which opens a fundamental question in the analysis of multiplex networks. Which weights would be the right to use? The unweighted case α = 0 certainly leads to a correlation different than those of larger α values. In fact, strong links might not necessarily be present or strong in all layers, e.g. two persons that frequently communicate might prefer phone calls rather than text messages. At the intermediate range, interaction could be more equally distributed across the channels or layers. In other words, the degree of multiplexity in our network is tunable and depends on the perspective, whether strong or weak links should be favored. This observed sensitivity in overlap, could have implications for community detection algorithms on multiplex networks [31, 32] or for the structural reducibility of overlapping layers [33]. We further note that the proximity (Bluetooth) layer is more densely connected than the other layers, in particular because the participants in the study meet at more informal gatherings at the university campus or have encounters which could either be spontaneous or of less personal character such as study groups. This could be one reason for the weaker similarity seen for most of the variables in the proximity data in Figs. 2 and 3. Here, we have performed an extensive mapping of similarity in a large social network based on detailed records of social interactions over a time span of nearly two years. From the frequency of interactions, all links in the network are assigned a weight, which we have been able to tune in order to look for homophily across varying levels of acquaintanceships. We show that tuning the weights can reveal new features of the node similarity. For the variables describing alcohol use, cigarette use, and extraversion, we see that individuals are more similar when they interact strongly. In contrast if the weights are disregarded, we see little or no similarity. Interestingly, the similarity of individuals is not monotonically increasing with the frequency of interaction for all variables, e.g., the intraclass correlation coefficient with regard to gender transitions from postive to negative values. The analysis of our data does not provide any evidence that the basic personality traits agreableness, conscientiousness, neuroticism and to some degree openness are an important factor in the formation of social networks. In fact, we find a small or non-existing correlation between these personality traits and social interaction, even when we only consider individuals that interact very frequently. Finally, the measure, we have introduced, shows that the degree of muliplexity in our network is tunable as we vary the balance between weak and strong links. PLOS 7/12 PLoS Submission Figure 4. Overlap between layers in the multilayer social network. Based on the correlation between the link-weights, we can check the overlap between the individual layers of call, SMS, and proximity for varying values of α. We see that the multilayer features of the network changes with the link-weight exponent α and the overlap between the layers is maximal for intermediate values of α. PLOS 8/12 PLoS Submission Materials and Methods In constructing the multilayer network, we include links from participants that meet minimum requirements with respect to the total time window in which they are active and their level of activity. In particular, we require that the data recording period is longer than 3 months and associated with at least 170 calls, 950 text messages and 200 hours of Bluetooth interaction. These numbers correspond to the typical social activity of a person during a 3 months period, which, we believe, is a reasonable time scale for the resolution of social behavior. These requirements reduce the dataset to 659 participants and is introduced to avoid the addition of noisy links in the network. The average user in the study has been active for 530 days, has been part of 952 phone calls, and has exchanged 5313 text messages. The average number of hours that a user has been in the proximity of others is 1073. The proximity network is based on asynchronous Bluetooth scans by each smartphone every 5 minutes, which are collected into 5 minute time-bins and symmetrized. Many of the recorded interactions are with people outside the study and can therefore not be included in the analysis of homophily. In the call and SMS data, the total weight of a single individual therefore depends on the fraction of calls or text messages that are directed to other participants in the study. The significance of our estimated ICCs have been computed in the following way. For each value of alpha and each layer in the network, we generate 10,000 reference layers (i.e. networks) by shuffling the links within a layer. We then measure the ICC in these reference layers. The fraction of network layers with an intraclass correlation coefficient larger than that of the original network layer provides us with a estimated of the p-value. A table of all computed p-values have been included in the Supporting Information S3. This study was reviewed and approved by the appropriate Danish authority, the Danish Data Protection Agency (Reference number: 2012-41-0664). The Data Protection Agency guarantees that the project abides by Danish law and also considers potential ethical implications. All subjects in the study provided written informed consent. References 1. Borgatti SP, Mehra A, Brass DJ, Labianca G. Network analysis in the social sciences. science. 2009;323(5916):892–895. 2. Eagle N, Pentland A. Reality mining: sensing complex social systems. Personal and ubiquitous computing. 2006;10(4):255–268. 3. Cattuto C, Van den Broeck W, Barrat A, Colizza V, Pinton J, Vespignani A. Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks. PLOS ONE. 2010 07;5(7):e11596. Available from: http://dx.doi.org/10.1371%2Fjournal.pone.0011596. 4. Aharony N, Pan W, Ip C, Khayal I, Pentland A. Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing. 2011;7(6):643–659. 5. Stopczynski A, Sekara V, Sapiezynski P, Cuttone A, Madsen MM, Larsen JE, et al. Measuring Large-Scale Social Networks with High Resolution. PLoS ONE. 2014 04;9(4):e95978. Available from: http://dx.doi.org/10.1371/journal.pone.0095978. 6. Kivela M, Arenas A, Barthelemy M, Gleeson JP, Moreno Y, Porter MA. Multilayer networks. Journal of Complex Networks. 2014;2(3):203–271. PLOS 9/12 PLoS Submission 7. Crandall CS, Schiffhauer KL, Harvey R. Friendship pair similarity as a measure of group value. Group Dynamics. 1997;1(2):133–143. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-0141662438&partnerID=40&md5=cfe73a3d2adb3e9e5b1eaed153451a2b. 8. Currarini S, Jackson MO, Pin P. Identifying the roles of race-based choice and chance in high school friendship network formation. Proceedings of the National Academy of Sciences. 2010;107(11):4857–4861. 9. Kandel DB. Similarity in real-life adolescent friendship pairs. Journal of Personality and Social Psychology. 1978;36(3):306–312. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-25444466854&partnerID=40&md5=00cc0153e389eaf6d02ccd89624333d1. 10. Rushton JP, Bons TA. Mate Choice and Friendship in Twins: Evidence for Genetic Similarity. Psychological Science. 2005;16(7):555–559. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-23944492077&partnerID=40&md5=56a6b7b64363aae63c9f77e1478894cc. 11. Kurtz JE, Sherker JL. Relationship quality, trait similarity, and self-other agreement on personality ratings in college roommates. Journal of personality. 2003;71(1):21–48. 12. Stehl´e J, Charbonnier F, Picard T, Cattuto C, Barrat A. Gender homophily from spatial behavior in a primary school: a sociometric study. Social Networks. 2013;35(4):604–613. 13. Cohen TR, Panter AT, Turan N, Morse L, Kim Y. Agreement and similarity in self-other perceptions of moral character. Journal of Research in Personality. 2013;47(6):816–830. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-84884293708&partnerID=40&md5=c463cc29df8e4a105ca67e0dc8ae9af9. 14. Lee K, Ashton MC, Pozzebon JA, Visser BA, Bourdage JS, Ogunfowora B. Similarity and Assumed Similarity in Personality Reports of Well-Acquainted Persons. Journal of Personality and Social Psychology. 2009;96(2):460–472. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-60749103381&partnerID=40&md5=8ba442558d8e4f4298385a93f3ccb448. 15. Paunonen SV, Hong RY. The many faces of assumed similarity in perceptions of personality. Journal of Research in Personality. 2013;47(6):800–815. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-84884223362&partnerID=40&md5=f33fe27c11db6a1b460225611fd29858. 16. Delay D, Laursen B, Kiuru N, Salmela-Aro K, Nurmi JE. Selecting and retaining friends on the basis of cigarette smoking similarity. Journal of Research on Adolescence. 2013;23(3):464–473. Available from: http://www.scopus.com/inward/record.url?eid=2-s2. 0-84882664852&partnerID=40&md5=37a95e3589dc5e9d318e06c0249d6737. 17. John OP, Naumann LP, Soto CJ. Paradigm shift to the integrative big five trait taxonomy. Handbook of personality: Theory and research. 2008;3:114–158. 18. Mollgaard A, Mathiesen J. The Dynamics of Initiative in Communication Networks. PloS one. 2016;11(4):e0154442. PLOS 10/12 PLoS Submission 19. Sekara V, Lehmann S. The strength of friendship ties in proximity sensor data. PLOS One. 2014;9(7). 20. Rosenberg M. Society and the adolescent self-image (rev). Wesleyan University Press; 1989. 21. Back MD, Kufner AC, Dufner M, Gerlach TM, Rauthmann JF, Denissen JJ. Narcissistic admiration and rivalry: Disentangling the bright and dark sides of narcissism. Journal of Personality and Social Psychology. 2013;105(6):1013. 22. Diener E, Emmons RA, Larsen RJ, Griffin S. The satisfaction with life scale. Journal of personality assessment. 1985;49(1):71–75. 23. Rotter JB. Generalized expectancies for internal versus external control of reinforcement. Psychological monographs: General and applied. 1966;80(1):1. 24. Russell DW. UCLA Loneliness Scale (Version 3): Reliability, validity, and factor structure. Journal of personality assessment. 1996;66(1):20–40. 25. Sherer M, Maddux JE, Mercandante B, Prentice-Dunn S, Jacobs B, Rogers RW. The self-efficacy scale: Construction and validation. Psychological reports. 1982;51(2):663–671. 26. Cohen S, Kamarck T, Mermelstein R. A global measure of perceived stress. Journal of health and social behavior. 1983;p. 385–396. 27. Bech P, Rasmussen NA, Olsen LR, Noerholm V, Abildgaard W. The sensitivity and specificity of the Major Depression Inventory, using the Present State Examination as the index of diagnostic validity. Journal of affective disorders. 2001;66(2):159–164. 28. Lund R, Nielsen LS, Henriksen PW, Schmidt L, Avlund K, Christensen U. Content Validity and Reliability of the Copenhagen Social Relations Questionnaire. Journal of aging and health. 2014;26(1):128–150. 29. Watson D, Clark LA, Tellegen A. Development and validation of brief measures of positive and negative affect: the PANAS scales. Journal of personality and social psychology. 1988;54(6):1063. 30. Nicosia V, Latora V. Measuring and modeling correlations in multiplex networks. Physical Review E. 2015;92(3):032805. 31. Mucha PJ, Richardson T, Macon K, Porter MA, Onnela JP. Community Structure in Time-Dependent, Multiscale, and Multiplex Networks. Science. 2010;328(5980):876–878. Available from: http://science.sciencemag.org/content/328/5980/876. 32. De Domenico M, Lancichinetti A, Arenas A, Rosvall M. Identifying Modular Flows on Multilayer Networks Reveals Highly Overlapping Organization in Interconnected Systems. Phys Rev X. 2015 Mar;5:011027. Available from: http://link.aps.org/doi/10.1103/PhysRevX.5.011027. 33. De Domenico M, Nicosia V, Arenas A, Latora V. Structural reducibility of multilayer networks. Nature communications. 2015;6. PLOS 11/12 PLoS Submission Acknowledgements The study received funding through the UCPH 2016 Excellence Programme for Interdisciplinary Research. Supporting Information S1 Text Description of data. Short description of the format of the data. S2 Text Data file. Data used in the analysis in the manuscript. S3 Text List of p-values for different traits and values of α. PLOS 12/12
1101.0272
2
1101
2011-03-05T22:09:35
Social Norms for Online Communities
[ "cs.SI", "cs.NI", "physics.soc-ph" ]
Sustaining cooperation among self-interested agents is critical for the proliferation of emerging online social communities, such as online communities formed through social networking services. Providing incentives for cooperation in social communities is particularly challenging because of their unique features: a large population of anonymous agents interacting infrequently, having asymmetric interests, and dynamically joining and leaving the community; operation errors; and low-cost reputation whitewashing. In this paper, taking these features into consideration, we propose a framework for the design and analysis of a class of incentive schemes based on a social norm, which consists of a reputation scheme and a social strategy. We first define the concept of a sustainable social norm under which every agent has an incentive to follow the social strategy given the reputation scheme. We then formulate the problem of designing an optimal social norm, which selects a social norm that maximizes overall social welfare among all sustainable social norms. Using the proposed framework, we study the structure of optimal social norms and the impacts of punishment lengths and whitewashing on optimal social norms. Our results show that optimal social norms are capable of sustaining cooperation, with the amount of cooperation varying depending on the community characteristics.
cs.SI
cs
Social Norms for Online Communities Yu Zhang, Student Member, IEEE, Jaeok Park, Mihaela van der Schaar, Fellow, IEEE Department of Electrical Engineering, UCLA [email protected], {jaeok, mihaela}@ee.ucla.edu Abstract—Sustaining cooperation among self-interested agents is critical for the proliferation of emerging online social communities, such as online communities formed through social networking services. Providing incentives for cooperation in social communities is particularly challenging because of their unique features: a large population of anonymous agents interacting infrequently, having asymmetric interests, and dynamically joining and leaving the community; operation errors; and low-cost reputation whitewashing. In this paper, taking these features into consideration, we propose a framework for the design and analysis of a class of incentive schemes based on a social norm, which consists of a reputation scheme and a social strategy. We first define the concept of a sustainable social norm under which every agent has an incentive to follow the social strategy given the reputation scheme. We then formulate the problem of designing an optimal social norm, which selects a social norm that maximizes overall social welfare among all sustainable social norms. Using the proposed framework, we study the structure of optimal social norms and the impacts of punishment lengths and whitewashing on optimal social norms. Our results show that optimal social norms are capable of sustaining cooperation, with the amount of cooperation varying depending on the community characteristics. Keywords—Incentive schemes, social communities, reputation schemes, social norms, whitewashing. I. INTRODUCTION Recent developments in technology have expanded the boundaries of communities in which individuals interact with each other. For example, nowadays individuals can obtain valuable information or content from remotely located individuals in a community formed through networking services [1][2][4]. However, a large population and the anonymity of individuals in social communities make it difficult to sustain cooperative behavior among self- interested individuals [3]. For example, it has been reported that so-called free-riding behavior is widely observed in peer-to-peer networks [5][6][7][8]. Hence, incentive schemes are needed to provide individuals with incentives for cooperation. The literature has proposed various incentive schemes. The popular forms of incentive devices used in many incentive schemes are payment and differential service. Pricing schemes use payments to reward and punish individuals for their behavior. Pricing schemes in principle can lead self-interested individuals to achieve social optimum by internalizing their external effects (see, for example, [9][10]). However, it is often claimed that pricing schemes are impractical because they require an accounting infrastructure [11]. Moreover, the operators of social communities may be reluctant to adopt a pricing scheme when pricing discourages individuals’ participation in community activities. Differential service schemes, on the other hand, reward and punish individuals by providing differential services depending on their behavior [12]. Differential services can be provided by community operators or by community members. Community operators can treat individuals differentially (for example, by varying the quality or scope of services) based on the information about the behavior of individuals. Incentive provision by a central entity can offer a robust method to sustain cooperation [13][14]. However, it is impractical in a community with a large population because the burden of a central entity to monitor individuals’ behavior and 1 provide differential services for them becomes prohibitively heavy as the number of individuals grows. Alternatively, there are more distributed incentive schemes where community members monitor the behavior of each other and provide differential services based on their observations [15][16][17][18]. Such incentive schemes are based on the principle of reciprocity and can be classified into personal reciprocation (or direct reciprocity) [15][16] and social reciprocation (or indirect reciprocity) [17][18]. In personal reciprocation schemes, individuals can identify each other, and behavior toward an individual is based on their personal experience with the individual. Personal reciprocation is effective in sustaining cooperation in a small community where individuals interact frequently and can identify each other, but it loses its force in a large community where anonymous individuals with asymmetric interests interact infrequently [17]. In social reciprocation schemes, individuals obtain some information about other individuals (for example, rating) and decide their behavior toward an individual based on their information about that individual. Hence, an individual can be rewarded or punished by other individuals in the community who have not had direct interaction with it [17][19]. Since social reciprocation requires neither observable identities nor frequent interactions, it has a potential to form a basis of successful incentive schemes for social communities. As such, this paper is devoted to the study of incentive schemes based on social reciprocation. Sustaining cooperation using social reciprocation has been investigated in the economics literature using the framework of anonymous random matching games. Social norms have been proposed in [17] and [19] in order to sustain cooperation in a community with a large population of anonymous individuals. In an incentive scheme based on a social norm, each individual is attached a label indicating its reputation, status, etc. which contains information about its past behavior, and individuals with different labels are treated differently by other individuals they interact with. Hence, a social norm can be easily adopted in social communities with an infrastructure that collects, processes, and delivers information about individuals’ behavior. However, [17] and [19] have focused on obtaining the Folk Theorem by characterizing the set of equilibrium payoffs that can be achieved by using a strategy based on a social norm when the discount factor is sufficiently close to 1. Our work, on the contrary, addresses the problem of designing a social norm given a discount factor and other parameters arising from practical considerations. Specifically, our work takes into account the following features of social communities:  Asymmetry of interests. As an example, consider a community where individuals with different areas of expertise share knowledge with each other. It will be rarely the case that a pair of individuals has a mutual interest in the expertise of each other. We allow the possibility of asymmetric interests by modeling the interaction between a pair of individuals as a gift-giving game, instead of a prisoner’s dilemma game, which assumes mutual interests between a pair of individuals.  Report errors. In an incentive scheme based on a social norm, it is possible that the reputation (or label) of an individual is updated incorrectly because of errors in the report of individuals. Our model incorporates the possibility of report errors, which allows us to analyze its impact on design and performance, whereas most existing works on reputation schemes [15][20][18] adopt an idealized assumption that reputations are always updated correctly.  Dynamic change in the population. The members of a community change over time as individuals gain or lose interest in the services provided by community members. We model this feature by having a constant fraction of 2 individuals leave and join the community in every period. This allows us to study the impact of population turnover on design and performance.  Whitewashing reputations. In an online community, individuals with bad reputations may attempt to whitewash their reputations by joining the community as new members [15]. We consider this possibility and study the design of whitewash-proof social norms and their performance. The remainder of this paper is organized as follows. In Section II, we describe the repeated matching game and incentive schemes based on a social norm. In Section III, we formulate the problem of designing an optimal social norm. In Section IV, we provide analytical results about optimal social norms. In Section V, we extend our model to address the impacts of variable punishment lengths and whitewashing possibility. We provide simulation results in Section VI, and we conclude the paper in Section VII. II. MODEL A. Repeated Matching Game We consider a community where agents can offer a valuable service to other agents. Examples of services are expert knowledge, customer reviews, job information, multimedia files, storage space, and computing power. We consider an infinite-horizon discrete time model with a continuum of agents [15][22]. In a period, each agent generates a service request [27][29], which is sent to another agent that can provide the requested service. We model the request generation and agent selection process by uniform random matching, where each agent receives exactly one request in every period, each agent is equally likely to receive the request from a particular agent, and the matching is independent across periods. In a pair of matched agents, the agent that requests a service is called a client while the agent that receives a service request is called a server. In every period, each agent in the community is involved in two matches, one as a client and the other as a server. Note that the agent with whom an agent interacts as a client can be different from that with which it interacts as a server, reflecting asymmetric interests between a pair of agents. We model the interaction between a pair of matched agents as a gift-giving game [23]. In a gift-giving game, the server has the binary choice of whether to fulfill or decline the request, while the client has no choice. The server’s action determines the payoffs of both agents. If the server fulfils the client’s request, the client receives a c > . We assume that b b > while the server suffers a service cost of c> so that the service service benefit of 0 0 of an agent creates a positive net social benefit. If the server declines the request, both agents receive zero payoffs. , where F stands for “fulfill” and D for “decline”. The The set of actions for the server is denoted by = { , }F D payoff matrix of the gift-giving game is presented in Table 1. An agent plays the gift-giving game repeatedly with changing partners until it leaves the community. We assume that at the end of each period a fraction of a Î agents in the current population leave and the same amount of new agents join the community. We refer to a as the turnover rate [15]. c> , Social welfare in a time period is measured by the average payoff of the agents in that period. Since b social welfare is maximized when all the servers choose action F in the gift-giving game they play, which yields c- to every agent. On the contrary, action D is the dominant strategy for the server in the gift-giving payoff b [0, 1] 3 game, which can be considered as the myopic equilibrium of the gift-giving game. When every server chooses its action to maximize its current payoff myopically, an inefficient outcome arises where every agent receives zero payoffs. TABLE 1. Payoff matrix of a gift-giving game. Server D 0 , 0 F b , c- Client B. Incentive Schemes Based on a Social Norm In order to improve the efficiency of the myopic equilibrium, we use incentive schemes based on social norms. A social norm is defined as the rules that a group uses to regulate the behavior of members. These rules indicate the established and approved ways of “operating” (e.g. exchanging services) in the group: adherence to these rules is positively rewarded, while failure to follow these rules results in (possibly severe) punishments [26]. This gives social norms a potential to provide incentives for cooperation. We consider a social norm that consists of a reputation scheme and a social strategy, as in [17] and [19]. A reputation scheme determines the reputations of agents depending on their past actions as a server, while a social strategy prescribes the actions that servers should take depending on the reputations of the matched agents. ,K t .  is the set of reputations that an Formally, a reputation scheme is represented by three elements ( ), agent can hold, K Î is the initial reputation attached to newly joining agents, and is the reputation update rule. After a server takes an action, the client sends a report (or feedback) about the action of the server to the third-party device or infrastructure that manages the reputations of agents, but the report is subject to errors with a small probability e . That is, with probability e , D is reported when the server takes action F, and vice versa. Assuming a ] binary set of reports, it is without loss of generality to restrict e in [ , reports are 0, 1 / 2 . When e = completely random and do not contain any meaningful information about the actions of servers. We consider a reputation update rule that updates the reputation of a server based only on the reputations of matched agents and the reported action of the server. Then, a reputation update rule can be represented by a mapping t q q ( ) , Ra , matched with a client with reputation q and its action is reported as . A social strategy is represented by a mapping ),s q q is the approved action for a server with reputation q that is matched with a client ( ´  , where  :s is the new reputation for a server with current reputation q when it is :t ´ ´  , where    1 / 2 with reputation q .1 To simplify our analysis, we initially impose the following restrictions on reputation schemes we consider.2 1)  is a nonempty finite set, i.e., ¼ for some nonnegative integer L . } {  0, 1, = , L 2) K L= . 3) t is defined by 1 The strategies in the existing reputation mechanisms [17][19] determine the server’s action based solely on the client’s reputation, and thus can be considered as a special case of the social strategies proposed in this paper. 2 We will relax the second and the third restrictions in Section V. 4 , R R R a } ) L 1, = + ¹ { q (1) a if  ( t q q , ,  ( ) s q q ,  ) ( s q q . , ìï min ïï= íï a 0 if ïïî Note that with the above three restrictions a nonnegative integer L completely describes a reputation scheme, and thus a social norm can be represented by a pair . We call the reputation scheme determined by L k s = ( , )L the maximum punishment reputation scheme with punishment length L . In the maximum punishment reputation scheme with punishment length L , there are 1L + reputations, and the initial reputation is specified as L . If the reported action of the server is the same as that specified by the social strategy s , the server’s reputation is increased by 1 while not exceeding L . Otherwise, the server’s reputation is set as 0 . A schematic representation of a maximum punishment reputation scheme is provided in Fig 1. Below we summarize the sequence of events in a time period: 1) Agents generate service requests and are matched. 2) Each server observes the reputation of its client and then determines its action. 3) Each client reports the action of its server. 4) The reputations of agents are updated, and each agent observes its new reputation for the next period. 5) A fraction of agents leave the community, and the same amount of new agents join the community. III. PROBLEM FORMULATION A. Stationary Distribution of Reputations As time passes, the reputations of agents are updated and agents leave and join the community. Thus, the th q be the fraction of q -agents in the total population at the distribution of reputations evolves over time. Let ( ) beginning of an arbitrary period t , where a q -agent means an agent with reputation q . Suppose that all the agents L to { } L } 0 in the community follow a given social strategy s . Then the transition from { q+ 1 t h h q ( ) ( ) q = q = 0 determined by the reputation update rule , taking into account the turnover rate a and the error probability e , as shown in the following expressions: ( ) 0 ( ) q ( ) L ) ) ( t e h q q £ £ - - L 1 for 1 } { ) ( ) ) ( t t h a e h + - + L L . 1 Since we are interested in the long-term payoffs of the agents, we study the distribution of reputations in the long run. Definition 1 (Stationary distribution) is a stationary distribution of reputations under the dynamics ) a e , ) ( a - 1 ) ( a - 1 ( = - 1 ( = - 1 ( = - 1 h h h (2) is 1, + 1 + 1 + 1 { } ( ) h q t t t t defined by (2) if it satisfies å L q = 0 h q ( ) = 1 and 5 ( ) h 0 ( ) h q ( ) h L ( = - 1 ( = - 1 ( = - 1 ) a e , ) ( a - 1 ) ( a - 1 ) ) ( q e h q £ £ - - L 1 for 1 } { ( ) ( ) ) a e h h + - + L L 1 . The following lemma shows the existence of and convergence to a unique stationary distribution. { } [ ] Lemma 1. For any and , there exists a unique stationary distribution ( ) a Î e Î h q 0, 1 / 2 [0, 1] (3) 1, whose expression is given by h ( ) L Proof: Suppose that a > or 0 ( ) h q + 1 - q q ( ) ) ( e a e q = - - £ £ - L , for 0 1 1 1, ìï e a = = 1 if ïïïï= + L L 1 ) ) ( ( a e - 1 1 íïïï ) ( ( a - - - 1 1 1 ïïî { } ( ) h q e > . Then (3) has a unique solution 0 e a + ) e otherwise. 0, (4) Moreover, the stationary distribution is reached within ( L + periods starting from any initial distribution. 1) ( ) h q h ( ) L ( = - 1 ( 1 - = e + 1 a - q q ) ( ) e 1 , for 0 + L L 1 ) ( ) a e - 1 ) ( ( a - - - 1 1 1 e a + ) e , q £ £ - L 1, (5) which satisfies å L q = 0 h q ( ) = 1 . Suppose that a = and 0 e = . Then solving (3) together with 0 å L q = 0 h q ( ) = 1 yields a unique solution h q = for 0 ( ) 0 q£ £ - and 1L ( ) Lh = . It is easy to see from the expressions in (2) 1 that ( ) h q is reached within ( q + periods, for all q , starting from any initial distribution. ■ 1) Since the coefficients in the equations that define a stationary distribution are independent of the social strategy that the agents follow, the stationary distribution is also independent of the social strategy, as can be seen in (4). Thus, we will write the stationary distribution as { ( )} Lh q to emphasize its dependence on the reputation scheme, which is represented by L . B. Sustainable Social Norms We now investigate the incentive of agents to follow a prescribed social strategy. For simplicity, we check the incentive of agents at the stationary distribution of reputations, as in [19] and [21]. Since we consider a non- cooperative scenario, we need to check whether an agent can improve its long-term payoff by a unilateral deviation. Note that any unilateral deviation from an individual agent would not affect the evolution of reputations and thus the stationary distribution,3 because we consider a continuum of agents. cs q q be the cost suffered by a server with reputation q that is matched with a client with reputation q ( ), Let 3 This is true for any deviation by agents of measure zero. 6 c c if and follows a social strategy , i.e., cs q q = s q q = s q q = s q q = ( ), ( ), ( ), ( ), bs q q be the benefit received by a client with reputation q that is matched with a server with reputation q ( ), s q q = s q q = bs q q = s q q = ( ), ( ), ( ), ( ), b consider uniform random matching, the expected period payoff of a q -agent under social norm k before it is matched is given by following a social strategy s , i.e., . Similarly, let . Since we and and if if if D D F F 0 0 b ( ) q = v k å  q  Î h L ( )  q b s (  q q , ) - å  q  Î h L ( )  q c s ) (  q q , . (6) To evaluate the long-term payoff of an agent, we use the discounted sum criterion in which the long-term payoff of an agent is given by the expected value of the sum of discounted period payoffs from the current period. Let ) ( q be the transition probability that a q -agent becomes a pk q 'q -agent in the next period under social norm k . ' Since we consider maximum punishment reputation schemes, ( pk q ' ) q can be expressed as ' ' e = pk ( q q if q min{ ìï - 1 ïïïï= q e = if 0, íïïïïïî 0 otherwise, Then we can compute the long-term payoff of an agent from the current period (before it is matched) by solving the following recursive equations q for all L 1, }, . (7) + Î ) q ' ( ) q ' ( q ) ( ) ' q ( ) q k v v v q = ¥ k ¥ k p k for q Î , + å d ' q Î where - is the weight that an agent puts on its future payoff. Since an agent leaves the community a d b = ) ( 1 with probability a at the end of the current period, the expected future payoff of a q -agent is given by ( ) ( ) - å q¥ ' q a ) k expected future payoff is multiplied by a common discount factor patience, of agents. , assuming that an agent receives zero payoff once it leaves the community. The , which reflects the time preference, or )0, 1 b Î (8) p k ' Î (1 q v [ q ' 's under social norm k . Since the deviation of a Now suppose that an agent deviates and uses a social strategy single agent does not affect the stationary distribution, the expected period payoff of a deviating q -agent is given by ( ) q = v ' k s , å  q  Î h L ( )  q b s (  q q , ) + h L ( )  q c s ' ) (  q q , . å  q  Î (9) ' ) ( q q be the transition probability that a q -agent using social strategy 's becomes a 'q -agent in the Let pk s q , ' , next period under social norm k , when it is matched with a client with reputation q . For each q , =  while the ) ) ( ( ' ' min ' q = with probability e if with probability ( e- and { } s q q s q q q q ) + = , , 0 1 1, L 7 ' ' ' ' v q h L p k s , p k s , gives the transition probabilities are reversed otherwise. Then ) ( ( ) ( )   = å  q q q q q , q  Î probability of a q -agent before knowing the reputation of its client, and the long-term payoff of a deviating agent from the current period (before it is matched) can be computed by solving ( ) ( ) ' q q + å d ' q  Î In our model, a server decides whether to provide a service or not after it is matched with a client and observes the reputation of the client. Hence, we check the incentive for a server to follow a social strategy at the point when it knows the reputation of the client. Suppose that a server with reputation q is matched with a client with reputation q . When the server follows the social strategy s prescribed by social norm k , it receives the long-term ( ) ( ) + å ( ) q¥ ' ' , excluding the possible benefit as a client. On the contrary, when the payoff d q q q , k for q Î . (10) p k s , ( ) q ( ) q ¥ k s , ¥ k s , - c p k = k s , q q v v v s ' ' ' ' ' ' q - c server deviates to a social strategy s ¢ , it receives the long-term payoff ) ( ) (  + å ( ) q¥ ' q q q q d q p , , ' k s s k s ¢ , , q again excluding the possible benefit as a client. By comparing these two payoffs, we can check whether a q -agent 's when it is matched with a client with reputation q . has an incentive to deviate to Definition 2 (Sustainable social norms) A social norm k is sustainable if ( ) ( )   ( ) ( ) å å ' q q q q q q , , s ),q q . 's , for all ( ³ - c s for all )  q q , ( ) ' q (11) p k s , ¥ k s , ( q - c p k ¥ k + + , q d d v v v q q ¢ ' ' ' ' ' ' ' ' ' is sustainable if no agent can gain from a unilateral deviation regardless of In words, a social norm s k = ( , )L the reputation of the client it is matched with when every other agent follows social strategy s and the reputations are determined by the maximum punishment reputation scheme with punishment length L. Thus, under a sustainable social norm, agents follow the prescribed social strategy in their self-interest. Checking whether a social norm is sustainable using the above definition requires computing deviation gains from all possible social strategies, whose computation complexity can be quite high for moderate values of L. By employing the criterion of unimprovability in Markov decision theory [28], we establish the one-shot deviation principle for sustainable social norms, which provides simpler conditions. For notation, let be the cost suffered by a server that takes action a , ) ( q q be the transition probability that a -agent becomes a q , norm k when it takes action a to a client with reputation q . The values of 'q -agent in the next period under social ) q q can be obtained in a , and let apk , apk , ( q ' ' similar way to obtain ) ( ),s q q . q q , by comparing a with ( pk s q , ' , Lemma 2 (One-shot Deviation Principle). A social norm k is sustainable if and only if '  ) ( q q , c s - £ c a d é ê ê ê ë å ' q { p k ' ( q q ) - p k a , ' ( q } )  q q , v ù ( ) ú q¥ ' ú k ú û (12) ),q q . for all a Î , for all ( 8 Proof: If social norm k is sustainable, then clearly there are no profitable one-shot deviations. We can prove the converse by showing that, if k is not sustainable, there is at least one profitable one-shot deviation. Since cs q q and ac are bounded, this is true by the unimprovability property in Markov decision theory [24][25]. ■ ( ), Lemma 2 shows that if an agent cannot gain by unilaterally deviating from s only in the current period and 's either, and vice versa. The left- following s afterwards, it cannot gain by switching to any other social strategy hand side of (12) can be interpreted as the current gain from choosing a , while the right-hand side of (12) represents the discounted expected future loss due to the different transition probabilities induced by choosing a . Using the one-shot deviation principle, we can derive incentive constraints that characterize sustainable social norms. ), ( s q q = ),q q such that First, consider a pair of reputations ( client, it suffers the service cost of c in the current period while its reputation in the next period becomes with probability (1 )e- and 0 with probability e . Thus, the expected long-term payoff of a q - { } q + 1, L min agent when it provides a service is given by . If the server with reputation q serves the F ) d L 1, - + + e ) v min = - + c ( ) ù é { } ¥ ¥ q (0) (1 ( ; V F F ú ê q k k û ë On the contrary, if a q -agent deviates and declines the service request, it avoids the cost of c in the current period while its reputation in the next period becomes 0 with probability (1 with probability e . )e- and { } q + 1, L min Thus, the expected long-term payoff of a q -agent when it does not provide a service is given by ) ( é ù { } q (1 ê ú ë û The incentive constraint that a q -agent does not gain from a one-shot deviation is given by V D F ( ; q (14) (13) min e v ) (0) ¥ k ¥ k e v e v = - + + 1, L , . d ) ) ) ( ; V F F q q³ ( ; V D F which can be expressed as - ¥ k d (1 e 2 ) { q min é v ê ë ), ( s q q = ),q q such that Now, consider a pair of reputations ( show that the incentive constraint that a q -agent does not gain from a one-shot deviation can be expressed as ( ) { } q ù (0) ú û (15) (16) min e 2 ) ¥ k - + - (1 - + ³ D 1, 1, ¥ k ¥ k L L d . v v c . Using a similar argument as above, we can ) } ( é v ê ë . ³ - c ù (0) ú û for some q , we can check only the first F Note that (15) implies (16), and thus for q such that ( ), s q q = incentive constraint (15). Therefore, a social norm k is sustainable if and only if (15) holds for all q such that ( ), ( ), s q q = s q q = for some q and (16) holds for all q such that for all q . The left-hand side of the incentive constraints (15) and (16) can be interpreted as the loss from punishment that social norm k applies to a q -agent for not following the social strategy. Therefore, in order to induce a q -agent to provide a service to some clients, the left-hand side should be at least as large as the service cost c , which can be interpreted as the deviation D F 9 gain. We use { } ) ( ù é } d (0) v ú ê û ë cooperation under social norm k , where cooperation means providing the requested service in our context. to measure the strength of the incentive for min min { q ( 1 ¥ k ¥ k  Î - - + 1, L ) 2 e v q C. Social Norm Design Problem Since we assume that the community operates at the stationary distribution of reputations, social welfare under social norm k can be computed by k ( ) q v k ( ) q . U h L = å q We assume that the community operator aims to choose a social norm that maximizes social welfare among sustainable social norms. Then the problem of designing a social norm can be formally expressed as ( ) ( ) å q q q ) ( ù é { } ( )   ¥ q e s q q q v L such that (0) 2 ) , min ú ê k û ë ) ( ù é } { ( )   ¥ s q q q q ³ - " - c v (0) , , such that min . ú ê k û ë A social norm that solves the design problem (18) is called an optimal social norm. U maximize ( ) s L , d subject to (1 d (1 $ such that ¥ v k ¥ k = " D ³ " c , (18) (17) e 2 ) h L - + = - + - = 1, 1, F L q v k q v k , IV. ANALYSIS OF OPTIMAL SOCIAL NORMS A. Optimal Value of the Design Problem We first investigate whether there exists a sustainable social norm, i.e., whether the design problem (18) has a s q q = D feasible solution. Fix the punishment length L and consider a social strategy D Ls defined by ( , ) L ),q q . Since there is no service provided in the community when all the agents follow D ( Ls , we have for all = 0 D ¥ LLv s D ( , q )( ) )D for all q . Hence, the relevant incentive constraint (16) is satisfied for all q , and the social norm ( , LL s sustainable. This shows that the design problem (18) always has a feasible solution. is *U be the optimal value of the design problem (18). In the Assuming that an optimal social norm exists, let *U . following proposition, we study the properties of Proposition 1. (i) £ - . b c £ 0 U * * U = if (ii) 0 c b > b - a - ( 1 b - ( 1 - ) ( 1 a ) ( 2 e ) 2 e - 3 ) 1 . (iii) U * ( ³ - - [1 1 a e ) ] ( b - if ) c c b £ b (1 - a )(1 - e 2 ) . *U (iv) < - if c b e > . 0 *U (v) = - if c b e = and 0 c b £ b (1 - . a ) *U (vi) = - only if c b e = and 0 c b £ b - a ( - 1 b ( - 1 ) a ) 1 . Proof: See Appendix A. ■ 10 We obtain zero social welfare at myopic equilibrium, without using a social norm. Hence, we are interested in whether we can sustain a social norm in which agents cooperate in a positive proportion of matches. In other words, * b c b a e that yield U > . From Proposition 1(ii) and (iii), we can we look for conditions on the parameters ( , , , ) , 0 é ê ë regard / c b £ conditions for c b / £ b (1 - a *U maximum social welfare in the limit. a - - - a b (1 - b (1 - )(1 )(2 ù é e 2 ) / 1 ú ê û ë ù û and / e c b 3 ) ú * U > , respectively. Moreover, when there are no report errors (i.e., 0 ù é û and / a c b ) ) / 1 ê ú ë = - , respectively. As a corollary of Proposition 1, we obtain the following results b c - as necessary and sufficient conditions to achieve the a ) as necessary and sufficient e = ), we can interpret 0 e 2 ) )(1 £ - - £ (1 (1 b (1 - - b a b Corollary 1. For any ( , )b c such that b *U converges to b c> , (i) c- as b  , 1 a  , and 0 e  , and (ii) 0 *U converges to 0 as b  , 0 a  , or 1 e  1 / 2 . ■ *U close to Corollary 1 shows that we can design a sustainable social norm that achieves near efficiency (i.e., c- ) when the community conditions are good (i.e., b is close to 1, and a and e are close to 0). Moreover, it b suffices to use only two reputations (i.e., L = ) for the design of such a social norm. On the contrary, no 1 * U = ) when the community conditions are bad (i.e., b is close to 0, a is cooperation can be sustained (i.e., 0 close to 1, or e is close to 1/2), as implied by Proposition 1(ii). B. Optimal Social Strategies Given a Punishment Length In order to obtain analytical results, we consider the design problem (18) with a fixed punishment length L , denoted DPL. Note that DPL has a feasible solution, namely D Ls , for any L and that there are a finite number (total )21 ( 2 L + ) of possible social strategies given L . Therefore, DPL has an optimal solution for any L . We use * LU and Ls to denote the optimal value and the optimal social strategy of DPL, respectively. We first show that increasing * the punishment length cannot decrease the optimal value. Proposition 2. 'L such that U for all L and ' L³ . L * * L ' L Proof: See Appendix B. ■ U³ Proposition 2 shows that * LU is non-decreasing in L . Since * LU £ - b c , we have * . U U U = = lim It may be the case that the incentive constraints eventually prevent the optimal * * sup ¥ L L L L value from increasing with L so that the supremum is attained by some finite L . If the supremum is not attained, the protocol designer can set an upper bound on L based on practical consideration. Now we analyze the structure of optimal social strategies given a punishment length. Proposition 3. Suppose that { } c b min ln / ln , b L . ³ q e > and 0 1a < . (i) If * s L ( ) q = for some q , then 0, F ( * 0, s L ) q = F for all 11 (ii) If q Î { 1, - } 1L , satisfies q ³ - L ( ln c b ) a e L Y ln ( , , ) - ln b , where Y ( a e , , L ) = ( 1 - a L ) + 1 L L a e e - - - ) ) (1 (1 (1 + L L 1 e e a a - - + ) ) (1 (1 2 + L + 1 - e ) e (19) and ( ) s q q = for some q , then , * F L ) ( , q = for some q , then * s L L F Proof: See Appendix C. ■ ( * s q , L (iii) If L ) = . F ( * s L L L , ) = . F C. Illustration with L=1 and L= 2 We can represent a social strategy Ls as an ( L + ´ + matrix whose ( , ) ( ) ) L i j 1 1 -entry is given by j 1, - . Proposition 3 provides some structures of an optimal social strategy 1) * Ls in the first row and the s - ( L i last column of the matrix representation, but it does not fully characterize the solution of DPL. Here we aim to obtain the solution of DPL for L = and 2 and analyze how it changes with the parameters. We first begin with 1 ( ) ),q q , the relevant incentive s q q = for some ( the case of two reputations, i.e., , 1 ( ) s q q = * , 1 . By Proposition 3(i) and (iii), if L = . In this case, if 1 constraint to sustain s= (1, 1 is (1 d for (1) ¥ k - ³ - F F k v c ) é e ¥ 2 ) v ê k ë ù (0) ú û ),q q , then some ( * * s s= 1 1 social strategies, only four can be optimal social strategies. These four social strategies are = , provided that (1, 1) F e > and 0 (0, 1) 1a < . Hence, among the total of 16 possible 1 s 1 = é D F ê ê F F ê ë ù ú ú ú û , 2 s 1 = F F D F é ê ê ê ë ù ú ú ú û 3 s , 1 = 0 D s 1 = é D F ê ê D F ê ë ù ú ú ú û 4 s , 1 = D s 1 = é D D ê ê D D ê ë ù ú ú ú û . (20) if 0 The following proposition specifies the optimal social strategy given the parameters. Proposition 4. Suppose that 0 . Then a e < - < 1 / 2 ) (1 ìïïïïïïïïïïïïíïïï 1 s 1 2 s 1 3 s ïïïïïïï 1 4 s ïïî 1 ( )11, i s= 2 e e a b - - c 2 ) ) (1 (1 < £ 2 e e a b - - + b (1 ) (1 2 ) 1 2 b a e e - - c 2 ) (1 ) (1 < £ 2 b a e e - - b 2 ) ) (1 (1 a a e e - - - - (1 2 )[1 )(1 ) ] 2 e e b a - - - ) (1 1 (1 2 ) c < < b a - )(1 b - 1 (1 c b . We obtain that b if (1 Proof: Let if if 1, 2, 3, 4 b + (1 , for - - a )(1 1 b i = e 2 ) * s 1 )(1 (1 (1 = £ < - - - - i k 1. a b , a e e - - (1 ) ] 2 )[1 2 a e e - 2 ) ) (1 , (21) e 2 ), ( = - 1 ( = - 1 U U 1 k 3 k ) 2 (0) ) b (0) ( - b ( - c h 1 h 1 c U ), 2 k U ), 4 k 12 ( = - 1 = 0. h 1 h (0) 1 ) b (1) ( - c ), (22) Since 0 < - (1 a e ) < 1 / 2 , we have 1 h (0) h< 1 (1) . Thus, we have U > U 2 k 1 k > U 3 k > U 4 k . Also, we obtain that v v ¥ 1 k ¥ 3 k (1) (1) - - v v ¥ 1 k ¥ 3 k (0) (0) = = ¥ ¥ h - - v b v c (1) (0) ), (0)( 1 2 2 k k ¥ ¥ - v v b (0) , (1) 4 4 k k = - b = 0. b (0)( - c ), h 1 (23) v v v v - - > (1) (1) (0) Thus, we have ¥ ¥ ¥ ¥ ¥ ¥ ¥ ¥ 3 3 2 2 1 1 4 4 k k k k k k k k strategy that yields the highest social welfare among feasible ones, we obtain the result. ■ Proposition 4 shows that the optimal social strategy is determined by the ratio of the service cost and benefit, 1 1s can be sustained, yielding the highest social welfare /c b . When /c b is sufficiently small, the social strategy . By choosing the social (0) (0) (0) (1) (1) > > - - v v v v among the four candidate social strategies. As /c b increases, the optimal social strategy changes from 1 1s to 2 1s to 0.8 for b = L = as c varies. The parameters we 1 4 3 1s . Fig 2 shows the optimal social strategies with 1s and eventually to , , use to obtain the results in the figures of this paper are set as follows unless otherwise stated: a = 0.1 b = . Fig 2(a) plots the incentive for cooperation of the four social strategies. We can find the , and e = 10 0.2 region of c in which each strategy is sustained by comparing the incentive for cooperation with the service cost c 1 2 3 4 1s , 1s , and 1s , and with c- for 1s . The solid portion of the lines indicates that the strategy is sustained while the dashed portion indicates that the strategy is not sustained. Fig 2(b) plots the social welfare of the four candidate strategies, with solid and dashed portions having the same meanings. The triangle-marked line represents the optimal value, which takes the maximum of the social welfare of all sustained strategies. L = . In order to provide a partial characterization of the Next, we analyze the case of three reputations, i.e. 2 * 2s , we introduce the following notation. Let # 2s be the social strategy with L = that 2 2G + be the set of ¥ ¥ ¥ ¥ L = . Let among all the social strategies with - - 2 k k k k all social strategies that satisfy the incentive constraints of DP2 for some parameters ( , , b c b a e satisfying e > , 0 , ) , 2s + be the social strategy that maximizes 2G + . Lastly, define a social strategy B B = Ls by s D L L ( - as defined in Appendix A. Let e ) 1a < , and (24) below with optimal social strategy maximizes min{ v (0)} 1, 0) (0), (2) (1) ( 1 - = g d v v v social welfare U k among all the social strategies in  s q q = B and . for all ( , ) q q ¹ - ( L F ( , ) L Proposition 5. Suppose that 1a < , and e > , 0 1, 0) c b < (2) 1 (1) g - g b < . c (24) (i) # s 2 0 D s= 2 . (ii) If 2 h (0) h< 2 (2) , then + = s 2 B s 2 h 2 h 2 . Proof: (i) Let k )D 0 s= (2, 2 . Then v ¥ k (1) - v ¥ k (0) = v ¥ k (2) - v ¥ k (0) = . We can show that, under the given b conditions, any change from 0 Ds 2 results in a decrease in the value of v ¥ k (1) ¥- v k (0) , which proves that 0 Ds 2 maximizes min{ v ¥ k (1) - v ¥ k (0), v ¥ k (2) - v ¥ k (0)} . 13 F = v v ¥ k - v - v ¥ k ¥ k (1) (2) (0) (0) q = 0, 1, 2 (ii) Since e > and 0 constraints, and thus , and thus replacing D with F in an element of 1a < , we have 2 ( ) h q > for all 0 a social strategy always improves social welfare. Hence, we first consider the social strategy F Ls defined by s q q = for all ( , )q q . F Fs maximizes social welfare U k among all the social strategies with L = , but ( , ) 2 L 2 ¥ Fs satisfies the incentive = . Thus, we cannot find parameters such that 0 k 2 G +Ï . Now consider social strategies in which there is exactly one D element. We can Fs 2 2 q > at ( , )q q such that s q q = show that, under the given conditions, having 2 ( , ) D s q q = q = at ( , )q q such that ¥- ¥ whereas having 2 ( , ) D yields both v 0 k k q > strategy having the only D element at ( , )q q such that , there do not exist parameters in the considered [ ] e ¥ ¥ parameter space with which the incentive constraint for 0-agents, d - - v v 2 ) (0) (1 (1) k k q = the other hand, for any social strategy having the only D element at ( , )q q such that incentive constraints by choosing , and c sufficiently close to 0. This shows that, among 1a < , b > , 0 2G + . Since Bs achieves the highest social welfare among the three candidate social strategies. ■ , h h < < (1) (0) (2) 2 2 2 Let us try to better understand now what the conditions in Proposition 5 mean. Proposition 5(i) implies that the maximum incentive for cooperation that can be achieved with three reputations is . Hence, b a e - - 2 )b )(1 (1 the social strategies having exactly one D element, only those having D in the first column belong to ¥ ¥- v k k > and . Thus, for any social 0 , we can satisfy both ³ , is satisfied. On c yields < , 0 1 / 2 e < (0) (0) (1) (1) h 2 0 0 0 v v cooperation can be sustained with L = if and only if (1 b 2 - a )(1 - e 2 )b ³ . That is, if / c c b > b (1 - a )(1 - e 2 ) , then Ds is the only feasible social strategy and thus * U = . Hence, when we increase c while holding other 0 2 2 parameters fixed, we can expect that Ds Ds around * 2s changes from 2 2 same is observed with converges to 1 as a L = in Proposition 4. We can see that [ 1 t t goes to 0 and b goes to 1. Hence, for given values of b , c , and e , the condition (24) is satisfied and thus some cooperation can be sustained if a and b are sufficiently close to 0 and 1, respectively. . Note that the (1)][(1 g ) / ] a )(1 (2) / e 2 ) b to (1 - = - - b g h h c 0 Consider a social norm k )B s= (2, 2 . We obtain that min{ v and U k ae ( ç= - - 1 1 ç çè a - (1) ¥ k 3 ) ( 1 - v ¥ k ) e e v (0), ö÷ ( -÷ b ÷ ø 2 ¥ k (2) - v ¥ k (0)} = v ¥ k (2) - v ¥ k (0) = - (1 2 a ) (1 - e e ) ( b - b c ) (25) ) c . Since 2G + is the set of all feasible social strategies with L = for some 2 parameters in the considered parameter space, we can interpret Proposition 5(ii) as stating that * s 2 B s= 2 when the community conditions are “favorable.” More precisely, we have * s 2 B s= 2 if (1 - a 2 ) (1 - e e b ) ( - b c ) ³ , or c c b £ b + - (1 2 b (1 3 a - ) (1 3 a - ) (1 e - 2 )(1 e - 2 )(1 e e ) e e - ) 1 . (26) 14 Also, Proposition 5(ii) implies that U * 2 ae ( ç£ - - 1 1 ç çè a 3 ) ( 1 - ) e e 2 ö÷ ( -÷ b ÷ ø ) c as long as the parameters remain in the considered parameter space. In Fig 3, we show the optimal value and the optimal social strategy of DP2 as we vary c . The optimal social * Ds as c increases: 2s changes in the following order before becoming 2 strategy = = , 1 s 2 = , 2 s 2 , 3 s 2 ù ù é é ù é F F F D F F D F F ú ú ê ê ú ê ú ú ê ú ê ê D F F D F F F F F ú ú ê ê ú ê ú ú ê ê ú ê F F F F F F F F F ú ú ê ê ú ê û ë û û ë ë ù ù ù ù é é é é D F F D F F F F F F F F ú ú ú ú ê ê ê ê ú ú ú ú ê ê ê ê D F F D F F F F F F F F ú ú ú ú ê ê ê ê ú ú ú ú ê ê ê ê D F F D F F D F F D F F ú ê ê ê ú ú ú ê ë û ë ë û û û ë 1 7 B D for large c (but not too large to sustain cooperation), which are for small c and s s= s s= 2 2 2 2 consistent with the discussion about Proposition 5. For the intermediate values of c , only the elements in the first column change in order to increase the incentive for cooperation. We find that the order of the optimal social Note that (27) , 5 s 2 , 6 s 2 , 7 s 2 4 s 2 = . = = = 0 strategies between 1 s 2 B s= 2 and s 7 2 D s= 2 0 depends on the community’s parameters ( , b b a e . , ) , V. EXTENSIONS A. Reputation Schemes with Shorter Punishment Length So far we have focused on maximum punishment reputation schemes under which any deviation in reported actions results in the reputation of 0. Although this class of reputation schemes is simple in that a reputation scheme can be identified with the number of reputations, it may not yield the highest social welfare among all e = , an agent possible reputation schemes when there are report errors. When there is no report error, i.e., 0 maintains reputation L as long as it follows the prescribed social strategy. Thus, in this case, punishment exists only as a threat and it does not result in an efficiency loss. On the contrary, when e > and 1a < , there exist a 0 positive proportion of agents with reputations 0 to 1L - in the stationary distribution even if all the agents follow the social strategy. Thus, there is a tension between efficiency and incentive. In order to sustain a social norm, we need to provide a strong punishment so that agents do not gain by deviation. At the same time, too severe a punishment reduces social welfare. This observation suggests that, in the presence of report errors, it is optimal to provide incentives just enough to prevent deviations. If we can provide a weaker punishment while sustaining the same social strategy, it will improve social welfare. One way to provide a weaker punishment is to use a random punishment. For example, we can consider a reputation scheme under which the reputation of a q -agent becomes 0 in the next period with probability and remains the same with probability 1 q q- when it reportedly q q Î (0, 1] deviates from the social strategy. By varying the punishment probability q q for q -agents, we can adjust the severity of the punishment applied to q -agents. This class of reputation schemes can be identified by . Maximum q q = for all q . punishment reputation schemes can be considered as a special case where 1 15 Another way to provide a weaker punishment is to use a smaller punishment length, denoted M . Under the reputation scheme with ( L + reputations and punishment length M , reputations are updated by 1) . R R R a ) + = - ¹ M { q (28)  ( t q q , , } if a , 0 if a L 1, }  ) ( s q q , ,  ( ) s q q , ìï q min{ ïï= íï max ïïî When a q -agent reportedly deviates from the social strategy, its reputation is reduced by M in the next period if Mq ³ and becomes 0 otherwise. Note that this reputation scheme is analogous to real-world reputation schemes for credit rating and auto insurance risk rating. This class of reputation schemes can be identified by ( , L M with ) £ £ .4 Maximum punishment reputation schemes can be considered as a special case where M L= . 1 M L In this paper, we focus on the second approach to investigate the impacts of the punishment length on the social { } é ù { { } ( ) } q q d v , 0 ) 1 ) min ú ê ë û q L M s . The punishment length M affects the evolution of the reputation social norm k , which is now defined as ( , , ) { } L ( ) h q ( , L M q L M , distribution, and the stationary distribution of reputations with the reputation scheme ( , ) welfare U k and the incentive for cooperation of a (max (min ¥ k ¥ k e 2 M + - - - 1, = 1 L , v ) satisfies the following equations: ( ) 0 ( ) q ( ) q ( ) L ( = - 1 ( = - 1 ( = - 1 ( = - 1 M ) å a e q = 0 ) ( a - 1 ) ( a - 1 ) ( a - 1 ) ( ) q , ( ( h ( , L M ) e h ( , L M ) e h ( , L M { ) e h ( , L M ) ) ) ( ) ) ( ) q q a eh - - + M 1 + 1 for 1 ( , ) L M ) q q - - + £ £ - L M L 1 1 for 1, } ) ( ) ( a h + + - L L . 1 ( , L M ) q £ £ - L M , (29) h ( , L M ) ) ) h ( , L M h ( , L M h ( , L M } L ( ) q q ) ) ) ) ) = 1 = 1 for Let for ( ) q ( ) k h L M ( , m L M ( , , i.e., } L ( ) q q { h L M ( , { m L M ( , be the cumulative distribution of q =  . Fig 4 plots the stationary distribution , L 0, q = å = k 0 { } { } L L ( ) ( ) m h q q L M L M ( , ( , q q = = 1 1 L = and M =  . We can see that the cumulative distribution monotonically decreases with M , i.e. 1, , 5 5 ( ) ( ) q q 1 2 agents holding a lower reputation. As a result, when the community adopts a social strategy that treats an agent with a higher reputation better, increasing the punishment length reduces social welfare while it increases the incentive for cooperation. This trade-off is illustrated in Fig 5, which plots social welfare and the incentive for , where the social strategy C Ls is defined by . This shows that, as the punishment length increases, there are more cooperation under a social norm and its cumulative distribution for all q if )CM s , 3 M M> 1 m L M ( , m L M ( , M = 1, 2, 3 for (3, £ 2 ) ) ) ) C s L ( ), q q = q³ if and only if q F , for all q . 4 We can further generalize this class by having the punishment length depend on the reputation. That is, when a q -agent reportedly deviates from the social strategy, its reputation is reduced to in the next period for some M q q£ . q - M q 16 p k - M ' ' ) ) = 1 ' q ( q ) (30) Î . . Agents’ long-term can be computed by (6), with the modification of the stationary distribution to In general, the social strategy adopted in the community is determined together with the reputation scheme in order to maximize social welfare while satisfying the incentive constraints. The design problem with variable punishment lengths can be formulated as follows. First, note that the expected period payoff of a q -agent, vk q , ( ) { } L ( ) h q L M ( , q payoffs can be obtained by solving (8), with the transition probabilities now given by ìï - { } q e q = + L 1, 1 if min , ïïïï= { } q q e q = - M , 0 , for all if max íïïïïïî 0 otherwise, Finally, the design problem can be written as ( ) å q h U maximize L M ( , ( ) s L M , , q ( é ) ( ¥ ¥ d e q - - + v v L min{ 2 ) max subject to (1 1, } ê k k ë ( )   s q q q q = " $ such that such that , ( é ) ( ¥ ¥ d q e + - - v v L (1 min{ 2 ) max 1, } ê k k ë ( )   q q s q q " = " .D , such that , and plot the L = and L M for We find the optimal social strategy given a reputation scheme ( , M = ) 1, 2, 3 3 social welfare and the incentive for cooperation of the optimal social strategies in Fig 6. Since different values of M induce different optimal social strategies given the value of L , there are no monotonic relationships between the punishment length and social welfare as well as the incentive for cooperation, unlike in Fig 5. The optimal punishment length given L can be obtained by taking the punishment length that yields the highest social welfare, which is plotted in Fig 7. We can see that, as the service cost c increases, the optimal punishment length increases from 1 to 2 to 3 before cooperation becomes no longer sustainable. This result is intuitive in that larger c requires a stronger incentive for cooperation, which can be achieved by having a larger punishment length. { q F , { q ) ù } , 0 ú û ) ù } , 0 ú û ³ - c , (31) ( ) q v k = k - M ³ c , B. Whitewash-Proof Social Norms So far we have restricted our attention to reputation schemes where newly joining agents are endowed with the highest reputation, i.e., K L= , without worrying about the possibility of whitewashing. We now make the initial reputation K as a choice variable of the design problem while assuming that agents can whitewash their reputations in order to obtain reputation K [15]. At the end of each period, agents can decide whether to whitewash their reputations or not after observing their reputations for the next period. If an agent chooses to whitewash its reputation, then it leaves and rejoins the community with a fraction of agents and receives initial reputation K . wc ³ . The cost of whitewashing is denoted by 0 The incentive constraints in the design problem (18) are aimed at preventing agents from deviating from the prescribed social strategy. In the presence of potential whitewashing attempts, we need additional incentive constraints to prevent agents from whitewashing their reputations. A social norm k is whitewash-proof if and only 17 if ¥ v K ( k ) ¥- k q v ( ) £ for all c w q =  . 5 Note that , L 0, ¥ v K ( k ) ¥- k q v ( ) is the gain from whitewashing for an ) ) q Q Î max ) - v ¥ v K ( k ¥- k q v ( ) . A social )L K with 0 K L £ £ . Let ( , agent whose reputation is updated as q . If agent. We measure the incentive for whitewashing under a social norm k by £ , there is no net gain from whitewashing for a q - c w { } ¥ ¥ k q v K ( ) ( k norm is more effective in preventing whitewashing as the incentive for whitewashing is smaller. To simplify our analysis, we fix the punishment length at M L= so that a reputation scheme is represented by { } L ( ) h q L K ( , q = 1 )L K . Then the design problem is modified as ( , å q é ¥ e v 2 ) ê k ë é ¥ q e d v 2 ) (min{ (1 ê k ë ¥- ¥ k q v v K c ( ) ( k w Now an optimal social norm is the one that maximizes social welfare among sustainable and whitewash-proof ( )   q s q q such that , ( )   s q q q , such that , be the stationary distribution of reputations under reputation scheme U maximize ( ) s L K , , d subject to (1 ù (0) ú û ù ³ - " c (0) , ú û L 1, }) q . $ such that ¥ v k ¥ k ³ " c , q q (min{ = " D + L 1, }) - (32) = F , h L K ( , ) q v ( ) k q ( ) = k £ " , - - + - v q ) social norms. Note that the design problem (32) always has a feasible solution for any )D wc ³ since ( , L K s 0 , L is sustainable and whitewash-proof for all ( , )L K . Proposition 6. If c w Proof: Since - £ c v ³ - 1 ( ) k q + b c a - )(1 (1 b - e ) , then every social norm is whitewash-proof. £ for all q , we have b v k ( ) q - v k ( )' q £ + for all q and q ¢ . Hence, by (37), c b v ¥ k q ( ) - v ¢ q ( ) = ¥ k - L 1 å = l 0 l g é v ê ë k ( q min{ + ) l L , } - v k q (min{ ¢ + ù l L , }) ú û £ b 1 + - c g . (33) c ) / (1 ³ + b ( Therefore, if wc Now we investigate the impacts of the initial reputation K on social welfare and the incentive for whitewashing. We first consider the case where the social strategy is fixed. Fig 8 plots social welfare and the incentive for L K s . ■ - , the whitewash-proof constraint is satisfied for any choice of ( , g , ) ) (3, for whitewashing under a social norm K =  . We can see that larger K yields higher social 0, , 3 )CK s , 3 welfare and at the same time a larger incentive for whitewashing since new agents are treated better. Hence, there is a trade-off between efficiency and whitewash-proofness as we increase K while fixing the social strategy. Next we )L K . Fig 9 plots social welfare and the incentive consider the optimal social strategy given a reputation scheme ( , K =  . We can see that giving the highest L = and for whitewashing under the optimal social strategy for , 3 0, 3 reputation to new agents ( 3K = ) yields the highest social welfare but it can prevent whitewashing only for small 5 This condition assumes that an agent can whitewash its reputation only once in its lifespan in the community. More generally, we can consider the case where an agent can whitewash its reputation multiple times. For example, an agent can use a deterministic stationary decision rule for whitewashing, which , where w q = (resp. w q = ) means that the agent whitewashes (resp. does not whitewash) its can be represented by a function w  ( ) 0 ( ) 1 : {0, 1} reputation if it holds reputation q in the next period. This will yield a different expression for the gain from whitewashing. 18 3K = is optimal only for small c , and optimal K drops values of c . With our parameter specification, choosing to 0 for other values of c with which some cooperation can be sustained. Fig 10 plots the optimal initial reputation *K as we vary the whitewashing cost wc , for . As wc increases, the incentive constraints for *K is non-decreasing in wc . On the other hand, as c increases, it whitewashing becomes less binding, and thus ) ( L 1, } becomes more difficult to sustain cooperation while the difference between q min{ and 1, 2, 3 ¥ vk c = ( )0 + v ¥ k s q q = increases for all q such that ( , ) F for some q . As a result, *K is non-increasing in c . VI. ILLUSTRATIVE EXAMPLE In this section, we present numerical results to illustrate in detail the performance of optimal social norms. b = ), the cost per Unless stated otherwise, the setting of the community is as follows: the benefit per service ( 10 service ( c = ), the discount factor ( ), the turnover rate ( ), the report error ( ), the b = a = e = 0.8 0.2 0.1 1 punishment step ( M L= ), and the initial reputation ( K L= ). Since the number of all possible social strategies given a punishment length L increases exponentially with L , it takes a long time to compute the optimal social ( )* s , LL We first compare the performances of the optimal social norm and the fixed social norm for strategy even for a moderate value of L . Hence, we consider social norms . For 1, 2, 3 1, 2, 3 for L = L = = k . When c is small, . As it shows, the optimal social norm )C each L , we use ( , as the example of the fixed social norm. Fig 11 illustrates the results, with the red bar LL s representing the pareto optimal value b c- , i.e., the highest social welfare that can be possibly sustained by a social norm, the black bar representing the social welfare of the optimal social norm, and the yellow bar )C * )LL s outperforms ( , LL s ( , . When c is sufficiently large such that no )C representing the social welfare of ( , LL s )C * )LL s delivers higher social welfare than ( , LL s ( , )C * cooperation can be sustained under ( , )LL s . , a positive level of cooperation can still be sustained under LL s ( , Next, we analyze the impacts of the community’s parameters on the performance of optimal social norms. Impact of the Discount Factor: We discuss the impact of the discount factor b on the performance of optimal social norms. As b increases, an agent puts a higher weight on its future payoff relative to its instant payoff. Hence, with larger b , it is easier to sustain cooperation using future reward and punishment through a social norm. This is . illustrated in Fig 12(a), which shows that social welfare is non-decreasing in b . Impact of the Turnover Rate: Increasing a has two opposite effects on social welfare. As a increases, the weight on the future payoffs, - , decreases, and thus it becomes more difficult to sustain cooperation. a b d = ) ( 1 On the other hand, as a increases, there are more agents holding the highest reputation given the restriction K L= . In general, agents with the highest reputation are treated well under optimal social strategies, which implies a positive effect of increasing a on social welfare. From Fig 12(b), we can see that, when a is large, the first effect is dominant, making cooperation not sustainable. We can also see that the second effect is dominant for 19 the values of a with which cooperation can be sustained, yielding an increasing tendency of social welfare with respect to a . Impact of the Report Errors: As e increases, it becomes more difficult to sustain cooperation because reward and punishment provided by a social norm becomes more random. At the same time, larger e increases the fraction of 0 -agents in the stationary distribution, which usually receive the lowest long-term payoff among all reputations. Therefore, we can expect that optimal social welfare has a non-increasing tendency with respect to e , as illustrated in Fig 12(c). When e is sufficiently close to 1/2, D Ls is the only sustainable social strategy and social welfare falls to 0 . On the other direction, as e approaches 0, social welfare converges to its upper bound b c- , regardless of the punishment length, as can be seen from Proposition 1(iii). We can also observe from Fig 12 that * the regions of a and e where some cooperation can be sustained (i.e., LU > ) become wider as L increases, 0 whereas that of b is independent of L . VII. CONCLUSIONS In this paper, we used the idea of social norms to establish a rigorous framework for the design and analysis of a class of incentive schemes to sustain cooperation in online social communities. We derived conditions for sustainable social norms, under which no agent gains by deviating from the prescribed social strategy. We formulated the problem of designing an optimal social norm and characterized optimal social welfare and optimal social strategies given parameters. We also discussed the impacts of punishment lengths and whitewashing possibility on the design and performance of optimal social norms, identifying a trade-off between efficiency and incentives. Lastly, we presented numerical results to illustrate the impacts of the discount factor, the turnover rate, and the probability of report errors on the performance of optimal social norms. Our framework will provide a foundation of incentive schemes to be deployed in real-world communities, encouraging cooperation among anonymous, self-interested individuals. APPENDIX A PROOF OF PROPOSITION 1 (i) * U ³ follows by noting that ( , LL s )D 0 ) ( ) ( ) (   q h s q q q ( , L å  q q h ) L , = F c I ) = - b ( U k is feasible. Note that the objective function can be rewritten as , where I is an indicator function. Hence, U k £ - for all k , b c *U which implies £ - . b c (ii) By (8), we can express v ¥ k ( ) 1 ¥- v k ( ) 0 as = = v k v k Similarly, we have ( ) 1 - v k ( ) 0 + d v ¥ k ( ) 1 - ¥ v k [ ( 1 ( ) 0 - e ) ( ) 1 + d v ¥ k ( 1 ( ) 2 - e + [ v ) e v ¥ k - d [ ( 1 - e ) v ¥ k ( ) 1 + e v ¥ k ] ( ) 0 (34) ¥ k ( ) 2 ] ( ) 0 - v - v ¥ k ( ) 0 k ] ( ) 1 . 20 v ¥ k ( ) 2 - v ¥ k ( ) 1 =  v k ( ) 2 - v k ( ) 1 + d ( 1 - e ) [ v ¥ k ( ) 3 - v ¥ k ] ( ) 2 , v ¥ k ) ( - - L 1 ¥ ( ) - L k v v ¥ k ¥ v k ( L ( L ) - = 2 ) - = 1 ) ( ( - - v L v L 1 k k ( ) ( - - v L v L k k ) - + 2 ) 1 . d ( 1 - e ) [ v ¥ k ( ) L - v ¥ k ( L - ] ) 1 , (35) v ¥ k ( ) q - v ¥ k ( q ) - = 1 q - L å = l 0 l g [ v k ( q ) + - l v k ( q + - l ] ) 1 , (36) In general, for q = ¼ , , L 1, where we define g = - . Thus, we obtain e d ) ( 1 ¥ ¥ q - v v ( ) (0) k k (0) q ( ) q ( + g = v - q - + 1 L v k [ v L ( ) k k g - + [ v k v L ( k + - 1) ]  + + v (1) k ]  q - + + + 1) g L - 1 L q - [ g v L ( ) k [ - v L ( ) k v L ( k - v L ( k - - ] 1) q ] ) (37) = - L 1 å = l 0 l g é v ë k ( q min{ + ) l L , } - ù v l ( ) , û k for q = ¼ . , L 1, Since - £ c v k q ( ) £ for all q , we have b v q ( ) k  q- v ( ) k £ + b c for all ( , )q q . Hence, by (37), v ¥ k q ( ) - v ¥ k (0) £ L g - 1 g - 1 b ( + £ c ) b 1 + - c g (38) for all q = ¼ , for all , L 1, k = s ( , )L . Therefore, if d (1 - e b 2 )[( + c ) / (1 - g )] < , or equivalently, c c b / > b [ (1 - a )(1 - e 2 )] / [1 - b (1 - a )(2 - e 3 )] for any social norm ( , )L s . This implies that any social strategy s such that , then the incentive constraint (15) cannot be satisfied for any q , ), ( for some ( ),q q is not s q q = F * feasible, and thus U = . 0 (iii) For any L , define a social strategy Ls by 0D s D L 0 ( ) q q = , D for q = 0 and 0 s D L ( ) q q = , F for all q > 0 , for all q . In other words, with Ls each agent declines the service request of 0-agents while providing a service to 0D other agents. Consider a social norm . Hence, and . Then c (1) (0) (1) k v v s= 0 )D (1, 1 and v ¥ k (1) ¥- v k (0) = b , constraint k c (1) h= - 1 thus and k the = - b h 1 incentive ³ is satisfied by the hypothesis / c b c £ b (1 - a )(1 - e 2 ) . Since there exists a d U k ( 1 a e - = - - c b ) ) ]( [1 (1 ( ) ) ( ) ( ) e ¥ v 0 1 k feasible solution that achieves U ¥ k - - 2 v [ = - - (1 1 ] a e b ) ( - , we have U c ) * [ ³ - - (1 1 ] a e b ) ( - . c ) k *U (iv) Suppose, on the contrary to the conclusion, that = - . If b c a = , then (15) cannot be satisfied for any 1 * q , for any k , which implies U = . Hence, it must be the case that 0 social norm that achieves *U = - . Since c b e > and 0 1a < , 21 * k = * L ( 1a < . Let ( ) q > for all q by (4). Since 0 be an optimal s ) , * h * L * U = U * k = - b ( c å  ) q q , h * L ( ) q h * L ( )  q I ) (  * s q q , ( = F ) , *s should have ( ) s q q = * , F ),q q . However, for all ( under this social strategy, all the agents are treated equally, and thus ¥ ¥ * v L ( * * k k satisfy the relevant incentive constraint (15) for all q since the left-hand side of (15) is zero, which contradicts the optimality of ( ) * * ,L s . (v) The result can be obtained by combining (i) and (iii). *s cannot . Then = = (0) v ) *U (vi) Suppose that *U = - , and let ( , )L s be an optimal social norm that achieves b c = - . By (iv), we b c obtain e = . Then by (4), 0 Lh q = for all 0 ( ) 0 q£ £ - and 1L L Lh ( ) = . Hence, s should have ( , )L L s 1 = F in order to attain *U = - . Since b c ( ) v L k = - and b c v k q ³ - for all 0 ( ) c q£ £ - , we have 1L v ¥ k ( ) L ¥- v k ( )0 £ b / (1 - g ) by (37). If d b / (1 d- < , then the incentive constraint for L -agents, c ) d ¥ v L [ ( ) k ¥- v k (0)] ³ , cannot be satisfied. Therefore, we obtain / c b c £ d / (1 - . ■ d ) APPENDIX B PROOF OF PROPOSITION 2 Choose an arbitrary L . To prove the result, we will construct a social strategy 1Ls + using punishment length * 1L + that is feasible and achieves LU . Define 1Ls + by s L + 1  ( ) q q , q for  ) ( ìï * s q q q for , ïïïïï L  ) ( * s q L , ïï= íï L * ) s q ( , ïïïïï L * s ïïî L q for q for ( L L , L ) £ L £  q and L ,  q 1 and  q and = + L £ L 1, = + L  q 1 and = + L = + L £ L , (39) 1. k = Let ( )* s , LL ( ( ) h ++ L L L 1 q =  and , L 0, h L + 1 ' k and ( = + L ( ) ) + = L 1 ) ( ) + = v Lk 1 h L ( v L ' k . Hence, we have that s + 1, L 1 ) . From (4), we have h + 1L ( ) q = h L ( ) q for q = 0, - 1L , and . Using this and (6), it is straightforward to see that ( ) k q 'v = vk ( ) q for all U ' k = = = + L 1 å q = 0 - L 1 å q = 0 - L 1 å q = 0 h L + 1 ( ) q h L ( ) q v k v ' k ( ) q ( ) q + h L ( ) q v k ( ) q + + 1 = h L - L 1 å q = 0 + L 1 å h L q = L ( ) ( ) h L v L k L ( ) q + 1 ( ) q ( ) q v ' k ( ) v L k + + L 1 å q = L h L + 1 ( ) q v ' k ( ) q (40) = U k = U * L . 22 Using (37), we can show that v ¥ ' k q ( ) - v ¥ ' k (0) = v ¥ k q ( ) - v ¥ k (0) for all q =  1, , L and ¥ v L ( ' k + - 1) v ¥ ' k (0) = ¥ v L ( ) k - v ¥ k (0) . By the definition of 1Ls + , the right-hand side of the relevant incentive constraint (i.e., c or c- ) for each q =  is the same both under , L 0, * Ls and under 1Ls + . Also, under 1Ls + , the right-hand side of the relevant incentive constraint for q = + is the same as that for 1L q = . Therefore, L 1Ls + satisfies the relevant incentive constraints for all q = 0, + 1L , . ■ APPENDIX C PROOF OF PROPOSITION 3 To facilitate the proof, we define uk q¥ ( ) by u ¥ k ( ) q = ¥ å = l 0 l g v k ( min { q + l L , ) } (41) for q =  . Then, by (37), we have , L 0, v ¥ k q ( ) - v ¥ k (0) = u ¥ k q ( ) - u ¥ k (0) for all q =  . Thus, we can use , L 1, u q¥ ( ) k ¥- u k (0) q¥ ( ) k ¥- v k (0) in the incentive constraints of DPL. instead of v ) ( 0, q = * s L Suppose that F for some q . Then the relevant incentive constraint for a 0-agent is d (1 - é e ¥ u 2 ) ê k ë (1) - u ¥ k ù (0) ú û ³ c . Suppose that ( * 0, s L ) q = for some D q Î { 1, - } 1L , such that q ³ c ln / ln b b . Consider a social strategy ' Ls defined by ) (  ' s q q , L ìï ) ( ( )   * q q s q q , for , ïï= íï L ) (  q q F , for ïïî ¹ = That is, ' Ls is the social strategy that differs from v k ' (0) - v k (0) h = - t U ' k - U k = h L h (0) L ( ) q ( ) q c < 0 and v ( ) k q ' - v b ( - > . Also, c ) 0 )0, q . Let Ls only at ( * ( ) q = h t k ( ) 0 b > 0 ( q 0, ( q 0, ) , ) . ( )* s , LL since e > = k (42) and ' k = 0 and ( ) ' s , LL 1a < . Note that . Thus, u ¥ ' k ( ) q - u ¥ k ( ) q q ìï ( ) ( ) q g q - + - v v v v ] [ (0) (0)] [ ïïïï k k ' ' k k q q q + 1 e e b a q = = - - - b c 0, ) (1 ] for ) [ (1 ïï = íï ( ) ( ) q q - q q g q q = ¼ - v v 1, ] for [ , , ïïïï k ' k q q = + ¼ 1, 0 for ïîï , L . (43) Since q ³ c ln / ln b b , we have u ¥ ( ) ' 0 k ¥- uk ( ) 0 £ . Thus, 0 u ¥ ' k q ( ) - u ¥ ' k (0) ³ u ¥ k q ( ) - u ¥ k (0) for all 23 q =  . Since , L 1, * s L ( ) q = for some q , the relevant incentive constraint for a q -agent is the same both 0, F under * Ls and under ' Ls , for all q . Hence, ' Ls satisfies the incentive constraints of DPL, which contradicts the optimality of * Ls . This proves that q = * (0, ) s L F for all ³ q c ln / ln b b . Similar approaches can be used to prove * (0, ) s L L = , (ii), and (iii). ■ F APPENDIX D FIGURES L 1L - … q … 0 s s s Fig 1. Schematic representation of a maximum punishment reputation scheme. service cost c 1 1 2 1 3 1 4 1 5 4 3 2 1 0 n o i t a r e p o o c r o f e v i t n e c n I 0 1 2 3 4 6 7 8 9 10 5 c 24 1 1 * = 1 10 9 8 7 6 5 4 3 2 1 0 0 e r a f l e w l a i c o S (a) 2 1 3 1 4 1 1 1 2 1 3 1 4 1 * 1 2 3 1 5 c (b) Fig 2. Performance of the four candidate social strategies when L = : (a) incentive for cooperation, and (b) social welfare 1 and the optimal social strategy. 10 7 8 9 4 6 7 6 2 5 2 4 2 3 2 2 2 1 2 * = 2 2 10 D 2 1 e r a f l e w l a i c o s l a m i t p O 8 6 4 2 0 0 0.8 0.6 0.4 0.2 0 0 )  ( ) M , L (  n o i t u b i r t s i d y r a n o i t a t S 2 5 c Fig 3. Optimal social welfare and the optimal social strategy of DP2. 3 7 4 6 8 M = 1 M = 2 M = 3 M = 4 M = 5 9 10 1 2 Reputation  3 4 5 25 5 L = . 5 8 9 10 L = . 3 1 2 3 4 Reputation  (b) (a) Stationary distribution of reputations and (b) its cumulative distribution when M = 1 M = 2 M = 3 8 6 4 service cost c 2 0 0 M = 1 M = 2 M = 3 5 5 6 c c Fig 5. Social welfare and the incentive for cooperation under social strategy C Ls when 0 0 8 9 10 3 4 7 1 2 3 1 2 6 7 4 2 service cost c )  ( ) M , L (  n o i t u b i r t s i d e v i t a l u m u C 1 0.8 0.6 0.4 0.2 0 0 (a) Fig 4. 10 8 6 4 e r a f l e w l a i c o S 10 e r a f l e w l a i c o S 9 8 7 6 5 4 M = 1 M = 2 M = 3 M = 4 M = 5 10 n o i t a r e p o o c r o f e v i t n e c n I 7 n o i t a r e p o o c r o f e v i t n e c n I 6 5 4 3 2 1 M = 1 M = 2 M = 3 3 M = 1 M = 2 M = 3 3 3 0 1 2 4 5 0 0 1 2 c c Fig 6. Social welfare and the incentive for cooperation under the optimal social strategy when 4 5 L = . 3 h t g n e l t n e m h s i n u p l a m i t p O 3 2 1 0 1 2 c 26 3 4 5 10 8 6 4 2 e r a f l e w l a i c o S L = . 3 K = 0 K = 1 K = 2 K = 3 Fig 7. Optimal punishment length when K = 0 K = 1 K = 2 K = 3 g n i h s a w e t i h w r o f e v i t n e c n I 20 15 10 5 0 0 6 7 8 L = and 3 9 10 wc = . 1 0 0 1 4 1 2 3 4 8 9 2 3 6 7 10 5 5 c c Fig 8. Social welfare and the incentive for whitewashing under social strategy C Ls when 1 10 9 8 7 6 5 4 3 2 1 0 0 g n i h s a w e t i h w r o f e v i t n e c n I K = 0 K = 1 K = 2 K = 3 K = 0 K = 1 K = 2 K = 3 e r a f l e w l a i c o S 0 0 0.5 2 1 3 2 1 3 4 5 c c Fig 9. Social welfare and the incentive for whitewashing under the optimal social strategy when 4 L = and 3 5 wc = . 1 n o i t a t u p e r l a i t i n i l a m i t p O 3 2 1 0 0 1 c = 1 c = 2 c = 3 4 3 2 5 cw Fig 10. Optimal initial reputation when 6 10 7 8 9 L = . 3 27 e r a f l e w l a i c o S e r a f l e w l a i c o S e r a f l e w l a i c o S 10 9 8 7 6 5 4 3 2 1 0 10 9 8 7 6 5 4 3 2 1 0 10 9 8 7 6 5 4 3 2 1 0 Pareto optimum Optimal social no rm Fixed social no rm 0 1 2 c (a) 3 4 5 Pareto optimum Optimal social no rm Fixed social no rm 0 1 2 c (b) 3 4 5 Pareto optimum Optimal social no rm Fixed social no rm 0 1 2 3 4 5 Fig 11. Performances of the optimal norm ( )* , LL s 10  , C LL  when (a) L = ; (b) 1 L = ; (c) 2 L = 3 c (c) and the fixed social norm  e r a f l e w l a i c o s l a m i t p O 8 6 4 2 L = 1 L = 2 L = 3 0 0 0.1 0.2 0.3 0.4 0.5 0.6  (a) 0.7 0.8 0.9 1.0 28 e r a f l e w l a i c o s l a m i t p O 10 8 6 4 2 0 0 10 e r a f l e w l a i c o s l a m i t p O 8 6 4 2 L = 1 L = 2 L = 3 L = 1 L = 2 L = 3 0.1 0.2 0.3 0.7 0.8 0.9 0.4 0.5 0.6  (b) (c) Fig 12. Optimal social welfare given L as b , a , and e vary. 1.0 0 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5  REFERENCES [1] O. Gharehshiran, V. Krishnamurthy, “Coalition Formation for Bearings–Only Localization in Sensor Networks – A Cooperative Game Approach,” IEEE Trans. on Signal Proc., vol 58, no. 8, pp. 4322 – 4338, 2010. [2] M. Jackson, “Social and Economic Networks,” Princeton University Press, 2008. [3] N. Hanaki, A. Peterhansl, P. Dodds, D. Watts, “Cooperation in Evolving Social Networks,” Management Science, vol. 53, no. 7, pp. 1036 – 1050, 2007. [4] H. Park, M. van der Schaar, “Evolution of Resource Reciprocation Strategies in P2P Networks,” IEEE Trans. on Signal Proc., vol. 58, no. 3, pp. 1205 – 1218, 2010. [5] E. Adar, B. A. Huberman, “Free Riding on Gnutella,” First Monday, vol. 5, No. 10, Oct. 2000. [6] Z. Xiang, Q. Zhang, W. Zhu, Z. Zhang, Y. Zhang “Peer-to-Peer Based Multimedia Distribution Service,” IEEE Trans. on Multimedia, vol. 6, no. 2, pp. 343 – 355, 2004. [7] M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design,” IEEE Internet Computing Journal, Special Issue on Agent-to-Agent Networking, 2002. [8] S. Saroiu, P. K. Gummadi, and S. D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. Multimedia Computing and Networking, 2002. [9] J. K. MacKie-Mason and H. R. Varian, “Pricing Congestible Network Resources,” IEEE J. Sel. Areas Commun., vol. 13, no. 7, pp. 1141–1149, Sep. 1995. [10] F. Wang, M. Krunz, S. Cui, “Price-Based Spectrum Management in Cognitive Radio Networks,” IEEE Journal of Selected Topics in Signal Processing, vol 2, no. 1, pp. 74 – 87, 2008. [11] C. Buragohain, D. Agrawal, and S. Suri, “A Game-theoretic Framework for Incentives in P2P Systems,” Proc. Int. Conf. Agent-to-Agent Computing, pp. 48-56, Sep. 2003. [12] B. Skyrms, R. Pemantle, “A Dynamic Model of Social Network Formation,” Adaptive Networks (Understanding Complex Systems), pp. 231 – 251, 2009. [13] J. Park, M. van der Schaar, “Medium Access Control Protocols with Memory,” IEEE/ACM Trans. on Networking, vol. 18, no. 6, pp. 1921 – 1934, 2010. [14] J. Huang, H. Mansour, V. Krishnamurthy, “A Dynamical Games Approach to Transmission-Rate Adaptation in Multimedia WLAN,” IEEE Trans. on Signal Proc., vol 58, no. 7, pp. 3635 – 3646, 2010. [15] M. Feldman, K. Lai, I. Stoica, J. Chuang, “Robust Incentive Techniques for Peer-to-Peer Networks,” Proc. of the 5th ACM Conf. on Elec. Commerce, Session 4, pp. 102-111, 2004. [16] A. Habib, J. Chuang, “Service Differentiated Peer Selection: an Incentive Mechanism for Peer-to-Peer Media Streaming,” IEEE Trans. on Multimedia, vol 8, no. 3, pp. 610 – 621, 2006. [17] M. Kandori, “Social Norms and Community Enforcement,” Rev. Economic Studies, vol. 59, No. 1, pp. 63-80, Jan. 1992. [18] A. Ravoaja, E. Anceaume, “STORM: A Secure Overlay for P2P Reputation Management,” Proc. 1st Int’l Conf. on Self- Adaptive and Self-Organizing Systems, pp. 247 – 256, 2007. [19] M. Okuno-Fujiwara and A. Postlewaite, “Social norms and random matching games,” Games Econ. Behavior, vol. 9, no. 1, pp. 79–109, Apr. 1995. 29 [20] S. Kamvar, M. T. Schlosser, H. G. Molina, “The Eigentrust Algorithm for Reputation Management in P2P Networks,” Proc. 12th Int’l Conf. on World Wide Web, pp. 640 – 651, 2003. [21] S. Adlakha, R. Johari, G. Y. Weinstraub, and A. Goldsmith, “Oblivious Equilibrium for Large-Scale Stochastic Games with Unbounded Costs,” IEEE Conference on Decision and Control, pp. 5531 – 5538, 2008 [22] eMule Peer-to-Peers File Sharing Content, [Online]. Available: http://www.emule-project.net/, [Online]. Available [23] P. Johnson, D. Levine, and W. Pesendorfer, “Evolution and Information in a Gift-Giving Game,” J. Econ. Theory, vol. 100, no. 1, pp. 1-21, 2001. [24] D. Kreps, “Decision Problems with Expected Utility Criteria, I: Upper and Lower Convergent Utility,” Mathematics of Operations Research, vol. 2, no. 1, pp. 45 – 53, 1977. [25] D. Kreps, “Decision Problems with Expected Utility Criteria, II: Stationary,” Mathematics of Operations Research, vol. 2, no. 3, pp. 266 – 274, 1977. [26] G. J. Mailath, L. Samuelson, “Repeated Games and Reputations: Long-Run Relationships,” Oxford University Press, Sep. 2006. [27] L. Massoulie, M. Vojnovic, “Coupon Replication Systems,” IEEE/ACM Trans. on Networking, vol. 16, no. 3, pp. 603 – 616, 2005. [28] P. Whittle, “Optimization Over Time,” New York: Wiley, 1983. [29] Y. Zhou, D. M Chiu, J. Lui, “A Simple Model for Analyzing P2P Streaming Protocols,” IEEE Int’l Conf. on Networking Protocols, pp. 226 – 235, 2007. 30
1609.00427
6
1609
2019-04-21T02:13:16
No Time to Observe: Adaptive Influence Maximization with Partial Feedback
[ "cs.SI" ]
Although influence maximization problem has been extensively studied over the past ten years, majority of existing work adopt one of the following models: \emph{full-feedback model} or \emph{zero-feedback model}. In the zero-feedback model, we have to commit the seed users all at once in advance, this strategy is also known as non-adaptive policy. In the full-feedback model, we select one seed at a time and wait until the diffusion completes, before selecting the next seed. Full-feedback model has better performance but potentially huge delay, zero-feedback model has zero delay but poorer performance since it does not utilize the observation that may be made during the seeding process. To fill the gap between these two models, we propose \emph{Partial-feedback Model}, which allows us to select a seed at any intermediate stage. We develop two novel greedy policies that, for the first time, achieve bounded approximation ratios under both uniform and non-uniform cost settings.
cs.SI
cs
Submitted to manuscript 2017 9 1 0 2 r p A 1 2 ] I S . s c [ 6 v 7 2 4 0 0 . 9 0 6 1 : v i X r a No Time to Observe: Adaptive Influence Maximization with Partial Feedback Jing Yuan Shaojie Tang The University of Texas at Dallas Although influence maximization problem has been extensively studied over the past ten years, majority of existing work adopt one of the following models: full-feedback model or zero-feedback model. In the zero- feedback model, we have to commit the seed users all at once in advance, this strategy is also known as non-adaptive policy. In the full-feedback model, we select one seed at a time and wait until the diffusion completes, before selecting the next seed. Full-feedback model has better performance but potentially huge delay, zero-feedback model has zero delay but poorer performance since it does not utilize the observation that may be made during the seeding process. To fill the gap between these two models, we propose Partial- feedback Model, which allows us to select a seed at any intermediate stage. We develop two novel greedy policies that, for the first time, achieve bounded approximation ratios under both uniform and non-uniform cost settings. 1. Introduction Since the seminal work of (Domingos and Richardson 2001), the influence maximization problem has attracted tremendous attention in recent years. This problem is first formal- ized and studied by (Kempe et al. 2003) as a discrete optimization problem. They study this problem under several diffusion models including independent cascade model and lin- ear threshold model. They demonstrate that the influence maximization problem under both models are NP-hard, however, the objective function is monotone and submodular. Leveraging these nice properties, they propose an elegant greedy algorithm with constant approximation ratio. Since then, considerable work (Chen et al. 2013, Leskovec et al. 2007, Cohen et al. 2014, Chen et al. 2010, 2009, Tang et al. 2011, Tang and Yuan 2016, Tong et al. 2016, Yuan and Tang 2017) has been devoted to this topic and its variants. However, majority of existing work fall into one of the following categories: full-feedback model (Golovin and Krause 2011) or zero-feedback model (Kempe et al. 2003). In the zero- feedback model, we have to commit the seed users all at once in advance, this strategy is also known as non-adaptive policy. In the full-feedback model, we select one seed at a time 1 2 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 and wait until the diffusion completes, before selecting the next seed, this policy is also known as adaptive policy. This type of policy has better performance in terms of expected cascade because of its adaptivity, e.g, it allows us to adaptively choose the next seed after observing the actual spread resulting from previously selected seeds. However, the viral marketing in reality is often time-critical, implying that it is impractical, sometimes impossible, to collect the full status of the actual spread before selecting the next seed. To fill this gap, we propose a generalized feedback model, called partial-feedback model, that captures the tradeoff between performance and delay. We adopt independent cascade model (IC) (Kempe et al. 2003), which is one of the most commonly used models, to model the diffusion dynamics in a social network. Unfortunately, we show that the objective under partial-feedback model and IC is not adaptive submodular, implying that existing results on adaptive submodular maximization does not apply to our model directly. To overcome this challenge, we develop two novel greedy policies, that, for the first time, achieve bounded approximation ratios under partial-feedback model. One nice feature of our policies is that we can balance the delay/performance tradeoff by adjusting the value of a controlling parameter. 1.1. Related Work In (Domingos and Richardson 2001), they show that data mining can be used to determine potential seed users in viral market. Since then, there is a rich body of works that has been devoted to viral marketing problem. Most of existing works on this topic can be classified into two categories. The first category is non-adaptive influence maximization: we must find a set of influen- tial customers all at once in advance subject to a budget constraint. Kempe et al. (Kempe et al. 2003) first formalized and studied this problem under two diffusion models, namely Independent Cascade model and Linear Threshold model. (Chen et al. 2013, Leskovec et al. 2007, Cohen et al. 2014, Chen et al. 2010, 2009) study influence maximization problem under various extended models. The second category is adaptive influence maximization, which is closely related to adaptive/stochastic submodular maximization Golovin and Krause (2011), Badanidiyuru et al. (2016), Tong et al. (2016), Yuan and Tang (2017). Existing studies mainly adopt full-feedback model, assuming that we can observe the full status of the previous cascade before selecting the next seed. We relax this assumption by incorporating partial-feedback Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 3 and develop two adaptive policies that achieve the first bounded approximation ratios under partial-feedback model. 2. Network Model and Diffusion Process 2.1. Independent Cascade Model A social network is modeled as a directed graph G = (V, E), where V is a set of n nodes and E is a set of social ties. We adopt independent cascade model (Kempe et al. 2003) to model the diffusion dynamics in a social network. Each node v ∈ V is associated with a cost cv, each edge (u, v) in the graph is associated with a propagation probability puv, which is the probability that node u independently influences node v in the next slot after u is influenced. The expected cascade of U , which is the expected number of influenced nodes given seed set U , is denoted as I(U ). 2.2. The Feedback Model Majority of existing work adopt one of the following feedback models: zero-feedback model or full-feedback model. Zero-feedback Model: During the seeding process, we can not observe anything about the resulting spread of adoption. Since there is no benefit in "waiting", we can simply commit the seeds all at once in advance. This model is equivalent to traditional non- adaptive influence maximization problem which has been well studied in the literature, (Kempe et al. 2003) showed that the utility function under this model is submodular and then propose a Greedy algorithm whose performance is lower bounded (1− 1/e) times the optimal non-adaptive solution. It is still unclear about the upper bound on the adaptivity gap, e.g., the performance gap between non-adaptive and adaptive solutions. Full-feedback Model: We select one seed at a time and wait until the diffusion completes, before selecting the next seed, this policy is also known as adaptive policy. In particular, after selecting a seed u, we can observe the status of all edges existing v, where v is any node that is reachable from u via live edges in the full realization. For this model, (Golovin and Krause 2011) introduced the concept of adaptive submodularity and proposed a Greedy algorithm has a (1− 1/e) approximation guarantee. As discussed in Section 1, full-feedback (resp. zero-feedback) model has better (resp. poorer) performance but potentially huge (resp. small) delay. To fill the gap between these two models, we propose partial-feedback model, which generalizes the previous two models by allowing us to select the next seed at some intermediate stage. 4 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 Based on independent cascade model, we next introduce the concept of diffusion real- ization (Golovin and Krause 2011) and other related concepts. Definition 1 (Diffusion Realization). Let ψ((u, v)) ∈ {0, 1, ?} denote the state of (u, v) given realization ψ where ψ((u, v)) = 0 means that (u, v) is blocked, ψ((u, v)) = 1 means that (u, v) is live, and ψ((u, v)) =? means that the state of (u, v) is unknown. We represent the state of the diffusion stage using function ψ : E → {0, 1, ?}, called diffusion realization. Definition 2 (Partial and Full Realization). Let dom(ψ) = {(u, v) : ψ((u, v)) ∈ {0, 1}} denote the set of edges observed in ψ. ψ is a full realization if dom(ψ) = E (i.e., all edges are observed in full realization). Otherwise, ψ is called partial realization. Definition 3 (Intermediate and Final Realization). Given a realization ψ of seeds S, we say ψ is a final realization if dom(ψ) is finalized (i.e., we can not observe more edges other than dom(ψ) by waiting longer). Otherwise, ψ is called intermediate realization. Let X(S) denote the set of all final realizations of S. Definition 4 (Subrealization and Superrealization). A realization ψa is consis- tent with a realization ψb (i.e., ψa ∼ ψb) if they are equal everywhere in dom(ψa)∩ dom(ψb). We say ψa is a subrealization of ψb (or equivalently ψb is a suprealization of ψa) if ψa is consistent with ψb and dom(ψa) ⊆ dom(ψb), or ψa ⊆ ψb. We say ψb is a final superreal- ization of ψa given S if ψb ∈ X(S) and ψb ⊇ ψa (i.e., ψb is a final realization and ψb is a superrealization of ψa). Consider an intermediate realization ψ of seeds S, let Xfinal(Sψ) := {φ : φ ∈ X(S), φ ⊇ ψ} denote the set of all final realizations of S given ψ. 3. Problem Formulation Under the partial-feedback model, we perform the decision process in a sequential manner where the decision made in each round is depending on the current observation of the network status and the remaining budget. Definition 5 (Adaptive Policy). We define our adaptive policy π : (ψ, S) → v, which is a function from the current "observation" ψ and the set of existing seeds S to v, specifying which seed to pick next given a particular set of observations. Definition 6 (Policy Concatenation). Given two policies πa and πb, we use πa@πB to denote a policy that runs πa first, and then runs policy πb, ignoring the information obtained from running πa. Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 5 We use Ψ to denote a random realization. Assume there is a known prior probability distribution Pr[ψ] := Pr[Ψ = ψ] over W which is the universe of all possible full realizations. Given a full realization ψ, let Sψ denote all seeds picked by π under ψ, and c(Sψ) =(cid:80) v∈Sψ cv denote the total cost of Sψ. The expected cascade of a policy π is f (π) = E[I(SΨΨ)] = Pr[ψ]I(Sψ) (cid:88) ψ∈W where I(Sψ) denotes the cascade of Sψ given realization ψ, e.g., all nodes that are reachable from Sψ under ψ. The goal of the adaptive influence maximization problem is to find a policy π such that Maximize f (π) subject to: c(Sψ) ≤ B,∀ψ ∈ W We first show that the objective is not adaptive submodular under partial feedback model. The concept of adaptive submodularity is a generalization of submodularity to adaptive policies: we say a function f is adaptive submodular if adding an element e to a realization ψ increases f at least as much as adding e to a superset of ψ. Since the Myopic Feedback model proposed in (Golovin and Krause 2011) is a special case of our partial-feedback model, we borrow the same counter example from their work to prove the following lemma. Theorem 1. (Golovin and Krause 2011) The objective f under partial-feedback model is not adaptive submodular. First of all, we want to emphasize the difference between "round" and "slot". One round corresponds to one execution of our algorithm, while one slot corresponds to one step of information propagation. In the rest of this paper, we use · to denote the size of a set. 4. α-Greedy Adaptive Policy with Partial Feedback In this section, we present the first adaptive policy, called α-Greedy policy, and analyze its performance bound. For ease of presentation, we start with uniform cost setting where all nodes have identical costs. Then we extend this result to non-uniform cost setting. 4.1. Uniform Cost We first study the case with uniform cost, e.g., ∀v ∈ V : cv = 1. Since each node has the same cost, the budget constraint can be reduced to cardinality constraint, e.g., the number of seeds that can be selected is upper bounded by B. 6 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 4.1.1. Policy Description α-Greedy policy πα (Algorithm 1) is performed in a sequen- tial greedy manner as follows: After observing the current partial realization, we choose to either wait for another slot or select the next seed immediately that maximizes the expected marginal benefit. This process iterates until the budget is used up. 1. Start with slot t = 1, seeds S = ∅, and a control parameter α ∈ [0, 1]; 2. Suppose we have made observations ψ[t] at slot t, let pv(S; ψ[t]) denote the activation probability of v given seeds S and observation ψ[t], and let f (Sψ[t]) =(cid:80) v∈V pv(S; ψ[t]) denote the expected cascade under the same setting. Define O(S; ψ[t]) := {v : pv(S; ψ[t]) = 0} as the set of nodes whose activation probability is zero under ψ[t] and S. We then examine the following condition. f (Sψ[t]) V \ O(S; ψ[t]) ≥ α (1) If condition (1) is satisfied, select arg maxu∈V ∆u(S; ψ[t]) where ∆u(ψ[t]; S) = f ({u} ∪ Sψ[t]) − f (Sψ[t]) denotes the expected marginal benefit of v given existing seeds S and partial realization ψ[t] (i.e., we select a node that maximizes the expected marginal benefit). Otherwise, if condition (1) is not satisfied, we wait for another slot. 3. This process iterates until the budget is used up. Condition (1) can be interpreted as follows: we will not select the next seed until the aver- age activation probability of all nodes with non-zero activation probability is sufficiently high. Note that this condition can always be satisfied when we reach a final realization (i.e., f (Sψ[t]) V \O(S;ψ[t]) = 1 when ψ[t] is a final realization). We use α to control the tradeoff of delay and performance. In particular, a larger α indicates longer delay but better performance. For example, if we set α = 1, our model becomes full-feedback model, that is, we must wait until every node is either in active state or non-active state, before selecting the next seed. On the other hand, if we set α = 0, our model is reduced to zero-feedback model, implying that we can select all seeds in advance. It was worth noting that we may select multiple seeds in one slot as long as condition (1) holds, thus one slot may contain multiple rounds. 4.1.2. Performance Analysis Let π[t] denote the level-t-truncation of π obtained by running until it terminates or until slot t. For every 1 ≤ i ≤ B, assume the i-th seed is f (Sψ[ti]) V \O(S;ψ[ti]) ≥ α). For brevity, we use O to denote O(S; ψ[ti]). added to S at slot ti (i.e., v∈O pv(S; ψ[ti]) denote the expected cascade in O given seeds S and Let f O(Sψ[ti]) =(cid:80) Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 7 Algorithm 1 α-Greedy Policy: πα Input: 0 ≤ α ≤ 1. Output: S. 1: S = ∅; t = 0; 2: S ← S ∪{arg maxu∈V ∆u(Sψ[t])}; 3: B ← B − 1; t ← t + 1 4: while B ≥ 0 do if f (Sψ[t]) V \O(S;ψ[t]) ≥ α then S ← S ∪{arg maxu∈V ∆u(Sψ[t])}; B ← B − 1; else t ← t + 1; update ψ[t]; 5: 6: 7: 8: 9: 10: return S observation ψ[ti]. We use π∗ to denote the optimal adaptive policy. In the rest of this paper, let f (πψ), f O(πψ), f V \O(πψ) denote respectively the expected cascade of π in V , O, V \ O under realization ψ. In order to prove the main theorem (Theorem 2), we first prove two preparatory lemmas (Lemma 1 and Lemma 2). Lemma 1. For any 1 ≤ i ≤ B and 0 < α ≤ 1, we have f (π∗ψ[ti])− f (πα [ti]ψ[ti])/α ≤ f O(π∗ψ[ti])− f O(πα [ti]ψ[ti]) Proof: First, we have [ti]ψ[ti])/α f (π∗ψ[ri])− f (πα = (f O(π∗ψ[ti])− f O(πα ≤ (f O(π∗ψ[ti])− f O(πα [ti]ψ[ti])/α) + (f V \O(π∗ψ[ti])− f V \O(πα [ti]ψ[ti])) + (f V \O(π∗ψ[ti])− f V \O(πα [ti]ψ[ti])/α) [ti]ψ[ti])/α) (cid:80) (cid:80) [ti]ψ[ti]) =(cid:80) Based on the definition of ti, we have f V \O(πα Then f (π∗ψ[ti])− f (πα v∈V \O pv(S; ψ[ti]) ≥ αV \ O, thus f V \O(π∗ψ[ti])− f V \O(πα [ti]ψ[ti])/α ≤ f O(π∗ψ[ti])− f O(πα [ti]ψ[ti]). (cid:3) V \O V \O = v∈V pv(S;ψ[ti]) v∈V \O pv(S;ψ[ti]) Lemma 2. For any 1 ≤ i ≤ B, we have ∆u(S; ψ[ti]) ≥ 1 B max u∈V (cid:0)f O(π∗ψ[ti])− f O(πα [ti]ψ[ti])(cid:1) (2) (3) (4) ≥ α. It follows that [ti]ψ[ti])/α ≤ 0. 8 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 Notice that f O(S;ψ)(Sψ) = (cid:80) Proof: Assume ψ(cid:48) and ψ are two partial realizations satisfying ψ(cid:48) ⊇ ψ, let S(cid:48) and S denote the seeds selected under ψ(cid:48) and ψ, satisfying S(cid:48) ⊇ S. Since the activation probability of v ∈ O(S; ψ) is zero, then based on similar proof of Theorem 8.1 in (Golovin and Krause 2011), we can prove the following ∀v ∈ O(S; ψ),∀z ∈ V : pv(S ∪{z}; ψ)− pv(S; ψ) ≥ pv(S(cid:48) ∪ {z}; ψ(cid:48))− pv(S(cid:48); ψ(cid:48)). v∈O(S;ψ) pv(S; ψ), it follows that f O(S;ψ)(S ∪ {z}ψ) − f O(S;ψ)(Sψ) ≥ f O(S;ψ)(S(cid:48) ∪ {z}ψ(cid:48)) − f O(S;ψ)(S(cid:48)ψ(cid:48)). This implies that function f O(·) is submodular. Based on the standard analysis of submodular maximization, we have maxz∈V [f O(S ∪ {z}ψ[ti]) − f O(Sψ[ti])] ≥ 1 . Because (cid:16) maxu∈V ∆u(S; ψ) ≥ maxz∈V [f O(S ∪ {z}ψ[ti]) − f O(Sψ[ti])], we have maxu∈V ∆u(S; ψ) ≥ (cid:17) [ti]ψ[ti]) f O(π∗ψ[ti])− f O(πα (cid:17) (cid:16) [ti]ψ[ti]) f O(π∗ψ[ti])− f O(πα Now we are ready to prove the performance bound of πα. Theorem 2. The expected cascade of πα is bounded by f (πα) ≥ α(1− e− 1 . (cid:3) α )f (π∗). 1 B B Proof: Let ∆i = f (π∗) − f (πα observed at slot ti−1, we have [ti])/α and Pr(ψ[ti−1]) denote the probability that ψ[ti−1] is α(∆i−1 − ∆i) = f (πα [ti−1]ψ[ti−1])) (cid:17) [ti]ψ[ti−1])− f (πα [ti−1]ψ[ti−1]) [ti−1]ψ[ti−1])/α)) ) (cid:16) [ti])− f (πα [ti−1]) = Pr(ψ[ti−1])(f (πα ≥ Pr(ψ[ti−1])( f O(π∗ψ[ti−1])− f O(πα 1 B ≥ Pr(ψ[ti−1])( (f (π∗ψ[ti−1])− f (πα 1 B f (π∗)− 1 αB f (π∗)− 1 αB Pr(ψ[ti−1])f (πα [ti−1]ψ[ti−1]) ∆i−1 [ti−1]) = 1 B 1 B f (πα 1 B = = (5) (6) (7) (8) (9) The first inequality is due to Lemma 2, and the second inequality is due to Lemma 1. It follows that ∆i+1 ≤ (1 − 1 f (π∗)− f (πα αB )∆i. Hence ∆B ≤ (1 − 1 α f (π∗). Hence f (πα) = f (πα αB )B∆0 ≤ e− 1 α ∆0. It follows that α )f (π∗). (cid:3) α ∆0 = e− 1 [tB]) ≥ α(1− e− 1 [tB])/α ≤ e− 1 As a corollary of Theorem 2, we can prove that the approximation ratio of our greedy policy under full-feedback setting is (1− e−1). Corollary 1. Under full-feedback model, i.e., α = 1, we have f (πα) ≥ (1− e−1)f (π∗). Another interesting finding is that if we set α = 0, then condition (1) is always true regardless of the observation ψ[t]. Our policy under this setting becomes non-adaptive, Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 9 implying that we can select all B seeds in advance without observing any partial realization. It is also worth noting that select the seed at a later slot never worsens the result. Implications of our results. One immediate implication of Theorem 2 is that given a desired approximation ratio, we can decide the appropriate seed selection point. Another implication is that we can decide the approximation ratio of the greedy selection strategy given any partial feedback. 4.2. Non-Uniform Cost 4.2.1. Policy Description We next study the case with non-uniform cost. The previous adaptive policy can be naturally modified to handle non-uniform item costs by replacing its selection rule by selecting arg maxu∈V ∆u(S;ψ[t]) cu (i.e., select the node that achieves the largest benefit-to-cost ratio). The detailed description of our greedy policy with non-uniform cost is listed in Algorithm 2. Algorithm 2 α-Greedy Policy with non-uniform cost: πα Input: 0 ≤ α ≤ 1. Output: S. 1: S = ∅; t = 0; 2: select v = arg maxu∈V 3: S ← S ∪{v}; B ← B − cv; 4: t ← t + 1; update ψ[t]; 5: while B ≥ 0 do ∆u(S;ψ[t]) ; cu if f (Sψ[t]) V \O(S;ψ[t]) ≥ α then select v = arg maxu∈V if B − cv < 0 then ∆u(S;ψ[t]) cu ; 6: 7: 8: 9: 10: 11: 12: 13: 14: break; else S ← S ∪{v}; B ← B − cv; else t ← t + 1; update ψ[t]; 15: return S 10 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 4.2.2. Performance Analysis We next focus on analyzing the performance bound of πα. For this purpose, we introduce the concepts of virtual time and virtual slot. Imagine that a policy π runs over virtual time, after π adds a node u to S, it starts to run u, and stops after cu virtual slots. Notice that running a node over virtual time does not consume actual time. We next introduce two important concepts. The level-k-truncation of a policy π over virtual time, denoted by πk, is a randomized policy defined as follows. Definition 7 (Level-k-truncation of π over virtual time). First run π for k virtual slots, and for every node v ∈ V , if v has been running for γ ≤ cv virtual slots, selecting v independently with probability γ/cv. The strict level-k-truncation of π, denoted π←k, is defined as follows. Definition 8 (Strict level-k-truncation of π over virtual time). First run π for k virtual slots, and for every node v ∈ V , selecting v if and only if it has been run for γ = cv virtual slots (i.e., removing any node whose virtual running time is strictly less than its cost). Theorem 3. Let c = maxv∈V cv, the expected cascade of πα is bounded by f (πα) ≥ α(1− e− 1 α B−c B )f (π∗). Proof: Our proof is based on techniques studied in the context of adaptive submodular maximization Golovin and Krause (2011). In the rest of the proof, let S denote the set of seeds selected by πα←k, O denote the set of nodes whose activation probability is zero under ψk and S, and ψk denote the partial realization observed at virtual slot k. We first provide two preparatory lemmas whose proofs are similar to the proofs of Lemma 1 and Lemma 2. Lemma 3. For any k ≥ 1, we have f (π∗ψk)− f (πα←kψk)/α ≤ f O(π∗ψk)− f O(πα←kψk). Lemma 4. For any k ≥ 1, maxu∈V (∆u(S; ψk)/cu) ≥ 1 Let ∆k = f (π∗)− f (πα (cid:0)f O(π∗ψk)− f O(πα←kψk)(cid:1). k )/α and Pr[ψi] denote the probability that ψi is observed in virtual B slot i, we have α(∆k−1 − ∆k) = f (πα k−1) i )− f (πα = Pr[ψi−1] max v∈V ≥ 1 B ≥ 1 B (∆v(S; ψk−1)/cv) Pr[ψk−1](f O(π∗ψk−1)− f O(πα←(k−1)ψk−1)) Pr[ψk−1](f (π∗ψk−1)− f (πα←(k−1)ψk−1)/α)) Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 11 ≥ 1 B 1 B = Pr[ψk−1](f (π∗ψk−1)− f (πα k−1ψk−1)/α)) ∆k−1 The first inequality is due to Lemma 4 and the second inequality is due to Lemma 3. It follows that ∆k ≤ (1− 1 αB )∆k−1. Hence, assume πα terminates after l virtual slots, we have B ∆0 where for the second inequality we have used the fact ∆l ≤ [(cid:81)l αB )]∆0 ≤ e− 1 k=1(1 − 1 α l that 1− x < e−x for all x > 0. Hence f (πα l ) ≥ α(1− e− 1 α l B )f (π∗) (10) Although we are not guaranteed to use up all the budget at the end of πα, the remaining budget in every realization can not be larger than c. In other words, the last virtual slot reached by πα is l ≥ B − c. It follows that f (πα) ≥ πα B )f (π∗). (cid:3) B−c B−c ≥ α(1− e− 1 Based on πα, we next provide an enhanced greedy policy πα−enhanced with constant approximation ratio. πα−enhanced (Algorithm 5) randomly picks one from the following two candidate solutions with equal probability: The first candidate solution contains a single node v∗ which can maximize the expected cascade: v∗ = arg maxv∈V I({v}); the second candidate solution is computed by the greedy policy πα. α Algorithm 3 Enhanced Greedy Policy πα−enhanced 1: Let v∗ = arg maxv∈V I({v}); 2: Randomly pick one from the following two strategies with equal probability: return {v∗} or run πα; Theorem 4. The expected cascade of πα−enhanced is bounded by f (πα−enhanced) ≥ α(1−e− 1 α ) f (π∗). 2 Proof: Consider a policy π(cid:48) obtained by first running πα, then selecting one more node according to the same greedy manner. It is easy to verify that π(cid:48) runs for at least B virtual slots. According to Theorem 3, we have f (π(cid:48)) ≥ α(1− e− 1 α )f (π∗). Due to the submodularity of I(·), we have f (π(cid:48)) ≤ f (πα) + I({v∗}). Thus f (πα) + I({v∗}) ≥ f (π(cid:48)) ≥ α(1− e− 1 α )f (π∗). Then f (πα−enhanced) = (f (πα) + I({v∗}))/2 ≥ α(1−e− 1 f (π∗). α ) (cid:3) As a corollary of Theorem 4, we can prove that the approximation ratio of πα−enhanced 2 under full-feedback and non-uniform cost setting is (1− e−1)/2. 12 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 Corollary 2. Under full-feedback model, i.e., α = 1, we have f (πα−enhanced) ≥ (1−e−1) 2 f (π∗). 5. β-Greedy Adaptive Policy with Partial Feedback Our second policy πβ (Algorithm 4) is still a simple greedy policy. However, we replace condition (1) used in the previous policy by condition (11). We first explain the idea of β-Greedy policy with non-uniform cost and then analyze the performance bound of πβ. 5.1. Policy Description We next summarize the work flow of β-Greedy policy with non-uniform cost. 1. Start with slot t = 1, S = ∅, and a control parameter β ∈ [0, 1]; 2. Suppose we have made observations ψ[t] at slot t, let Pr[ψψ[t]] denote the prob- ability that ψ is the final superrealization of ψ[t]. Given S and final realization ψ, let maxu∈V (∆u(S; ψ)/cu) denote the largest benefit-to-cost ratio achieved by selecting one more node. We then examine the following condition. maxv∈V (∆v(S; ψ[t])/cv) EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])] ≥ β (11) where (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])] = EΨ[max u∈V (cid:88) ψ∈Xfinal(Sψ[t]) Pr[ψψ[t]] max u∈V (∆u(S; ψ)/cu) If condition (11) is satisfied, add arg maxu∈V (∆u(S; ψ[t])/cu) to S (i.e., we select a node that maximizes the expected benefit-to-cost ratio). Otherwise, if condition (11) is not satisfied, wait for another slot. 3. This process iterates until the budget is used up. The left side of condition (11) can be interpreted as the gap between adaptive policy and non-adaptive policy given ψ[t]. We use β to control the tradeoff of delay and performance. It was worth noting that EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])] in condition (11) can be replaced by maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) without affecting our results, this is due to maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) ≥ EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])]. However, this may prolong the waiting time before selecting the next seed. In fact, Tang (2018) uses this value to derive a performance bound on adaptive influence maximiza- tion problem subject to partition matroid constraint. As pointed out in (Tang 2018), arg maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu) can be interpreted as the most "pessimistic" final Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 13 superrealization of ψ[t] under which no additional users, other than those who have been influenced under ψ[t], will be influenced. As compared with EΨ[maxu∈V (∆u(S; Ψ)/cu)Ψ ∈ Xfinal(Sψ[t])], it is easier to evaluate the value of maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu). Assume that no additional nodes can be further influenced given ψ[t], we select the node, say v, that maximizes the marginal benefit-to-cost ratio. It is easy to verify that the benefit-to-cost ratio of v is maxψ∈Xfinal(Sψ[t]) maxu∈V (∆u(S; ψ)/cu). Algorithm 4 β-Greedy Policy: πβ Input: 0 ≤ β ≤ 1. Output: S. 1: S = ∅; t = 0; 2: select v = arg maxu∈V 3: S ← S ∪{v}; B ← B − cv; 4: t ← t + 1; update ψ[t]; 5: while B ≥ 0 do ∆u(S;ψ[t]) cu ; if 6: 7: 8: 9: 10: 11: 12: 13: 14: maxv∈V (∆v(S;ψ[t])/cv) EΨ[maxu∈V (∆u(S;Ψ)/cu)Ψ∈Xfinal(Sψ[t])] ≥ β then select v = arg maxu∈V if B − cv < 0 then ∆u(S;ψ[t]) cu ; break; else S ← S ∪{v}; B ← B − cv; else t ← t + 1; update ψ[t]; 15: return S 5.2. Performance Analysis We next provide the performance bound of πβ. In the rest of this section, we adopt the same notations used in Section 4.2.2. Theorem 5. Let c = maxv∈V cv, the expected cascade of πβ is bounded by f (πβ) ≥ (1 − B )f (π∗). e−β B−c 14 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 Proof: Let ∆k = f (π∗)− f (πβ ∆k−1 − ∆k = f (πβ k−1) = Pr[ψk−1](f (πβ kψk−1)− f (πβ k−1ψk−1)) k ), we have k )− f (πβ ≥ Pr[ψk−1] max v∈V ≥ Pr[ψk−1](β (cid:88) ≥ Pr[ψk−1] ≥ Pr[ψk−1] β B β B = β B (f (π∗)− f (πβ k−1)) ≥ β B ∆k−1 (∆v(S; ψk−1)/cv) ψ∈Xfinal(Sψk−1) Pr[ψψk−1] max u∈V [←(k−1)]@π∗ψk−1)− f (πβ k−1ψk−1)) (f (πβ (f (π∗ψk−1)− f (πβ (∆u(S; ψ)/cu)) [←(k−1)]ψk−1)) The first inequality is due to the selection rule of πβ k (Line 7 in Algorithm 4). The second inequality holds due to condition (11) is satisfied before selecting the next node. The third inequality is due to the adaptive submodularity of f under full-feedback model. The last inequality is due to f (π∗) ≥ f (πβ that ∆k ≤ (1 − β B )∆k−1. Hence ∆l ≤ (1 − β e−β∆0 = e− βl f (πβ) ≥ f (πβ k−1). It follows l ) ≤ B f (π∗). Because the last virtual slot reached by πβ is l ≥ B − c, we have B−c) ≥ (1− e− β(B−c) [←(k−1)]@π∗) and f (πβ B )l∆0 ≤ e− βl B ∆0. It follows that f (π∗) − f (πβ [←(k−1)]) ≥ (πβ )f (π∗). (cid:3) B As a corollary of Theorem 2, we can prove that the approximation ratio of our greedy policy under full-feedback setting is (1− e−1). Corollary 3. Under full-feedback model, i.e., β = 1, we have f (πβ) ≥ (1− e−1)f (π∗). Based on πβ, we next provide an enhanced greedy policy πβ−enhanced (Algorithm 5) with constant approximation ratio. πβ−enhanced randomly picks one from the following two can- didate solutions with equal probability: The first candidate solution contains a single node v∗ which can maximize the expected cascade: v∗ = arg maxv∈V I({v}); the second candidate solution is computed by the greedy policy πβ. Algorithm 5 Enhanced Greedy Policy πβ−enhanced 1: Let v∗ = arg maxv∈V I({v}); 2: Randomly pick one from the following two strategies with equal probability: return {v∗} or run πβ; Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 15 Theorem 6. The expected cascade of πβ−enhanced is bounded by f (πβ−enhanced) ≥ (1−e−β ) 2 f (π∗). Proof: Due to the submodularity of I(·), we have f (πβ) + I({v∗}) ≥ (1 − e−β)f (π∗). Then f (πβ−enhanced) = (f (πβ) + I({v∗}))/2 ≥ (1−e−β ) f (π∗). 2 (cid:3) As a corollary of Theorem 6, we can prove that the approximation ratio of πβ−enhanced under full-feedback and non-uniform cost setting is (1− e−1)/2. Corollary 4. Under full-feedback model, i.e., β = 1, we have f (πβ−enhanced) ≥ (1−e−1) 2 f (π∗). 6. Experimental Evaluation Figure 1 Influence spread vs. α on NetHEPT dataset under varying budget constraint. We conduct extensive experiments on a real benchmark social networks: NetHEPT to examine the effectiveness and efficiency of α-Greedy policy. We set the propagation prob- ability of each directed edge randomly from i × {0.01, 0.001} as in (Jung et al. 2012). We vary the value of i and examine how it affects the quality of the solutions. Selecting the node with the largest marginal gain is #P-hard (Chen et al. 2010), and is typically approx- imated by numerous Monte Carlo simulations (Kempe et al. 2003). We adjust the value of control parameter α in range [0, 1]. Figure 1 shows the influence spread yielded by the proposed enhanced greedy policy on the NetHEPT dataset, as α ranges from 0 to 1 with a step of 0.2. The x-axis corresponds to the value of the control parameter α and the y-axis holds the size of the influence spread achieved. We test the scenario with varying edge propagation probability distributions as discussed above. In particular, each edge is randomly assigned a propagation probability 16 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 from i×{0.01, 0.001}. We adjust the value of i from 1 to 8 and Figure 1(a)-(d) shows the comparison of the influence spread under i = 1, i = 2, i = 4, i = 8, respectively. In this set of experiments, the budget B ranges from 30 to 60. The cost of each node is randomly assigned from [1, 10]. As expected, a higher budget leads to a larger influence spread since the budget indirectly controls the number of seeds can be selected. We observe that when i takes a smaller value, take i = 1 as an example, the advantage of performing adaptive seeding with partial feedback is not obvious since the improvement over influence spread does not increase much as α increases. The reason behind this is that a smaller i indicates a lower probability for the edges to be alive, resulting in a lower uncertainty about the status of the edges. In this case observations gained from partial feedback may not help much since with high probability the estimation of influence spread based on sampling technique matches the real propagation. As shown in Figure 1, the advantage of taking adaptive seeding based on partial feedback becomes obvious as i increases. We observe that when i ≥ 2, a much larger influence spread can be achieved based on partial feedback (α > 0) compared to zero-feedback scenario (α = 0). For example, when i = 4 with budget of 50, while the influence spread based on zero-feedback leads to a size of 57, the spread achieves a size of 87 based on partial feedback (α = 0.8), a 52.6% increase. We also observe that a smaller α can lead to a significant improvement on influence spread with a higher edge propagation probability. For example, as shown in Figure 1, when i = 2, a 10% improvement can be achieved with α = 0.6. When i = 4, a 20% improvement can be achieved with α = 0.4. This implies that given a social graph with moderate edge propagation probability, it is worth to leverage the partial observation of diffusion realiza- tion, since adaptive seeding based on partial feedback leads to a significant improvement over the size of influence spread. 7. Conclusion To the best of our knowledge, we are the first to systematically study the problem of influence maximization problem with partial feedback. Under independent cascade model, which is one of the most commonly used models in literature, we present two greedy algorithms with bounded approximation ratios. Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 17 References Badanidiyuru, Ashwinkumar, Christos Papadimitriou, Aviad Rubinstein, Lior Seeman, Yaron Singer. 2016. Locally adaptive optimization: adaptive seeding for monotone submodular functions. Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 414 -- 429. Chen, Wei, Laks VS Lakshmanan, Carlos Castillo. 2013. Information and influence propagation in social networks. Synthesis Lectures on Data Management 5(4) 1 -- 177. Chen, Wei, Chi Wang, Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 1029 -- 1038. Chen, Wei, Yajun Wang, Siyu Yang. 2009. Efficient influence maximization in social networks. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 199 -- 208. Cohen, Edith, Daniel Delling, Thomas Pajor, Renato F Werneck. 2014. Sketch-based influence maximization and computation: Scaling up with guarantees. Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management. ACM, 629 -- 638. Domingos, Pedro, Matt Richardson. 2001. Mining the network value of customers. Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 57 -- 66. Golovin, Daniel, Andreas Krause. 2011. Adaptive submodularity: Theory and applications in active learning and stochastic optimization. Journal of Artificial Intelligence Research 427 -- 486. Jung, Kyomin, Wooram Heo, Wei Chen. 2012. Irie: Scalable and robust influence maximization in social networks. Data Mining (ICDM), 2012 IEEE 12th International Conference on. IEEE, 918 -- 923. Kempe, David, Jon Kleinberg, ´Eva Tardos. 2003. Maximizing the spread of influence through a social network. Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 137 -- 146. Leskovec, Jure, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance. 2007. Cost-effective outbreak detection in networks. Proceedings of the 13th ACM SIGKDD interna- tional conference on Knowledge discovery and data mining. ACM, 420 -- 429. Tang, Shaojie. 2018. When social advertising meets viral marketing: Sequencing social advertisements for influence maximization. Thirty-Second AAAI Conference on Artificial Intelligence. Tang, Shaojie, Jing Yuan. 2016. Optimizing ad allocation in social advertising. Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. ACM, 1383 -- 1392. Tang, Shaojie, Jing Yuan, Xufei Mao, Xiang-Yang Li, Wei Chen, Guojun Dai. 2011. Relationship classification in large scale online social networks and its impact on information propagation. INFOCOM, 2011 Proceedings IEEE . IEEE, 2291 -- 2299. 18 Yuan et al.: No Time to Observe: Adaptive Influence Maximization with Partial Feedback Article submitted to ; manuscript no. 2017 Tong, Guangmo, Weili Wu, Shaojie Tang, Ding-Zhu Du. 2016. Adaptive influence maximization in dynamic social networks. IEEE/ACM Transactions on Networking . Yuan, Jing, Shaojie Tang. 2017. Adaptive discount allocation in social networks. Proceedings of the eighteenth ACM international symposium on Mobile ad hoc networking and computing. ACM.
1502.05058
1
1502
2015-02-17T21:04:44
Tensor Spectral Clustering for Partitioning Higher-order Network Structures
[ "cs.SI", "physics.soc-ph" ]
Spectral graph theory-based methods represent an important class of tools for studying the structure of networks. Spectral methods are based on a first-order Markov chain derived from a random walk on the graph and thus they cannot take advantage of important higher-order network substructures such as triangles, cycles, and feed-forward loops. Here we propose a Tensor Spectral Clustering (TSC) algorithm that allows for modeling higher-order network structures in a graph partitioning framework. Our TSC algorithm allows the user to specify which higher-order network structures (cycles, feed-forward loops, etc.) should be preserved by the network clustering. Higher-order network structures of interest are represented using a tensor, which we then partition by developing a multilinear spectral method. Our framework can be applied to discovering layered flows in networks as well as graph anomaly detection, which we illustrate on synthetic networks. In directed networks, a higher-order structure of particular interest is the directed 3-cycle, which captures feedback loops in networks. We demonstrate that our TSC algorithm produces large partitions that cut fewer directed 3-cycles than standard spectral clustering algorithms.
cs.SI
cs
Tensor Spectral Clustering for Partitioning Higher-order Network Structures Austin R. Benson∗ David F. Gleich† Jure Leskovec‡ Abstract Spectral graph theory-based methods represent an important class of tools for studying the structure of networks. Spec- tral methods are based on a first-order Markov chain de- rived from a random walk on the graph and thus they cannot take advantage of important higher-order network substruc- tures such as triangles, cycles, and feed-forward loops. Here we propose a Tensor Spectral Clustering (TSC) algorithm that allows for modeling higher-order network structures in a graph partitioning framework. Our TSC algorithm allows the user to specify which higher-order network structures (cy- cles, feed-forward loops, etc.) should be preserved by the network clustering. Higher-order network structures of in- terest are represented using a tensor, which we then partition by developing a multilinear spectral method. Our framework can be applied to discovering layered flows in networks as well as graph anomaly detection, which we illustrate on syn- thetic networks. In directed networks, a higher-order struc- ture of particular interest is the directed 3-cycle, which cap- tures feedback loops in networks. We demonstrate that our TSC algorithm produces large partitions that cut fewer di- rected 3-cycles than standard spectral clustering algorithms. 1 Introduction Spectral graph methods investigate the structure of networks by studying the eigenvalues and eigenvectors of matrices as- sociated to the graph, such as its adjacency matrix or Lapla- cian matrix. Arguably the most important spectral graph algorithms are the spectral graph partitioning methods that identify partitions of nodes into low conductance commu- nities in undirected networks [1]. While the simple matrix computations and strong mathematical theory behind spec- tral clustering methods makes them appealing, the methods are inherently limited to two-dimensional structures, for ex- ample, undirected edges connecting pairs nodes. Thus, it is a natural question whether spectral methods can be general- ized to higher-order network structures. For example, tradi- tional spectral clustering attempts to minimize (appropriately normalized) number of first-order structures (i.e., edges) that need to be cut in order to split the graph into two parts. In a ∗Institute for Computational and Mathematical Engineering, Stanford University. †Department of Computer Science, Purdue University. ‡Department of Computer Science, Stanford University. similar spirit, a higher-order generalization of spectral clus- tering would try to minimize cutting higher-order structures that involve multiple nodes (e.g., triangles). Incorporating higher-order graph information (that is, network motifs/graphlets) into the partitioning process can significantly improve our understanding of the underlying network. For example, triangles (three-dimensional network structures involving three nodes) have proven fundamental to understanding social networks [14, 21] and their community structure [10, 26, 29]. Most importantly, higher-order spec- tral clustering would allow for greater modeling flexibility as the application would drive which higher-order network structures should be preserved by the network clustering. For example, in financial networks, directed cycles might indi- cate money laundering and higher-order spectral clustering could be used to identify groups of nodes that participate in such directed cycles. As directed cycles involve multi- ple edges, current spectral clustering tools would not be able to identify groups with such structural signatures. Generalizing spectral clustering to higher-order struc- tures involves several challenges. The essential challenge is that higher-order structures are often encoded in tensors, i.e., multi-dimensional matrices. Even simple computations with tensors lack the traditional algorithmic guarantees of two-dimensional matrix computations such as existence and known runtimes. For instance, eigenvectors are a key com- ponent to spectral clustering, and finding tensor eigenvectors is NP-hard [15]. An additional challenge is that the number of higher-order structures increases exponentially with the size of the structure. For example, in a graph with n nodes, the number of possible triangles is O(n3). However, real- world networks have far fewer triangles. While there exist several extensions to the spectral method, including the directed Laplacian [5], the asymmet- ric Laplacian [4], and co-clustering [9, 28], these methods are all limited to two-dimensional graph representations. A simple work-around would be to weight edges that occur in higher-order structures [19]. However, this heuristic is un- satisfactory because the optimization is still on edges, and not on the higher-order patterns we aim to cluster. Here, we propose a Tensor Spectral Clustering (TSC) framework that is directly based on higher-order network structures, i.e., network information beyond edges connect- ing two nodes. Our framework operates on a tensor of net- work data and allows the user to specify which higher-order network structures (cycles, feed-forward loops, etc.) should be preserved by the clustering. For example, if one aims to obtain a partitioning that does not cut triangles, then this can be encoded in a third-order tensor T, where T(i, j, k) is equal to 1 if nodes i, j, and k form a triangle and 0 otherwise. Given a tensor representation of the desired higher-order network structures, we then use a mutlilinear PageRank vec- tor [13] to reduce the tensor to a two-dimensional matrix. This dimensionality reduction step allows us to use effi- cient matrix algorithms while approximately preserving the higher-order structures represented by the tensor. Our result- ing TSC algorithm is a spectral method that partitions the network to minimize the number of higher-order structures cut. This way our algorithm finds subgraphs that contain many instances of the higher-order structure described by the tensor. Figure 1 illustrates a directed network, and our goal is to identify clusters of directed 3-cycles. That is, we aim to partition the nodes into two sets such that few directed 3- cycles get cut. Our TSC algorithm finds a partition that does not cut any of the directed 3-cycles, while a standard spectral partitioner (the directed Laplacian [5]) does. Clustering networks based on higher-order structures has many applications. For example, the TSC algorithm allows for identifying layered flows in networks, where the network consists of several layers that contain many feedback loops. Between layers, there are many edges, but they flow in one direction and do not contribute to feedback. We identify such layers by clustering a tensor that describes small feedback loops (e.g., directed 3-cycles and reciprocated edges). Similarly, TSC can be applied to anomaly detection in directed networks, where the tensor encodes directed 3-cycles that have no reciprocated edges. Our TSC algorithm can find subgraphs that have many instances of this pattern, while other spectral methods fail to capture these higher-order network structures. Our contributions are summarized as follows: • In Sec. 3, we develop a tensor spectral clustering frame- work that computes directly on higher-order graph structures. We provide theoretical justifications for our framework in Sec. 4. • In Sec. 5, we provide two applications—layered flow networks and anomaly detection—where our ten- sor spectral clustering algorithm outperforms standard spectral clustering on small, illustrative networks. • In Sec. 6, we use tensor spectral clustering to parti- tion large networks so that directed 3-cycles are not cut. This provides additional empirical evidence that our al- gorithm out-performs state-of-the-art spectral methods. Code used is for this at https://github.com/arbenson/tensor-sc, and all networks used in experiments are available from SNAP [23]. available paper 0 2 3 5 1 4 Tensor spectral clustering: {0, 1, 2}, {3, 4, 5} Directed Laplacian: {1, 2, 5}, {0, 3, 4} Figure 1: (Left) Network where directed 3-cycles only ap- pear within the blue or red nodes. (Right) Partitioning found by our proposed tensor spectral clustering algorithm and the directed Laplacian. Our proposed algorithm doesn’t cut any directed 3-cycles. Directed 3-cycles are just one higher-order structure that can be used within our framework. 2 Preliminaries and background We now review spectral clustering and conductance cut. The key ideas are a Markov chain representing a random walk on a graphs, a second left eigenvector of the Markov chain, and a sweep cut that uses the ordering of the eigenvector to compute conductance scores. In Sec. 3, we generalize these ideas to tensors and higher-order structures on graphs. + 2.1 Notation and the transition matrix Consider an undirected, weighted graph G = (V, E), where n = V and m = E. Let A ∈ Rn×n be the weighted adjacency matrix of G, i.e., Ai j = wi j if (i, j) ∈ E and Ai j = 0 otherwise. Let D be the diagonal matrix with generalized degrees of the ver- tices of G. In other words, D = diag (Ae), where e is the vector of all ones. The combinatorial Laplacian or Kirchoff matrix is K = D − A. The matrix P = AT D−1 is a column stochastic matrix, which we call the transition matrix. We now interpret this matrix as a Markov chain. 2.2 Markov chain interpretation Since P is column stochastic, we can interpret the matrix as a Markov chain with states S t, for each time step t. Specifically, the states of the Markov chain are the vertices on the graph, i.e., S t ∈ V. The transition probabilities are given by P: Prob(S t+1 = i S t = j) = Pi j = A ji/D j j. This Markov chain represents a random walk on the In Sec. 3.2, we will generalize this idea to graph G. tensors of graph data. We now show how the second left eigenvector of the Markov chain described here is key to spectral clustering. 2.3 Second left eigenvector for conductance cut The conductance of a set S ⊂ V of nodes is (2.1) φ (S ) = cut (S ) / min(cid:16)vol(S ), vol( ¯S )(cid:17) , where cut (S ) = (cid:12)(cid:12)(cid:12) , and vol(S ) = {(u, v) u ∈ S }. Small conductance indicates a good par- {(u, v) u ∈ S , v ∈ ¯S }(cid:12)(cid:12)(cid:12) tition of the graph: the number of cut edges must be small and neither S nor ¯S can be too small. Let z ∈ {−1, 1}n be an indicator vector over the nodes in G, where zi = 1 if the ith node is in S . Then (2.2) zTKz = X (i, j)∈E 4I (cid:16)zi = z j(cid:17) ∝ cut (S ) . The conductance cut eigenvalue problem is an approxi- mation for the NP-hard problem of minimizing conductance: (2.3) minimize z∈Rn zTKz/zT Dz subject to eT Dz = 0, kzk = 1 The idea of the real-valued relaxation in Eqn. (2.3) is that positive and negative values of z correspond to the ±1 indicator vector for the cut in Eqn. (2.2). In Sec. 2.4 we will review how to convert the real-valued solution to a cut. The matrices K and D are positive semi-definite, and Eqn. (2.3) is a generalized eigenvalue problem. In particular, the solution is the vector z such that Kz = λDz, where λ is the second smallest generalized eigenvalue (the smallest eigenvalue is 0 and corresponds to the trivial solution z = e). To get the solution z, we observe that Kz = λDz ⇐⇒ (I − D−1 A)z = λz ⇐⇒ zT P = (1 − λ)zT where 1 − λ is the second largest left eigenvalue of P. We know that eT P = eT , so we are looking for the dominant left eigenvector that is orthogonal to the trivial one. Here, we call the above partitioning algorithm for undi- rected graphs the “undirected Laplacian” method. One gen- eralization to directed graphs is due to Chung [5]. For this method, we use the undirected Laplacian method on the following symmetrized network: Asym := 1 2 (cid:16)ΠPT + PΠ(cid:17), where P = AT D−1 and Π = diag (π) for Pπ = π, the station- ary distribution of P. Note that Dsym = diag (cid:16)Asyme(cid:17) = Π, so we are interested in the second left eigenvector of (2.4) Psym = 1 2 (cid:16)ΠPTΠ−1 + P(cid:17) . By “directed Laplacian”, we refer to the method that uses the second left eigenvector of Psym. 2.4 Sweep cuts In order to round the real-valued solution z to a solution set S to evaluate Eqn. (2.1), we sort the vertices by the values zi and consider vertex sets S k that consist of the first k nodes in the sorted vertex list. In other words, if σi is equal to the index of the ith smallest element of z, then S k = {σ1, σ2, . . . σk}. We then choose S = arg minS k φ(S k). The set of nodes S satisfies the celebrated Cheeger inequality [1]: φ2 ∗/2 ≤ φ(S ) ≤ 2φ∗, where φ∗ is the minimum conductance over all cuts. The sweep cut computation is fast, since S k+1 differs from S k by only one node, and the sequence of scores φ(S 1), . . . , φ(S n) can be computed in O(n + m) time. interest are the normalized cut, ncut(S ) In addition to conductance, other scores can also be computed in the same sweeping fashion. Of par- ticular = cut (S ) (cid:16)1/vol(S ) + 1/vol( ¯S )(cid:17), and the expansion, ρ(S ) = cut (S ) / min(S , ¯S ). The normalized cut differs by at most a factor of two from conductance, so we will limit ourselves to conductance and expansion in this paper. 3 Tensor spectral clustering framework The key ingredients for spectral clustering discussed in Sec. 2 were a transition matrix from an undirected graph, a Markov chain interpretation of the transition matrix, and the second left eigenvector of the Markov chain. We now generalize these ideas for higher-order network structures. 3.1 Transition tensors Our first goal is to represent the higher-order network stuctures of interest. For example, to represent structures on three nodes (i.e., directed cycles, or feed-forward loops) we required a three-dimensional tensor. In particular, we want a symmetric order-3 tensor T ∈ Rn×n×n such that the entry at index (i, j, k) contains information about nodes i, j, k ∈ V. (Here, symmetric means that the value of T(i, j, k) remains the same under any permutation of the three indices.) A tensor describing triangles in G is: + (3.5) T(i, j, k) = I (cid:0)i, j, k ∈ V distinct and form a triangle(cid:1) . This tensor represents third-order information about the graph. We form a transition tensor by P(i, j, k) = T(i, j, k)/ n X i=1 T(i, j, k), 1 ≤ i, j, k ≤ n. In the case that Pn i=1 T(i, j, k) = 0, we fill in P(:, j, k) with a stochastic vector u, i.e., P(:, j, k) = u. We call the vector u the dangling distribution vector, borrowing the term from the PageRank community [3]. Next, we see how to interpret this transition tensor as a second-order Markov chain. 3.2 Second-order Markov chains and the spacey ran- dom surfer Next, we seek to generalize the Markov chain interpretation of spectral clustering to tensors. While spec- tral clustering on matrices is analogous to a first-order Markov chain, we will show that tensor spectral clustering is analogous to a second-order Markov chain on a matrix representation of the tensor. Entries of the transition tensor P from Sec. 3.1 can be interpreted as the transition probabilities of a second-order Markov chain. Specifically, given a second-order Markov chain with state space the set of vertices, V, we define the transition probabilities as P(i, j, k) = Prob (S t+1 = i S t = j, S t−1 = k) . In other words, the probability of moving to state i depends on the current state j and the last state k. For the triangle tensor in Eqn. (3.5), P(i, j, k) = I (cid:0)i, j, k form triangle(cid:1) #(triangles involving nodes j and k) If the previous state was node k and the current state is node j, then, for the next state, the Markov chain chooses uniformly over all nodes i that form a triangle with j and k. The stationary distribution Xi j of the second-order Markov chain satisfies Pk P(i, j, k)X jk = Xi j. We would like to model the full second-order dynamics of the Markov chain, but doing so is computationally infeasible because just storing the stationary distribution requires O(n2) mem- ory. Instead, we will make the simplifying assumption that Xi j = xix j for some vector x ∈ Rn + with Pi xi = 1. The stationary distribution then satisfies (3.6) X 1≤ j,k≤n P(i, j, k)x jxk = xi. With respect to Eqn. (3.6), x is called a z eigenvector of the tensor P with eigenvalue 1 [27]. To simplify notation, we will denote the one-mode unfolding of P by R ∈ Rn×n2, namely R = hP(:, :, 1) P(:, :, 2) . . . P(:, :, n)i. The ma- trix R is a column stochastic matrix. We use Rk = P(:, :, k) to denote the kth n ×n block of R. With this notation, Eqn. (3.6) reduces to R · (x ⊗ x) = x, where ⊗ denotes the Kronecker product. The simplifying approximation Xi j = xix j is computa- tionally and algebraically appealing, but we also want a ran- dom process to interpret the vector. Recent work [13] has considered the multilinear pagerank vector x that satisfies (3.7) αR (x ⊗ x) + (1 − α)u = x, xk ≥ 0, eTx = 1, for a constant α ∈ (0, 1) and stochastic vector u. This vector is the stationary distribution of a stochastic process recently termed the spacey random surfer [12]. At any step of the process, a random surfer has just moved from node k to node j. With probability (1−α), the surfer teleports to a random state via the stochastic vector u. With probability α, the surfer wants to transition to node i with probability P(i, j, k). However, the surfer spaces out and forgets that s/he came from node k. Instead, the surfer guesses the previous state, based on the historical distribution over the state space. Formally, the surfer guesses node ℓ with probability t+n (cid:16)1 + Pt 1 r=1 I [S t = ℓ](cid:17). It is important to note that although this process is an approximation to a second-order Markov chain, the process is no longer Markovian. 3.3 Second left eigenvector Following the steps of spec- tral clustering, we now need to obtain an equivalent of the second left eigenvector (Sec. 2.3). In particular, we now show how to get a relevant eigenvector from the multilinear PageRank vector x and the transition tensor P. The multilin- ear PageRank vector x satisfying αR · (x ⊗ x) + (1 − α)u = x can also be re-interpreted as the stationary distribution of a particular Markov chain. Specifically, define the matrix (3.8) P[x] := n X k=1 xkRk. (Recall that Rk = P(:, :, k) is the kth n × n block of R). The matrix P[x] is column stochastic because each Rk is column stochastic and Pn R · (x ⊗ x) = k=1 xk = 1. Note that n x = P[x] · x. n X k=1 Rk (xkx) =  X k=1 xkRk Hence, x is the stationary distribution of the PageRank system αP[x] · x + (1 − α)u = x. However, the transition matrix depends on x itself. We use the second left eigenvector of P[x] for our higher-order spectral clustering algorithm. Heuristically, P[x] is a weighted sum of n “views” of the graph (the matrices Rk), from the perspective of each node (k, 1 ≤ k ≤ n), according to three-dimensional graph data (the tensor T). If node k has a large influence on the three-dimensional data, then xk will be large and we will weight data associated with node k more heavily. The ordering of the eigenvector will be used for a sweep cut on the vertices. 3.4 Sweep cuts The last remaining step is to generalize the notion of the sweep cut (Sec. 2.4). Recall that the sweep cut takes some ordering on the nodes, σ, and computes some score f (S k) for each cut S k = {σ1, . . . , σk}. Finally, the sweep cut procedure returns arg maxS k f (S k). The eigenvec- tor from Sec. 3.3 provides us with an ordering for a sweep cut, just as in the two-dimensional case (Sec. 2.4). We gen- eralize the cut and volume measures as follows: cut3(S ) := X T(i, j, k) − X i, j,k∈V i, j,k∈S T(i, j, k) − X i, j,k∈ ¯S T(i, j, k) vol3(S ) := X T(S , V, V). And we define “higher-order conductance” (denoted φ3) and “higher-order expansion” (denoted ρ3) as cut3(S ) (3.9) φ3 (S ) := (3.10) ρ3(S ) := min (cid:16)vol3(S ), vol3( ¯S )(cid:17) cut3(S ) min (cid:16)S , ¯S (cid:17) . This definition ensures that φ3(S ) ∈ [0, 1], as in standard conductance. Algorithm 1: Tensor Spectral Partitioning Data: G = (V, E), V = n, T ∈ Rn×n×n distribution vector u, α ∈ (0, 1) + , dangling Result: Set of nodes S ⊂ V for 1 ≤ i, j, k ≤ n, T(i, j, k) , 0 do P(i, j, k) ← T(i, j, k)/ Pi T(i, j, k) for j, k such that Pi T(i, j, k) = 0 do P(:, j, k) ← u x ← MultilinearPageRank(α, P) Rk ← P(:, :, k) P[x] ← Pk xkRk Compute second left eigenvector z of P[x] σ ← sorted ordering of z S ← S weepCut(σ, G) Algorithm 2: Tensor Spectral Clustering (TSC) Data: G = (V, E), V = n, T ∈ Rn×n×n , dangling distribution vector u, α ∈ (0, 1), number of clusters C + Result: Partition P of V if P < C then Partition G into G1 = (V1, E1) and G2 = (V2, E2) via Algorithm 1. P = P ∪ {V1, V2}. Recurse on largest component in P. 3.5 Tensor spectral clustering framework We now have higher-order analogs of all the spectral clustering tools from Sec. 2. The central routine of our tensor spectral clustering framework is given in Algorithm 1, which is the tensor spectral partitioning algorithm. This subroutine takes a data tensor T of third-order information about a graph G and partitions the nodes into two sets. Algorithm 2 is the clustering algorithm that performs recursive bisection in order to decompose the graph into several components. This algorithm can also be used with other partitioning algorithms [11], and we will take that approach in Sec. 5. 3.6 Complexity The complexity of Algorithm 2 depends on the sparsity of the data tensor T, i.e.the number of higher- order structures in the network. The algorithm depends on the sparsity in three ways. First, all of the higher-order structures in the network must be enumerated as an upfront cost. Second, the sparsity affects the complexity of the multilinear PageRank subroutine in Algorithm 1. Third, the number of non-zeroes in P[x] is equal to the number of the higher-order structures. When performing recursive bisection (Algorithm 2), there is no upfront cost to enumerate the structures—we only need to determine which structures are preserved under the partition. We argue that the upfront cost is not cumbersome. Triangle enumeration for real-world undirected networks is a well-studied problem [7, 30]. For directed graphs, we can: (1) undirect the graph, (2) use high-performance code to enumerate the triangles, and (3) stream through the triangles and only keep those that are the directed structure of interest. Now, we consider the second and third computations. Let T be the number of non-zeroes in T. There are several methods for computing the multilinear PageRank vector in Algorithm 1 [13]. We use the shifted fixed point method (akin to the symmetric higher-order power method [20]). Each iteration takes O(T ) time, and we found that this method converges very quickly—usually within a handful of iterations. The computation of the second left eigenvector of P[x] dominates the running time. We use the power method to compute this eigenvector. Since P[x] has T non-zero entries, each iteration takes O(T ) time. Finally, we look at the relationship between T and the In theory, T can be O(n3), but this is size of the graph. far from what we see in practice. For the large networks considered in Sec. 6, T ≤ 6m (see Table 1). To summarize, the majority of our time is spent comput- ing the eigenvector of P[x]. Each iteration takes O(T ) time, and T ≤ 6m for the algorithms we consider. Standard spec- tral algorithms also compute an eigenvector with the power method, but each iteration is only O(m) time. Thus, we can think of our algorithms as running within an order of magni- tude of standard algorithms. However, when moving beyond third-order structures, we note that T can be much larger. 4 Generalizations and directed 3-cycle cut Before transitioning to applications, we mention two impor- tant generalities of our framework and discuss directed 3- cycle cuts. The directed 3-cycle will play an important role for our applications in Sections 5 and 6. 4.1 Generalizations Our first generalization deals with data beyond three dimensions. While we have presented the algorithm with three-dimensional data, the same ideas carry through for higher-order data. The multilinear PageRank vector can still be computed, although α must be smaller to guarantee convergence [13]. However, in practice, we do not observe large α impeding convergence. Second, our TSC algorithm is a strict generalization of traditional spectral clustering in the following sense. There is a data tensor T such that for any multilinear PageRank vector x, we compute the same eigenvector that conductance cut computes. In particular, we can always define T(i, j, k) = Ai j, where A is the adjacency matrix. Then Rk = P, 1 ≤ k ≤ n, and P[x] = Pk xkP = P Pk xk = P. 4.2 Directed 3-cycle cuts We now turn our attention to a particular three-dimensional representation of directed graph data: directed 3-cycles (D3Cs), i.e., sets of edges (i, j), ( j, k), and (k, i) for distinct nodes i, j, and k. Such structures are important for community detection [19] and are natural motifs for network feedback. We will use this structure for applications in Sections 5 and 6. The data tensor we use for directed 3-cycle cuts is (4.11) T(i, j, k) = 2 1 0 i, j, k form two D3Cs i, j, k form one D3C otherwise  Nodes i, j, and k form two D3Cs if and only if every possible directed edge between them is present. When T(i, j, k) = 1, we do not differentiate between 0, 1, or 2 reciprocated edges. For directed 3-cycle cut, we want to find partitions of the graph that do not cut many D3Cs. 4.3 Strongly connected components We now show that TSC correctly breaks up strongly connected components when using the data tensor in Eqn. (4.11). Suppose we have an undirected graph G = (V, E) with two connected components V1 and V2. A standard result of the spectral method for conductance cut on undirected graphs (Sec. 2.3) is that there is a second left eigenvector z of P such that zT P = z, and sign(zi) = −sign(z j) for i ∈ V1, j ∈ V2 [6]. This means that the ordering induced by the eigenvector correctly separates the components. A similar result holds for strongly connected components in a directed graph G using the directed Laplacian. We now present a similar result for directed 3-cycle cut. First, we observe the following: there is no directed 3-cycle that has nodes from different strongly connected components. Now, Lemma 4.1 shows that if we have a graph with two strongly connected components, then, under some conditions, the second left eigenvector computed by Algorithm 1 correctly partitions the two strongly connected components. Lemma 4.1. Consider a directed graph G = (V, E) with two components V1 and V2 such that there are no directed 3- cycles containing a node i ∈ V1 and j ∈ V2. Assume that the directed 3-cycle tensor T is given by Eqn. (4.11). Augment the corresponding transition matrices Rk with a sink node t so that transition involving j ∈ V1, k ∈ V2 (or vice versa) jump to the sink node, i.e., P(i, j, k) = I (i = t). Finally, instead of using the dangling distribution vector u to fill in P, assume that when Pi T(i, j, k) = 0 for j, k ∈ V1, P(i, j, k) = I(i ∈ V1)/V1. (And the same for transitions involving j, k ∈ V2). Then P[x] has a second left eigenvector z with eigen- value 1 such that zTe = 0 and sign(zi) = −sign(z j) for any i ∈ V1, j ∈ V2. Proof. See the full version of the paper.1 1Available from https://github.com/arbenson/tensor-sc. 5 Applications on synthetic networks We now explore applications of our TSC framework. The purpose of this section is to illustrate that explicitly parti- tioning higher-order network data can improve partitioning and clustering on directed networks. The examples that fol- low are small and synthetic but illustrative. In future work, we plan to use these ideas on real data sets. For the applications in this section, we use the following parameters for the tensor spectral clustering algorithm: α = 0.99 for the multilinear PageRank vector, γ = 0.01 for SS- HOPM, u = u = 1 n e, and the higher-order conductance score function (Eqn. (3.9)). 5.1 Layered flow networks Our first example is a net- work consisting of multiple layers, where feedback loops Information tends to flow primarily occur within a layer. “downwards” from one layer to the next. In other words, most edges between two layers point in the same direction. Figure 2 gives an example of such a network with three lay- ers, each consisting of four nodes. We are interested in separating the layers of the network via our TSC algorithm. Feedback in a directed network is synonymous with directed cycle. For this example, we count all directed 2-cycles (i.e., reciprocated edges) and directed 3-cycles. In order to account for the directed 2-cycles, we will say that the data tensor T is equal to one for any index of the form (i, i, j), (i, j, i), or ( j, i, i) when nodes i and j have reciprocated edges. Formally, the data tensor is: T(i, j, k) = 2 1 1 1 i, j, k distinct and form two D3Cs i, j, k distinct and form one D3C (k = j or k = i) and (i, j), ( j, i) ∈ E j = i and (i, k), (k, i) ∈ E  Figure 2 lists the three communities found by (1) TSC (Algorithm 2 with C = 3), (2) the directed Laplacian (DL), and (3) the directed Laplacian on the subgraph only including edges involved in at least one directed 2-cycle or directed 3-cycle (Sub-DL). TSC is the only method that correctly identifies the three communities. Sub-DL performs almost as well, but misclassifies node 1, placing it with the green nodes two layers beneath. In general, DL does not do well because there are a large number of edges between layers, and the algorithm does not want to cut these edges. 5.2 Anomaly detection Our second example is anomaly detection. In many real networks, most directed 3-cycles have at least one reciprocated edge [19]. Thus, a set of nodes with many directed 3-cycles and few reciprocated edges between them would be highly anamolous. The goal of this example is to show that our TSC framework can find such sets of nodes when they are planted in a network. Figure 3 shows a network where the anomalous cluster we want to identify is nodes 0–5. All triangles between 0 2 4 1 5 3 7 6 8 10 11 TSC DL {0, 1, 2, 3}, {4, 5, 6, 7}, {8, 9, 10, 11} {1, 2, 3, 6, 7, 10}, {0, 4, 5, 8, 9}, {11} 9 Sub-DL {8, 10, 11}, {9}, {0, 1, 2, 3, 4, 5, 6, 7} Figure 2: (Left) Layered flow network, where almost all feedback occurs at three different layers (specified by the blue, red, and green nodes). There are many edges going from one layer to the layers below it. (Right) Three communities found when using TSC, the directed Laplacian (DL), and the directed Laplacian on the subgraph of edges participating in at least one directed 2- or 3-cycle (Sub-DL). Only TSC correctly identifies all three communities. nodes 0–5 are directed 3-cycles with no reciprocated edges. Nodes 6–21 connect to each other according to a Erdos- R´enyi model with edge probability 0.25. Finally, nodes 0– 5 each have four outgoing and two incoming edges with nodes 6–21. In total, there are 18 directed 3-cycles with no reciprocated edges, and 8 of them occur between nodes 0–5. To use the TSC framework, we form a data tensor that only counts directed 3-cycles with no reciprocated edges: T(i, j, k) = I ((i, j), ( j, k), (k, i) ∈ E, ( j, i), (k, j), (i, k) < E) + I (( j, i), (k, j), (i, k) ∈ E, (i, j), ( j, k), (k, i) < E) Figure 3 lists the smaller of the two communities found by (1) TSC (Algorithm 2 with C = 2), (2) the directed Laplacian (DL), and (3) the directed Laplacian on the sub- graph only including edges involved in at least one directed 3-cycle with no reciprocated edges (Sub-DL). We see that only TSC correctly captures the planted anomalous commu- nity. DL does not capture any information about directed 3-cycles with no reciprocated edges, and hence the cut does not make sense in this context. Sub-DL correctly captures nodes 0, 1, 4, and 5, but misses nodes 2 and 3. 6 Directed 3-cycle cuts on large networks We now transition to real data sets and show that our tensor spectral partitioning algorithm provides good cuts for the directed 3-cycle (D3C) data tensor given by Eqn. (4.11). We compare the following algorithms: 9 2 11 10 3 4 8 1 5 0 7 6 21 17 18 19 20 12 13 14 15 16 DL TSC {0, 1, 2, 3, 4, 5, 12, 13, 16} {1, 4, 5, 7, 8, 12, 13, 15, 18, 20} Sub-DL {0, 1, 4, 5, 9, 11 16, 17, 19, 20} (Left) Network with planted anomalous clus- Figure 3: ter (nodes 0–5). Between these nodes, there are many directed 3-cycles with no reciprocated edges (thick black lines). Nodes 6–22 follow an Erdos-R´enyi graph pattern with edges indicated by dashed lines. (Right) Smaller of two com- munities found by TSC, the directed Laplacian (DL), and the directed Laplacian on the subgraph with only edges involved in a directed 3-cycle with no reciprocated edges (Sub-DL). Only TSC finds the entire anomalous cluster. • Directed Laplacian (DL) [5]: The sweep cut ordering is provided by the second left eigenvector of Psym in Eqn. (2.4). • Asymmetric Laplacian (AL) [4]: The sweep cut or- dering is provided by the second left eigenvector of P. • Co-clustering (Co) [9, 28]: The sweep cut ordering is based on the second left and right singular vectors of a normalized adjacency matrix. Specifically, let Drow = diag(Ae) and Dcol = diag(ATe) and let UΣVT row AD−1/2 be the singular value decomposition of D−1/2 . col The the sweep cut ordering is provided by D−1/2 row U(:, 2) or D−1/2 col V(:, 2). We take the better of the two cuts. • Random: The sweep cut ordering is random. This provides a simple baseline. 6.1 Data preprocessing Before running partitioning algo- rithms, we first filter the networks as follows: (1) remove all edges that do not participate in any D3C, and (2) take the largest strongly connected component of the remaining net- work. We perform this filtering to make a fairer comparison between the different partitioning algorithms. Table 1 lists the relevant networks and statistics for the filtered networks that we use in our experiments. We limit ourselves to a few representative networks to illustrate the main patterns we ob- served. Data for more networks is available in the full ver- sion of this paper. Networks are available from SNAP [23]. • TSC: This is our proposed method (Algorithm 2 with C = 2), where the data tensor is given by Eqn. (4.11). The sweep cut ordering is provided by the second left eigenvector of P[x]. • Undirected Laplacian (UL): The sweep cut ordering is provided by the second left eigenvector of the transition matrix of the undirected version of the graph. 6.2 Results Figure 4 shows the sweep profiles on the net- works in Table 1. The results are for a single cut of the network. The plots show the higher-order conductance (Eqn. (3.9)), higher-order expansion (Eqn. (3.10)), and den- sity of the smaller of the partitionined vertex sets. For email-EuAll and wiki-Talk, higher-order conductance is the same for most algorithms, but TSC has much bet- 100 ) S ( 3 φ 10−1 10−2 10−3 101 104 102 100 ) S ( 3 ρ 10−2 101 100 y t i s n e d 10−2 10−4 101 email−EuAll 102 S 103 104 email−EuAll 102 S 103 104 email−EuAll 102 S 103 104 100 ) S ( 3 φ 10−1 10−2 10−3 100 104 ) S ( 3 ρ 102 100 100 100 y t i s n e d 10−2 10−4 100 wiki−Talk S wiki−Talk S wiki−Talk soc−Epinions1 102 S 103 104 soc−Epinions1 102 S 103 104 soc−Epinions1 100 ) S ( 3 φ 10−1 10−2 105 10−3 101 104 102 100 ) S ( 3 ρ 105 10−2 101 100 y t i s n e d 10−2 S 105 10−4 101 102 S 103 104 100 ) S ( 3 φ 10−1 10−2 10−3 100 1010 ) S ( 3 ρ 105 100 10−5 100 100 y t i s n e d 10−2 10−4 10−6 100 twitter_combined S twitter_combined S twitter_combined TSC DL UL AL Co Random 105 105 S 105 Figure 4: (Top row) Higher-order conductance, φ3(S ), as a function of the smaller vertex partition set (S ). The size of the vertex set runs from twenty to half the nodes in the network. (Middle row) Higher-order expansion, ρ3(S ). (Bottom row) Density of the cluster. For email-EuAll and wiki-Talk (left two coumns), higher-order conductance from TSC is on par with other spectral methods, and higher-order expansion is better for large enough clusters. For soc-Epinions1 and twitter combined, the higher-order conductance and expansion is better using standard clustering algorithms. In all cases, TSC finds much denser clusters. Table 1: Statistics of networks used for computing directed 3-cycle cuts. The statistics are taken on the largest strongly connected component of the network after removing all edges that do not participate in any D3C. Network n = V m = E # D3Cs email-EuAll soc-Epinions1 wiki-Talk twitter combined 11,315 15,963 52,411 57,959 80,211 262,779 957,753 1,371,621 183,836 738,231 5,138,613 6,921,399 ter higher-order expansion when the vertex set gets large enough. On soc-Epinions1 and twitter combined, standard spectral methods have better higher-order conduc- tance and higher-order expansion. Crucially, in all cases, TSC finds much denser subgraphs. In general, we expect communities with lots of directed 3-cycles to be dense sets. Thus, even though TSC sometimes does not always do well with respect to the score metrics discussed in Sec. 3.4, it is still finding relevant structure. Since our goal is to explore structural properties of the cuts, we did not tune our TSC algorithms for high performance. Subsequently, we do not compare running times of the algorithms. However, we note that for each network, our straightforward implementation of TSC ran in under 10 minutes using a laptop with 4GB of memory. 7 Related work While the bulk of community detection algorithms are for undirected networks, there is still an abundance of meth- ods for directed networks [25]. There are several spectral algorithms related to partitioning directed networks. The ones we investigated in this paper were based on the undi- rected Laplacian (i.e., standard spectral clustering but ignor- ing edge directions), the directed Laplacian [5], the asym- metric Laplacian [4], and co-clustering [9, 28]. Other spec- tral algorithms are based on dyadic methods [24] and opti- mizing directed modularity [22]. There is some work in community detection that explic- itly targets higher-order structures. Klymko et al. weight directed edges in triangles and then revert to a clustering algorithm for undirected networks [19]. Clique percola- tion builds overlapping communities by examining small cliques [8]. Optimizing the LinkRank metric can identify communities based on information flow [18], which is sim- ilar to our use of directed 3-cycles in Sec. 5.1. Multi-way relationships between nodes are also explicitly handled by hypergraph partitioners [17] . Finally, we mention that tensor factorizations have been used by Huang et al. to find overlapping communities [16]. This work uses new spectral techniques for learning latent variable models from higher-order moments [2]. 8 Discussion We have provided a framework for tensor spectral clustering that opens the door to further higher-order network analy- sis. The framework gives the user the flexibility to cluster structures based on his or her application. In Sec. 5 we pro- vided two applications—layered flow networks and anomaly detection—that showed how this framework can lead to bet- ter clustering of nodes based on network motifs. For these applications, the networks were small and manually con- structed. In future work, we plan to explore these applica- tions on large networks. In Sec. 6, we explored clustering based on directed 3- In some cases, TSC provided much better cuts in cycles. terms of higher-order expansion. Interestingly, for some networks, simply removing edges that do not participate in a directed 3-cycle and using a standard spectral clustering algorithm is sufficient for finding good cuts with respect to higher-order conductance and higher-order expansion. However, in these cases, we are comparing against baselines optimized for our specific problem. That being said, TSC does always identify much denser clusters. The networks we analyzed were social and internet-based, and it would be interesting to see if similar trends hold for networks derived from physical or biological systems. For the large networks, we did not perform full directed clustering—we only investigated the sweep profiles. The higher-level goal of this paper is to explore the ideas in higher-order clustering, and we leave full-stack algorithms to future work. One interesting question for such algorithms is whether we should partition based on recursive bisection (Algorithm 2) or k-means. These algorithmic variations provide several opportunities for challenging future work. Acknowledgements This research has been supported in part by NSF IIS- 1016909, CNS-1010921, CAREER IIS-1149837, ARO MURI, DARPA XDATA, DARPA GRAPHS, Boeing, Face- book, Volkswagen, and Yahoo. David F. Gleich is supported by NSF CAREER CCF-1149756 and IIS-1422918. Austin R. Benson is supported by a Stanford Graduate Fellowship. References [1] N. Alon and V. D. Milman. λ1, isoperimetric inequalities for Journal of Combinatorial graphs, and superconcentrators. Theory, Series B, 38(1):73–88, 1985. [2] A. Anandkumar, R. Ge, D. Hsu, S. M. Kakade, and M. Tel- garsky. Tensor decompositions for learning latent variable models. arXiv preprint arXiv:1210.7559, 2012. [3] P. Boldi, R. Posenato, M. Santini, and S. Vigna. Traps and pitfalls of topic-biased PageRank. In Algorithms and Models for the Web-Graph, pages 107–116. Springer, 2008. [4] D. Boley, G. Ranjan, and Z.-L. Zhang. Commute times for a directed graph using an asymmetric Laplacian. Linear Algebra and its Applications, 435(2):224–242, 2011. [5] F. Chung. Laplacians and the Cheeger inequality for directed graphs. Annals of Combinatorics, 9(1):1–19, 2005. [6] F. R. Chung. Spectral graph theory, volume 92. American Mathematical Soc., 1997. [7] J. Cohen. Graph twiddling in a mapreduce world. Computing in Science & Engineering, 11(4):29–41, 2009. [8] I. Der´enyi, G. Palla, and T. Vicsek. Clique percolation in random networks. PRL, 94(16):160202, 2005. [9] I. S. Dhillon. Co-clustering documents and words using bipartite spectral graph partitioning. In KDD, 2001. [10] N. Durak, A. Pinar, T. G. Kolda, and C. Seshadhri. Degree re- lations of triangles in real-world networks and graph models. In CIKM, 2012. [11] D. F. Gleich. Hierarchical directed spectral graph partition- ing, 2006. [12] D. F. Gleich, L.-H. Lim, and A. Benson. The Spacey Random Surfer: A stochastic process for multilinear PageRank. [13] D. F. Gleich, L.-H. Lim, and Y. Yu. Multilinear PageRank. arXiv, cs.NA:1409.1465, 2014. [14] M. S. Granovetter. The strength of weak ties. American Journal of Sociology, pages 1360–1380, 1973. [15] C. J. Hillar and L.-H. Lim. Most tensor problems are NP- hard. Journal of the ACM (JACM), 60(6):45, 2013. [16] F. Huang, U. Niranjan, M. Hakeem, and A. Anandkumar. Fast detection of overlapping communities via online tensor methods, 2013. [17] G. Karypis and V. Kumar. Multilevel k-way hypergraph partitioning. VLSI design, 11(3):285–300, 2000. [18] Y. Kim, S.-W. Son, and H. Jeong. Finding communities in directed networks. Phys. Rev. E, 81:016103, Jan 2010. [19] C. Klymko, D. F. Gleich, and T. G. Kolda. Using triangles In to improve community detection in directed networks. Proceedings of the ASE BigData Conference, 2014. [20] T. G. Kolda and J. R. Mayo. Shifted power method for com- puting tensor eigenpairs. SIAM Journal on Matrix Analysis and Applications, 32(4):1095–1124, 2011. [21] G. Kossinets and D. J. Watts. Empirical analysis of an evolving social network. Science, 311(5757):88–90, 2006. [22] E. A. Leicht and M. E. Newman. Community structure in directed networks. PRL, 100(11):118703, 2008. [24] Y. Li, Z.-L. Zhang, and J. Bao. Mutual or unrequited love: Identifying stable clusters in social networks with uni-and bi-directional links. In Algorithms and Models for the Web Graph, pages 113–125. Springer, 2012. [25] F. D. Malliaros and M. Vazirgiannis. Clustering and commu- nity detection in directed networks: A survey. Physics Re- ports, 533(4):95 – 142, 2013. [26] A. Prat-P´erez, D. Dominguez-Sal, J. M. Brunat, and J.-L. Larriba-Pey. Shaping communities out of triangles. In CIKM, 2012. [27] L. Qi. Eigenvalues of a real supersymmetric tensor. Journal of Symbolic Computation, 40(6):1302–1324, 2005. [28] K. Rohe and B. Yu. Co-clustering for directed graphs; the stochastic co-blockmodel and a spectral algorithm. arXiv preprint arXiv:1204.2296, 2012. [29] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West, and R. Lambiotte. Memory in network flows and its effects on spreading dynamics and community detection. Nature communications, 5, 2014. [30] T. Schank and D. Wagner. Finding, counting and listing In all triangles in large graphs, an experimental study. Experimental and Efficient Algorithms. 2005. 9 Proof of Lemma 4.1 Proof. Without loss of generality, order the nodes so that the nodes in V1 are first, the nodes V2 are second, and the sink node t is last. Let R(i) k be the transition probabilities of Rk, restricted to nodes in Vi, i = 1, 2. Because nodes from two different strongly connected components cannot be in the same directed 3-cycle, Rk = R(1) k 0 0  0 0 eT 0 0 1  , k ∈ V1; Rk = 0 0 0 R(2) k eT 0  0 0 1  , k ∈ V2 Here, the first block diagonal matrix is of size V1 × V1, the second of size V2 × V2, and the third of size 1 × 1. Consider the following vectors that have the same block structure: T 1 = heT y 0 1i , T 2 = h0 eT y 1i . Then y T i Rk = yi, i = 1, 2 for k ∈ V1 and k ∈ V2. Thus, T i P[x] = X y T i (xkRk) = X y xky T i = y T i k k The vector z = y1 − N1+1 N2+1 y2 satisfies zT P[x] = zT and zTe = 0. Since eT P[x] = eT, z is a second left eigenvector. Finally, zi is positive for all i ∈ V1 and negative for all i ∈ V2. [23] J. Leskovec and A. Krevl. Stanford http://snap.stanford.edu/data, June 2014. network large SNAP Datasets: collection. dataset 10 Directed 3-cycle cuts on more networks Here we present the results of Sec. 6 on more networks. Ta- ble 2 lists the statistics of eleven networks that we consider. We include one undirected network, email-Enron. For this data set, all undirected edges are simply replaced with two directed edges. Figures 5, 6, and 7 show the sweep profiles for higher-order conductance, higher-order expansion, and density, respectively. Table 2: Statistics of networks used for computing directed 3-cycle cuts. The statistics are taken on the largest strongly connected component of the network after removing all edges that do not participate in any directed 3-cycle. Network n = V m = E # D3Cs wiki-Vote wiki-RfA as-caida20071105 email-EuAll web-Stanford soc-Epinions1 soc-Slashdot0811 email-Enron wiki-Talk twitter combined amazon0312 1,151 2,219 8,320 11,315 12,520 15,963 22,193 22,489 52,411 57,959 253,405 24,349 61,965 50,016 80,211 105,376 262,779 377,172 332,396 957,753 1,371,621 1,476,377 43,975 133,004 72,664 183,836 212,639 738,231 883,884 1,447,534 5,138,613 6,921,399 1,682,909 100 10−1 100 ) S ( 3 φ 10−1 10−2 10−3 101 100 ) S ( 3 φ 10−1 10−2 10−3 101 100 amazon0312 TSC DL UL AL Co Random email−EuAll ) S ( 3 φ 10−1 10−2 10−3 100 100 100 ) S ( 3 φ 10−1 10−2 10−3 101 100 ) S ( 3 φ 10−1 10−2 10−3 101 102 S 103 104 web−Stanford 102 S 103 104 100 ) S ( 3 φ 10−1 10−2 10−3 101 100 ) S ( 3 φ 10−1 10−2 10−3 100 100 ) S ( 3 φ 10−1 10−2 10−3 100 email−Enron S twitter_combined S wiki−Vote 105 105 as−caida20071105 102 S 103 104 soc−Slashdot0811 100 ) S ( 3 φ 10−1 10−2 10−3 100 100 ) S ( 3 φ 10−1 10−2 S wiki−Talk 105 10−3 100 100 ) S ( 3 φ 10−1 10−2 105 10−3 101 S 102 S 103 102 S 104 106 soc−Epinions1 102 S 103 104 wiki−RfA 102 S 103 104 Figure 5: Directed 3-cycle higher-order conductance (φ3(S ), Eqn. (3.9)) as a function of the smaller partition size, S . The size runs from twenty nodes to half the nodes in the network. 100 10−1 10−1 104 102 100 ) S ( 3 ρ 10−2 101 104 102 100 ) S ( 3 ρ 10−2 101 TSC DL UL AL Co Random email−EuAll 102 S 103 104 web−Stanford 102 S 103 104 104 102 100 ) S ( 3 ρ 10−2 100 100 104 102 100 ) S ( 3 ρ 10−2 101 104 103 102 ) S ( 3 ρ 101 101 amazon0312 102 S 104 106 soc−Epinions1 103 104 102 S wiki−RfA 102 S 103 104 103 102 101 ) S ( 3 ρ 100 101 104 102 100 ) S ( 3 ρ 10−2 100 104 ) S ( 3 ρ 102 100 100 as−caida20071105 102 S 103 104 soc−Slashdot0811 email−Enron S twitter_combined 104 102 100 ) S ( 3 ρ 10−2 100 1010 ) S ( 3 ρ 105 100 S wiki−Talk S wiki−Vote 105 10−5 100 103 ) S ( 3 ρ 102 105 105 105 101 101 S 102 S 103 Figure 6: Directed 3-cycle higher-order expansion (ρ3(S ), Eqn. (3.9)) as a function of the smaller partition size, S . The size runs from twenty nodes to half the nodes in the network. 100 10−1 10−2 10−1 100 y t i s n e d 10−2 10−4 101 100 y t i s n e d 10−2 10−4 101 TSC DL UL AL Co Random email−EuAll 100 amazon0312 y t i s n e d 10−2 100 10−4 100 100 S soc−Epinions1 y t i s n e d 10−2 10−4 101 100 y t i s n e d 10−2 10−4 101 102 S 103 104 web−Stanford 102 S 103 104 102 S 103 104 wiki−RfA 102 S 103 104 100 y t i s n e d 10−2 105 10−4 101 100 y t i s n e d 10−2 10−4 100 100 y t i s n e d 10−2 10−4 100 as−caida20071105 102 S 103 104 soc−Slashdot0811 email−Enron S twitter_combined 100 y t i s n e d 10−2 10−4 100 100 y t i s n e d 10−2 S wiki−Talk 105 10−4 100 100 y t i s n e d 10−2 S wiki−Vote 105 105 105 10−4 101 S 102 S 103 Figure 7: Density of the smaller partition set of vertices as a function of its size, S . The size runs from twenty nodes to half the nodes in the network. In nearly all cases, TSC finds the densest clusters.
1705.04969
1
1705
2017-05-14T14:32:22
Attributed Social Network Embedding
[ "cs.SI" ]
Embedding network data into a low-dimensional vector space has shown promising performance for many real-world applications, such as node classification and entity retrieval. However, most existing methods focused only on leveraging network structure. For social networks, besides the network structure, there also exists rich information about social actors, such as user profiles of friendship networks and textual content of citation networks. These rich attribute information of social actors reveal the homophily effect, exerting huge impacts on the formation of social networks. In this paper, we explore the rich evidence source of attributes in social networks to improve network embedding. We propose a generic Social Network Embedding framework (SNE), which learns representations for social actors (i.e., nodes) by preserving both the structural proximity and attribute proximity. While the structural proximity captures the global network structure, the attribute proximity accounts for the homophily effect. To justify our proposal, we conduct extensive experiments on four real-world social networks. Compared to the state-of-the-art network embedding approaches, SNE can learn more informative representations, achieving substantial gains on the tasks of link prediction and node classification. Specifically, SNE significantly outperforms node2vec with an 8.2% relative improvement on the link prediction task, and a 12.7% gain on the node classification task.
cs.SI
cs
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 1 Attributed Social Network Embedding Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua Abstract-Embedding network data into a low-dimensional vector space has shown promising performance for many real-world applications, such as node classification and entity retrieval. However, most existing methods focused only on leveraging network structure. For social networks, besides the network structure, there also exists rich information about social actors, such as user profiles of friendship networks and textual content of citation networks. These rich attribute information of social actors reveal the homophily effect, exerting huge impacts on the formation of social networks. In this paper, we explore the rich evidence source of attributes in social networks to improve network embedding. We propose a generic Social Network Embedding framework (SNE), which learns representations for social actors (i.e., nodes) by preserving both the structural proximity and attribute proximity. While the structural proximity captures the global network structure, the attribute proximity accounts for the homophily effect. To justify our proposal, we conduct extensive experiments on four real-world social networks. Compared to the state-of-the-art network embedding approaches, SNE can learn more informative representations, achieving substantial gains on the tasks of link prediction and node classification. Specifically, SNE significantly outperforms node2vec with an 8.2% relative improvement on the link prediction task, and a 12.7% gain on the node classification task. Index Terms-Social Network Representation, Homophily, Deep Learning. ! 1 INTRODUCTION S OCIAL networks are an important class of networks that span a wide variety of media, ranging from social websites such as Facebook and Twitter, citation networks of academic papers, and telephone caller–callee networks - to name a few. Many applications need to mine useful informa- tion from social networks. For instance, content providers need to cluster users into groups for targeted advertising [1], and recommender systems need to estimate the preference of a user on items for personalized recommendation [2]. In order to apply general machine learning techniques on network-structured data, it is essential to learn informative node representations. Recently, research interest in representation learning has spread from natural language to network data [3]. Many network embedding methods have been proposed [3], [4], [5], [6], and show promising performance for various ap- plications. However, existing methods primarily focused on general class of networks and leveraged the structural information only. For social networks, we point out that there almost always exists rich information about social actors in addition to the link structure. For example, users on social websites may have profiles like age, gender and textual comments. We term all such auxiliary information as attributes, which not only refer to user demographics, but also include other information such as the affiliated texts and the possible labels. Attributes essentially exert huge impacts on the orga- nization of social networks. Many studies have justified its importance, ranging from user demographics [7], to • X. He is the corresponding author. E-mail: [email protected] • L. Liao is with the NUS Graduate School for Integrative Sciences and Engineering, National University of Singapore, Singapore, 117456. E-mail: [email protected] • X. He, H. Zhang and TS. Chua are with National University of Singapore. Manuscript received May 12, 2017; revised **** ****. (a) class year (b) major (c) dormitory Fig. 1: Attribute homophily largely impacts social net- work: we group users in each 4018×4018 user matrix based on a specific attribute. Clear blocks around the diagonal show the attribute homophily effect. subjective preference like political orientation and personal interests [8]. To illustrate this point, we plot the user–user friendship matrix of a Facebook dataset from three views1. Each row or column denotes a user, and a colored point indicates that the corresponding users are friends. Each subfigure is a re-ordering of users according to a certain attribute such as "class year', "major" and "dormitory". For example, Figure 1(a) first groups users by the attribute "class year", and then sort these resulting groups in chronological order. As can be seen, there exist clear block structures in each subfigure, where users of a block are more densely connected. Each block actually points to users of the same attribute; for example, the right bottom block of Figure 1(a) corresponds to users who will graduate in the year of 2009. This real-world example lends support to the importance of attribute homophily. By jointly considering the attribute homophily and the network structure, we believe more informative node representations can be learned. Moreover, 1. This is the Chapel Hill data constructed by [9], which we will detail later in Section 5.1.1. (cid:1006)(cid:1004)(cid:1004)(cid:1013)(cid:1006)(cid:1004)(cid:1004)(cid:1012)(cid:1006)(cid:1004)(cid:1004)(cid:1011)(cid:857)(cid:68)(cid:258)(cid:361)(cid:381)(cid:396)(cid:882)(cid:1005)(cid:1004)(cid:1011)(cid:857)(cid:857)(cid:24)(cid:381)(cid:396)(cid:373)(cid:882)(cid:1006)(cid:1005)(cid:1012)(cid:857)(cid:857) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 2 since we utilize the auxiliary attribute information, the link sparsity and cold-start problem [10] can largely be allevi- ated. In this paper, we present a neural framework named SNE for learning node representations from social network data. SNE is a generic machine learner working with real- valued feature vectors, where each feature denotes the ID or an attribute of a node. Through this, we can easily incor- porate any type and number of attributes. Under our SNE framework, each feature is associated with an embedding, and the final embedding for a node is aggregated from its ID embedding (which preserves the structural proximity) and attribute embedding (which preserves the attribute proxim- ity). To capture the complex interactions between features, we adopt a multi-layer neural network to take advantage of strong representation and generalization ability of deep learning. In summary, the contributions of this paper are as fol- lows. • We demonstrate the importance of integrating net- work structure and attributes for learning more in- formative node representations for social networks. • We propose a generic framework SNE to perform so- cial network embedding by preserving the structural proximity and attribute proximity of social networks. • We conduct extensive experiments on four datasets with two tasks of link prediction and node classifica- tion. Empirical results and case studies demonstrate the effectiveness and rationality of SNE. The rest of the paper is organized as follows. We first discuss the related work in Section 2, followed by providing some preliminaries in Section 3. We then present the SNE framework in Section 4. We show experimental results in Section 5, before concluding the whole paper in Section 6. 2 RELATED WORK In this section, we briefly summarize studies about attribute homophily. We then discuss network embedding methods that are closely related to our work. 2.1 Attribute homophily in Social Networks Social networks belong to a special class of networks, in which the formation of social ties involves not only the self-organizing network process, but also the attribute-based process [11]. The motivation for considering attribute prox- imity in the embedding procedure is rooted in the large impact of attribute homophily, which plays an important role in attribute-based process. Therefore, we provide a brief summarization of homophily studies here as a background. Generally speaking, the "homophily principle"-birds of a feather flock together-is one of the most striking and robust empirical regularities of social life [12], [13], [14]. The hypothesis that people similar to each other tend to become friends dates back to at least the 70s in the last century. In social science, there is a general expectation that individuals develop friendships with others of approximately the same age [15]. In [16] the authors studied the inter-connectedness between homogeneous composition of groups and the emer- gence of homophily. In [17] the authors tried to find the role of homophily in online dating choices made by users. They found that online users of the online dating system seek people like them much more often than chance would predict, just as in the offline world. In more recent years, [18] investigated the origins of homophily in a large univer- sity community, using network data in which interactions, attributes and affiliations were all recorded over time. Not surprisingly, it has been concluded that besides structural proximity, preferences for attribute similarity also provides an important factor for the social network formation pro- cedure. Thus, to get more informative representations for social networks, we should take attributes information into consideration. 2.2 Network Embedding Some earlier works such as Local Linear Embedding (LLE) [19], IsoMAP [20] and Laplacian Eigenmap [21] first transform data into an affinity graph based on the feature vectors of nodes ( e.g., k-nearest neighbors of nodes) and then embed the graph by solving the leading eigenvectors of the affinity matrix. Recent works focus more on embedding an existing network into a low-dimensional vector space to facilitate further analysis and achieve better performance than those earlier works. In [3] the authors deployed truncated ran- dom walks on networks to generate node sequences. The generated node sequences are treated as sentences in lan- guage models and fed to the Skip-gram model to learn the embeddings. In [5] the authors modified the way of generating node sequences by balancing breadth-first sam- pling and depth-first sampling, and achieved performance improvements. Instead of performing simulated "walks" on the networks, [6] proposed clear objective functions to preserve the first-order proximity and second-order proximity of nodes while [10] introduced deep models with multiple layers of non-linear functions to capture the highly non- linear network structure. However, all these methods only leverage network structure. In social networks, there exists large amount of attribute information. Purely structure- based methods fail to capture such valuable information, thus may result in less informative embeddings. In addition, these methods get affected easily when the link sparsity problem occurs. Some recent efforts have explored the possibility of in- tegrating contents to learn better representations [22]. For example, TADW [23] proposed text-associated DeepWalk [3] to incorporate text features into the matrix factorization framework. However, only text attributes can be handled. Being with the same problem, TriDNR [24] proposed to separately learn embeddings from the structure-based Deep- Walk [3] and label-fused Doc2Vec model [25], the embed- dings learned were linearly combined together in an itera- tive way. Under such a scheme, the knowledge interaction between the two separate models only goes through a series of weighted sum operations and lacks further convergence constrains. On the contrary, our method models the struc- ture proximity and attribute proximity in an end-to-end neural network that does not have such limitations. Also, by incorporating structure and attribute modeling by an early fusion, the two parts only need to complement each other, resulting in sufficient knowledge interactions [26]. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 3 In this work, we strive to develop embedding meth- ods that preserve both the structural proximity and attribute proximity of social network. In what follows, we give the definition of the two notions. Definition 1. (Structural Proximity) denotes the proximity of social actors that is evidenced by links. For ui and uj, if there exists a link eij between them, it indicates the direct proximity; on the other hand, if uj is within the context of ui, it indicates the indirect proximity. Intuitively, the direct proximity corresponds to the first- order proximity, while the indirect proximity accounts for higher-order proximities [6]. A popular way to generate contexts is by performing random walks in the network [3], i.e., if two nodes appear in a walking sequence, they are treated as in the same context. In our method, we apply the walking procedure proposed by node2vec [5], which controls the random walk by balancing the breadth-first sampling (BFS) and depth-first sampling (DFS). In the remaining of the paper, we use the term "neighbors" to denote both the first-order neighbors and the nodes in the same context for simplicity. Definition 2. (Attribute Proximity) denotes the proximity of social actors that is evidenced by attributes. The attribute inter- section of Ai and Aj indicates the attribute proximity of ui and uj. By enforcing the constraint of attribute proximity, we can model the attribute homophily effect, as social actors with similar attributes will be placed close to each other in the embedding space. 4 PROPOSED METHOD We first describe how we model the structural proximity with a deep neural network architecture. We then elaborate how to model the attribute proximity with a similar architecture by casting attributes to a generic feature representation. Our final SNE model integrates the models of structures and attributes by an early fusion on the input layer. Lastly, we discuss the relationships of our SNE model to other relevant models. Some of the terms and notations are summarized in Table 1. 4.1 Structure Modeling Since the focus of this subsection is on the modeling of network structure, we use only the identity (ID) to represent a node in the one-hot representation, in which a node ui is represented as an M-dimensional sparse vector where only the i-th element of the vector is 1. Based on our definition of structural proximity, the key to structure modeling is in the estimation of pairwise proximity of nodes. Let f be the function that maps two nodes ui, uj to their estimated proximity score. We define the conditional probability of node uj on ui using the softmax function as: (cid:80)M p(ujui) = exp(f (ui, uj)) j(cid:48)=1 exp(f (ui, uj(cid:48))) , (1) which measures the likelihood that node uj is connected with ui. To account for a node's structural proximity w.r.t. all Fig. 2: An illustration of social network embedding. The numbered nodes denote users, and users of the same color share the referred attribute. [27] There have also been efforts explored semi-supervised learning for network embedding. combined an embedding-based regularizer with a supervised learner to incorporate label information. Instead of imposing regu- larization, [28] used embeddings to predict the context in graph and leveraged label information to build both transductive and inductive formulations. In our framework, label information can also be incorporated in the same way similar to [28] when available. We leave this extension as future work, as this work focuses on the modeling of attributes for network embedding. 3 DEFINITIONS Social networks are more than links; in most cases, social actors are associated with rich attributes. We denote a social network as G = (U,E,A), where U = {u1, ..., uM} denotes the social actors, E = {eij} denotes the links between social actors, and A = {Ai} denotes the attributes of social actors. Each edge eij can be associated with a weight sij denoting the strength of connection between ui and uj. Generally, our analysis can apply to any (un)directed, (un)weighted network. While in this paper, we focus on unweighted network, i.e., sij is 1 for all edges, our method can be easily applied to weighted network through the neighborhood sampling strategy [5]. The aim of social network embedding is to project the social actors into a low-dimensional vector space (a.k.a. em- bedding space). Since the network structure and attributes offer different sources of information, it is crucial to capture both of them to learn a comprehensive representation of social actors. To illustrate this point, we show an example in Figure 2. Based on the link structure, a common assumption of network embedding methods [3], [5], [6] is that closely connected users should be close to each other in the embed- ding space. For example, (u1, u2, u3, u4, u5) should be close to each other, and similarly for (u8, u9, u11, u12). However, we argue that purely capturing structural information is far from enough. Taking the attribute homophily effect into consideration, (u2, u9, u11, u12) should also be close to each other. This is because they all major in computer science; although u2 is not directly linked to u9, u11 or u12, we could expect that some computer science articles popular among (u9, u11, u12) might also be of interest to u2. To learn more informative representations for social actors, it is essential to capture the attribute information. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 (cid:89) its neighbors, we further define the conditional probability of a node set by assuming conditional independence: p(Niui) = p(ujui), j∈Ni (2) where Ni denotes the neighbor nodes of ui. By maxi- mizing this conditional probability over all nodes, we can achieve the goal of preserving the global structural proximity. Specifically, we define the likelihood function for the global structure modeling as: M(cid:89) i=1 M(cid:89) (cid:89) i=1 j∈Ni l = p(Niui) = p(ujui). (3) W(k), b(k) Wid, Watt Symbol M Ni n U h(n) i ui ui u(cid:48) i 4 TABLE 1: Terms and Notations Definition total number of social actors in the social network neighbor nodes of social actor ui number of hidden layers the weight matrix connecting to the output layer embedding of ui with both structure and attributes the row in U refers to ui's embedding as a neighbor pure structure representation of ui pure attribute representation of ui the k-th hidden layer weight matrix and biases the weight matrix for id and attributes input Having established the target of learning from network data, we now design an embedding model to estimate the pairwise proximity f (ui, uj). Most previous efforts have used shallow models for relational modeling, such as matrix factorization [29], [30] and neural networks with one hidden layer [3], [5], [31]. In these formulations, the proximity of two nodes is usually modeled as the inner product of their embedding vectors. However, It is known that simply the inner product of embedding vectors can limit the model's representation ability and incur large ranking loss [32]. To capture the complex non-linearities of real-world networks [10], [33], we propose to adopt a deep architecture to model the pairwise proximity of nodes: fid(ui, uj) = uj · δn(W(n)(··· δ1(W(1)ui + b(1))··· ) + b(n)), (4) where ui denotes the embedding vector of node ui, and n denotes the number of hidden layers to transform an embedding vector to its final representation; W(n), b(n) and δn denote the weight matrix, bias vector and activation function of the n-th hidden layer, respectively. It is worth noting that in our model design, each node has two latent vector representations, u that encodes a node to its embedding and u that embeds the node as a neighbor. To comprehensively represent a node for downstream appli- cations, practitioners can add/concatenate the two vectors which has empirically shown to have better performance in distributed word representations [34], [35]. 4.2 Encoding Attributes Many real-world social networks contain rich attribute in- formation, which can be heterogeneous and highly diverse. To avoid manual efforts that design specific model com- ponents for specific attributes, we convert all attributes to a generic feature vector representation (see Figure 3 as an example) to facilitate designing a general method for learning from attributes. Regardless of semantics, we can categorize attributes into two types: • Discrete attributes. A prevalent example is categor- ical variables, such as user demographics like gen- der and country. We convert a categorical attribute to a set of binary features via one-hot encoding. For example, the gender attribute has two values {male, f emale}, so we can express a female user as the vector v = {0, 1} where the second binary feature of value 1 denotes "female". • Continuous attributes. Continuous attributes natu- rally exist on social networks, e.g., raw features of images and audios. Or they can be artificially gener- ated from transformation of categorical variables. For example, in document modeling, after obtaining bag- of-words representation of a document, it is common to transform it to real-valued vector via TF-IDF to reduce noises. Another example is the historical fea- tures, such as users' purchases on items and check- ins on locations, which are always normalized to real-valued vector to reduce the impact of variable length [36]. Fig. 3: A simple example to show the two kinds of social network attributes information. Suppose there are K feature entries in the attribute feature vector v as shown in Figure 3, for each feature entry, we associate it with an low-dimensional embedding vector ek which corresponds to the k-th column of the weight matrix Watt as shown in Figure 4. We then aggregate the attribute representation vector u(cid:48) for each input social actor by u(cid:48) =(cid:80)K k=1 vkek. Similar to structure modeling, we aim to model the attribute proximity by adopting a deep model to approximate the complex interactions between attributes and introduce non-linearity, which can be fulfilled by Equation 4 while substituting ui with u(cid:48) i. 4.3 The SNE Model To combine the strength of both structure and attribute modeling, an intuitive way is to concatenate the learned embeddings from each part by late fusion as adopted by [6]. However, the main drawback of late fusion is that individual models are trained separately without knowing each other and results are simply combined after training. On the contrary, early fusion allows optimizing all parame- ters simultaneously. As a result, the attribute modeling can complement the learning of structure modeling, allowing 010.8…0.10.20.10.0…0.10.0…0.4FMl1…lLw1w2w3wW…t1tT…GenderLocationText.contentTransformed JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 5 (cid:20) u (cid:21) teh two parts closely interact with each other. Essentially, the strategy of early fusion is more preferable in recent developments of end-to-end deep learning methods, such as Deep crossing [37] and Neural Factorization Machines [38]. Therefore, we propose a generic social network embedding framework (SNE) as shown in Figure 4, which integrates the structure and attribute modeling parts by an early fusion on the input layer. In what follows, we elaborate the design of SNE layer by layer. Embedding Layer. The embedding layer consists of two fully connected components. One component projects the one-hot user ID vector to a dense vector u which captures structure information. The other component encodes the generic feature vector and generates a compact vector u(cid:48) which aggregates attributes information. Hidden Layers. Above the embedding layer, u and u(cid:48) are fed into a multi-layer perceptron. The hidden repre- sentations for each layer are denoted as h(0), h(1),··· , h(n), which are defined as follows: , λu(cid:48) h(0) = h(k) = δk(W(k)h(k−1) + b(k)), k = 1, 2,··· , n, (5) i where λ ∈ R adjusts the importance of attributes, δk de- notes the activation function, n is the number of hidden layers. From the last hidden layer, we obtain an abstractive representation h(n) of the input social actor ui. Stacking multiple non-linear layers has been shown to help learning better representations of data [39]. Regarding the architecture design, a common strategy is to use a tower structure, where each successive layer has a smaller number of neurons. The premise is that by using a small number of hidden units for higher layers, they can learn more abstractive features of data [39]. Therefore, as depicted in Figure 4, we implement the hidden layers component following the tower structure with halved layer size for each successive higher layer. Such a design has also been shown to be effective by recent work on recommendation task [32]. Moreover, u and u(cid:48) are concatenated with weight adjustments λ before fed into the fully connected layers, which can help to learn high-order interactions between also has been shown to help learning higher-order interactions between u and u(cid:48) [32], [37]. Output Layer. At last, the output vector of the last hidden layer h(n) is transformed into a probability vector o, which contains the predictive link probability of ui to all the nodes in U: i o = [p(u1ui), p(u2ui),··· , p(uMui)]. (6) Denoting the abstractive representation of a neighbor uj as uj which corresponds to a row in the weight matrix U between the last hidden layer and the output layer, the proximity score between ui and uj can be defined as below: f (ui, uj) = uj · h(n) i , (7) which can be fed into Equation 1 for further obtaining the predictive link probability p(ujui) in vector o: p(ujui) = (cid:80)M exp(uj · h(n) j(cid:48)=1 exp(u(cid:48) i j · h(n) i ) , ) (8) Fig. 4: Social network embedding (SNE) framework. where all the parameters Θ = {Θh, Wid, Watt, U} and Θh denotes the weight matrices and biases in the hidden layers component. 4.3.1 Optimization To estimate the model parameters of the whole SNE frame- work, we need to specify an objective function to optimize. As detailed in Equation 3, we aim to maximize the condi- tional link probability over all nodes. In this way, the whole SNE framework is jointly trained to maximize the likelihood with respect to all the parameters Θ, i=1 M(cid:89) (cid:88) (cid:88) (cid:89) p(ujui) (cid:88) (cid:88) uj∈Ni ui∈M j∈Ni ui∈M uj∈Ni Θ(cid:63) = arg max Θ = arg max Θ = arg max Θ log p(ujui) (cid:80) exp(uj · h(n) j(cid:48)∈M exp(uj(cid:48) · h(n) log ) i i (9) . (10) ) Maximizing the softmax scheme in Equation 10 actually has two effects: to enhance the similarity between any ui and these u ∈ Ni as well as to weaken that between any ui and these u (cid:54)∈ Ni. However, this causes two major problems. The first one lies in the fact that if two social actors are not linked together, it does not necessarily mean they are dissimilar. For example, many users in social websites are not linked, not because they are dissimilar. Most of the times, it is simply because they never had the chance to know each other. Thus forcing dissimilarity between ui and all the other actors not inside Ni will be inappropriate. The second problem arises from the calculation of the nor- malization constant in Equation 10. In order to calculate a single probability, we need to go through all the actors in the whole network, which is computationally inefficient. In order to avoid these problems, we apply negative sampling procedure [31], [40] where only a very small subset of users are sampled from the whole social network. The main idea is to do approximation in the gradient calculation procedure. When we consider the gradient of the log-probability in Equation 9, the gradient is actually composed of a positive and a negative part as follows, ∇ log p(ujui) = ∇ f (ui, uj) − (cid:88) p(uj(cid:48)ui)∇ f (ui, uj(cid:48)), j(cid:48)∈M i JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 where f (ui, uj) = uj · h(n) as defined in Equation 7. Note that given the actor ui, the negative part of the gradient is in essence the expected gradient of ∇f (ui, uj(cid:48)), denoting as E[∇f (ui, uj(cid:48))]. The key idea for sampling a subset of social actors is to approximate this expectation, resulting in much lower computational complexity as well as avoiding too strong constraint on those not linked actors. To optimize the aforementioned framework, we ap- ply the Adaptive Moment Estimation (Adam) [41], which adapts the learning rate for each parameter by performing smaller updates for the frequent parameters and larger updates for the infrequent parameters. The Adam method combines the advantages of two popular optimization meth- ods: the ability of AdaGrad [42] to deal with sparse gra- dients, and the ability of RMSProp [43] to deal with non- stationary objectives. To address internal covariate shift [44] which slows down the training by requiring careful settings of learning rate and parameter initialization, we adopt batch normalization [44] in our multi-layer SNE framework. In the embedding layer and each hidden layer, we also add dropout component to alleviate overfitting. After proper optimization, we obtain abstractive representation h(n) and u for each social actor, similar to [34], [35], we use h(n) + u as the final representation for each social actor, which returns us better performance results. 4.4 Connections to Other Models In this subsection, we discuss the connection of the pro- posed SNE framework to other related models. We show that SNE subsumes the state-of-the-art network embedding method node2vec [5] and the linear latent factor model SVD++ [45]. Specially, the two models can be seen as a special case of shallow SNE. To facilitate further discussion, we first give the prediction model of the one-hidden-layer SNE as: (cid:21) (cid:20) ui λu(cid:48) i 6 where pu (qi) denotes the embedding vector for user u (item i); Ru denotes the set of rated items for u, and yk denotes another embedding vector for item k for modeling the item– item similarity. By treating the item as a "neighbor" of the user for estimating the proximity, we reformulate the model using the symbols of our SNE: fSV D++(ui, uj) = uj · (ui + u(cid:48) i) , i denotes the sum of item embedding vectors of Ru, where u(cid:48) which corresponds to the aggregated attribute representa- tion of ui in SNE. To see how SNE subsumes the model, we first set δ1 to an identity function, λ to 1.0, and b(1) to a zero vector, reducing Equation 11 to: f (ui, uj) = uj · W(1) (cid:21) (cid:20)ui u(cid:48) i . By further setting W(1) to a concatenation of two identity matrices (i.e. W(1) = [I, I]), we can recover the SVD++ model: f (ui, uj) = uj · (ui + u(cid:48) i) . Through the connection between SNE and a family of shal- low models, we can see the rationality behind our design of SNE. Particularly, SNE deepens the shallow models so as to capture the underlying interactions between the net- work structure and attributes. When modeling real-world data that may have complex and non-linear inherent struc- ture [10], [33], our SNE is more expressive and can better fit on the real-world data. 5 EXPERIMENTS In this section, we conduct experiments on four publicly accessible social network datasets to answer the following research questions. Can SNE learn better node representations as compared to state-of-the-art network embed- ding methods? RQ2 What are the key reasons that lead to better RQ3 representations learned by SNE? Are deeper layers of hidden units helpful for learning better social network embeddings? In what follows, we first describe the experimental settings. We then answer the above three research questions one by one. 5.1 Experimental Setup 5.1.1 Datasets We conduct the experiments on four public datasets, which are representative of two types of social networks - social friendship networks and academic citation networks [46]. The statistics of the four datasets are summarized in Table 2. FRIENDSHIP Networks. We use two Facebook net- works constructed by [9], which contain students from two American universities: University of Oklahoma (OK- LAHOMA) and University of North Carolina at Chapel Hill (UNC), respectively. Besides user ID, there are seven anonymized attributes: status, gender, major, second major, f (ui, uj) = uj · δ1(W(1) + b(1)). (11) RQ1 4.4.1 SNE vs. node2vec The node2vec applies a shallow neural network model to learning node embeddings. Under the context of SNE, the essence of node2vec can be seen as estimating the proximity of two nodes as: fnode2vec(ui, uj) = uj · ui. By setting λ to 0.0 (i.e., no attribute modeling), δ1 to an identity function (i.e., no nonlinear transformation), W(1) to an identity matrix and b(1) to a zero vector (i.e., no trainable hidden neurons), we can exactly recover the node2vec model from Equation 11. 4.4.2 SNE vs. SVD++ The SVD++ is one of the most effective latent factor models for collaborative filtering [45], originally proposed to model the ratings of users to items. Given a user u and an item i, the prediction model of SVD++ is defined as: fSV D++(u, i) = qi · pu + (cid:88) k∈Ru  , yk JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 dorm/house, high school, class year. Note that not all stu- dents have the seven attributes available. For example, for the UNC dataset, only 4, 018 of the 18, 163 users contain all attributes (as plotted in Figure 1). CITATION Networks. For citation networks, we use the DBLP and CITESEER2 data used in [24]. Each node denotes a paper. The attributes are the title contents for each paper after removing stop words and the stemming process. The DBLP dataset consists of bibliography data in computer science from [47]3. A list of conferences from four research areas are selected. The CITESEER dataset consists of scientific publications from ten distinct research areas. These research areas are treated as class labels in the node classification task. Dataset TABLE 2: Statistics of the datasets #(E) 892,528 766,800 52,890 77,218 #(U) 17,425 18,163 60,744 29,751 UNC [9] DBLP [24] OKLAHOMA [9] CITESEER [24] 5.1.2 Evaluation Protocols We adopt two tasks - link prediction and node classi- fication - which have been widely used in literature to evaluate network embeddings [3], [5]. While the link pre- diction task assesses the ability of node representations in reconstructing network structure [10], node classification evaluates whether the representations contain sufficient in- formation trainable for downstream applications. Link prediction. We follow the widely adopted way in [5], [10]: we randomly hold out 10% links as the test set, 10% as the validation set for tuning hyper-parameters, and train SNE on the remaining 80% links. Since the test/validation set contains only positive instances, we ran- domly sample the same number of non-existing links as negative instances [5], and rank both positive and negative instances according to the prediction function. To judge the ranking quality, we employ the area under the ROC curve (AUROC) [48], which is widely used in IR community to evaluate a ranking list. It is a summary measure that essentially averages accuracy across the spectrum of test values. A higher value indicates a better performance, and an ideal model that ranks all positive instances higher than negative instances has an AUROC value of 1. Node classification. We first train models on the training sets (with links and all attributes but no class labels) to obtain node representations; the hyper-parameters for each model are chosen based on the performance of link predic- tion. We then feed node representations into the LIBLINEAR package [49], which is widely adopted in [3], [10], to train a classifier. To evaluate the classifier, we randomly sample a portion of labeled nodes (ρ ∈ {10%, 30%, 50%}) as training, using the remaining labeled nodes as test. We repeat this process 10 times, and report the mean of the Macro-F1 and Micro-F1 scores. Note that since only the DBLP and 7 TABLE 3: The optimal hyper-parameter settings. OKLAHOMA SNE node2vec LINE TriDNR bs lr λ p q S tw 128 0.0001 0.8 2.0 0.25 100 0.6 UNC 256 0.0001 0.8 2.0 1.0 100 0.6 DBLP 128 0.001 1.0 1.0 0.25 10 0.8 CITESEER 64 0.001 1.0 2.0 0.125 10 0.8 CITESEER datasets contain class labels for nodes, the node classification task is performed on the two datasets only. 5.1.3 Comparison Methods We compare SNE with several state-of-the-art network embedding methods. - node2vec [5]: It applies the Skip-Gram model [31] on the node sequences generated by biased random walk. There are two key hyper-parameters p and q that control the random walk, which we tuned them the same way as the original paper. Note that when p and q are set to 1, node2vec degrades to DeepWalk [3]. - LINE [6]: It learns two embedding vectors for each node by preserving the first-order and second-order proxim- ity of the network, respectively. Then the embedding vectors are concatenated as the final representation for a node. We followed the hyper-parameter settings of [6] and the number of training samples S (millions) is adapted to our data size. - TriDNR [24]: It learns node representations by cou- pling multiple neural network models to jointly exploit the network structure, node–content correlation, and label– content correspondence. This is a state-of-the-art network embedding method that also uses attribute information. We searched the text weight (tw) hyper-parameter among [0.0, 0.2, ..., 1.0]. For all baselines, we used the implementation released by the original authors. Note that although node2vec and LINE are state-of-the-art methods for embedding networks, they are designed to use only the structure information. For a fair comparison with SNE that additionally exploits attributes, we further extend them to include attributes by concatenating the learned node representation with the attribute feature vector. We dub the variants node2vec+ and LINE+. Moreover, we are aware of a recent network em- bedding work [22] also considering attribute information. However, due to the unavailability of their codes, we do not further compare with it. 5.1.4 Parameter Settings Our implementation of SNE is based on TensorFlow4, which will be made available upon acceptance. Regarding the choice of activation function of hidden layers, we have tried rectified linear unit (ReLU), soft sign (softsign) and hyperbolic tangent function (tanh), finding softsign leads to the best performance in general. As such, we use soft- sign for all experiments. We randomly initialize model 2. http://citeseerx.ist.psu.edu/ 3. http://arnetminer.org/citation (V4 version is used) 4. https://www.tensorflow.org/ JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 8 (a) OKLAHOMA (b) UNC (c) DBLP (d) CITESEER Fig. 5: Performance of link prediction on social networks w.r.t. different network sparsity (RQ1). parameters with a Gaussian distribution (with a mean of 0.0 and standard deviation of 0.01), optimizing the model with mini-batch Adam [41]. We test the batch size (bs) of [8, 16, 32, 64, 128, 256] and the learning rate (lr) of [0.1, 0.01, 0.001, 0.0001]. The search space of the concatena- tion hyper-parameter λ is the same as tw of TriDNR, where a value of λ = 0.0 degrades to a model that considers only the structure (c.f., Section 4.1). The concatenation parameter λ is searched in same space as tw. More detailed impact of λ is studied in Section 5.2.3. The embedding dimension d is set to 128 for all methods in line with node2vec and LINE. The hyper-parameter p and q for controlling the walking procedure are set to be the same with that of node2vec. Without special mention, we use two hidden layers, i.e., n = 2. Table 3 summarizes the optimal hyper-parameters of each method tuned on validation sets. 5.2 Quantitative Analysis (RQ1) 5.2.1 Link Prediction Figure 5 shows the AUROC scores of SNE and baseline methods on the four datasets. To explore the robustness of embedding methods w.r.t. the network sparsity, we vary the ratio of training links and investigate the performance change. The key observations are as follows: 1) Our proposed SNE achieves the best performance among all methods. Notably, compared to the pure structure-based methods node2vec and LINE, our SNE per- forms significantly better with only half links. This demon- strates the usefulness of attributes in predicting missing links, as well as the rationality of SNE in leveraging at- tributes for learning better node representation. Moreover, we observe more dramatic performance drop of node2vec and LINE on DBLP and CITESEER, as compared to that of OKLAHOMA and UNC. The reason is that the DBLP and CITESEER datasets contain less link information (as shown in Table 2); as such, the link sparsity problem becomes more severe when the ratio of training links decreases. On the contrary, our SNE exhibits more stability when we use fewer links for training, which is credible to its effective modeling of attributes. 2) Focusing on methods that account for attributes, we find how to incorporate attributes plays a pivotal role for the performance. First, node2vec+ (LINE+) slightly improves over node2vec (LINE), which reflects the value of attributes. Nevertheless, the rather modest improvements indicate that simply concatenating attributes with the embedding vector is insufficient to fully leverage the rich signal in attributes. This reveals the necessity of designing a more principled approach to incorporate attributes into the network em- bedding process. Second, we can see that SNE consistently outperforms TriDNR - the most competitive baseline that also incorporates attributes into the network embedding process. Although TriDNR is a joint model, it separately trains the structured-based DeepWalk and attributed-fused Doc2Vec during the optimization process, which can be sub-optimal to leverage attributes. In contrast, our SNE seamlessly incorporates attributes by an early fusion on the input layer, which allows the following hidden layers to capture complex structure–attribute interactions and learn more informative node representations. 3). Comparing the two structure-based methods, we observe that node2vec generally outperforms LINE across all the four datasets. This result is in consistent with Grover and Leskovec [5]'s finding. One plausible reason for node2vec's superior performance might be that by performing ran- dom walks on the social network, higher-order proxim- ity information can be captured. In contrast, LINE only models the first- and second-order proximities, which fails in capturing sufficient information for link prediction. To justify this, we have further explored an additional baseline that directly utilizes the second-order proximity by ranking nodes according to their common neighbors. As expected, the performance is weak for all datasets (lower than the bottom line of each subfigure), which again demonstrates the need for learning higher-order proximities via network embedding. Since our SNE shares the same walking proce- dure as node2vec, it is also capable of learning from higher- order proximities, which are further complemented by the attribute information. 5.2.2 Node Classification Table 4 shows the macro-F1 and micro-F1 scores obtained by each method on the classification task. Upon getting the node representations, we train the LIBLINEAR classifier with different ratios of labeled data (ρ ∈ {10%, 30%, 50%}). Ratio of links for trainning0.40.50.60.70.8AUROC value0.880.890.90.910.920.930.940.950.960.970.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.880.890.90.910.920.930.940.950.960.970.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.780.80.820.840.860.880.90.920.940.960.98node2vecLINETriDNRnode2vec+attrLINE+attrSNERatio of links for trainning0.40.50.60.70.8AUROC value0.70.720.740.760.780.80.820.840.860.880.9node2vecLINETriDNRnode2vec+attrLINE+attrSNE JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 The performance trends are generally consistent with that of the link prediction task. First and foremost, SNE achieves the best performance among all the methods for all settings, and the one-sample paired t-test verifies that all improvements are statistically significant for p < 0.05. The performance of SNE is fol- lowed by that of TriDNR, and then followed by that of the attribute-based methods node2vec+ and LINE+; node2vec and LINE which use only the network structure perform the worst. This further justifies the usefulness of attributes on social networks, and such that properly modeling them can lead to better representation learning and benefit down- stream applications. Among the four attribute-based meth- ods, SNE and TriDNR demonstrate superior performance over node2vec+ and LINE+, which points to the positive effects of incorporating attributes into the network embed- ding process. It is worth pointing out that the ground-truth labels of the node classification task are not involved in the network embedding process. Despite this, SNE can learn effective representations that support the task well. This is attributed to SNE's modeling of network structure and attributes in a sound way, which leads to comprehensive and informative representations for nodes. 5.2.3 Impact of λ We further explore the impact of λ which adjusts the im- portance of attributes. Both the link prediction task and the node classification task are evaluated under the same evaluation protocols as Section 5.1.2. For a clear comparison, we plot the results in Figure 6. The link prediction results are reported under training on 80% of links. The node classification results are obtained from training on 50% of labeled nodes. Due to the fact that λ actually can be set to any real number under our learning framework, we first broadly explore the impact of λ on the range [0, 0.01, 0.1, 1, 10, 100]. Setting λ to 0 returns the pure structure modeling, while setting it to a large number approximates the pure attribute modeling. We found that good results are generally obtained within [0, 1] across datasets. When λ becomes relatively large and the attribte part overweights the structure part, the performance even becomes worse than pure structure modeling. Therefore, we focus our exploration on the range [0, 1] at an interval of 0.2. Generally, attributes play an important role in SNE as evidenced by the improving performance when λ increases. We observe similar trends for both the link prediction and node classification tasks across datasets. If we ignore the attribute information by setting λ = 0.0, SNE degrades to pure structure modeling as detailed in subsection 4.1. Its corresponding performance is the worst for both tasks, as compared to the attributes included counterparts. Moreover, the performance improvements on DBLP and CITESEER are relatively larger. Specifically, we observe a dramatic im- provement of performance on CITESEER when λ increases from 0.0 to 0.2. As there is less link information in these two datasets as shown in Table 2, the performance improvement indicates that attributes help to alleviate the link sparsity problem. 9 (a) Link prediction (b) Node classification Fig. 6: Performance results with different λ (RQ1). In addition, we observe that the pure structure model (λ = 0.0) outperforms node2vec if we further compare the results with Figure 5 for link prediction and Table 4 for node classification. Since the same p, q setting as node2vec are leveraged, we attribute the performance improvements to the non-linearity introduced by the hidden layers. 5.3 Qualitative Analysis (RQ2) To understand why SNE can achieve better results than the other methods, we carry out a case study on the DBLP dataset in this subsection. Given the node representations learned by each method, we retrieve the three most similar papers w.r.t. a given query paper. Specifically, we measure the similarity using the cosine distance. For a fair compari- son with the structure-based methods, the query paper we choose is a well-cited paper of KDD 2006 named "Group formation in large social networks: membership, growth, and evolution". According to Google Scholar by 15/1/2017, its citation number reaches 1510. Based on the content of this query paper, we expect that relevant results should be about the structure evolution of groups or communities in social networks. The top results retrieved by different methods are shown in Table 5. 60.00.20.40.60.81.0AUROC value0.80.820.840.860.880.90.920.940.960.98OKLAHOMAUNCDBLPCITESEER 10 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 TABLE 4: Averaged Macro-F1, Micro-F1 scores for node classification task. (cid:63) denotes the statistical significance for p < 0.05. (RQ1) Dataset Method r c a m LINE o 10% 0.548 30% 0.580 50% 0.619 o 10% 0.573 30% 0.614 50% 0.661 r c i m CITESEER node2vec 0.606 0.625 0.667 0.623 0.653 0.695 LINE+ 0.597 0.631 0.670 0.607 0.667 0.691 node2vec+ 0.613 0.630 0.682 0.628 0.695 0.717 TriDNR 0.618 0.692 0.736 0.644 0.714 0.756 SNE 0.653(cid:63) 0.715(cid:63) 0.752(cid:63) 0.675(cid:63) 0.732(cid:63) 0.767(cid:63) LINE 0.565 0.586 0.628 0.587 0.632 0.678 node2vec 0.617 0.632 0.677 0.647 0.665 0.733 LINE+ 0.619 0.636 0.692 0.661 0.678 0.732 DBLP node2vec+ 0.631 0.642 0.695 0.686 0.749 0.753 TriDNR 0.665 0.702 0.715 0.750 0.778 0.785 SNE 0.699(cid:63) 0.725(cid:63) 0.761(cid:63) 0.763(cid:63) 0.786(cid:63) 0.804(cid:63) TABLE 5: Top three results returned by each method (RQ2) Query: Group formation in large social networks: membership, growth, and evolution5 SNE 1. Structure and evolution of online social networks 2. Discovering temporal communities from social network documents 3. Dynamic social network analysis using latent space models TriDNR 1. Influence and correlation in social networks 2. A framework for analysis of dynamic social networks 3. A framework for community identification in dynamic social networks node2vec 1. Latent Dirichlet Allocation 2. Maximizing the spread of influence through a social network 3. Mining the network value of customers LINE 1. Graphs over time: densification laws, shrinking diameters and possible explanations 2. Maximizing the spread of influence through a social network 3. Relational learning via latent social dimensions First of all, we see that SNE returns rather relevant re- sults: all the three papers are about dynamic social network analysis and community structures. For example, the first one considers the evolution of structures such as communi- ties in large online social networks. The second result can be viewed as a follow-up work of the query, focusing on discovering temporal communities. While for TriDNR, the top result aims to measure social influence between linked individuals but community structures are not of concern. Regarding methods that only leverage structure infor- mation, the results returned by node2vec are less similar to the query paper. It seems that node2vec tends to find less related but highly cited papers. According to Google Scholar by 15/1/2017, the citation numbers for the first, second and third results are 16908, 4099 and 1815, respectively. This is because the random walk procedure can be easily biased towards the popular nodes that have more links. While SNE also relies on the walking sequences, it can correct such bias to a certain extent by leveraging attributes. Similarly, LINE also retrieves less relevant papers. Al- though the first and second results are related to dynamic social network analysis, all the three results are not con- TABLE 6: Performance of link prediction and node classi- fication on DBLP w.r.t. different number of hidden layers (RQ3) Hidden layers No Hidden Layers 128Softsign 256Softsign → 128Softsign 512Softsign → 256Softsign → 128Softsign AUROC micro-F1 0.9273 0.9418 0.9546 0.9589 0.791 0.799 0.804 0.802 cerned with group or community. It might due to the limi- tations of only modeling first- and second-order proximities while leaving out the abundant attributes. Based on the above qualitative analysis, we draw the conclusion that using both network structure and attributes benefits the retrieval of similar nodes. Compared to the pure structure-based methods, the top returned results of SNE are more relevant to the query paper. It is worth noting that for this qualitative study, we have purposefully chosen a popular node to migrate the sparsity issue, which actually favors the structure-based methods; even so, the structure-based methods fail at identifying relevant results. This sheds light on the limitation of solely relying on the network structure for social network embedding, and thus the importance of modeling the rich evidence sources in attributes. 5.4 Experiments with Hidden Layers (RQ3) In this final subsection, we explore the impact of hidden layers on SNE. It is known that increasing the depth of a neural network can increase the generalization ability for some models [32], [39], however, it may also degrade the performance due to optimization difficulties [50]. It is thus curious to see whether using deeper layers can empirically benefit the learning of SNE. Table 6 shows SNE's performance of the link predic- tion and node classification tasks w.r.t. different number of hidden layers on the DBLP dataset. The results on other datasets are generally similar, thus we just showcase one here. As the size of the last hidden layer determines a SNE model's representation ability, we set it to the same number for all models to ensure a fair comparison. Note that for each setting (row), we have re-tuned the hyper-parameters to fully exploit the model's performance. First, we can see the trend that with more hidden lay- ers, the performance is improved. This indicates the pos- JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 itive effect of using a deeper architecture for SNE, which indeed increases its generalization ability and boost its performance. The trade-off, however, is the server CPU time needed for the training procedure. Specifically, on our modest commodity server (Intel Xeon CPU of 2.40GHz), a one-layer SNE takes 25.6 seconds, while a three-layer SNE takes 81.9 seconds for one epoch. We stopped exploring deeper models, as the current SNE uses fully connected layers, which become difficult to optimize and can be eas- ily over-fitting and degrading with more layers [50]. The diminishing improvement of results in Table 6 also implies the potential problem. To address it, modern neural network designs shall be applied, such as the residual units and highway networks [39]. We leave this possibility for future work. It is worth noting that when there is no hidden layer, SNE's performance is rather weak, which is in the same level as TriDNR. With one more layer, the performance is significantly improved. This demonstrates the usefulness of learning structure–attribute interactions in a non-linear way. To justify this, we have further tried to replace the softsign activation function with the identity function, i.e., using a linear function above the concatenation of structure and attribute embedding vectors. However, the performance is much worse than that of using the non-linear softsign function. 6 CONCLUSION To learn informative representations for social network data, it is crucial to account for both network structure and attribute information. To this end, we proposed a generic framework for embedding social networks by capturing both the structural proximity and attribute proximity. We adopted a deep neural network architecture to model the complex interrelations between structural information and attributes. Extensive experiments show that SNE can learn informative representations for social networks and achieve superior performance on the tasks of link prediction and node classification comparing to other representation learn- ing methods. This work has tackled representation learning on social networks by leveraging both structural and attribute infor- mation. While social networks are rich sources of informa- tion containing more than links and textual attributes, we will study the following directions in future. First, we will enhance our SNE framework by fusing data from multiple modalities. It is reported that over 45% tweets contain images in Weibo [51], making it urgent and meaningful to perform network embedding with multi-modal data [52]. Second, we will develop (semi-)supervised variant for SNE, so as to learning task-oriented embeddings to tailor for a specific task. Third, we are interested in exploring how to capture the evolution nature of social networks, such as new users and social relations by using temporal-aware recurrent neural networks. Lastly, we will consider improving the efficiency of SNE by learning to hash techniques [53] to make it suitable for large-scale industrial use. 11 ACKNOWLEDGMENTS This research is supported by the NExT research center, which is supported by the National Research Foundation, Prime Minister's Office, Singapore under its IRC@SG Fund- ing Initiative. We warmly thank all the anonymous review- ers for their time and efforts. REFERENCES [1] X. Wang, L. Nie, X. Song, D. Zhang, and T.-S. Chua, "Unifying virtual and physical worlds: Learning toward local and global consistency," ACM Transactions on Information Systems, vol. 36, no. 1, p. 4, 2017. [2] X. He, M. Gao, M.-Y. Kan, and D. Wang, "Birank: Towards ranking on bipartite graphs," IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 1, pp. 57–71, 2017. [3] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social representations," in SIGKDD, 2014, pp. 701–710. S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang, "Heterogeneous network embedding via deep architec- tures," in SIGKDD, 2015, pp. 119–128. [5] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in SIGKDD, 2016, pp. 855–864. J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large-scale information network embedding," in WWW, 2015, pp. 1067–1077. J. D. Burger, J. Henderson, G. Kim, and G. Zarrella, "Discriminat- ing gender on twitter," in EMNLP, 2011, pp. 1301–1309. [8] M. Pennacchiotti and A.-M. Popescu, "Democrats, republicans and starbucks afficionados: user classification in twitter," in SIGKDD, 2011, pp. 430–438. [9] A. L. Traud, P. J. Mucha, and M. A. Porter, "Social structure of facebook networks," Physica A: Statistical Mechanics and its Applications, pp. 4165–4180, 2012. [10] D. Wang, P. Cui, and W. Zhu, "Structural deep network embed- [4] [6] [7] ding," in SIGKDD, 2016, pp. 1225–1234. [11] G. Robins, "Exponential random graph models for social net- works," Encyclopaedia of Complexity and System Science, Springer, 2011. [12] P. F. Lazarsfeld, R. K. Merton et al., "Friendship as a social process: A substantive and methodological analysis," Freedom and control in modern society, pp. 18–66, 1954. [13] E. O. Laumann, Prestige and association in an urban community: An analysis of an urban stratification system. Bobbs-Merrill Company, 1966. [14] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: Homophily in social networks," Annual review of sociology, pp. 415– 444, 2001. [15] S. B. Kurth, "Friendships and friendly relations," Social relation- ships, pp. 136–170, 1970. [16] J. M. McPherson and L. Smith-Lovin, "Homophily in voluntary organizations: Status distance and the composition of face-to-face groups," American sociological review, pp. 370–379, 1987. [17] A. T. Fiore and J. S. Donath, "Homophily in online dating: when do you like someone like yourself?" in CHI '05, 2005, pp. 1371– 1374. [18] G. Kossinets and D. J. Watts, "Origins of homophily in an evolving social network1," American journal of sociology, pp. 405–450, 2009. [19] S. T. Roweis and L. K. Saul, "Nonlinear dimensionality reduction by locally linear embedding," Science, pp. 2323–2326, 2000. [20] J. B. Tenenbaum, V. De Silva, and J. C. Langford, "A global geometric framework for nonlinear dimensionality reduction," science, pp. 2319–2323, 2000. [21] M. Belkin and P. Niyogi, "Laplacian eigenmaps and spectral techniques for embedding and clustering," in NIPS, 2001, pp. 585– 591. [22] X. Huang, J. Li, and X. Hu, "Label informed attributed network embedding," in WSDM, 2017. [23] C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang, "Network representation learning with rich text information," in IJCAI, 2015, pp. 2111–2117. [24] S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang, "Tri-party deep network representation," in IJCAI, 2016, pp. 1895–1901. [25] Q. V. Le and T. Mikolov, "Distributed representations of sentences and documents," in ICML, 2014, pp. 1188–1196. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, MAY 2017 12 [26] H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H. Arad- hye, G. Anderson, G. Corrado, W. Chai, M. Ispir et al., "Wide & deep learning for recommender systems," in Workshop on DLRS, 2016, pp. 7–10. [27] J. Weston, F. Ratle, H. Mobahi, and R. Collobert, "Deep learning via semi-supervised embedding," in Neural Networks: Tricks of the Trade, 2012, pp. 639–655. [28] Z. Yang, W. Cohen, and R. Salakhudinov, "Revisiting semi- supervised learning with graph embeddings," in ICML, 2016, pp. 40–48. [29] S. Cao, W. Lu, and Q. Xu, "Grarep: Learning graph representations with global structural information," in CIKM, 2015, pp. 891–900. [30] X. He, H. Zhang, M.-Y. Kan, and T.-S. Chua, "Fast matrix factoriza- tion for online recommendation with implicit feedback," in SIGIR, 2016, pp. 549–558. [31] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, "Distributed representations of words and phrases and their com- positionality," in NIPS, 2013, pp. 3111–3119. [32] X. He, L. Liao, H. Zhang, L. Nie, X. Hu, and T. Chua, "Neural collaborative filtering," in WWW, 2017. [33] D. Luo, F. Nie, H. Huang, and C. H. Ding, "Cauchy graph embedding," in ICML, 2011, pp. 553–560. [34] J. Pennington, R. Socher, and C. D. Manning, "Glove: Global vectors for word representation," in EMNLP, 2014, pp. 1532–1543. [35] O. Levy, Y. Goldberg, and I. Dagan, "Improving distributional sim- ilarity with lessons learned from word embeddings," Transactions of the Association for Computational Linguistics, 2015. [36] S. Rendle, "Factorization machines," in ICDM, 2010, pp. 995–1000. [37] Y. Shan, T. R. Hoens, J. Jiao, H. Wang, D. Yu, and J. Mao, "Deep crossing: Web-scale modeling without manually crafted combina- torial features," in SIGKDD, 2016, pp. 255–262. [38] X. He and T.-S. Chua, "Neural factorization machines," in SIGIR, 2017, p. to appear. [47] J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su, "Arnetminer: extraction and mining of academic social networks," in SIGKDD, 2008, pp. 990–998. [48] K. H. Zou, A. J. OMalley, and L. Mauri, "Receiver-operating char- acteristic analysis for evaluating diagnostic tests and predictive models," Circulation, pp. 654–657, 2007. [49] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin, "Liblinear: A library for large linear classification," Journal of machine learning research, pp. 1871–1874, 2008. [50] X. Glorot and Y. Bengio, "Understanding the difficulty of training deep feedforward neural networks," in AISTATS, 2010, pp. 249– 256. [51] T. Chen, X. He, and M.-Y. Kan, "Context-aware image tweet modelling and recommendation," in MM, 2016, pp. 1018–1027. [52] C. Zhang, K. Zhang, Q. Yuan, H. Peng, Y. Zheng, T. Hanratty, S. Wang, and J. Han, "Regions, periods, activities: Uncovering ur- ban dynamics via cross-modal representation learning," in WWW, 2017, pp. 361–370. [53] H. Zhang, F. Shen, W. Liu, X. He, H. Luan, and T.-S. Chua, "Discrete collaborative filtering," in SIGIR, 2016, pp. 325–334. [39] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in CVPR, 2016, pp. 770–778. [40] S. Wang, Y. Wang, J. Tang, K. Shu, S. Ranganath, and H. Liu, "What your images reveal: Exploiting visual contents for point-of-interest recommendation," in WWW, 2017, pp. 391–400. [41] D. Kingma and J. Ba, "Adam: A method for stochastic optimiza- tion," in ICLR, 2015, pp. 1–15. [42] J. Duchi, E. Hazan, and Y. Singer, "Adaptive subgradient methods for online learning and stochastic optimization," Journal of Machine Learning Research, pp. 2121–2159, 2011. [43] T. Tieleman and G. Hinton, "Lecture 6.5-rmsprop, coursera: Neu- ral networks for machine learning," Tech. Rep., 2012. [44] S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep network training by reducing internal covariate shift," in ICML, 2015, pp. 448–456. [45] Y. Koren, "Factorization meets the neighborhood: a multifaceted collaborative filtering model," in SIGKDD, 2008, pp. 426–434. [46] S. Wasserman and K. Faust, Social network analysis: Methods and applications, 1994.
1610.00782
4
1610
2018-01-19T21:55:34
Network Structure Inference, A Survey: Motivations, Methods, and Applications
[ "cs.SI", "cs.AI", "physics.soc-ph" ]
Networks represent relationships between entities in many complex systems, spanning from online social interactions to biological cell development and brain connectivity. In many cases, relationships between entities are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? These are directly observable in the system in question. In most cases, relationship between nodes are not directly observable and must be inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a social bond? Who infected whom in a disease outbreak in a population? Existing approaches for inferring networks from data are found across many application domains and use specialized knowledge to infer and measure the quality of inferred network for a specific task or hypothesis. However, current research lacks a rigorous methodology which employs standard statistical validation on inferred models. In this survey, we examine (1) how network representations are constructed from underlying data, (2) the variety of questions and tasks on these representations over several domains, and (3) validation strategies for measuring the inferred network's capability of answering questions on the system of interest.
cs.SI
cs
Network Structure Inference, A Survey: Motivations, Methods, and Applications IVAN BRUGERE, University of Illinois at Chicago, USA BRIAN GALLAGHER, Lawrence Livermore National Laboratory, USA TANYA Y. BERGER-WOLF, University of Illinois at Chicago, USA Networks represent relationships between entities in many complex systems, spanning from online social interactions to biological cell development and brain connectivity. In many cases, relationships between entities are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? These are directly observable in the system in question. In most cases, relationship between nodes are not directly observable and must be inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a social bond? Who infected whom in a disease outbreak in a population? Existing approaches for inferring networks from data are found across many application domains and use specialized knowledge to infer and measure the quality of inferred network for a specific task or hypothesis. However, current research lacks a rigorous methodology which employs standard statistical validation on inferred models. In this survey, we examine (1) how network representations are constructed from underlying data, (2) the variety of questions and tasks on these representations over several domains, and (3) validation strategies for measuring the inferred network's capability of answering questions on the system of interest. 1 INTRODUCTION Networks represent relationships between entities in many complex systems, spanning from online social interactions to biological cell development and brain connectivity. In many cases, relationships between entities are unambiguously known: are two users 'friends' in a social network? Do two researchers collaborate on a published paper? Do two road segments in a transportation system intersect? These are directly observable in the system in question [104]. In most cases, however, relationships between entities are not directly observable and must be inferred: does one gene regulate the expression of another? Do two animals who physically co-locate have a social bond? Who infected whom in a disease outbreak in a population? Networks are mathematical representations (i.e., models) used to answer these types of questions about data collected on individual entities. There is a broad range of the questions over application domains and a variety of ways in which networks are used to answer these questions. How do we know whether a particular network on data is the most useful representation for answering a given question? What is the "right" network representation and how do we compare the utility of many possible representations for our particular question? Finally, how can we measure whether networks are the correct models to answer a particular question on the system of interest? Various approaches that use specialized knowledge to infer and measure the quality of inferred network for a specific task or hypothesis are found across many application domains. The rigor of these methodologies varies across domains and currently there are no common best-practices for evaluating the quality of networks inferred from data. Such practices would measure some combination of general statistical properties, including model significance-testing and unique- ness, sensitivity (i.e., the change in quality relative to underlying data measurements and model parameters), and generalizability (i.e., network quality measured over multiple hypotheses or tasks). Authors' addresses: Ivan Brugere, University of Illinois at Chicago, Chicago, IL, 60607, USA, [email protected]; Brian Gallagher, Lawrence Livermore National Laboratory, Livermore, CA, 94550, USA; Tanya Y. Berger-Wolf, University of Illinois at Chicago, Chicago, IL, 60607, USA, [email protected]. , Vol. 1, No. 1, Article . Publication date: January 2018. In this survey, we examine: 1) how network representations are constructed from underlying data; 2) the variety of questions and tasks on these representations over several domains; and 3) validation strategies for measuring the inferred network's capability for answering questions on the system of interest. 1.1 Motivation: Networks Represent Complex Relationships Networks are a natural choice of data representation across many domains. First, networks by design represent higher-order structure emerging from dyadic relationships, which serve as units of further analysis. These structures include neighborhoods, ego-nets, communities/modules, and connected components. For example, in the computational biology domain, clusters and motifs often represent shared biological function. The mutual connectivity provides stronger evidence for the common function than individual pairwise relationships. Individual, dyadic, neighborhood, or aggregate population analysis may be the most appropriate depending on the question of interest. Second, networks represent heterogeneity among entities in the local network topology. Rather than analysis on population aggregates (e.g., histograms), networks allow local querying of complex, non-metric attribute and feature spaces. Homophily yields correlation in node attributes among entities close in the network. However, these correlations also tend to be non-monotonic: the most similar node to a query entity may be arbitrarily distant in the network. Due to this correlation, network topology often represents local clusters as overlapping, heterogeneous relationships. For example, a user's 'friends' in an online social network often cluster into functional units: friends from work, school, from the user's hometown etc., where nodes within each cluster are correlated in some–often unknown–attribute. The effectiveness of simple heuristics such as counting common neighbors in the link prediction problem [117] shows the latent information within social networks. Third, networks are interpretable models for further analysis and hypothesis generation. Re- searchers can visually explore small networks and examine relationships between nodes to compare against their knowledge-base and intuition from the domain. Furthermore, a shared vocabulary of descriptive network measures enables researchers to compare networks according to density, degree distribution, clustering coefficient, centralities, diameter, average path length, triangle counts [90, 181], and graphlet distributions [142]. Many higher-level network measures have also recently been developed including robustness [37, 144], local information efficiency [7], and routing effi- ciency [114, 189]. Using these shared measures, researchers can compare properties across classes of networks and generate hypotheses explaining similarities or differences. Finally, networks are common models for data and can be re-used in multiple studies. The breadth of tools and support for network analysis allows researchers of various disciplines to apply sophisticated off-the-shelf analysis and visualization techniques, as well as easier storage, querying, and portability in graph databases. Researchers also have a common vernacular developed in the area of "network science," across biology, physics, and computer science [24]. A cautionary note, however: when inferring networks from data, researchers ought to consider whether higher-order structures are meaningful and which descriptive measures are appropriate on the inferred network. Available tools and convenience can motivate researchers to translate their problem into a network formulation, whether or not a network is the best model for the question of interest. This survey aims to clarify when network models are appropriate and how they are inferred. 1.2 Inferring Network Models from Data Inferred networks are a class of networks where the node and/or edge definitions are inferred from non-explicitly relational data. Work in network science often focuses on applications of explicit networks: network representations where the meaning of nodes and edges is unambiguous and 2 categorical. For example, in the Facebook network, two adjacent users are categorically "friends." In weighted networks such as a road transportation network, nodes represent road intersections and edges represent the road segments between them. These edges are unambiguous, change with low frequency, and have strict spatial constraints for new edge appearance. Measuring weights (e.g., travel time) is a matter of sensing/measuring traffic over the network, but these measurements are constrained to adjacent nodes on the known topology. In general, estimating weights in explicit network applications is a matter of accurately measuring a known relationship on a known topology, rather than learning a hypothesized relationship on an unknown topology. Seemingly explicit networks often also have biases and arbitrary choices (e.g., thresholding, see: Section 2.5.1) in the collection or construction of the network. These choices are out of the control of researchers using these networks. Starting from underlying data and translating data to a network model enables researchers to measure and account for these biases to ensure the network model actually represents the appropriate characteristics of the system. 1.3 Challenges Inferring networks from data presents several challenges: – Noisy measurements: The underlying relationships of interest within real datasets are often noisy and confounded by overlapping relationships at varying scales (e.g., temporal, spatial). Furthermore, such errors are propagated when measuring higher-order properties of the inferred network (e.g., path lengths, triangle counts, network centralities, communities). – Lack of ground truth and/or model assumptions: Determining whether a particular method accurately encodes the relationship of interest in the network requires: (1) ground truth data, (2) model assumptions (e.g., Exponential Random Graph Model), or (3) some stability assumption (e.g., predictability over time). In many instances, no such assumptions or data are available and researchers are left with an under-determined problem and ad-hoc tuning of network model parameters [161]. – Large parameter spaces and sensitivity: Many network inference methods have thresh- olds or other parameters which define a large space of possible networks. Often this leads to ad-hoc selection or parameter-space sampling (see: Section 2.5.1). Although sensitivity analysis is routine for method parameters of the subsequent task on the network (e.g., pre- diction, classification), most evaluation methodologies do not incorporate inferred network structure(s) into the sensitivity analysis. – Varying model complexity: Descriptive interpretation of edges, paths, and communities is increasingly challenging with additional model complexity. For example, a social network defined via thresholding on who-calls-whom call record data is more interpretable than a linear regression on node feature vectors. Determining the validity and interpretability of these higher-order features is crucial to the many analyses that use them. 1.4 Outline of This Survey This survey organizes recent work focusing on inferring networks from data. We draw from several domains where these methods are applied and general method development from machine learning. The study of inferring networks from data is largely unstructured. In Section 2, we first organize the work under a common problem formulation, taxonomy, and terminology. In Section 3, we examine various application domains to highlight unique challenges found in these areas. 1.5 Audience Our survey is best suited for domain researchers using network inference in applications, as well as machine learning researchers interested in methods and methodology on networks. For novices 3 Fig. 1. An overview of related areas in machine learning and network science for this survey, several surveyed domains, and principle surveys and introductory work for these sub-areas. in the networks space, Section 1.6 structures many introductory surveys related to our work. Our survey is also relevant to the broader network science community working on traditional explicit networks. These networks often represent an aggregation of longitudinal interactions which are not informative to explain the current behavior of the population. Closer scrutiny of edges in the network 'as given' may yield more appropriate representations and affect all aspects of downstream analysis [29]. Researchers routinely construct networks from 'behavior' (i.e., node features) or other data to evaluate against their explicit network. Much of the work in scientific domains (including biology, ecology, chemistry) learn dynamic interaction networks in the absence of ground truth. This work has developed varied strategies to evaluate the quality of networks in general for prediction, classification, or the discovery of robust edge relationships over time or question(s) of interest. 1.6 Meta-Review: Comparison to Existing Surveys In this section, we provide a brief meta-review of existing surveys and work that is related but distinct from network structure inference. See Section 2.3 for how these areas relate to our proposed taxonomy of related work within our problem. Figure 1 provides a map of research in related but distinct network science problems. Kolaczyk [103] is the most relevant work to our survey. The author organizes related work in three categories: (1) the link prediction problem, where some edges and all nodes are known and the task is to infer new edges, (2) interaction networks where all nodes are known and the task is to infer edge relationships (e.g., by correlation), and (3) network tomography where some edges and nodes are known, and the task is to infer unobserved 'interior' nodes and edges [76, 133, 206]. Of these, (2) is primarily within the scope of what we define as the network structure inference; we focus with much greater depth on the network inference methodology and applications, where no edge definition is known a priori. We define network structure inference as distinct from the large body of work in relational learning. One branch contains attribute inference and prediction on networks. Given a network, these methods infer missing attributes using local estimates [159, 195], or link prediction: predicting 4 Network Structure InferenceKolaczyk 2009Temporal NetworksAggarwal and Subbing 2014Holme and Saramaki 2012Holme 2015Relational LearningKimmig et al. 2015Sen et al. 2008 Xiang and Neville 2008Link predictionHasan and Zaki 2011Liben-Nowell and Kleinberg 2007Relational InferenceNetwork ModelingGoldenberg et al. 2010Parametric InferenceDomainsda Fontoura Costa et al. 2011Havlin et al. 2012NeuroscienceBielza and Larrañaga 2014Bullmore and Sporns 2009Rubinov and Sporns 2010Simpson et al. 2013Ecology Krause et al. 2013Farine and Whitehead 2015Pinter-Wollman et al. 2013Computational Biology Hecker et al. 2009Marbach et al. 2012 Sima et al. 2009Yu et al. 2013…Epidemiology Danon et al. 2010Keeling and Eames 2005Welch et al. 2011Predictive Inference edges at a later time-step or by node attribute similarity [79, 117, 118]. These are two fundamental tasks which serve as evaluation methodologies for many network inference methods. A second branch in relational learning focuses on inferring probabilistic relational models from data [65, 97]. While graphical models are one strategy applied to our problem, generally these models treat attributes or variables as nodes. Previous work in probabilistic relational models learns relationships between explicit input and output graphs, using node attribute inference, entity resolution, and link prediction tasks in a supervised setting [130]. Other recent surveys cover broad statistical network modeling [66] and multi-layer networks [22, 98]. Our survey draws on parametric network models, which is one class of model inferring parameters according to a particular distribution (e.g., attribute-edge joint distributions, [137]). Research in network synthesis on multi-layer networks is one case of network structure inference for a particular task, where input data is a collection of networks. Many network structure inference applications define edges by association measures over time (e.g., correlation in time series), so dynamics and temporal networks are an important aspect of network models for prediction tasks [2, 87, 88]. Finally, "network representation learning" is typically used to describe graph embedding methods. This is a rapidly growing area which aims to learn a low-dimensional representation of the network structure of a given network [40, 70, 78], which preserves desired structural properties. These models are used for comparison of nodes or networks, or predictive tasks in the embedded representation. Our survey draws on several application areas. For a more exhaustive and general survey of complex networks in different application domains, da Fontoura Costa et al. [41], Havlin et al. [81] provide more breadth. However, we focus specifically on comparing motivations, evaluation methodologies, and challenges in several of these areas. Recent domain-focused meta-studies [120] and surveys in computational biology [83, 116, 162, 197], ecology [60, 106, 139, 141], neuroscience [19, 31, 152, 163], political science [112], and epidemiology [43, 95, 190] all have significant discus- sion of network topology inference specific to the domain. However, few have network structure inference as a methodological focus and are limited to discussion of the single domain. Our survey focuses on challenges across each of these areas. We provide value to domain researchers both within and across fields, as well as to researchers in machine learning interested in predictive model development on networks. 2 PROBLEM DESCRIPTION We give a high-level formulation of network structure inference to clarify the methodologies often encountered for this problem. This definition is very broad and not meant to be novel or exhaustive. We use this formalization for added precision of defining the constituent elements we will discuss. 2.1 Preliminaries We define a network G = ⟨V, E, A⟩ as a tuple containing a set V of n nodes, vi ∈ V, a set E of m node pairs, eij ∈ E, and set A containing node and/or edge attribute sets. A particular attribute, the weight of an edge wij is a scalar value, wij ≤ 1, where wij = 0 denotes the absence of an edge. An unweighted network is a special case of a weighted network where wij ∈ {0, 1}. Edge and node features are a particular type of attribute, derived by a function measuring some local edge or node property (e.g., node degree). Time-varying networks are defined as a t-length sequence of static network snapshots: G = (G1, ...Gk , ...Gt), with time-varying attributes and/or edges.1 1While there are other representations of time-varying (or temporal, dynamic) networks [88], the time series of static networks is by far the most common. 5 Fig. 2. A common methodology for data science, with a focus on networks as models of underlying data. A researcher typically (1) uses relevant data and appropriate data models to formalize a particular question. (2) Traditional domain science (top, orange) typically combines direct observation and simple statistical models. Data-driven science with machine learning (bottom, purple) augments this intuition, hypotheses and statistical models with sophisticated features and patterns, yielding additional challenges for visualization, hypothesis testing and generation. (3) The output of this analysis is a plausible explanation or some supported hypothesis. (4) The result of data-driven science are considered to be shrinking this 'gap' in understanding, toward robust and verifiable answers to the original question (see: Cao [35], Hey et al. [84]). 2.2 Data Science Motivations for Network Structure Inference We organize network structure inference through the perspective of hypothesis-driven data science [35, 84]. Under this perspective, the value of a network can be stated simply: for a question of interest on the underlying system and its relevant data, are networks an informative and useful data model for better answering the question? Figure 2 gives an overview of a general data science methodology and introduces all the relevant terms to our taxonomy. We start with a broad question of interest and try to (1) locate or collect the data relevant to computationally modeling our question. There are several possible data sources, collection processes, and modalities for analysis, coupled with several possible representations (e.g., networks, tensors). Our choice of data representation informs and constrains our hypotheses about the question of interest. (2) Domain science (orange, top) and machine learning (purple, bottom) generate complimentary analyses for hypothesis generation. (3) Novel computational methods are developed to test these hypotheses. These tested models serve as a solution approaching an answer, (4) closing the gap in understanding for many questions in novel ways. For example, data-driven science has developed novel, large-scale methodologies relevant across scientific domains, including experimental design [8, 74, 102] and randomization techniques [56, 99]. Figure 2 highlights several levels of modeling which can impact the final capability for answering a question of interest. Often different individuals will be responsible for generating and collecting the underlying data, inferring or defining the network, and developing the predictive models. For example, machine learning researchers will rarely control the underlying sampling rate of specialized data collection processes in bioinformatics, neuroscience, or climate science. One novel approach in bioinformatics uses feedback from the network with active learning to guide the often costly and labor intensive data collection and experimentation process [177]. 6 GapData ModelingQuestionDataData ModelGPS, Proximity, SensorsSocial, Images, VideoTensorsTime Series,SequencesAvailable Tools,Data, ExpertiseDomain Knowledge,Observation,Statistical AnalysisPatterns, Clusters,Models, OptimizationHypothesis GenerationStatistically Testable, Parsimonious,Predictive or DescriptiveAnswerExperiments,Model DevelopmentModel/Hypothesis TestingVisualization NetworksExplicit, Discrete, Inferred RelationshipsKnown or Inferred EntitiesMethod of Inference (e.g. Correlation)Surveys, FieldnotesPlausible ExplanationsSupported HypothesesProblemComputational ScienceProcessDomain ScienceMachine Learning1234 In the machine learning community, there is a great deal of sensitivity analysis for the subsequent downstream predictive models on a network, without testing the parameters of the underlying network representation. This strategy is effective at producing sophisticated models "given a network," but is less suited at answering our scientific questions on the original system. Previous work demonstrates that the incorrect network representation for a particular question can have a large impact on performance [30]. Therefore the correct network representation may be more important than developing the best predictive model. 2.3 A Taxonomy for Network Structure Inference Below, we taxonomize work for the network inference problem according to: (1) The varying difficulty of defining edges and nodes, given the nature of the underlying data. (2) The type of method (e.g., mutual information, correlation) used for network inference. (3) The types of hypotheses and tasks used to evaluate the quality of the network representation. 2.3.1 Explicit, Discrete, and Inferred Edge Definitions. Networks model three broad types of relationships (i.e., edges), typically based on a measure of interaction between entities. Categorical, explicit relationships are unambiguously known in the system–such as the 'friend' or 'follower' relations in online social networks. Discrete interactions denote unambiguous transactions occurring between two entities–such as phone calls or text messages in mobile device data. The primary task of defining edges on these interactions is to select an appropriate threshold to measure the strength of the relationship. Inferred interactions denote some statistical measure of similarity, beyond simple transaction counts. For example, the definition of a spatiotemporal co-location interaction between two entities can be inferred by specifying "how close" for "what duration," both of which are continuous thresholds. This is a more challenging to measure relative to discrete interactions. 2.3.2 Explicit and Inferred Node Definitions. Similarly, inferring nodes is of varying difficulty in different domains. In most applications, nodes are explicit in two ways: (1) the node definition is unambiguous (e.g., a 'user', 'animal', or 'gene' is represented by a node) and (2) there is a node correspondence between time-steps in the data (e.g., this particular node corresponds to a user 'ivan' at each time step). Functional brain networks and climate networks are two examples of domains where the node definition is neither explicitly given nor is consistent over time. Here, nodes correspond to groups of two-dimensional earth surface pixels, or three-dimensional brain voxels. The scale of node definition can dramatically change the performance of predictive models and the stability of descriptive statistics derived from the network [33]. 2.3.3 Hypotheses and Tasks on Inferred Networks. Figure 2 (2–3) illustrates the core novelty in machine learning and data science for hypothesis generation, model development, and testing. In machine learning, there is typically a bias toward evaluating models using a novel prediction tasks. However, typically these models do little to explain the underlying system and are more useful for generating new hypotheses. In the statistics domain and many natural sciences, there is a bias toward descriptive modeling, where the 'task' is parameter inference on an assumed parametric (or non-parametric, but still with parameters, [188]) statistical model on the data. These parameters are useful at interpreting the underlying system, such as fitting the exponent of degree distributions, or reporting other aggregate statistics on a network. Both of these aspects have a role for understanding the mechanisms of the underlying system. Applications driven by descriptive models aim to reconstruct and describe the 'hidden' relational structure with the greatest fidelity, relative to the domain knowledge base. A typical example is gene regulatory networks (GRNs). These networks are inferred on data measuring individual genetic expression over different experimental settings. In these networks, nodes represent genes 7 or functional gene families and edges represent inferred positive or negative gene expression relationships (e.g., "gene A reduces the expression of gene B under some context"). Inference of these networks typically identifies new, high quality candidate regulation relationships given high accuracy of inferring known edges. These interactions can be experimentally tested to build greater understanding of cellular processes and to develop potential personalized medical treatments. In contrast, predictive methods aim to discover network structure which maximizes predictive performance and may not reconstruct the underlying process with the highest fidelity. Instead, they may focus on those aspects or modalities which are most predictive. Modeling the predictive aspects of the data allows researchers to learn regular relationships between modalities (e.g., call, text, and location in mobile phone data) or over time (e.g., periodicities). This informs further hypothesis generation to understand the mechanism underlying the predictive relationships. However, often highly predictive relationships are also uninteresting and can drive the structure of the inferred network. Several domains such as climate science tend to remove known periodic dynamics as preprocessing of the underlying data, prior to inferring the network structure. 2.3.4 Models for Network Structure Inference. We organize related work broadly along the type of network structure inference model used, including parametric, non-parametric, and thresholded interaction/correlation measures. In these groups, we categorize the type of task performed on the network, including edge and attribute prediction, descriptive analysis, and model selection. Table 1 summarizes work across several domains, introducing an example scientific question driving the analysis, as well as the network structure inference model used to realize the network. In Table 1 (Column 'Model'), we label these models under two broad categories. First, parametric models make assumptions on the distribution of edges in the network. We identify graphical models (GM) and other network models using maximum likelihood methods (ML), relative to the assumption on the input data (e.g., the information flow between nodes [68]). Causal models (CM) typically generate causal networks–a special case of graphical models–use Granger causality [71] or other causal definitions [119, 124]. These networks represent strong relationships between nodes which control for confounding factors of possible adjacent nodes. Second, non-parametric models tend to directly measure interactions between nodes and use statistical tests to determine appropriate edge weights (see Section 2.5.1). We categorize work related to novel and 'ad-hoc' interaction measures (I) between the data associated with pairs of nodes, correlation networks (IC) which measure linear, cross, or some other correlation, entropy (IE), frequency domain measures (IF), and regression (R). The edge definition may be defined by an underlying parametric model (e.g., linear correlation), however we refer to these models as 'non-parametric' because they don't have a model for the edge structure as a whole. Table 1 (Column 'Task') categorizes rows within each domain by the type of task performed, under the caveat that one study may use several evaluation strategies, or that the actual task may be loosely described as the canonical task (e.g., edge prediction). First, we denote predictive tasks, including edge prediction (PE) and attribute prediction (PA). Attribute prediction can also describe prediction of the original data, or tasks such as change-point prediction [62] and rank prediction, which are higher-order attribute tasks. Predictive models are relatively rare across application domains because researchers are interested in descriptive and interpretable models which give insight into the underlying system. We observe some specialization in both information networks and epidemiology, which aims to predict the extent or timing of an epidemic over a population in varying contact models. Second, descriptive analysis is broken by node-oriented statistics (DN), which includes reporting distributions of simple node statistics, such as degree distribution, clustering coefficient, correlation distributions, etc. This often constitutes the base-level exploratory analysis and qualitative evalua- 8 tion of the inferred network. Role-oriented analysis (DR) aims to characterize nodes using network features by the structural roles they play in the system (e.g., bridges between social communities). This may also include factor analysis and interpretation. Other high-order analysis (DH) examines communities and larger subgraph structures beyond node and edge-based descriptive statistics. In descriptive and predictive cases, we find a sizable collection of work in model selection (MS). This work uses varying network representations with some evaluation criteria over models. These varying models correspond to different hypotheses to how the network may have been generated. 2.3.5 Evaluating Networks and Tasks. Evaluation strategies over the entire methodology of Figure 2 measure the performance of the final task (prediction or statistical inference). In this context, the network serves as a model of the data. However, the fidelity of this model in terms of fitting error, or reconstruction against a partial ground truth network does not measure the network's usefulness for answering questions on the original system. It is more appropriate to think of the space of networks as possible representations with some utility for answering a specific question. 'The network' is typically seen as uncovering the true relational structure of the data with some error [187], rather than one of many representations for a particular purpose or question. Most scientific domains use an evaluation strategy focused on a final task (a network for location prediction, brain activity response, etc.), because there is no evaluation framework for comparing the inferred network structure. For example, we simply cannot survey baboons [59] as we can humans [53] to discover their real friendships. Furthermore, uncovering a general-purpose, robust network from complex data may not appropriately model the overlapping modalities of the data. For example, the existence of many contexts may mean that functional brain networks are inherently probabilistic. Discovering the most general network model will be less informative in any particular question because it does not account for this complexity [30]. 2.4 Network Structure Inference The network structure inference problem represents some input data as a network and validates this network relative to performance on some task(s) or hypothesis. Often, model selection is done offline and we only see the result of the final network representation evaluated on the task. Currently, there exists no standardized methodology for evaluation of networks inferred from data. Our work structures this problem, particularly in the absence of network validation data. The network topology inference problem combines two basic models: first, a network model R(D, α) → G constructs network G on input data D under some parameters α. This model may be parametric statistical models (e.g., Exponential Random Graph Models) or non-parametric and threshold-based interaction networks. Second, the problem uses a task model T(G, β) → p1, p2... on input G under some parameters, with task outputs (e.g. prediction 'pi'). These approximate the unknown ideal function T ∗(G) of a network task (e.g., classification, prediction) with error e(). This formulation may seem overly simplistic. However, it succinctly clarifies the relationships between input data, the network model, and the task model. It explicitly formulates network G as a model on data D for task T ∗, approximated by T . This formulation captures simple interaction network methodologies (see: Section 2.5.1) which separately infer the network (often by hand-tuned thresholds) and validate task performance, as well as parametric inference methods which learn the network model parameters. To our knowledge, all network structure inference methodologies can be broadly formulated in this pattern and all network inference models should be formulated relative to a particular task or hypothesis. In much of the existing work, the network or task models will not be formulated explicitly, or possible model combinations may be sparsely-explored. We can instantiate several tasks within this formulation. In the context of network prediction tasks, our predictive model can output predictions of (1) edges, (2) attributes, or (3) the original 9 data. For one instantiation, on a validation edge-set E∗, we can evaluate: e(T(R(D, α), β), E∗) argmin G (1) This infers G over network model parameters α and task model parameters β. Practically, this might be done by a model selection over a grid search of parameter pairs [30], or an iterative re-training [122]. In this context, the suitability of both the network model, task model, and the appropriate error function will determine the performance of the inferred network. Network model selection methodologies mitigate some of the biases from offline, hand-tuned network construction by exploring many possible model combinations. This formulation highlights two key challenges in network structure inference. First, the param- eter space of possible G from R(D, α) may be large and parameter search will likely be non-convex with respect to the performance of the task of interest. Second, well-performing models in the parameter-space may yield very different network topologies. Summarizing and reconciling these differences may be important for interpreting which network model is most suitable. This prolif- eration of plausible task and network models makes further hypothesis generation and testing more challenging for the researcher; more plausible models means additional interpretations of the mechanisms involved in the underlying behavior of the system. 2.5 Network Models and Inference Methodologies Our problem description is flexible enough to incorporate varying types of network models (e.g., regression, correlation, parametric network models) and tasks (e.g., prediction, descriptive statistics and hypothesis testing). Below, we describe several formulations for network structure inference according to their network model and task model. 2.5.1 Interaction Networks. The most prevalent class of network topology inference is measuring pairwise interactions (e.g., correlations) between nodes and choosing a threshold to define a sufficient degree of interaction. This threshold may be chosen by some statistical test, by tuning on some desired criteria (e.g., a desired network density), or ad-hoc offline testing. This has been discussed in the context of discrete interactions as described above: "Inferring networks from pairwise interactions of cell-phone call or email records simply reduces down to selecting the right threshold τ such that an edge (u, v) is included in the network if u and v interacted more than τ times in the dataset. Similarly, inferring networks of interactions between proteins in a cell usually reduces to determining the right threshold." [129] Researchers often make several application-specific decisions around these thresholds: "From this complete correlation graph, only the edges with significant correlation (> 0.5) were retained. But using the same threshold for positive and negative correlations is not appropriate as negative correlations are usually weaker and many nearby locations have high positive correlation" [93] "We let δ as a user-controlled parameter, where larger δ values correspond to less predicted regulations, and only focus on designing a significance score s(t, д) that leads to 'good' prediction for some values of δ" [80] These methods typically produce a fixed network model and explore networks under varying threshold settings in an offline trial-and-error fashion. Unfortunately, these negative results are rarely reported, so we often only have a description of the final network definition. We use our formulation for this process. Assume the interaction threshold τ is given by hand- tuning or domain knowledge; we have some feature matrix D that has some similarity between 10 features, measured by R(), and T() is an edge prediction task evaluated on E∗. This method is expressed as: R(D, τ) → G; argmin e(T(G, β), E∗) β (2) When these interaction networks are evaluated in the absence of ground truth, the network may be measured through autocorrelation. In this case, the same network inference is applied, R(D∗, α) → G∗ for some hold-out data D∗. 2.5.2 Parametric Network Models and Parameter Inference. Maximum-likelihood methods assume some parametric model family to represent relationships between nodes, such as time between interaction, likelihood of information transmission over time. For clarity, we work through one specific application, in epidemiology and information networks such as blogs, although the pattern is similar in other applications. Structure inference methods on disease transmission networks share the assumption that we are observing the 'arrival' of infection or information/attribute value at nodes (i.e., computers, blog pages, individuals) over time, but are unable to observe the topology which transmitted the information. For an edge eij, the likelihood of information transmission (or infection, in the epidemiology context) time difference tj − ti is given by an information transmission/infection model, yielding the likelihood that vi transmitted information to vj [129]. Where input data D are infection times of each node, we can formulate these methods as: R(D, α) → G; argmin e(T(G, β), E∗) argmin (3) In information network applications, E∗ is typically provided by a known network. Processes are simulated on this network to generate input data for the maximum-likelihood relational data model R(). This method is used to 'reconstruct' E∗ only from input data D. α β 2.5.3 Learning Network Structure and Task Model Parameters. Previous work in statistical rela- tional learning on explicit networks has focused on learning relationships between (categorical) attributes and a predictive task, such as link prediction [69, 130], and distinguishing correlated effects between these processes [108]. Previous work has also used a methodology for the network structure inference problem which maximizes performance of particular task(s) on the inferred network [45, 59]. Consider interaction networks over varying thresholds τ. A naive solution for this type of approach is to explore the parameter space of R(D, τ) and evaluate the task performance on each inferred network. However, this is very costly, especially as R() requires more parameters. Learning network structure paired with task parameters T() yields both the network and task definition according to some optimization or model selection criteria. For example, previous work has learned network models that iteratively discover features in a supervised LDA model, and the logistic regression weights that perform well for an edge prediction task [122]. Other work uses model selection to select task and network models by performance [30, 183], or minimum description length (MDL) encoding cost [28]. A related area of work treats dynamic networks as a sampling process over varying sampling rates [148], where network models are evaluated according to the most predictive representation for the given task [62, 174]. In Equation 1, we have already formulated paired evaluation of network and task parameters: (4) With more context we now see R() can construct networks of varying interaction measures, sampling rate criteria, etc., and this methodology selects the G() corresponding to minimum error on T(). Therefore this simple formulation defines a very general model selection methodology. e(T(R(D, α), β), E∗) argmin G 11 Domain Computational Biology Example Discover interactions between genes in cellular processes Climate Neuroscience Epidemiology Ecology Mobile Describe relationships in environmental system dynamics Model relationships between brain regions, physiological structure, and function Model hidden networks from observed infections Describe and predict animal behavior social on Predict influence individual mobility Sec. Model Task Citations I IE GM R CM IC IE CM GM R IC IF CM ML I GM ML I IE R I 3.1 3.2 3.3 3.4 3.5 3.6 DH, DR PE DN, PA DN DN, MS PA PA, MS Zhang and Horvath [204] Butte and Kohane [32], Faith et al. [57], Meyer et al. [125] Allen and Liu [4], Lebre et al. [113], Mani and Cooper [119], Mukherjee and Speed [128], Toh and Horimoto [178] Haury et al. [80], Yuan and Lin [199] Barzel and Barabasi [14], Feizi et al. [61] Kawale et al. [92], Paluš et al. [134], Steinhaeuser et al. [170], Tsonis and Roebber [179], Tupikina et al. [182], Yamasaki et al. [196] Donges et al. [50], Hlinka et al. [85] Ebert-Uphoff and Deng [55], Kretschmer et al. [107], Runge et al. [153] Zerenner et al. [202] Zhou et al. [205] Bialonski et al. [18], Zalesky et al. [200] Lachaux et al. [109], Pfurtscheller and Andrew [138], Ponten et al. [140], Zhan et al. [203] David et al. [44], Dhamala et al. [48], Friston et al. [64], Ramsey et al. [145], Roebroeck et al. [150], Rosa et al. [151] Cao et al. [34], Papalexakis et al. [135] Adar and Adamic [1], Haydon et al. [82] Britton and O'Neill [26], Groendyke et al. [73], Stack et al. [168] Du et al. [51], Gomez-Rodriguez et al. [67, 68], Myers and Leskovec [129], Netrapalli and Sanghavi [132] DH, MS DN PE PE, DN Aplin et al. [6], Haddadi et al. [75], Psorakis et al. [143], Spiegel et al. [165] Barrett et al. [12] Farine [58], Whitehead and James [193] Farine et al. [59], Fletcher et al. [63] De Choudhury et al. [45], Eagle and Pentland [53], Mastrandrea et al. [121], Sekara and Lehmann [158] Interaction, IC: Correlation, IE: Entropy, IF: Frequency, I: Novel measures CM: Causal model GM: Graphical model, ML: Maximum likelihood, R: Regression Descriptive Analysis, DN: Nodes, DR: Roles, DH: Other high-order, MS: Model Selection Prediction, PA: Attributes, PE: Edges Table 1. A summary of related work, across domains 3 APPLICATIONS OF NETWORK STRUCTURE INFERENCE Applications of network structure inference are too numerous to meaningfully cover. Instead, we look closely at a few applications where inferring networks from data is illustrative of the challenges and expertise in these domains. 3.1 Computational Biology: Discovering New Genetic Regulation Networks are constructed in computational biology to model many different processes. Protein- protein interaction (PPI) is the most common type of network in this domain, constructed mostly 12 Fig. 3. A consensus gene regulatory network (GRN) of Staphylococcus aureus generated from microarray data in the DREAM5 challenge ensemble methodology (see: Figure 4). Network modules in agreement with Gene Ontology (GO) database are colored and labeled according to their shared function (grey are not coherent in GO). The detail (right) shows inferred gene regulation related to pathogenesis. (From Marbach et al. [120]). experimentally through, for example, yeast two-hybrid experiments others that physically test for binding of one protein to another or other types of physical interactions. Metabolic networks are process networks that model relationships between enzymes, metabolites (typically nodes) on processes (typically edges) such as reactions or pathways. We focus only on gene regulation networks (GRNs) and gene co-expression networks (GCNs), which infer relationships between genes under different experimental scenarios (for further reading, see: [162]). 3.1.1 Underlying Data in Gene Regulatory Networks. Next-generation high-throughput microar- ray technologies allow the sequencing of genomes and measuring the expression of particular genes at a large scale and low cost [160]. 'Expression' is the measurement of how groups of genes produce different phenotypic specializations through the production of different proteins. In cellular development, different gene co-expression can be responsible for RNA translation or nucleotide metabolism, yielding many complex functions from gene interaction (see: [13]). Figure 3 illustrates a small network with annotated functional clusters.2 The output of microarray analysis (with notable simplification) is a 2D data matrix of numeric values measuring the expression of a gene (row), on a particular experimental design, subject, or time step (column) [10]. Defining edges between genes simplifies to comparing expression profiles across the different columns of the data. 3.1.2 Discovering New Gene Interactions From Data. The high-level 'task' for gene regulatory networks is link prediction on the network learned from data, to discover unknown gene regulation candidates which can be experimentally tested. The network model inferred from data should agree with databases of biologically-known interactions and function, while providing few verified false-positive regulations. Table 1 illustrates that the inference of GRNs is very mature relative to other domains, since the inferred network is clearly verifiable according to current domain knowledge, and directs future investigation and hypothesis generation. One unique challenge in gene regulation is the issue of confounding factors, including indirect and transitive associations, resulting in many spurious 2All figures reprinted with permission and attribution. 13 Fig. 4. The general methodology design for the DREAM5 network inference challenge. This methodology (1-2) generates one simulation dataset and three experimental microarray datasets from three well-studied species. The 29 participating inference methods all (3) generate inferred network output, (4) a consensus network is constructed for each dataset, and then (5) validated against known edges in synthetic networks and against experimentally known edges in two of the real datasets. (From Marbach et al. [120]). edges. Recent work has measured these 'direct' (e.g., causal) edges in noisy expression datasets [14, 61]. 3.1.3 Translating Gene Expression Data to Interaction Discovery. Marbach et al. [120] introduce an ensemble approach associated with the DREAM5 network inference challenge. The authors present 29 different network inference methods across different model types, including regression, mutual information, correlation (a.k.a. 'relevance networks' in this domain), Bayesian networks, ensembles, and other novel approaches (e.g., random forests, neural networks, Gaussian mixture models, etc.) This list demonstrates the maturity and variety of methods applied to this problem. These methods use pairwise (e.g., gene-to-gene correlation) or group-wise (e.g., many-to-one group LASSO) measures of interaction intensity, which yield a directed, unweighted network signifying "gene A regulates gene B." Figure 4 illustrates an ensemble methodology for the DREAM5 network structure inference challenge. The authors (1) generate a ground truth network on three species using experimental trials as well as synthetic network data. In (2), these experiments yield four different datasets of biologically-tested networks of gene regulation, as well as the raw (non-relational) gene expression. The collection of inference methods produce (3) inferred networks on each of the four datasets. The authors (4) integrate these 29 different inferred networks to produce an ensemble network. This network is (5) validated against the ground-truth networks generated in step (1). Finally, the authors show that the ensemble method discovered 59 potential interactions, of which 29 show some support and 20 show strong support for being biologically significant. We examine this process in such detail to demonstrate the 'complete' methodology for network structure inference, from input data, to network representation, to a final output (learning the regulatory network). Within our formulation, this methodology does not have an explicit task model, as the network itself is the object of interest. Therefore, this application is typically descriptive modeling against evaluation data. Although these models do 'predict' new potential gene regulation via unknown edges, these interactions are usually checked manually through experimentation. 3.2 Environmental Science: Discovering Climate Relationships and Predicting Outcomes Networks inferred to understand climate dynamics are among the most difficult to model of any domain, with much of the work to formalize and validate these networks still in early development. 14 Within this domain, researchers want to discover robust, causal relationships between climatic variables, over different spatial regions of earth. This modeling can improve prediction of changing hydrological processes, land-cover, ecosystem productivity, and polar or sea ice cover, which are key aspects for climate change mitigation. Two unique challenges exist for inferring climate networks: (1) Input data is typically noisy, highly spatially-autocorrelated, multivariate time series of climatic variables collected over varying regimes and sensor (e.g., satellite) quality. Domain scientists produce a consistent"reanalysis" data products which attempt to mitigate problems of varying sensors and errors in data. However, inferring accurate networks from these data requires significant understanding of the data ingestion process [115, 155] and its introduced biases and variability. (2) The structure of climate networks is not well understood aside from a handful of climate indices–coarse spatial locations on earth where dynamics are well-studied and regulate or correlate with other environmental processes (e.g., El Niño and La Niña oscillation cy- cles). Therefore, validating correctness of the inferred network is suitable for unsupervised strategies such as relational or predictive modeling of the original data. 3.2.1 Network Inference Methods in Climate and Environmental Science. Nearly all studies con- structing climate networks use some time series similarity as an underlying relational measurement. Previous work has used linear correlation [49, 170, 179, 196] or mutual information [49, 85], either a hand-picked [49, 179] or a simple statistical test [196] to set similarity threshold τ–where similarity greater than τ is considered a binary edge in the network. There is considerable focus on formulating these simple pairwise comparison methods and often the 'recipe' of the network, according to parameter settings and preprocessing choices, varies greatly from study to study. These networks are typically binary rather than weighted, because the final output of interest is a binary decision on the similarity distribution: (e.g., ["significant", "not significant"]). However, typically these measures will have no 'natural' threshold which gives this binary classification. Instead, these networks can be gradually densified or sparsified by weakening or strengthening the similarity threshold. Descriptive statistical work has been very popular downstream from these varying network 'recipes.' Donges et al. [49] reports clustering coefficient, betweenness centrality, closeness cen- trality on correlation and mutual information networks (Equation 5–6). Tsonis et al. [180] reports community structure which tends to cluster in spatially-contiguous locations, on account of the autocorrelation present in these networks. Little work focuses on evaluating these networks as predictive models for the input data. Steinhaeuser et al. [170] use both descriptive statistics and predictive performance to evaluate the inferred network. As work utilizing network models grows in this climate and environmental science, researchers have developed more sophisticated techniques for determining edge significance [92], or conditional dependencies using causality [55, 107, 153]. 3.2.2 A Methodology for Translating Environmental Sensing Data to Interaction Network. We will step through a concrete example of constructing a climate network from spatially-gridded time series data of global surface air temperature (SAT) [49]. The authors measure the similar dynamics of pairwise earth locations (corresponding to nodes ni , nj) and construct edges between locations with 'significant' similarity. The authors use two standard measures, linear correlation and mutual 15 Pij = Xi  (cid:115)Xi  B t =1 (Xi,t − ¯Xi)(Xj,t − ¯Xj) (cid:115)Xj  (Xj,t − ¯Xj)2 t =1 (Xi,t − ¯Xi)2 pb(Xi , Xj)log pb(Xi , Xj) pb(Xi)pb(Xj) t =1 (5) (a) Pi j vs. distance (b) Mi j vs. distance (c) Pi j vs. Mi j Fig. 5. On the input data of averaged global surface air temperature (SAT) at different spatial regions, (a) shows the distribution of pairwise linear correlation measures (Pij ) vs. geographic distance between nodes, on a logarithmic color bar scale. This illustrates a strong spatial autocorrelation between nearby points. (b) shows the pairwise distribution for mutual information pairwise calculation vs. geographic distance, showing less spatial autocorrelation. The horizontal bars indicate thresholds on the Pij and Mij scales which produce the same network density (ρ = 0.005). (c) shows the linear correlation vs. mutual information. The starred quadrant (top-left) denotes edges defined by mutual information but not by correlation. (From Donges et al. [49]). information between time series Xi and Xj: b=1 Mij = (6) Equation 5 is the sample Pearson correlation between two time series, where ¯Xi is the sample mean of time series Xi. The denominator represents the product of the sample standard deviations of Xi and Xj. This measures linear relationship of Xi and Xj over the length of the time series. Equation 6 is the discrete mutual information estimate between two time series, where pb(Xi , Xj) is the joint cumulative distribution of the b-th discretization window, and pb(X) is the marginal cumulative distribution of the b-th discretization window. This measure compares the shape of the joint and marginal probability density functions. When the joint distribution is equal to the product of marginal distributions: log(1) = 0 yields no mutual information (e.g., Xi and Xj are independent). Varying similarity threshold τ produces networks of varying edge densities ρ and other network measures. The authors select thresholds for correlation and mutual information (τcorr = 0.682 and τMI = 0.398) such that they produce the same network density (ρ = 0.005). Figure 5(a) shows the density of pairwise linear correlation measures (Pij) vs. geographic distance between nodes, on a logarithmic color bar scale. This illustrates a strong spatial autocorrelation between nearby points. Figure 5(b) shows the pairwise distribution for mutual information pairwise calculation vs. geographic distance, showing less spatial autocorrelation. The horizontal bars indicate thresholds on the Pij and Mij scales which produce the same network density (ρ = 0.005). Figure 5(c) shows the linear correlation vs. mutual information. The starred quadrant (top-left) denotes edges defined by mutual information but not by correlation. This demonstrates that under a fixed network density, the chosen similarity measure can yield a very different network structure. 16 (a) Betweenness vs. Degree (b) Betweenness vs. Closeness Fig. 6. (a) the distribution of betweenness centrality of nodes vs. degree of nodes. (b) the distribution of betweenness centrality of nodes vs. closeness centrality of nodes. (From Donges et al. [49]). While several methods have been developed to test edge significance, little work has focused on the validity of higher-order structures such as paths or communities. While the graph definition of paths or communities are valid on these networks, no known work in this domain measures the interpretation of these relationships with respect to the original time series data. Figure 6 explores the sub-spaces of different node measures on the inferred network. Figure 6(a) shows the distribution of betweenness centrality per node, vs. the degree per node. Similarly, 6(b) shows betweenness centrality and closeness centrality. The authors demonstrate that degree- preserving edge re-wiring randomization indeed destroys the rank-order correlation between the marginal distributions of the node measures. There are two drawbacks of this analysis which re-occur across domains. First, while this methodology tests some global relational structure of the network, we are unable to interpret the relationship between any two nodes at a high geodesic distance (≥ 2). This means that we cannot measure properties we associate with networks, such as flow or routing. Second, significance analysis is done at a particular threshold setting, without a sensitivity analysis on the original threshold choice. In the machine learning settings, the parameter sensitivity will often be on the prediction model parameters at a particular network definition threshold. 3.3 Neuroscience: Describing Functional Brain Structure and Its Connections Biological research suggests that the brain activates interconnected, often spatially distant, regions along neuronal pathways [166]. This interconnected complexity makes networks a very natural model to study the brain. These studies are broadly in two areas: structural and functional brain networks. Structural networks (also known as 'effective connectivity', tractography, or the brain connectome) map the physical axon pathways between neurons, which may be relatively long and spatially distant. With some simplification, these networks are analogous to the physical layer in communication networks, where nodes are explicitly connected by cables and routers. Functional networks are analogous to the logical layer in communication networks. These networks model how neuronal signals (i.e. 'traffic') flows over this physical layer in order to activate other neurons (i.e. 'resources') to perform different types of behavior such as auditory, visual, or motor behaviors. Researchers are only starting to understand the underlying routing and information-seeking on this physical network, and the complex contexts which change how the behavior is realized within the functional layer. Researchers aim to better understand and predict this routing, as well as the collective activation dynamics in different areas of the brain. Much work compares the topology of structural and functional networks using descriptive 17 Fig. 7. A methodology for constructing brain networks. (1) for a subject or population of subjects, (2) sensing techniques such as Diffusion Tensor Imaging (DTI) or functional Magnetic Resonance Imaging (fMRI) are used to sense connectivity or activity of the brain, respectively. (3) Given sensed data at recording sites (nodes), edges are inferred by different measures on the underlying data (see: Section 3.3.2). (4) Subsequent scientific study is conducted, using the network as a data model. (From Sporns [166]). network statistics and higher-order structures, such as cluster and communities [147, 152, 167], especially under different experimental conditions that may affect these structures, such as spinal cord injuries, epilepsy, or schizophrenia. However, all of these studies infer the network models differently, therefore it is an open challenge to rigorously synthesize these results. 3.3.1 Underlying Data in Brain Networks. The underlying data for structural or function networks are primarily derived from two sources. First, bio-medical imaging technologies, including Magnetic Resonance Imaging (MRI), functional MRI (fMRI), and Diffusion Tensor Imaging (DTI), detect structure of varying densities and water content. These procedures produce a flat two-dimensional image of pixels, or a three-dimensional space of voxels (often as a series of imaging over time). For example, DTI is used to construct structural networks. These images can accurately trace axon tissue connectivity by measuring flow vector orientation through the voxel space. fMRI similarly measures blood flow to voxels, a surrogate for 'activity' at this location. Inferring a functional network on fMRI data then amounts to measuring statistical interactions (e.g., correlation) between activations in different brain areas. Second, non-invasive sensors, including electroencephalography (EEG) and magnetoencephalography (MEG), measure and localize electrical current at a probed location. Typically, these probes yield fewer and spatially coarser nodes than those defined from fMRI voxel data. These techniques produce time-series estimating electrical current (a measure for 'activity') at reference locations. Figure 7 illustrates defining both structural and functional networks, from (1) the data collection on individual subjects to (4) the final analysis task. The left path of Figure 7 illustrates constructing 18 structural networks. (2) Anatomical parcellation techniques use DTI or similar imaging to determine physical connectivity in the brain. These techniques are very accurate in recovering tracts of connectivity, unambiguously. (3) these tracts are translated into nodes and edges, where previous work shows significant effects of node definition on descriptive measures such as average path length and clustering coefficient [201]. Finally, (4) researchers use the networks as models to ask questions about the brain of the original subject or population. The right path of Figure 7 illustrates inferring functional networks from sensed neuronal activity. This activity can be for a range of stimulus such as music preferences [194], image/language associations [135] or for experimental conditions such as an Alzheimer's patient cohort [175]. (2) fMRI, EEG, or MEG sensors measure activity at different recording sites (contact locations, pixel or voxel locations). As in structural network construction, pixel aggregation or node definition mapping may be applied. (3) These activity response signals are compared between recording sites (nodes) with time series similarity measures (e.g., cross-correlation). 'Sufficiently' similar time series are interpreted as latent connections between nodes, yielding the final functional network. One class of experiments focuses on functional networks from fMRI, coupled with a particular experimental user task (e.g., speaking, listening, motor). Another class focuses on inferring resting- state networks (RSNs) of the brain [72]. These networks are constructed in much the same way as other functional networks, except this resting connectivity is informative of very robust functional clusters. Functional networks for different user tasks can then be characterized at a higher level (e.g., cognitively 'difficult' tasks) by comparing to the resting-state network (RSN). Another network of particular research interest is the 'rich-club' structural sub-networks [184– 186]. This network is essentially a k-core decomposition of the structural network, which indicates the global 'backbone' of connectivity (where k > 10 is set in comparison to degree-preserving randomized networks). Nodes within the rich-club network are used to characterize the broader network into 'rich-club edges' connecting two rich-club nodes, 'feeder edges' connecting exactly one rich-club node, and 'local edges' which connect two non rich-club nodes (see: Figure 8). Analogous to routing in communication networks, information can flow locally within one local region for a particular behavior, or routed through backbones to physically distant regions. 3.3.2 Methods for Inferring Networks. Neuroimaging time series are the dominant underlying data in neuroscience, therefore methods for constructing functional brain networks are almost exclusively in the domain of thresholded pairwise similarity measures, with some exceptions of parametric network modeling [100]. Sakkalis [156] provides an in-depth review of these different measures, including cross-correlation [18, 200], frequency domain analysis such as discrete Fourier transform (DFT) and discrete wavelet transform (DWT) and domain-driven 'coherence' measures [109, 138, 140, 203]. Finally, significant work focuses on causal models [145], including Granger causality [48, 150] and dynamic causal models (DCM) [44, 64, 151]. Where these methods have threshold parameters, τ, they are often validated by measuring robustness of network statistics across varying thresholds [105], then using these thresholds for distinguishing patient cohorts by label or network statistic distribution. For example, previous work uses a paired t-test or other simple statistical test [176]. Kramer et al. [104] proposes a bootstrapping [56] method in the frequency domain, providing more general p-values without model assumptions. 3.3.3 Dynamic Functional Brain Networks. Since the underlying data of functional brain networks is often time series, a time series of networks (dynamic networks, or time-evolving networks) are a natural extension in this domain [89]. Network construction using time-series similarity measures (e.g., cross-correlation) generalize to the dynamic setting, computing on time-series subsequences. The advantage of introducing the complexity of dynamics is discovering distinct connectivity 'states' over the course of the experiment. Because fMRI response can change very quickly as 19 Fig. 8. A study methodology comparing structural and functional brain networks. (a) a schematic of the rich-club structural network. Blue nodes indicate the k-core decomposition of the structural network (k > 10), grey nodes indicate non-rich nodes. Red ('rich-club') edges connect two rich-club nodes, orange ('feeder') edges connect exactly one rich-club and one non-rich node, yellow ('local') edges connect two non-rich nodes. (b) the network with colored nodes and edges, visualized in a brain coordinate system. (c) an adjacency matrix comparing structural topology sensed from Diffusion Tensor Imaging with rich-club edge coloring (left) to three thresholded values of functional connections for resting brain state inferred from fMRI for the same node-set (right). These nodes are ordered according to brain function in different regions of the brain. (d) the distribution of rich-club nodes within these different labeled regions. (From Sporns [166]). activity occurs over the brain, these states are lost under global time series measures [42, 149, 198]. Challenges of network validation generalize to this dynamic setting, with the added challenge of appropriate temporal scale [62, 174]. 3.3.4 Comparing Functional and Structural Brain Networks. Figure 8 illustrates a complete case study summarizing many of the topics discussed above. This work integrates structural networks across 75 individuals, sensed from Diffusion Tensor Imaging (DTI) with functional networks sensed from fMRI in resting state using Pearson correlation. These different views of the network enable researchers to study how function and physical connectivity are correlated. (a) illustrates a schematic layout of rich-club nodes, feeder, and local nodes. (b) shows the layout of these nodes in a brain coordinate system, with the same node and edge coloring. (c) illustrates an adjacency matrix comparing structural connections (left) with three thresholded values of functional connections within the same node-set (right). Furthermore, nodes in different spatial regions of the brain (e.g., default mode network, motor, auditory, frontal) are labeled according to primary function, showing structural and functional edges between these regions. (d) shows the distribution of rich-club nodes within these different labeled regions. 3.4 Epidemiology, Blogs, Information Networks: Modeling Virus Spread and Information Flow 3.4.1 Networks in Epidemiology. Networks are used in epidemiology to simulate the spread of disease over a family of parametric network models (e.g., random, small-world, exponential random graphs) representing contact between entities over time [95]. Network structure inference in epidemiology and information networks aims to discover an unobservable network (e.g., physical 20 (a) (b) (c) (d) Fig. 9. Examples of networks inferred from data, or modeled in the epidemiology domain. (a) depicts a contact network where squares are respondents and edges are sexual or drug contact which might transmit HIV [16]. (b) a sexual network derived from snowball sampling of respondents (squares), where the edges between non-respondents (circle nodes) are unknown. (c) a network of households (cliques) and their interconnections for modeling infection in realistic social contact networks. (d) The 'small-world' network property modeled through a lattice with sparse edges connecting distant nodes. (From Danon et al. [43]). contact networks, sexual networks, malware transmission) over which information or infection is spread. We observe the effects of transmission on the infected node (e.g symptoms), but not the edges over which they spread. The focus in this domain is therefore parametric inference for these models from data. Modeling contact networks allows researchers to simulate different outbreaks on these networks. Figure 9 illustrates types of network data and models used in the epidemiology domain [43]. Figure 9(a) visualizes a contact network from survey data, where squares are respondents and edges identify the transmission risk for HIV through contact by drug use or sex [16]. Figure 9(b) shows a snowball sample of respondents (as squares) and their partners. In this example, edges between circle nodes are unknown. Subsequent modeling for edges between circle nodes can test the spread over this population under different unobserved contact assumptions. Figure 9(c) illustrates a model of households (cliques), sparsely connected to others. This is intended to model contact networks and potential spread through family-unit environments. Finally, 9(d) illustrates a lattice network with sparse edges outside of the local neighborhood. This model was previously used to capture the 'small-world' property of information and disease spread [23]. Historically, inferring networks in this area focuses largely on parametric graphical modeling using Markov Chain Monte Carlo (MCMC) [27] and maximum likelihood methods, incorporating modeling assumptions in transmission and interaction rates. Given a compartmental transmission model [25] (e.g., the susceptible-infected-recovered SIR model or susceptible-exposed-infected-recovered SEIR model), these methods measure the likeli- hood of possible sequences, or trees of infection, where infection times from a root are monotonically increasing. Let ti and tj denote the infection times of nodes ni and nj, then the transmission model yields the likelihood P("j infected i"tj − tj). 3.4.2 Contact Network Inference. Early work in the epidemiology domain focused on the infer- ence of either spread parameters (e.g., infection rate) or network model parameters on random graphs [26], Poisson, and power-law networks [126], as well as fitting of real-world data to a contact network model [9]. In these analytical and simulation results, the network model is known and no structural inference is necessary. These studies generally model the spread of an epidemic under possible individuals in contact (called 'contact tracing') [136] and discovering the root individual(s) of the infection (called 'transmission tracing'). Early work also formulates association network heuristics based on time and distance of potential contacts [82]. 21 (a) (b) Fig. 10. (a) illustrates constructing network G∗ on a collection of cascades c1, c2...ck . For a source node s, these methods estimate the likelihood of infecting i given the observation of information arrival ('infection') at node i. (b) An estimated network inferred from hyperlink arrival times at nodes. (From Gomez-Rodriguez et al. [68]). 3.4.3 Infection-Time Cascades. Previous work in machine learning uses network structure inference to represent the spread of information between nodes, where the edges of transmission are unobservable. Maximum-likelihood methods have focused on learning a network under assumed transmission rate models, using statistical inference for these parameters [129]. Figure 10(a) illustrates the intuition of network construction by information propagation through unobservable edges. To recover the unobservable true network G∗, each sequence of non-decreasing infection times (e.g., "cascades") supports the possible transmission between nodes with sufficiently close infection times. The key step of this work is learning the parameters of a transmission model which measures the likelihood of a cascade according to differences in "adjacent" infection times in the network. Myers and Leskovec [129] use convex programming to learn a maximum-likelihood network under a fixed transmission time probability distributions w(t) and recovery-time distribution r(t). To learn the transmission weight matrix A, the authors use an Independent Cascade model [96] where an uninfected node ni is exposed to infection by adjacent infected nodes nj at each time step using a Bernoulli process with a probability Aj,i. The authors present a convex optimization formulation of their likelihood function, with regularization. This model, and most of the subsequent work, is evaluated on synthetic network models where the underlying network is explicitly known. The 'task' is the accurate reconstruction of the network which simulated these infection times. Similar to gene regulatory networks, the final evaluation of the network is the network itself, rather than a subsequent task on the inferred network. These methods then also typically present qualitative results on real-world datasets. Gomez-Rodriguez et al. [68] scales this previous work by fixing a global edge transmission probability β and solving this simplified problem. For many applications, this fixed transmission probability assumption can be made. The primary insight under this assumption is that we can simply use the most likely propagation tree over a set of nodes in a cascade c (see: Figure 10). Given a cascade set C, the authors marginalize their likelihood function relative to edge selection and prove this function is monotonic and submodular. Therefore, edges can be greedily selected with an approximation factor of (1 − 1/e) [131]. The transmission model of [129] assumes repeated Bernoulli trials of fixed probability. Gomez- Rodriguez et al. [67] introduce transmission likelihood functions which vary over time. Given a set of cascades C, the method infers the parameters of transmission rate models for each edge. The model uses a hazard function H(τiτj; αj,i) that measures the instantaneous infection rate on node ni from infected node nj, given the parametric function on α. The authors present three 22 Fig. 11. Transmission histograms, showing poor fit of exponential and Raleigh models. (From Du et al. [51]). different transmission model functions: Exponential, Power-law, and Rayleigh, and prove that the optimization for transmission rates matrix A is convex. In many real-world applications, information can propagate in a multitude of ways. Older information might be promoted by an influential node, causing multi-modal spikes in propagation after some delays. Therefore, these transmission rates may not decay monotonically, nor according to any simple parametric function. Figure 11 illustrates this intuition on real transmission data between blog sites. The figure reports the probability density function (y-axis) over varying time delays between post creations on different nodes (x-axis). The data poorly fits any single exponential or Rayleigh transmission model. Du et al. [51] extends previous work to address this limitation. The key addition of this work is to kernelize the hazard function H(τ∗τj , αj,i) over m different kernels. These kernels serve as a piecewise approximation of the time-lag distribution, which can then be used to estimate the likelihood of transmission between nodes, given observed 'infection' data. We have dug deeper into the technical details in this section to demonstrate the added modeling complexity accounting for richer assumptions of the underlying transmission process. However, there is still an important gap. Previous work does not typically account for null modeling. In this instance the underlying process may not be a network, but a confounding process which might individually 'infect' nodes. 3.5 Ecology: Inferring Animal Social Networks to Explain Social Behavior 3.5.1 Networks in Ecology. Networks in ecology model systems at differing levels of abstraction. In systems ecology, traditional graphical models are used to model an ecosystem at a high level, with relationships between species, environmental variables, services, and other processes [127]. For example, food webs model who-eats-whom within an ecosystem [141]. A second application of networks in behavioral ecology model social systems of animal populations [60, 191]. These networks are the focus of this section. Analogous to sociology and political science, traditional fieldwork data in ecology are collected from direct observation and 'surveys,' measuring interactions or other relationships among individ- uals in the population [12, 173], particularly over time [47, 123, 139]. Networks serves as models to summarize and describe these social or behavioral relationships within these populations. Direct observation of populations allows researchers to incorporate their own intuition and experience into the definition of these networks. In practice, much of the work in this area uses ad-hoc, intuitive network definitions with some sensitivity analysis. These networks derived from direct observation are typically categorical (e.g., kinship relations) or discrete (e.g., thresholding on number of interactions, where interactions are implicitly decided by observers). Methodological consideration are well established in the field on these data, including edge strength thresholding [38], sampling, hypothesis testing [39], and randomization strategies [75, 91]. Each of these provide several different choices for validating the definition of these networks. These networks are tightly 23 0102030405000.10.20.3t(hours)pdf histogramexprayleighKernelCascade0204000.020.040.060.080.1t(hours)pdf histogramexprayleighKernelCascade05010000.020.040.060.080.1t(hours)pdf histogramexprayleighKernelCascade coupled with a particular hypothesis and experimental cohorts in the population. Two networks of interest in animal social networks measure affiliations and associations between individuals [193]. Affiliations describe intentional social relationships between individuals [39, 192] (e.g., grooming pairs of primates), while associations describe a broader set of interactions, which might be driven by structural factors rather than social affinity (e.g. environmental resources, sex, age, and other individual attributes) [15]. Whitehead and James [193] introduce a generalized affiliation index using a linear regression model, using it to remove sets of predictive structural features. The resulting model by subtraction is the affiliative network model. 3.5.2 Instrumentation and Sensing of Animal Populations. Recent instrumentations of individuals and the environment allow the observation of ecosystems and populations at an unprecedented scale using geo-location sensors such as GPS, proximity sensors, radio-telemetry, and Passive Integrated Transponder (PIT) tags [94, 106, 154], as well as individual identification by photographs [17]. This instrumentation allows the study of detailed individual behavior and social dynamics that are outside the direct observation of researchers. This abundance of data requires novel statistical techniques for inferring networks from implicit interactions. Defining meaningful 'interactions' directly from data is non-trivial. No known work compares the biases of interaction and/or affiliation sampling via traditional direct observation fieldwork, against the interaction or affiliation inference from underlying data. Presently, these sensors are most effective at recording simple co-location or trajectories. Challenging independent problems such as activity recognition (e.g., grooming, conflict) are much more easily identified by direct observation by researchers than by data, but these direct observations do not scale. Future research will likely integrate the strengths of these modalities to improve fieldwork data collection. 3.5.3 Studies and Network Inference Methods on Instrumented Data. The key difference between data from traditional fieldwork and from instrumented technologies is that the former tend to be discrete counts (e.g., number of co-locations or grooming events), while the latter are continuous data without these higher-level labels (e.g., relative distances between individuals). To translate to discrete co-location events–and subsequently a network–requires defining "how close" for "which duration" constitutes a co-location edge, or "how correlated" for "which duration" constitutes a higher-order edge in the network. The simplest method for setting these closeness and persistence thresholds for co-location is by domain knowledge, or by sampling the parameter-space in some way. Haddadi et al. [75] use this strategy in GPS data from sheep, ranging from individuals co-locating for 1 minute at 1 meter, to 5 minutes at 3.5 meters. The authors have some known 'affiliations' (as described above), which are used to validate network accuracy at these different thresholds when the individuals are mixed into a larger population. Aplin et al. [6] collected data from passive integrated transponder (PIT) tags of individuals sensed by radio-frequency identification (RFID) antennae at feeder sites. This work defines associations as two individuals co-occurring at the site within 30 seconds before or after the other on a sliding 75 second window. Co-occurrence is categorical due to the physical design of feeders, so only the 'persistence' of interaction need be defined. This threshold generates a stream of pairwise associations which is then thresholded again (τ ≥ 0.02) to produce an aggregated association network. Psorakis et al. [143] define edges using Gaussian mixture models (GMM) on co-occurrence data for a similar feeder system. This approach mitigates the 'persistence' threshold by fitting Gaussian distributions to a one-dimensional space of occurrence counts (and generalized to continuous two- dimensional geographic space, [59]). These distributions capture events of co-occurrence among several individuals. Hamede et al. [77] used a randomization approach to define non-random associations on proximity sensors on a population of wild Tasmanian devils (Sarcophilus harrisii). 24 (a) (b) (c) Fig. 12. Networks inferred from co-location at feeding stations sensed using RFID over three different populations. These edges are colored showing learned behavior (red edges) of obtaining food through an instrumented puzzle mechanism, the trained individuals (yellow nodes), and affiliated individuals using the default strategy (black edges). (From Aplin et al. [5]). Internal thresholds on these sensors detect co-location within 30 centimeters. This work studies disease transmission through physical contact of the animals, so this thresholding is appropriate. We enumerate several instances to demonstrate that these network constructions are typically 'ad- hoc' from domain knowledge. In each case, the sensitivity of downstream hypotheses is not tested against the choice of network threshold parameters. This may result in inadvertent fine-tuning of parameters and incorrect conclusions. 3.5.4 Translating Co-Location Data to Innovation Spread in Networks. Aplin et al. [5] proposed a network inference task to measure the learning of a feeding behavior in a population of great tits (Parus major). In this experiment, feeders were instrumented with RFID antennae and recorded the visitation of each unique bird using PIT tags. The feeders had a sliding door that needed to be open to the left or right to access the food. The feeder recorded the bird's puzzle solution. The authors investigated whether birds learn by example from others at the feeding sites. Figure 12 shows a thresholded, aggregated network over individuals, weighted by the frequency of co-location events at any feeder, using the Gaussian mixture model (GMM) method described above for interaction 'events'. Yellow nodes represent trained individuals, red nodes represent individuals that have learned the correct behavior to solve the feeder by the end of the study. These networks visually show strong network modules between red and black individuals. Figure 12(b) shows a strong network separation between the two behaviors, where trained individuals are within the red cluster. Figure 12(c) shows two strong red clusters around both trained individuals, but also that the correct behavior has spread across a component of untrained individuals. 3.5.5 Testing Biological Hypotheses Using Networks as Models. Farine et al. [59] evaluates net- works inferred from geo-location data of individual olive baboons (Papio anubis) within a troop. The authors evaluate varying networks for their ability to be used as models for predicting the future location of individuals. Figure 13 shows an affiliation network inferred on a large time-scale. Individual baboons are fitted with high-resolution GPS collars and are represented as nodes. Edge weights indicate the proportion of time two individuals are within 1.5 meters for at least 1 minute, over much of the course of data collection. The authors also generate an alternative k-nearest neighbor network model over varying k at shorter time-scales. For a given node, the location centroid of neighbors in each of these networks is used as a prediction of the individual's location. This collection of networks represents different hypotheses for the mechanism of predictable interactions between baboons: how many individuals do baboons pay attention to at a time? How 25 Fig. 13. A "co-sitting" network inferred from geo-location data on a population of baboons. Edge weights are proportional to the time two individuals are within 1.5 meters for at least 1 minute. (From Farine et al. [59]). long do these relationships persist? And do individuals have fixed preferences which are more predictive than interactions over time? This study finds that a k-nearest neighbor network of k = 4, 5, 6 are most predictive and statistically significant. This is biologically meaningful and agrees with previous work showing grooming cliques in baboons tend to be size 4–8 [52]. This size indicates the biological capability of baboons to manage attention and social relationships at a given time. The study also finds that at longer time scales on the order of 10 minutes, the network of long-term affiliations becomes more predictive. So, different networks are more appropriate models of behavior on different time scales. 3.6 Mobile Social Networks: Studying Human Mobility Through Social Relationships 3.6.1 Underlying Data in Mobile Networks. Phones and other mobile devices are among the most versatile and informative sensors of personal and social activity [110]. The modeling of mobile phone data as networks is motivated by the complex, overlapping, and dynamic modalities which are sensed by these devices. Mobile devices collect physical proximity (bluetooth, WiFi), physical location (GPS), direct communication (SMS, voice), interactions with applications, interactions through other online social networks and email [101]. Integrating these modalities promises to give a rich picture of large-scale human mobility, dynamics and scale [157], geography and communication [21, 146], and offline face-to-face social networks. While much of this underlying data is similar to data collected for animal social networks (prox- imity, location, discrete interactions), there are notable trade-offs between privacy and experimental design within these domains. While animals are not due rights to data privacy, they are also unable to comply with instructions or be surveyed for ground truth network edges. In human experiments, contact diaries [121] or Facebook friends [158] have been collected to validate networks inferred from proximity sensors. Experiments on mobile users are necessarily less invasive, while topics such as disease spread and sexual contact networks are often sensed in animal populations. Data privacy requires careful, informed consent and secure storage [171]; location has been shown very effective to uniquely identify users using only a few data points [46]. Several mobile datasets have been collected for the purposes of social research [20]. The "Reality Mining" dataset is the first large-scale collection, on 100 participants (faculty and students) in the MIT Media Laboratory [54]. This anonymized dataset contains call logs, Bluetooth device proximity, cell tower ID (a proxy for location), and other fields. Similar mobile data collection projects followed, including the Lausanne Data Collection Campaign on 170 student participants [111], the Social fMRI study on 130 participants [3], and the SensibleDTU project of 1,000 participants [172]. These subsequent studies collected more detailed user activity, surveys, online social network activity, and detailed user demographics, addressing the limitations of previous efforts. 26 adult maleadult femalesubadult malesubadult femalejuvenile (a) (b) Fig. 14. (a) a weighted latent network inferred by Bluetooth proximity and call records on the population of Reality Mining users. (b) the self-reported ground-truth friendship network. (From Eagle and Pentland [53]). Finally, the SocioPatterns platform [11, 36] uses a specialized proximity sensor design to record face-to-face interactions. These sensors have been deployed in an academic conference setting [164], elementary schools [169], high schools [121], and several other environments. The specificity of these sensors for detecting individual interactions between users addresses the challenges of using general proximity sensors (e.g., Bluetooth) for population studies. 3.6.2 Studies and Methods on Mobile Data. The primary task in inferring networks from mobile data is related to comparison across modalities, for edge or attribute prediction. Previous work focuses on predicting Facebook friends from Bluetooth co-location [158], as well as survey-reported friends from proximity and call record data [53]. Figure 14 examines this latter task. The network in Figure 14(a) is inferred using principle components analysis of Bluetooth proximity counts across different times and locations (e.g., work, off-campus, weekday, weekend). The authors assign edge weights according to the PCA factor that by inspection corresponded to "non-work" hours (e.g., "close friends are those co-located outside of work"). Figure 14(b) reports the ground-truth social network, self-reported from a user survey, accurately reconstructed by the inferred network. While the discovery that friends meet or call after work is not particularly surprising, this demonstrates the integration approach of these modalities for the simple edge prediction task. The principle components measure to infer the network edges also incorporates domain knowledge of work schedules. Previous work shows that human mobility in urban environments is highly periodic between a small set of locations (e.g., home and work) [53]. Therefore, incorporating these periodicities explicitly is a key aspect of this domain. De Choudhury et al. [45] revisit the discussion of setting similarity threshold τ for an interaction measure calculated on data. Even under a fixed interaction measure, varying τ realizes many possible networks. In Figure 15, from left to right the number of required emails exchanged increases in order to define an edge, thus reducing the resulting network density. Any predictive task on this network balances novelty against the task difficulty: at a low threshold, a dense graph is realized and edge prediction may not perform better than random because the definition of the edge is simply noise. However, a very high threshold may infer a very sparse network, where edges are trivially easy to predict (but uninteresting). The authors generate one-year aggregated networks in a university email dataset and the Enron email dataset (note that the time-scale is arbitrarily set). The authors tune the global threshold τ according to performance across several different classification tasks on sets of node-level features 27 (a) A network inferred from a university email corpus (b) A network inferred from the Enron email corpus Fig. 15. Two networks inferred over varying network thresholds τ , creating sparser networks from left to right as the threshold criteria becomes more strict (e.g., more than τ email interactions for an edge between individuals vi and vj ). (From De Choudhury et al. [45]). from each inferred network. These tasks include classification of node class (e.g., undergraduate, graduate, faculty, staff), gender, "community" (with class labels provided by stochastic block model- ing, [86]), where each of these tasks may be independently of interest. If these node demographics and communities were separable as a set of behaviors at some "natural" threshold, this analysis would discover the threshold yielding the maximal classification accuracy. The authors also predict future communication activity using simple linear regression, reporting the accuracy at these same τ. Each of these tasks yield a similar range of high performing τ thresholds, suggesting that classification and prediction agree across multiple views of the network. 4 CONCLUSION This survey aims to provide a vocabulary and structure to the problem of inferring networks from data. Typically, this problem is addressed in data preprocessing, often with several artful steps of parameter tuning or feature selection. We propose investigation of this problem using a more general and rigorous methodology for building networks appropriate for data science questions. We survey several domains in order to illustrate their varying questions, challenges and how the nature of the data drives the methodological specializations in the areas. For example–with some simplification–we observe that gene regulatory networks are methodologically very mature, with a breadth of interaction measures appropriate for multivariate, matrix data (e.g., microarray) including regression and graphical models. Climate networks and brain networks are mature in time series interaction measures, including causal and frequency-based analysis, respectively. The problems in each of these areas are still exploratory, focusing on integrating and validating networks from different data (e.g., structural and functional brain networks) to develop data science tools downstream from these robust network models. Animal social networks inherit traditional direct observation data in relatively simple formats, with instrumented sensing now becoming more feasible. This yields relatively simple network models over straightforward parameters (e.g., distance and persistence), with a focus on experimental design. Epidemiology historically studies observed infection data spreading across a hidden contact network. Therefore, modeling these transmission functions is a key to this area. We hope that this data-driven summary might help locate models and expertise on networks derived from different underlying data modalities. Previous work often assumes that the objective of network inference is uncovering "the network" representation which is obscured by noise. Often in this context, the network inference method 28 tries to reconstruct known ground-truth networks from data. In contrast, our work treats a network as a model to perform a particular task, where we often cannot access the ground truth network, or assume its parametric form. Analogous to clustering for a classification task, there are many possible clusterings which are only as valuable as the accuracy improvement they provide of a downstream task (e.g., classification) or question. Conceptualizing network inference within the complete data science methodology–from data (to network) to task models for particular questions–focuses on a tighter coupling of network models constructed from data and task models. There are several methodologies across domains which use randomization, causality, and signifi- cance testing strategies to rigorously learn the network model under some assumptions. While these networks are appropriate according to their structural assumptions, they may not be the most informative for the question/task(s) of interest. Currently, no general, statistically rigorous methodology exists to learn and evaluate networks over particular task(s). Furthermore, there is little understanding of the criteria for network models and predictive models which would make them appropriate for this paired evaluation. We anticipate this will be an exciting area of future research and look forward to the followup publications. 5 ACKNOWLEDGEMENTS This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344 (LLNL-JRNL-703477), and with support of National Science Foundation grants III-1514126 (Berger-Wolf), CNS-1248080 (Berger- Wolf), and IGERT CNS-1069311 (Brugere). REFERENCES [1] Eytan Adar and Lada A. Adamic. 2005. Tracking information epidemics in blogspace. In Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence. 207–214. https://doi.org/10.1109/WI.2005.151 [2] Charu Aggarwal and Karthik Subbian. 2014. Evolutionary Network Analysis: A Survey. ACM Comput. Surv. 47, 1 (May 2014), 10:1–10:36. https://doi.org/10.1145/2601412 [3] Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, and Alex Pentland. 2011. Social fMRI: Investigating and Shaping Social Mechanisms in the Real World. Pervasive Mob. Comput. 7, 6 (Dec. 2011), 643–659. https://doi.org/10.1016/j. pmcj.2011.09.004 [4] Genevera I. Allen and Zhandong Liu. 2012. A Log-Linear Graphical Model for Inferring Genetic Networks from High-throughput Sequencing Data. In Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) (BIBM '12). IEEE Computer Society, 1–6. https://doi.org/10.1109/BIBM.2012.6392619 [5] Lucy M. Aplin, Damien R. Farine, Julie Morand-Ferron, Andrew Cockburn, Alex Thornton, and Ben C. Sheldon. 2015. Experimentally induced innovations lead to persistent culture via conformity in wild birds. Nature 518, 7540 (Feb. 2015), 538–541. https://doi.org/10.1038/nature13998 [6] Lucy M. Aplin, Damien R. Farine, Julie Morand-Ferron, and Ben C. Sheldon. 2012. Social networks predict patch discovery in a wild population of songbirds. Proceedings of the Royal Society of London B: Biological Sciences (2012). https://doi.org/10.1098/rspb.2012.1591 [7] Mahmoudreza Babaei, Przemyslaw Grabowicz, Isabel Valera, Krishna P. Gummadi, and Manuel Gomez-Rodriguez. 2016. On the Efficiency of the Information Networks in Social Media. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). ACM, 83–92. https://doi.org/10.1145/2835776.2835826 [8] Lars Backstrom and Jon Kleinberg. 2011. Network Bucket Testing. In Proceedings of the 20th International Conference on World Wide Web (WWW '11). ACM, 615–624. https://doi.org/10.1145/1963405.1963492 [9] Shweta Bansal, Bryan T. Grenfell, and Lauren Ancel Meyers. 2007. When individual behaviour matters: homogeneous and network models in epidemiology. J. Royal Soc. Interface 4, 16 (2007), 879–891. https://doi.org/10.1098/rsif.2007.1100 [10] Ziv Bar-Joseph, Anthony Gitter, and Itamar Simon. 2012. Studying and modelling dynamic biological processes using time-series gene expression data. Nature Reviews Genetics 13, 8 (Aug. 2012), 552–564. https://doi.org/10.1038/nrg3244 [11] Alain Barrat, Ciro Cattuto, Vittoria Colizza, Jean-François Pinton, Wouter Van den Broeck, and Alessandro Vespignani. 2008. High Resolution Dynamical Mapping of Social Interactions With Active RFID. ArXiv e-prints (Nov. 2008). http://arxiv.org/abs/0811.4170v2 [12] Louise Barrett, Peter Henzi, and David Lusseau. 2012. Taking sociality seriously: the structure of multi-dimensional social networks as a source of information for individuals. Philosophical Transactions of the Royal Society of London B: Biological Sciences 367, 1599 (2012), 2108–2118. https://doi.org/10.1098/rstb.2012.0113 [13] Tanya Barrett, Stephen E. Wilhite, Pierre Ledoux, Carlos Evangelista, Irene F. Kim, Maxim Tomashevsky, Kimberly A. Marshall, Katherine H. Phillippy, Patti M. Sherman, Michelle Holko, Andrey Yefanov, Hyeseung Lee, Naigong Zhang, 29 Cynthia L. Robertson, Nadezhda Serova, Sean Davis, and Alexandra Soboleva. 2013. NCBI GEO: archive for functional genomics data sets–update. Nucleic Acids Research 41, D1 (2013), D991–D995. https://doi.org/10.1093/nar/gks1193 [14] Baruch Barzel and Albert-Laszlo Barabasi. 2013. Network link prediction by global silencing of indirect correlations. Nature Biotechnology 31, 8 (Aug. 2013), 720–725. https://doi.org/10.1038/nbt.2601 [15] Lars Bejder, David Fletcher, and Stefan Bräger. 1998. A method for testing association patterns of social animals. Animal Behaviour 56, 3 (1998), 719–725. https://doi.org/10.1006/anbe.1998.0802 [16] David C. Bell, John S. Atkinson, and Jerry W. Carlson. 1999. Centrality measures for disease transmission networks. Social Networks 21, 1 (1999), 1–21. https://doi.org/10.1016/S0378-8733(98)00010-0 [17] Tanya Y. Berger-Wolf, Daniel I. Rubenstein, Charles V. Stewart, Jason A. Holmberg, Jason Parham, Sreejith Menon, Jonathan Crall, Jon Van Oast, Emre Kiciman, and Lucas Joppa. 2017. Wildbook: Crowdsourcing, computer vision, and data science for conservation. ArXiv e-prints (Oct. 2017). https://arxiv.org/abs/1710.08880 [18] Stephan Bialonski, Martin Wendler, and Klaus Lehnertz. 2011. Unraveling Spurious Properties of Interaction Networks with Tailored Random Networks. PLoS ONE 6, 8 (Aug. 2011), e22826. https://doi.org/10.1371%2Fjournal.pone.0022826 [19] Concha Bielza and Pedro Larrañaga. 2014. Bayesian networks in neuroscience: a survey. Frontiers in Computational Neuroscience 8 (Oct. 2014), 131. https://doi.org/10.3389/fncom.2014.00131 [20] Vincent D. Blondel, Adeline Decuyper, and Gautier Krings. 2015. A survey of results on mobile phone datasets analysis. EPJ Data Science 4, 1 (2015), 1–55. https://doi.org/10.1140/epjds/s13688-015-0046-0 [21] Vincent D. Blondel, Gautier Krings, and Isabelle Thomas. 2010. Regions and borders of mobile telephony in Belgium and in the Brussels metropolitan zone. Brussels Studies (2010). https://doi.org/2078.1/95261 [22] Stefano Boccaletti, Ginestra Bianconi, Regino Criado Herrero, Charo I. del Genio, Jesus Gómez-Gardeñes, Miguel Romance, Irene Sendiña-Nadal, Zhen Wang, and Massimiliano Zanin. 2014. The structure and dynamics of multilayer networks. Physics Reports 544, 1 (2014), 1–122. https://doi.org/10.1016/j.physrep.2014.07.001 [23] Michael Boots and Akira Sasaki. 1999. "Small worlds" and the evolution of virulence: infection occurs locally and at a distance. Proceedings of the Royal Society of London B: Biological Sciences 266, 1432 (1999), 1933–1938. https://doi.org/10.1098/rspb.1999.0869 [24] Ulrik Brandes, Garry Robins, Ann Mccranie, and Stanley Wasserman. 2013. What is network science? Network Science [25] Fred Brauer. 2008. Compartmental Models in Epidemiology. Springer Berlin Heidelberg, Berlin, Heidelberg, 19–79. 1, 1 (2013), 1–15. https://doi.org/10.1017/nws.2013.2 https://doi.org/10.1007/978-3-540-78911-6_2 [26] Tom Britton and Philip D. O'Neill. 2002. Bayesian Inference for Stochastic Epidemics in Populations with Random Social Structure. Scandinavian Journal of Statistics 29, 3 (Sept. 2002), 375–390. https://doi.org/10.1111/1467-9469.00296 [27] Steve Brooks, Andrew Gelman, Galin Jones, and Xiao-Li Meng. 2011. Handbook of Markov Chain Monte Carlo. CRC Press. https://books.google.com/books?id=qfRsAIKZ4rIC [28] Ivan Brugere and Tanya Y. Berger-Wolf. 2017. Network Model Selection Using Task-Focused Minimum Description Length. ArXiv e-prints (Oct. 2017). https://arxiv.org/abs/1710.05207 [29] Ivan Brugere, Chris Kanich, and Tanya Y. Berger-Wolf. 2017. Evaluating Social Networks Using Task-Focused Network Inference. In Proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG). https://arxiv.org/abs/1707.02385 [30] Ivan Brugere, Chris Kanich, and Tanya Y. Berger-Wolf. 2017. Network Model Selection for Task-Focused Attributed Network Inference. In 2017 IEEE International Conference on Data Mining Workshop (ICDMW). https://arxiv.org/abs/ 1708.06303 [31] Ed Bullmore and Olaf Sporns. 2009. Complex brain networks: graph theoretical analysis of structural and functional systems. Nature Reviews Neuroscience 10, 3 (Mar. 2009), 186–198. https://doi.org/10.1038/nrn2575 [32] Atul J. Butte and Isaac S. Kohane. 2000. Mutual Information Relevance Networks: Functional Genomic Clustering Using Pairwise Entropy Measurements. Pacific Symposium on Biocomputing 5 (2000), 415–426. https://doi.org/10. 1142/9789814447331_0040 [33] Leila Cammoun, Xavier Gigandet, Djalel Meskaldji, Jean Philippe Thiran, Olaf Sporns, Kim Q Do, Philippe Maeder, Reto Meuli, and Patric Hagmann. 2012. Mapping the human connectome at multiple scales with diffusion spectrum MRI. Journal of Neuroscience Methods 203, 2 (2012), 386–397. https://doi.org/10.1016/j.jneumeth.2011.09.031 [34] Bokai Cao, Lifang He, Xiaokai Wei, Mengqi Xing, Philip S. Yu, Heide Klumpp, and Alex D. Leow. 2017. t-BNE: Tensor-based Brain Network Embedding. 189–197. https://doi.org/10.1137/1.9781611974973.22 [35] Longbing Cao. 2017. Data Science: A Comprehensive Overview. ACM Comput. Surv. 50, 3, Article 43 (June 2017), 42 pages. https://doi.org/10.1145/3076253 [36] Ciro Cattuto, Wouter Van den Broeck, Alain Barrat, Vittoria Colizza, Jean-François Pinton, and Alessandro Vespignani. 2010. Dynamics of Person-to-Person Interactions from Distributed RFID Sensor Networks. PLOS ONE 5, 7 (July 2010), e11596. https://doi.org/10.1371/journal.pone.0011596 [37] Hau Chan, Hanghang Tong, and Leman Akoglu. 2014. Make It or Break It: Manipulating Robustness in Large Networks. In Proceedings of the 2014 SIAM International Conference on Data Mining. 325–333. https://doi.org/10.1137/ 1.9781611973440.37 [38] Darren P. Croft, Jens Krause, Safi K. Darden, Indar W. Ramnarine, Jolyon J. Faria, and Richard James. 2009. Behavioural Trait Assortment in a Social Network: Patterns and Implications. Behavioral Ecology and Sociobiology 63, 10 (2009), 1495–1503. https://doi.org/10.1007/s00265-009-0802-x [39] Darren P. Croft, Joah R. Madden, Daniel W. Franks, and Richard James. 2011. Hypothesis testing in animal social 30 networks. Trends in Ecology & Evolution 26, 10 (2011), 502–507. https://doi.org/10.1016/j.tree.2011.05.012 [40] Peng Cui, Xiao Wang, Jian Pei, and Wenwu Zhu. 2017. A Survey on Network Embedding. ArXiv e-prints (Nov. 2017). https://arxiv.org/abs/1711.08752 [41] Luciano da Fontoura Costa, Osvaldo N Oliveira Jr., Gonzalo Travieso, Francisco Aparecido Rodrigues, Paulino Ribeiro Villas Boas, Lucas Antiqueira, Matheus Palhares Viana, and Luis Enrique Correa Rocha. 2011. Analyzing and modeling real-world phenomena with complex networks: a survey of applications. Advances in Physics 60, 3 (2011), 329–412. https://doi.org/10.1080/00018732.2011.572452 [42] E. Damaraju, E.A. Allen, A. Belger, J.M. Ford, S. McEwen, D.H. Mathalon, B.A. Mueller, G.D. Pearlson, S.G. Potkin, A. Preda, J.A. Turner, J.G. Vaidya, T.G. van Erp, and V.D. Calhoun. 2014. Dynamic functional connectivity analysis reveals transient states of dysconnectivity in schizophrenia. NeuroImage: Clinical 5 (2014), 298–308. https://doi.org/ 10.1016/j.nicl.2014.07.003 [43] Leon Danon, Ashley P Ford, Thomas House, Chris P Jewell, Matt J Keeling, Gareth O Roberts, Joshua V Ross, and Matthew C Vernon. 2011. Networks and the Epidemiology of Infectious Disease. In Interdisciplinary Perspectives on Infectious Diseases, Vol. 2011. https://doi.org/10.1155/2011/284909 [44] Olivier David, Isabelle Guillemain, Sandrine Saillet, Sebastien Reyt, Colin Deransart, Christoph Segebarth, and Antoine Depaulis. 2008. Identifying Neural Drivers with Functional MRI: An Electrophysiological Validation. PLoS Biology 6, 12 (Dec. 2008), e315. https://doi.org/10.1371/journal.pbio.0060315 [45] Munmun De Choudhury, Winter A. Mason, Jake M. Hofman, and Duncan J. Watts. 2010. Inferring Relevant Social Networks from Interpersonal Communication. In Proceedings of the 19th International Conference on World Wide Web (WWW '10). ACM, 301–310. https://doi.org/10.1145/1772690.1772722 [46] Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the Crowd: The privacy bounds of human mobility. Nature Scientific Reports 3 (Mar 2013), 1376. https://doi.org/10.1038/srep01376 [47] Shermin de Silva, Ashoka D.G. Ranjeewa, and Sergey Kryazhimskiy. 2011. The dynamics of social networks among female Asian elephants. BMC Ecology 11, 1 (2011), 1–16. https://doi.org/10.1186/1472-6785-11-17 [48] Mukeshwar Dhamala, Govindan Rangarajan, and Mingzhou Ding. 2008. Analyzing information flow in brain networks with nonparametric Granger causality. NeuroImage 41, 2 (2008), 354–362. https://doi.org/10.1016/j.neuroimage.2008. 02.020 [49] Jonathan F. Donges, Yong Zou, Norbert Marwan, and Juergen Kurths. 2009. Complex networks in climate dynamics. The European Physical Journal Special Topics 174, 1 (2009), 157–179. https://doi.org/10.1140/epjst/e2009-01098-2 [50] Jonathan F. Donges, Yong Zou, Norbert Marwan, and Juergen Kurths. 2009. The backbone of the climate network. EPL (Europhysics Letters) 87, 4 (2009), 48007. https://doi.org/10.1209/0295-5075/87/48007 [51] Nan Du, Le Song, Ming Yuan, and Alex J Smola. 2012. Learning Networks of Heterogeneous Influence. In Advances in Neural Information Processing Systems 25, F Pereira, C J C Burges, L Bottou, and K Q Weinberger (Eds.). 2780–2788. http://papers.nips.cc/paper/4582-learning-networks-of-heterogeneous-influence [52] Robin M. Dunbar. 1992. Time: a hidden constraint on the behavioural ecology of baboons. Behavioral Ecology and Sociobiology 31, 1 (01 Jul 1992), 35–49. https://doi.org/10.1007/BF00167814 [53] Nathan Eagle and Alex Sandy Pentland. 2009. Eigenbehaviors: identifying structure in routine. Behavioral Ecology and Sociobiology 63, 7 (2009), 1057–1066. https://doi.org/10.1007/s00265-009-0739-0 [54] Nathan Eagle and Alex (Sandy) Pentland. 2006. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10, 4 (Mar. 2006), 255–268. https://doi.org/10.1007/s00779-005-0046-3 [55] Imme Ebert-Uphoff and Yi Deng. 2012. Causal Discovery for Climate Research Using Graphical Models. Journal of Climate 25, 17 (Feb. 2012), 5648–5665. https://doi.org/10.1175/JCLI-D-11-00387.1 [56] Bradley Efron and R.J. Tibshirani. 1993. An Introduction to the Bootstrap. Chapman & Hall. [57] Jeremiah J. Faith, Boris Hayete, Joshua T. Thaden, Ilaria Mogno, Jamey Wierzbowski, Guillaume Cottarel, Simon Kasif, James J. Collins, and Timothy S. Gardner. 2007. Large-Scale Mapping and Validation of Escherichia coli Transcriptional Regulation from a Compendium of Expression Profiles. PLoS Biology 5, 1 (Jan. 2007), e8. https: //doi.org/10.1371/journal.pbio.0050008 [58] Damien R. Farine. 2017. A guide to null models for animal social network analysis. Methods in Ecology and Evolution 8, 10 (2017), 1309–1320. https://doi.org/10.1111/2041-210X.12772 [59] Damien R. Farine, Ariana Strandburg-Peshkin, Tanya Y. Berger-Wolf, Brian Ziebart, Ivan Brugere, Jia Li, and Mar- garet C. Crofoot. 2016. Both Nearest Neighbours and Long-term Affiliates Predict Individual Locations Dur- ing Collective Movement in Wild Baboons, In Nature Scientific Reports. Scientific Reports 6, 27704. https: //doi.org/10.1038/srep27704 [60] Damien R. Farine and Hal Whitehead. 2015. Constructing, conducting and interpreting animal social network analysis. Journal of Animal Ecology 84, 5 (2015), 1144–1163. https://doi.org/10.1111/1365-2656.12418 [61] Soheil Feizi, Daniel Marbach, Muriel Medard, and Manolis Kellis. 2013. Network deconvolution as a general method to distinguish direct dependencies in networks. Nature Biotech. 31, 8 (Aug. 2013), 726–733. https://doi.org/10.1038/ nbt.2635 [62] Benjamin Fish and Rajmonda S. Caceres. 2017. A task-driven approach to time scale detection in dynamic networks. In Proceedings of the 13th International Workshop on Mining and Learning with Graphs (MLG). http://www.mlgworkshop. org/2017/paper/MLG2017_paper_17.pdf [63] Robert J. Fletcher, Miguel A. Acevedo, Brian E. Reichert, Kyle E. Pias, and Wiley M. Kitchens. 2011. Social network models predict movement and connectivity in ecological landscapes. Proceedings of the National Academy of Sciences 31 108, 48 (2011), 19282–19287. https://doi.org/10.1073/pnas.1107549108 [64] Karl J Friston, Baojuan Li, Jean Daunizeau, and Klaas E Stephan. 2011. Network discovery with DCM. NeuroImage 56, 3 (Jun. 2011), 1202–1221. https://doi.org/10.1016/j.neuroimage.2010.12.039 [65] Lise Getoor, Nir Friedman, Daphne Koller, Avi Pfeffer, and Ben Taskar. 2007. Models. introduction-statistical-relational-learning Introduction to Statistical Relational Learning (2007), 129. Probabilistic Relational https://mitpress.mit.edu/books/ [66] Anna Goldenberg, Alice X. Zheng, Stephen E. Fienberg, and Edoardo M. Airoldi. 2010. A Survey of Statistical Network Models. Foundations and Trends in Machine Learning 2, 2 (Feb. 2010), 129–233. https://doi.org/10.1561/2200000005 [67] Manuel Gomez-Rodriguez, Jure Leskovec, David Balduzzi, and Bernhard Schölkopf. 2014. Uncovering the structure and temporal dynamics of information propagation. Network Science 2, 1, 26–65. https://doi.org/10.1017/nws.2014.3 [68] Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Krause. 2012. Inferring Networks of Diffusion and Influence. ACM Trans. on Knowledge Discovery from Data 5, 4 (Feb. 2012), 21:1--21:37. https://doi.org/10.1145/2086737.2086741 [69] Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine (Runting) Shi, and Dawn Song. 2014. Joint Link Prediction and Attribute Inference Using a Social-Attribute Network. ACM Trans. Intell. Syst. Technol. 5, 2 (Apr. 2014), 27:1--27:20. https://doi.org/10.1145/2594455 [70] Palash Goyal and Emilio Ferrara. 2017. Graph Embedding Techniques, Applications, and Performance: A Survey. CoRR abs/1705.02801 (2017). http://arxiv.org/abs/1705.02801 [71] Clive W.J. Granger. 1969. Investigating Causal Relations by Econometric Models and Cross-spectral Methods. Econometrica 37, 3 (1969), 424–438. https://doi.org/10.2307/1912791 [72] Michael D. Greicius, Ben Krasnow, Allan L. Reiss, and Vinod Menon. 2003. Functional connectivity in the resting brain: A network analysis of the default mode hypothesis. Proceedings of the National Academy of Sciences 100, 1 (2003), 253–258. https://doi.org/10.1073/pnas.0135058100 [73] Chris Groendyke, David Welch, and David R. Hunter. 2011. Bayesian Inference for Contact Networks Given Epidemic Data. Scandinavian Journal of Statistics 38, 3 (Sept. 2011), 600–616. https://doi.org/10.1111/j.1467-9469.2010.00721.x [74] Huan Gui, Ya Xu, Anmol Bhasin, and Jiawei Han. 2015. Network A/B Testing: From Sampling to Estimation. In Proc. of the 24th Intl. Conference on World Wide Web. ACM, 399–409. https://doi.org/10.1145/2736277.2741081 [75] Hamed Haddadi, Andrew J. King, Alison P. Wills, Damien Fay, John Lowe, A. Jennifer Morton, Stephen Hailes, and Alan M. Wilson. 2011. Determining association networks in social animals: choosing spatial-temporal criteria and sampling rates. Behavioral Ecology and Sociobiology 65, 8 (2011), 1659–1668. https://doi.org/10.1007/s00265-011-1193-3 [76] Hamed Haddadi, Miguel Rio, Gianluca Iannaccone, Andrew Moore, and Richard Mortier. 2008. Network topologies: inference, modeling, and generation. Communications Surveys Tutorials, IEEE 10, 2 (2008), 48–69. https://doi.org/10. 1109/COMST.2008.4564479 [77] Rodrigo K. Hamede, Jim Bashford, Hamish McCallum, and Menna Jones. 2009. Contact networks in a wild Tasmanian devil (Sarcophilus harrisii) population: using social network analysis to reveal seasonal variability in social behaviour and its implications for transmission of devil facial tumour disease. Ecology Letters 12, 11 (2009), 1147–1157. https: //doi.org/10.1111/j.1461-0248.2009.01370.x [78] William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Representation Learning on Graphs: Methods and Applica- tions. ArXiv e-prints (Sept. 2017). https://arxiv.org/abs/1709.05584 [79] Mohammad Al Hasan and Mohammed J. Zaki. 2011. A Survey of Link Prediction in Social Networks. In Social Network Data Analytics SE - 9, Charu C Aggarwal (Ed.). Springer US, 243–275. https://doi.org/10.1007/978-1-4419-8462-3_9 [80] Anne-Claire Haury, Fantine Mordelet, Paola Vera-Licona, and Jean-Philippe Vert. 2012. TIGRESS: Trustful Inference https://doi.org/10.1186/ of Gene REgulation using Stability Selection. BMC Systems Biology 6, 1 (2012), 145. 1752-0509-6-145 [81] S. Havlin, D.Y. Kenett, E. Ben-Jacob, A. Bunde, R. Cohen, H. Hermann, J.W. Kantelhardt, J. Kertész, S. Kirkpatrick, J. Kurths, J. Portugali, and S. Solomon. 2012. Challenges in network science: Applications to infrastructures, climate, social systems and economics. The European Physical Journal Special Topics 214, 1 (2012), 273–293. https://doi.org/10. 1140/epjst/e2012-01695-x [82] D.T. Haydon, M. Chase-Topping, D.J. Shaw, L. Matthews, J.K. Friar, J. Wilesmith, and M.E.J. Woolhouse. 2003. The construction and analysis of epidemic trees with reference to the 2001 UK foot-and-mouth outbreak. Proceedings of the Royal Society of London B: Biological Sciences 270, 1511 (Jan. 2003), 121–127. https://doi.org/10.1098/rspb.2002.2191 [83] Michael Hecker, Sandro Lambeck, Susanne Toepfer, Eugene van Someren, and Reinhard Guthke. 2009. Gene regulatory network inference: Data integration in dynamic models–A review. Biosystems 96, 1 (2009), 86–103. https://doi.org/10.1016/j.biosystems.2008.12.004 [84] Anthony Hey, Stewart Tansley, and Kristin Tolle. 2009. The Fourth Paradigm: Data-Intensive Scientific Discovery. [85] Jaroslav Hlinka, David Hartman, Martin Vejmelka, Jakob Runge, Norbert Marwan, Jürgen Kurths, and Milan Paluš. 2013. Reliability of Inference of Directed Climate Networks Using Conditional Mutual Information. Entropy 15, 6 (2013), 2023. https://doi.org/10.3390/e15062023 [86] Jake M. Hofman and Chris H. Wiggins. 2008. Bayesian Approach to Network Modularity. Physical Review Letters 100, 25 (Jun. 2008), 258701. https://doi.org/10.1103/PhysRevLett.100.258701 [87] Petter Holme. 2015. Modern temporal network theory: a colloquium. The European Physical Journal B 88, 9 (2015), 1–30. https://doi.org/10.1140/epjb/e2015-60657-4 [88] Petter Holme and Jari Saramäki. 2012. Temporal networks. Physics Reports 519, 3 (2012), 97–125. https://doi.org/10. 1016/j.physrep.2012.03.001 32 [89] R Matthew Hutchison, Thilo Womelsdorf, Elena A. Allen, Peter A. Bandettini, Vince D. Calhoun, Maurizio Corbetta, Stefania Della Penna, Jeff H. Duyn, Gary H. Glover, Javier Gonzalez-Castillo, Daniel A. Handwerker, Shella Keilholz, Vesa Kiviniemi, David A. Leopold, Francesco de Pasquale, Olaf Sporns, Martin Walter, and Catie Chang. 2013. Dynamic functional connectivity: Promise, issues, and interpretations. NeuroImage 80 (Oct. 2013), 360–378. https: //doi.org/10.1016/j.neuroimage.2013.05.079 [90] Alon Itai and Michael Rodeh. 1978. Finding a Minimum Circuit in a Graph. SIAM J. Comput. 7, 4 (Nov. 1978), 413–423. https://doi.org/10.1137/0207033 [91] Richard James, Darren P. Croft, and Jens Krause. 2009. Potential banana skins in animal social network analysis. Behavioral Ecology and Sociobiology 63, 7 (2009), 989–997. https://doi.org/10.1007/s00265-009-0742-5 [92] Jaya Kawale, Snigdhansu Chatterjee, Dominick Ormsby, Karsten Steinhaeuser, Stefan Liess, and Vipin Kumar. 2012. Testing the Significance of Spatio-temporal Teleconnection Patterns. In Proc. of ACM SIGKDD 2012 (KDD '12). ACM, 642–650. https://doi.org/10.1145/2339530.2339634 [93] Jaya Kawale, Stefan Liess, Arjun Kumar, Michael Steinbach, Peter Snyder, Vipin Kumar, Auroop R. Ganguly, Nagiza F. Samatova, and Fredrick Semazzi. 2013. A graph-based approach to find teleconnections in climate data. Statistical Analysis and Data Mining 6, 3 (2013), 158–179. https://doi.org/10.1002/sam.11181 [94] Roland Kays, Margaret C. Crofoot, Walter Jetz, and Martin Wikelski. 2015. Terrestrial animal tracking as an eye on life and planet. Science 348, 6240 (2015). https://doi.org/10.1126/science.aaa2478 [95] Matt J. Keeling and Ken T.D. Eames. 2005. Networks and epidemic models. Journal of The Royal Society Interface 2, 4 (Sept. 2005), 295–307. https://doi.org/10.1098/rsif.2005.0051 [96] David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the Spread of Influence Through a Social Network. In Proc. of ACM SIGKDD 2003 (KDD '03). ACM, 137–146. https://doi.org/10.1145/956750.956769 [97] Angelika Kimmig, Lilyana Mihalkova, and Lise Getoor. 2014. Lifted graphical models: a survey. Machine Learning 99, 1 (2014), 1–45. https://doi.org/10.1007/s10994-014-5443-2 [98] Mikko Kivelä, Alex Arenas, Marc Barthelemy, James P. Gleeson, Yamir Moreno, and Mason A. Porter. 2014. Multilayer networks. Journal of Complex Networks 2, 3 (2014), 203–271. https://doi.org/10.1093/comnet/cnu016 [99] Ariel Kleiner, Ameet Talwalkar, Purnamrita Sarkar, and Michael I. Jordan. 2014. A scalable bootstrap for massive data. Journal of the Royal Stat. Soc.: Series B (Statistical Methodology) 76, 4 (2014), 795–816. https://doi.org/10.1111/rssb.12050 [100] Florian Klimm, Danielle S. Bassett, Jean M. Carlson, and Peter J. Mucha. 2014. Resolving Structural Variability in Network Models and the Brain. PLoS Comput Biol 10, 3 (Mar. 2014), e1003491. https://doi.org/10.1371/journal.pcbi. 1003491 [101] Bryan Klimt and Yiming Yang. 2004. The enron corpus: A new dataset for email classification research. In Machine learning: ECML 2004. Springer, 217–226. https://doi.org/10.1007/978-3-540-30115-8_22 [102] Ron Kohavi, Alex Deng, Brian Frasca, Toby Walker, Ya Xu, and Nils Pohlmann. 2013. Online Controlled Experiments at Large Scale. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '13). ACM, New York, NY, USA, 1168–1176. https://doi.org/10.1145/2487575.2488217 [103] Eric D. Kolaczyk. 2009. Network Topology Inference. In Statistical Analysis of Network Data SE - 7. Springer New York, 1–48. https://doi.org/10.1007/978-0-387-88146-1_7 [104] Mark A. Kramer, Uri T. Eden, Sydney S. Cash, and Eric D. Kolaczyk. 2009. Network inference with confidence from multivariate time series. Physical Review E 79, 6 (Jun. 2009), 61916. https://doi.org/10.1103/PhysRevE.79.061916 [105] Mark A. Kramer, Eric D. Kolaczyk, and Heidi E. Kirsch. 2008. Emergent network topology at seizure onset in humans. Epilepsy Research 79, 2–3 (2008), 173–186. https://doi.org/10.1016/j.eplepsyres.2008.02.002 [106] Jens Krause, Stefan Krause, Robert Arlinghaus, Ioannis Psorakis, Stephen Roberts, and Christian Rutz. 2013. Reality mining of animal social systems. Trends in Ecology & Evolution 28, 9 (Sept. 2013), 541–551. https://doi.org/10.1016/j. tree.2013.06.002 [107] Marlene Kretschmer, Dim Coumou, Jonathan F. Donges, and Jakob Runge. 2016. Using Causal Effect Networks to analyze different Arctic drivers of mid-latitude winter circulation. Journal of Climate (Mar 2016). https://doi.org/10. 1175/JCLI-D-15-0654.1 [108] Timothy La Fond and Jennifer Neville. 2010. Randomization Tests for Distinguishing Social Influence and Homophily Effects. In Proc. of the 19th Intl. Conference on World Wide Web. ACM, 601–610. https://doi.org/10.1145/1772690.1772752 [109] Jean-Philippe Lachaux, Antoine Lutz, David Rudrauf, Diego Cosmelli, Michel Le Van Quyen, Jacques Martinerie, and Francisco Varela. 2002. Estimating the time-course of coherence between single-trial brain signals: an introduction to wavelet coherence. Neurophysiologie Clinique/Clinical Neurophysiology 32, 3 (Jun. 2002), 157–174. https://doi.org/10. 1016/S0987-7053(02)00301-5 [110] N.D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A.T. Campbell. 2010. A survey of mobile phone sensing. IEEE Communications Magazine 48, 9 (Sept. 2010), 140–150. https://doi.org/10.1109/MCOM.2010.5560598 [111] Juha K. Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh Minh Tri Do, Olivier Dousse, Julien Eberle, and Markus Miettinen. 2013. From big smartphone data to worldwide research: The Mobile Data Challenge. Pervasive and Mobile Computing 9, 6 (Dec. 2013), 752–771. https://doi.org/10.1016/j.pmcj.2013.07.014 [112] David Lazer. 2011. Networks in Political Science: Back to the Future. PS: Political Science & Politics 44, 01 (2011), 61–68. https://doi.org/10.1017/S1049096510001873 [113] Sophie Lebre, Jennifer Becq, Frederic Devaux, Michael Stumpf, and Gaelle Lelandais. 2010. Statistical inference of the time-varying structure of gene-regulation networks. BMC Systems Biology 4, 1 (2010), 130. https://doi.org/10.1186/ 1752-0509-4-130 33 [114] Jure Leskovec and Eric Horvitz. 2014. Geospatial Structure of a Planetary-Scale Social Network. IEEE Trans. on Computational Social Systems 1, 3 (Sept. 2014), 156–163. https://doi.org/10.1109/TCSS.2014.2377789 [115] S. Levitus, J.I. Antonov, O.K. Baranova, T.P. Boyer, C.L. Coleman, H.E. Garcia, A.I. Grodsky, D.R. Johnson, R.A. Locarnini, A.V. Mishonov, J.R. Reagan, C.L. Sazama, D. Seidov, I. Smolyar, E.S. Yarosh, and M.M. Zweng. 2013. The World Ocean Database. Data Science Journal 12 (2013), WDS229–WDS234. https://doi.org/10.2481/dsj.WDS-041 [116] Huai Li, Jianhua Xuan, Yue Wang, and Ming Zhan. 2008. Inferring regulatory networks. Frontiers in Bioscience 13 (2008), 263–275. https://doi.org/10.2741/2677 [117] David Liben-Nowell and Jon Kleinberg. 2007. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology 58, 7 (May 2007), 1019–1031. https://doi.org/10.1002/asi.20591 [118] Linyuan Lü and Tao Zhou. 2011. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and its Applications 390, 6 (2011), 1150–1170. https://doi.org/10.1016/j.physa.2010.11.027 [119] Subramani Mani and Gregory F Cooper. 2004. Causal discovery using a Bayesian local causal discovery algorithm. Studies in Health Technology and Informatics 107, Pt 1 (2004), 731–735. https://doi.org/10.3233/978-1-60750-949-3-731 [120] Daniel Marbach, James C. Costello, Robert Kuffner, Nicole M. Vega, Robert J. Prill, Diogo M. Camacho, Kyle R. Allison, Manolis Kellis, James J. Collins, and Gustavo Stolovitzky. 2012. Wisdom of crowds for robust gene network inference. Nature Methods 9, 8 (Aug. 2012), 796–804. https://doi.org/10.1038/nmeth.2016 [121] Rossana Mastrandrea, Julie Fournet, and Alain Barrat. 2015. Contact Patterns in a High School: A Comparison between Data Collected Using Wearable Sensors, Contact Diaries and Friendship Surveys. PLoS ONE 10, 9 (Sept. 2015), e0136497. https://doi.org/10.1371/journal.pone.0136497 [122] Julian McAuley, Rahul Pandey, and Jure Leskovec. 2015. Inferring Networks of Substitutable and Complementary Products. In Proc. of ACM SIGKDD 2015 (KDD '15). ACM, 785–794. https://doi.org/10.1145/2783258.2783381 [123] David B. McDonald. 2007. Predicting fate from early connectivity in a social network. Proceedings of the National Academy of Sciences 104, 26 (Jun. 2007), 10910–10914. https://doi.org/10.1073/pnas.0701159104 [124] Christopher Meek. 1995. Causal Inference and Causal Explanation with Background Knowledge. In Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence (UAI'95). Morgan Kaufmann Publishers Inc., 403–410. http://dl.acm.org/citation.cfm?id=2074204 [125] Patrick Meyer, Kevin Kontos, Frederic Lafitte, and Gianluca Bontempi. 2007. Information-Theoretic Inference of Large Transcriptional Regulatory Networks. EURASIP Journal on Bioinformatics and Systems Biology 2007, 1 (2007), 79879. https://doi.org/10.1155/2007/79879 [126] Lauren Ancel Meyers, Babak Pourbohloul, M.E.J. Newman, Danuta M. Skowronski, and Robert C. Brunham. 2005. Network theory and SARS: predicting outbreak diversity. Journal of Theoretical Biology 232, 1 (2005), 71–81. https: //doi.org/10.1016/j.jtbi.2004.07.026 [127] Isobel Milns, Colin M. Beale, and V. Anne Smith. 2010. Revealing ecological networks using Bayesian network inference algorithms. Ecology 91, 7 (Feb. 2010), 1892–1899. https://doi.org/10.1890/09-0731.1 [128] Sach Mukherjee and Terence P. Speed. 2008. Network inference using informative priors. Proceedings of the National Academy of Sciences 105, 38 (Sept. 2008), 14313–14318. https://doi.org/10.1073/pnas.0802272105 [129] Seth Myers and Jure Leskovec. 2010. On the Convexity of Latent Social Network Inference. In http://papers.nips.cc/paper/ Advances Information Processing Systems 4113-on-the-convexity-of-latent-social-network-inference in Neural 23. 1741–1749. [130] Galileo Mark Namata, Ben London, and Lise Getoor. 2015. Collective Graph Identification. ACM Transactions on Knowledge Discovery from Data. https://doi.org/10.1145/2818378 [131] G.L. Nemhauser, L.A. Wolsey, and M.L. Fisher. 1978. An analysis of approximations for maximizing submodular set functions–I. Mathematical Programming 14, 1 (1978), 265–294. https://doi.org/10.1007/BF01588971 [132] Praneeth Netrapalli and Sujay Sanghavi. 2012. Learning the Graph of Epidemic Cascades. SIGMETRICS Perform. Eval. Rev. 40, 1 (Jun. 2012), 211–222. https://doi.org/10.1145/2318857.2254783 [133] Jian Ni, Haiyong Xie, Sekhar Tatikonda, and Yang Richard Yang. 2010. Efficient and Dynamic Routing Topology Inference from End-to-end Measurements. IEEE/ACM Transactions on Networking 18, 1 (Feb. 2010), 123–135. https: //doi.org/10.1109/TNET.2009.2022538 [134] M. Paluš, D. Hartman, J. Hlinka, and M. Vejmelka. 2011. Discerning connectivity from dynamics in climate networks. Nonlinear Processes in Geophysics 18, 5 (2011), 751–763. https://doi.org/10.5194/npg-18-751-2011 [135] Evangelos E. Papalexakis, Alona Fyshe, Nicholas D. Sidiropoulos, Partha Pratim Talukdar, Tom M. Mitchell, and Christos Faloutsos. 2014. Good-enough Brain Model: Challenges, Algorithms and Discoveries in Multi-subject Experiments. In Proc. of ACM SIGKDD 2014 (KDD '14). ACM, 95–104. https://doi.org/10.1145/2623330.2623639 [136] D.M. Patrick, M.L. Rekart, A. Jolly, S. Mak, M. Tyndall, J. Maginley, E. Wong, T. Wong, H. Jones, C. Montgomery, and R.C. Brunham. 2002. Heterosexual outbreak of infectious syphilis: epidemiological and ethnographic analysis and implications for control. Sexually Transmitted Infections 78, suppl 1 (2002), i164–i169. https://doi.org/10.1136/sti.78. suppl_1.i164 [137] Joseph J. Pfeiffer III, Sebastian Moreno, Timothy La Fond, Jennifer Neville, and Brian Gallagher. 2014. Attributed Graph Models: Modeling Network Structure with Correlated Attributes. In Proceedings of the 23rd International Conference on World Wide Web (WWW '14). ACM, 831–842. https://doi.org/10.1145/2566486.2567993 [138] Gert Pfurtscheller and Colin Andrew. 1999. Event-Related changes of band power and coherence: methodology and interpretation. Journal of Clinical Neurophysiology 16, 6 (Nov. 1999), 512–519. http://dx.doi.org/10.1097/ 00004691-199911000-00003 34 [139] Noa Pinter-Wollman, Elizabeth A. Hobson, Jennifer E. Smith, Andrew J. Edelman, Daizaburo Shizuka, Shermin de Silva, James S. Waters, Steven D. Prager, Takao Sasaki, George Wittemyer, Jennifer Fewell, and David B. McDonald. 2013. The dynamics of animal social networks: analytical, conceptual, and theoretical advances. Behavioral Ecology (2013). https://doi.org/10.1093/beheco/art047 [140] S.C. Ponten, F. Bartolomei, and C.J. Stam. 2016. Small-world networks and epilepsy: Graph theoretical analysis of intracerebrally recorded mesial temporal lobe seizures. Clinical Neurophysiology 118, 4 (Apr. 2016), 918–927. https://doi.org/10.1016/j.clinph.2006.12.002 [141] Stephen R. Proulx, Daniel E.L. Promislow, and Patrick C. Phillips. 2005. Network thinking in ecology and evolution. Trends in Ecology & Evolution 20, 6 (2005), 345–353. https://doi.org/10.1016/j.tree.2005.04.004 [142] Nataša Pržulj, Derek G. Corneil, and Igor Jurisica. 2004. Modeling interactome: scale-free or geometric? Bioinformatics 20, 18 (2004), 3508–3515. https://doi.org/10.1093/bioinformatics/bth436 [143] Ioannis Psorakis, Stephen J. Roberts, Iead Rezek, and Ben C. Sheldon. 2012. Inferring social network structure in ecological systems from spatio-temporal data streams. Journal of The Royal Society Interface 9, 76 (2012), 3055–3066. https://doi.org/10.1098/rsif.2012.0223 [144] Manish Purohit, B. Aditya Prakash, Chanhyun Kang, Yao Zhang, and V.S. Subrahmanian. 2014. Fast Influence-based Coarsening for Large Networks. In Proc. of ACM SIGKDD 2014 (KDD '14). ACM, 1296–1305. https://doi.org/10.1145/ 2623330.2623701 [145] J.D. Ramsey, S.J. Hanson, C. Hanson, Y.O. Halchenko, R.A. Poldrack, and C. Glymour. 2010. Six problems for causal inference from fMRI. NeuroImage 49, 2 (2010), 1545–1558. https://doi.org/10.1016/j.neuroimage.2009.08.065 [146] Carlo Ratti, Stanislav Sobolevsky, Francesco Calabrese, Clio Andris, Jonathan Reades, Mauro Martino, Rob Claxton, and Steven H Strogatz. 2010. Redrawing the Map of Great Britain from a Network of Human Interactions. PLoS ONE 5, 12 (Dec. 2010), e14248. https://doi.org/10.1371/journal.pone.0014248 [147] Jaap C Reijneveld, Sophie C Ponten, Henk W Berendse, and Cornelis J Stam. 2007. The application of graph theoretical analysis to complex networks in the brain. Clinical Neurophysiology 118, 11 (Dec. 2007), 2317–2331. https://doi.org/10.1016/j.clinph.2007.08.010 [148] Bruno Ribeiro, Nicola Perra, and Andrea Baronchelli. 2013. Quantifying the effect of temporal resolution on time- varying networks. Scientific Reports 3 (Oct. 2013), 3006. http://dx.doi.org/10.1038/srep03006 [149] Lucy F. Robinson, Lauren Y. Atlas, and Tor D. Wager. 2015. Dynamic functional connectivity using state-based dynamic community structure: Method and application to opioid analgesia. NeuroImage 108 (2015), 274–291. https: //doi.org/10.1016/j.neuroimage.2014.12.034 [150] Alard Roebroeck, Elia Formisano, and Rainer Goebel. 2005. Mapping directed influence over the brain using Granger causality and fMRI. NeuroImage 25, 1 (2005), 230–242. https://doi.org/10.1016/j.neuroimage.2004.11.017 [151] M.J. Rosa, K. Friston, and W. Penny. 2012. Post-hoc selection of dynamic causal models. Journal of Neuroscience Methods 208, 1 (2012), 66–78. https://doi.org/10.1016/j.jneumeth.2012.04.013 [152] Mikail Rubinov and Olaf Sporns. 2010. Complex network measures of brain connectivity: Uses and interpretations. NeuroImage 52, 3 (Sept. 2010), 1059–1069. https://doi.org/10.1016/j.neuroimage.2009.10.003 [153] Jakob Runge, Vladimir Petoukhov, and Jürgen Kurths. 2013. Quantifying the Strength and Delay of Climatic Interactions: The Ambiguities of Cross Correlation and a Novel Measure Based on Graphical Models. Journal of Climate 27, 2 (Sept. 2013), 720–739. https://doi.org/10.1175/JCLI-D-13-00159.1 [154] Christian Rutz, Zackory T. Burns, Richard James, Stefanie M.H. Ismar, John Burt, Brian Otis, Jayson Bowen, and James J.H. St Clair. 2012. Automated mapping of social networks in wild birds. Current Biology 22, 17 (2012), R669 – R671. https://doi.org/10.1016/j.cub.2012.06.037 [155] Suranjana Saha, Shrinivas Moorthi, Xingren Wu, Jiande Wang, Sudhir Nadiga, Patrick Tripp, David Behringer, Yu-Tai Hou, Hui-ya Chuang, Mark Iredell, Michael Ek, Jesse Meng, Rongqian Yang, Malaquías Peña Mendez, Huug van den Dool, Qin Zhang, Wanqiu Wang, Mingyue Chen, and Emily Becker. 2014. The NCEP Climate Forecast System Version 2. Journal of Climate 27, 6 (2014), 2185–2208. https://doi.org/10.1175/JCLI-D-12-00823.1 [156] Vangelis Sakkalis. 2011. Review of Advanced Techniques for the Estimation of Brain Connectivity Measured with EEG/MEG. Comp. in Biology and Medicine 41, 12 (2011), 1110–1117. https://doi.org/10.1016/j.compbiomed.2011.06.020 [157] Jari Saramäki and Esteban Moro. 2015. From seconds to months: an overview of multi-scale dynamics of mobile telephone calls. The European Physical Journal B 88, 6 (2015), 1–10. https://doi.org/10.1140/epjb/e2015-60106-6 [158] Vedran Sekara and Sune Lehmann. 2014. The Strength of Friendship Ties in Proximity Sensor Data. PLoS ONE 9, 7 (July 2014), e100915. https://doi.org/10.1371/journal.pone.0100915 [159] Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Galligher, and Tina Eliassi-Rad. 2008. Collective Classification in Network Data. AI Magazine 29, 3 (2008), 93. http://hdl.handle.net/1903/7546 [160] Jay Shendure and Hanlee Ji. 2008. Next-generation DNA sequencing. Nature Biotechnology 26, 10 (Oct. 2008), 1135–1145. https://doi.org/10.1038/nbt1486 [161] Caroline Siegenthaler and Rudiyanto Gunawan. 2014. Assessment of Network Inference Methods: How to Cope with an Underdetermined Problem. PLOS ONE 9, 3 (03 2014), 1–7. https://doi.org/10.1371/journal.pone.0090481 [162] Chao Sima, Jianping Hua, and Sungwon Jung. 2009. Inference of gene regulatory networks using time-series data: a survey. Current Genomics 10, 6 (Sept. 2009), 416–429. https://doi.org/10.2174/138920209789177610 [163] Sean L. Simpson, F. DuBois Bowman, and Paul J. Laurienti. 2013. Analyzing complex functional brain networks: Fusing statistics and network science to understand the brain. Statistics Surveys 7 (2013), 1–36. https://doi.org/10. 1214/13-SS103 35 [164] Timo Smieszek, Stefanie Castell, Alain Barrat, Ciro Cattuto, Peter J. White, and Gérard Krause. 2016. Contact Diaries Versus Wearable Proximity Sensors in Measuring Contact Patterns at a Conference: Method Comparison and Participants' Attitudes. BMC Infectious Diseases 16, 1 (2016), 1–14. https://doi.org/10.1186/s12879-016-1676-y [165] Orr Spiegel, Stephan T. Leu, Andrew Sih, and C. Michael Bull. 2016. Socially interacting or indifferent neighbours? Randomization of movement paths to tease apart social preference and spatial constraints. Methods in Ecology and Evolution 7, 8 (2016), 971–979. https://doi.org/10.1111/2041-210X.12553 [166] Olaf Sporns. 2014. Contributions and challenges for network models in cognitive neuroscience. Nature Neuroscience 17, 5 (May 2014), 652–660. https://doi.org/10.1038/nn.3690 [167] Olaf Sporns and Richard F. Betzel. 2016. Modular Brain Networks. Annual Review of Psychology 67, 1 (Jan. 2016), 613–640. https://doi.org/10.1146/annurev-psych-122414-033634 [168] J. Conrad Stack, Shweta Bansal, V.S. Anil Kumar, and Bryan Grenfell. 2013. Inferring population-level contact heterogeneity from common epidemic data. Journal of The Royal Society Interface 10, 78 (2013). https://doi.org/10. 1098/rsif.2012.0578 [169] Juliette Stehlé, François Charbonnier, Tristan Picard, Ciro Cattuto, and Alain Barrat. 2013. Gender Homophily from Spatial Behavior in a Primary School: A Sociometric Study. Social Networks 35, 4 (2013), 604 – 613. https: //doi.org/10.1016/j.socnet.2013.08.003 [170] Karsten Steinhaeuser, Nitesh V. Chawla, and Auroop R. Ganguly. 2011. Complex networks as a unified framework for descriptive analysis and predictive modeling in climate science. Statistical Analysis and Data Mining 4, 5 (2011), 497–511. https://doi.org/10.1002/sam.10100 [171] Arkadiusz Stopczynski, Riccardo Pietri, Alex Pentland, David Lazer, and Sune Lehmann. 2014. Privacy in Sensor-Driven Human Data Collection: A Guide for Practitioners. ArXiv e-prints (Mar. 2014). https://arxiv.org/abs/1403.5299 [172] Arkadiusz Stopczynski, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen, Jakob Eg Larsen, and Sune Lehmann. 2014. Measuring Large-Scale Social Networks with High Resolution. PLoS ONE 9, 4 (Apr. 2014), e95978. https://doi.org/10.1371/journal.pone.0095978 [173] Cédric Sueur, Armand Jacobs, Frédéric Amblard, Odile Petit, and Andrew J King. 2011. How can social network analysis improve the study of primate behavior? American Journal of Primatology 73, 8 (Aug. 2011), 703–19. https: //doi.org/10.1002/ajp.20915 [174] Rajmonda Sulo, Tanya Berger-Wolf, and Robert Grossman. 2010. Meaningful Selection of Temporal Resolution for Dynamic Networks. In Proceedings of the Eighth Workshop on Mining and Learning with Graphs (MLG '10). ACM, New York, NY, USA, 127–136. https://doi.org/10.1145/1830252.1830269 [175] Kaustubh Supekar, Vinod Menon, Daniel Rubin, Mark Musen, and Michael D. Greicius. 2008. Network Analysis of Intrinsic Functional Brain Connectivity in Alzheimer's Disease. PLoS Comput Biol 4, 6 (2008), 1–11. https: //doi.org/10.1371/journal.pcbi.1000100 [176] Kaustubh Supekar, Vinod Menon, Daniel Rubin, Mark Musen, and Michael D Greicius. 2008. Network Analysis of Intrinsic Functional Brain Connectivity in Alzheimer's Disease. PLoS Computational Biology 4, 6 (Jun. 2008), e1000100. https://doi.org/10.1371/journal.pcbi.1000100 [177] Yuriy Sverchkov and Mark Craven. 2017. A review of active learning approaches to experimental design for uncovering biological networks. PLOS Computational Biology 13, 6 (2017), 1–26. https://doi.org/10.1371/journal.pcbi.1005466 [178] Hiroyuki Toh and Katsuhisa Horimoto. 2002. Inference of a genetic network by a combined approach of cluster analysis and graphical Gaussian modeling. Bioinformatics 18, 2 (2002), 287–297. https://doi.org/10.1093/bioinformatics/18.2.287 [179] Anastasios A. Tsonis and Paul J. Roebber. 2004. The architecture of the climate network. Physica A: Statistical Mechanics and its Applications 333, 0 (2004), 497–504. https://doi.org/10.1016/j.physa.2003.10.045 [180] Anastasios A. Tsonis, Geli Wang, Kyle L. Swanson, Francisco A. Rodrigues, and Luciano da Fontura Costa. 2011. Community structure and dynamics in climate networks. Climate Dynamics 37, 5-6 (2011), 933–940. https://doi.org/ 10.1007/s00382-010-0874-3 [181] Charalampos E. Tsourakakis, U Kang, Gary L. Miller, and Christos Faloutsos. 2009. DOULION: Counting Triangles in Massive Graphs with a Coin. In Proc. of ACM SIGKDD 2009. ACM, 837–846. https://doi.org/10.1145/1557019.1557111 [182] Liubov Tupikina, Nora Molkenthin, Cristóbal López, Emilio Hernández-García, Norbert Marwan, and Jürgen Kurths. 2016. Correlation Networks from Flows. The Case of Forced and Time-Dependent Advection-Diffusion Dynamics. PLOS ONE 11, 4 (04 2016), 1–12. https://doi.org/10.1371/journal.pone.0153703 [183] Toni Vallès-Català, Tiago P. Peixoto, Roger Guimerà, and Marta Sales-Pardo. 2017. On the consistency between model selection and link prediction in networks. ArXiv e-prints (May 2017). https://arxiv.org/abs/1705.07967 [184] Martijn P. van den Heuvel, René S. Kahn, Joaquín Goñi, and Olaf Sporns. 2012. High-cost, high-capacity backbone for global brain communication. Proceedings of the National Academy of Sciences 109, 28 (July 2012), 11372–11377. https://doi.org/10.1073/pnas.1203593109 [185] Martijn P. van den Heuvel and Olaf Sporns. 2011. Rich-club organization of the human connectome. The Journal of Neuroscience 31, 44 (Nov. 2011), 15775–15786. https://doi.org/10.1523/jneurosci.3539-11.2011 [186] Martijn P. van den Heuvel and Olaf Sporns. 2015. Network hubs in the human brain. Trends in Cognitive Sciences 17, 12 (Dec. 2015), 683–696. https://doi.org/10.1016/j.tics.2013.09.012 [187] Dan J. Wang, Xiaolin Shi, Daniel A. McFarland, and Jure Leskovec. 2012. Measurement error in network data: A re-classification. Social Networks 34, 4 (2012), 396–409. https://doi.org/10.1016/j.socnet.2012.01.003 [188] Larry Wasserman. 2006. All of Nonparametric Statistics (Springer Texts in Statistics). Springer New York. https: //doi.org/10.1007/0-387-30623-4 36 [189] Duncan J. Watts and Steven H. Strogatz. 1998. Collective dynamics of 'small-world' networks. Nature 393, 6684 (Jun. 1998), 440–442. https://doi.org/10.1038/30918 [190] David Welch, Shweta Bansal, and David R. Hunter. 2011. Statistical inference to advance network models in epidemiology. Epidemics 3, 1 (Mar. 2011), 38–45. https://doi.org/10.1016/j.epidem.2011.01.002 [191] Tina Wey, Daniel T. Blumstein, Weiwei Shen, and Ferenc Jordán. 2008. Social network analysis of animal behaviour: a promising tool for the study of sociality. Animal Behaviour 75, 2 (2008), 333–344. https://doi.org/10.1016/j.anbehav. 2007.06.020 [192] Hal Whitehead, Lars Bejder, and C. Andrea Ottensmeyer. 2005. Testing association patterns: issues arising and extensions. Animal Behaviour 69, 5 (2005), e1 –. https://doi.org/10.1016/j.anbehav.2004.11.004 [193] Hal Whitehead and Richard James. 2015. Generalized affiliation indices extract affiliations from social network data. Methods in Ecology and Evolution 6, 7 (2015), 836–844. https://doi.org/10.1111/2041-210X.12383 [194] R.W. Wilkins, D.A. Hodges, P.J. Laurienti, M. Steen, and J.H. Burdette. 2014. Network Science and the Effects of Music Preference on Functional Brain Connectivity: From Beethoven to Eminem. Scientific Reports 4 (Aug. 2014), 6130. https://doi.org/10.1038/srep06130 [195] Rongjing Xiang and Jennifer Neville. 2008. Pseudolikelihood EM for Within-network Relational Learning. In Proc. of the 8th IEEE Intl. Conference on Data Mining (ICDM 2008). 1103–1108. https://doi.org/10.1109/ICDM.2008.148 [196] K. Yamasaki, A. Gozolchiani, and S. Havlin. 2008. Climate Networks around the Globe are Significantly Affected by El Niño. Phys. Rev. Lett. 100, 22 (Jun. 2008), 228501. https://doi.org/10.1103/PhysRevLett.100.228501 [197] Donghyeon Yu, MinSoo Kim, Guanghua Xiao, and Tae Hyun Hwang. 2013. Review of Biological Network Data and Its Applications. Genomics & Informatics 11, 4 (Dec. 2013), 200–210. https://doi.org/10.5808/GI.2013.11.4.200 [198] Qingbao Yu, Erik B. Erhardt, Jing Sui, Yuhui Du, Hao He, Devon Hjelm, Mustafa S. Cetin, Srinivas Rachakonda, Robyn L. Miller, Godfrey Pearlson, and Vince D. Calhoun. 2015. Assessing dynamic brain graphs of time-varying connectivity in fMRI data: Application to healthy controls and patients with schizophrenia. NeuroImage 107 (2015), 345–355. https://doi.org/10.1016/j.neuroimage.2014.12.020 [199] Ming Yuan and Yi Lin. 2006. Model selection and estimation in regression with grouped variables. J. Royal Stat. Soc: Series B (Statistical Methodology) 68, 1 (Feb. 2006), 49–67. https://doi.org/10.1111/j.1467-9868.2005.00532.x [200] Andrew Zalesky, Alex Fornito, and Ed Bullmore. 2012. On the use of correlation as a measure of network connectivity. NeuroImage 60, 4 (2012), 2096–2106. https://doi.org/10.1016/j.neuroimage.2012.02.001 [201] Andrew Zalesky, Alex Fornito, Ian H. Harding, Luca Cocchi, Murat Yücel, Christos Pantelis, and Edward T. Bullmore. 2010. Whole-brain anatomical networks: Does the choice of nodes matter? NeuroImage 50, 3 (Apr. 2010), 970–983. https://doi.org/10.1016/j.neuroimage.2009.12.027 [202] Tanja Zerenner, Petra Friederichs, Klaus Lehnertz, and Andreas Hense. 2014. A Gaussian graphical model approach to climate networks. Chaos 24, 2 (2014). https://doi.org/10.1063/1.4870402 [203] Yang Zhan, David Halliday, Ping Jiang, Xuguang Liu, and Jianfeng Feng. 2006. Detecting time-dependent coherence between non-stationary electrophysiological signals–A combined statistical and time-frequency approach. Journal of Neuroscience Methods 156, 1-2 (Sept. 2006), 322–332. https://doi.org/10.1016/j.jneumeth.2006.02.013 [204] Bin Zhang and Steve Horvath. 2005. A General Framework for Weighted Gene Co-Expression Network Analysis. Statistical Applications in Genetics and Molecular Biology 4, 1 (2005). https://doi.org/10.2202/1544-6115.1128 [205] Dong Zhou, Avi Gozolchiani, Yosef Ashkenazy, and Shlomo Havlin. 2015. Teleconnection Paths via Climate Network Direct Link Detection. Phys. Rev. Lett. 115, 26 (Dec. 2015), 268501. https://doi.org/10.1103/PhysRevLett.115.268501 [206] Hui Zhou, Wencai Du, Shaochun Xu, and Qinling Xin. 2011. An Empirical Study of Network Topology Inference. In Computer and Information Science 2011 SE - 17, Roger Lee (Ed.). Studies in Computational Intelligence, Vol. 364. Springer Berlin Heidelberg, 213–225. https://doi.org/10.1007/978-3-642-21378-6_17 37
1505.06286
1
1505
2015-05-23T08:08:54
An Effective Marketing Strategy for Revenue Maximization with a Quantity Constraint
[ "cs.SI" ]
Recently the influence maximization problem has received much attention for its applications on viral marketing and product promotions. However, such influence maximization problems have not taken into account the monetary effect on the purchasing decision of individuals. To fulfill this gap, in this paper, we aim for maximizing the revenue by considering the quantity constraint on the promoted commodity. For this problem, we not only identify a proper small group of individuals as seeds for promotion but also determine the pricing of the commodity. To tackle the revenue maximization problem, we first introduce a strategic searching algorithm, referred to as Algorithm PRUB, which is able to derive the optimal solutions. After that, we further modify PRUB to propose a heuristic, Algorithm PRUB+IF, for obtaining feasible solutions more effciently on larger instances. Experiments on real social networks with different valuation distributions demonstrate the effectiveness of PRUB and PRUB+IF.
cs.SI
cs
An Effective Marketing Strategy for Revenue Maximization with a Quantity Constraint Ya-Wen Teng #1, Chih-Hua Tai ∗2, Philip S. Yu †3, Ming-Syan Chen #4 # EE Dept., National Taiwan University, Taipei, Taiwan 1 [email protected], 4 [email protected] ∗ CSIE Dept., National Taipei University, New Taipei, Taiwan 2 [email protected] † CS Dept., University of Illinois at Chicago, Chicago, IL 60607 3 [email protected] ABSTRACT Recently the influence maximization problem has received much attention for its applications on viral marketing and product promotions. However, such influence maximization problems have not taken into account the monetary effect on the purchasing decision of individuals. To fulfill this gap, in this paper, we aim for maximizing the revenue by considering the quantity constraint on the promoted com- modity. For this problem, we not only identify a proper small group of individuals as seeds for promotion but also determine the pricing of the commodity. To tackle the rev- enue maximization problem, we first introduce a strategic searching algorithm, referred to as Algorithm PRUB, which is able to derive the optimal solutions. After that, we further modify PRUB to propose a heuristic, Algorithm PRUB+IF, for obtaining feasible solutions more efficiently on larger in- stances. Experiments on real social networks with differ- ent valuation distributions demonstrate the effectiveness of PRUB and PRUB+IF. 1. INTRODUCTION Due to the advance of the Web 2.0 techniques, various kinds of websites have become parts of our life. Most peo- ple nowadays are used to sharing, seeking and obtaining information, and interacting with others through various social networking websites such as Digg, Slashdot, Face- book, and Twitter, to name a few. As more and more peo- ple join these social websites, the phenomenon of immense quantity of information flow and influence spread becomes prominent. This then motivates the utilization of this phe- nomenon, known as the "word-of-mouth" effect, to bring sig- nificant potential benefits in many types of business such as viral marketing and innovation promotion. For example, a company can effectively promote its brand and new prod- ucts by involving a group of influential people spreading the good words over social websites. Hence, in very recent years, there is active research [3, 7, 15, 19] exploring the problem of influence maximization. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. Existing works studied the influence maximization prob- lem generally based on two kinds of diffusion models, the Linear Threshold (LT) and the Independent Cascade (IC) models. In the LT model, the influence strength between a pair of individuals is modeled as a fixed weight, and the influence on an individual is described as cumulative. An individual is activated when the sum of the weights propa- gated from his/her activated neighbors exceeds his/her own threshold. The IC model assumes that each influence of one to another is an independent chance to activate the latter with a probability. On both models, the problem of influ- ence maximization aims at identifying a proper group (of a specified size) of individuals as seeds to have the number of activated people maximized. However, note that such in- fluence maximization problems have not taken into account the monetary aspect, which usually plays a crucial factor in people's purchase decisions. That is, maximizing the influ- ence spread does not necessarily bring maximum revenue, as an individual may be very interested in a new smartphone, but does not purchase the smartphone due to its high price. According to the studies in the fields of social psychology [2, 8] and economics [10, 14, 20], one's valuation towards a commodity will be positively influenced by those that have purchased the commodity, which is known as the herd men- tality or positive network externalities. In other words, peo- ple tend to imitate others in their consumer behaviors, which will result in irrational valuations of the commodity, i.e., higher valuations beyond their inherent valuations. Based on these phenomena, Mirrokni et al. [17] addressed the Rev- enue Maximization problem by incorporating the mon- etary concept into the maximization problem of influence spread based on the LT model. In the monetary LT model, the influence strength (or said weight) is transformed into the valuation concept, and the individual threshold is re- garded as the inherent valuation. One's valuation of a com- modity is thus the sum of his/her inherent valuation and the valuation increment from social influences. An individ- ual then pays for a commodity and propagates his/her in- fluence whenever her/his valuation is larger than or equal to the pricing of the commodity. Consider the network shown in Figure 1 as an example, where the number contained in each node is the inherent valuation and the number on an edge from one node to another is the weight, i.e., the influ- ence strength. For the ease of illustration, without loss of generality, the function F (x) = x is used to transform the effects of the social influences cumulated on an individual a($2) 2 5 1 3 b($0) 4 c($3) 3 d($1) e($2) 5 f ($0) 4 2 1 2 2 Figure 1: A network with the monetary concept. into the valuation concept in this example. If f purchases the commodity, c's valuation is increased to $3 + F (1) = $4. If a, e, and f all purchase the commodity, the valuation in- crement for c is F (3 + 2 + 1) = $6 and c's valuation thus becomes $3 + $6 = $9. The objective of the revenue max- imization problem thus aims at determining the pricing of the commodity and identifying a seed group of individuals for promotion so that the total revenue is maximized. However, to the best of our knowledge, none of the existing works has taken a quantity constraint on commodities into account. Note that due to the consideration of marketing strategies or practical conditions, quantities of commodities are often constrained in the real world. For example, the scarcity fallacy usually makes commodities more desirable [21], as a company may want to release limited edition com- modities to boost customer desire. Another example is the case of promoting a concert, where the quantity of the con- cert tickets is constrained by the number of available seats. In this case, due to the schedules of the musicians or singers, it is hard to add more shows and the total number of concert tickets. Hence, selecting seeds to receive free commodities will reduce the quantities of commodities that can be sold. This makes the prior works unapplicable to determine the proper pricing and obtain maximum revenue. For example, suppose that the network shown in Figure 1 is considered, where the diffusion model with the monetary concept in the work [17] is adopted and the function F (x) = x is used to transform the effects of the social influence into the valuation concept. Without consideration of the commodity quantity, the maximum revenue is $28 obtained at the pricing of $7 with the seed group {d, f }. With the influence from {d, f }, a and e are the first to purchase the commodity, since both their valuations $2 + F (5) = $7 are equal to the pricing of $7. Then, b and c will subsequently purchase the com- modity due to their valuations $0 + F (2 + 4 + 4) = $10 and $3 + F (3 + 2 + 1) = $9, respectively. However, if the quantity of commodities is limited to 4, the revenue will de- crease to $14 since two free commodities given to the seeds d and f should be taken off first. In this case, letting the commodity be priced at $6 and choosing only d as the seed will be the best. Under the influence of d, a first purchases the commodity since its valuation $2 + F (5) = $7 is larger than the pricing of $6. Then, both b and c purchase the commodities due to their valuations $0 + F (2 + 4) = $6 and $3 + F (3) = $6, respectively. Finally, since a, b, and c all pay for the commodity sold at the price of $6, the maximum revenue is $18. Therefore, when the quantity of commodi- ties is limited, we argue the need of new approaches for the revenue maximization problem. Specifically, we address the revenue maximization problem with a quantity constraint on commodities. Given a limited quantity of commodities and a social network with mone- tary concept regarding to the commodity, the problem is to determine the pricing of the commodity and identify a small group of people, i.e., a seed group, to be the initial customers receiving freebies to help promote the commodity at the be- ginning, so that the total revenue is maximized. In this paper, we investigate this problem on the monetary-concept incorporated LT-model [17], and propose Algorithm PRUB (Pricing searching strategy using Revenue Upper Bound) to derive the optimal solutions. Then, we further revise PRUB to propose a heuristic Algorithm PRUB+IF (Pricing searching strategy using Revenue Upper Bound with Impor- tance Feedback) for better efficiency. Experiments on real social networks show the good effectiveness of PRUB and PRUB+IF, demonstrating the revenue maximization with and without a quantity constraint differs from each other. In summary, the contributions of this paper are: 1. We are the first to address the general case of the rev- enue maximization problem. Note that the previous work of the revenue maximization without a quantity constraint is a special case of our problem with the quantity set as the total number of individuals on the social network. 2. For the addressed problem, we proposed the optimal PRUB as well as a heuristic PRUB+IF. 3. Experiments on real social networks demonstrate the effectiveness of the proposed approaches for both gen- eral and special cases of the revenue maximization problem. Note even in the case without a commod- ity constraint, the proposed approach outperforms the state of the art approach that incorporates the mone- tary concept [17]. 2. PROBLEM FORMULATION To formulate the revenue maximization problem, in this section, we first describe the social network with the mone- tary concept, then explain how the social influences propa- gate over the network using the monetary-concept incorpo- rated LT-model [17], and finally define the revenue and the revenue maximization problem formally. Given a commodity, a social network with the monetary concept, referred to as a monetizing social network, is a weighted digraph G = (V, X, E, W, F ), where V is the set of individuals and for each individual v ∈ V , his/her in- herent valuation χv is carried in X. Usually, the valuation information X can be estimated and learned from question- naires or historical sales data, with regard to the commodity [13]. For any individuals u, v ∈ V , if u's purchase will di- rectly encourage v's desire for the commodity, an edge from u to v, denoted as euv ∈ E (E standing for the edge set), represents the existance of the influence, and wuv ∈ W rep- resents the influence strength as the weight on euv. Adopt- ing the Concave Graph Model in the work [17], we con- sider a non-negative, non-decreasing, and concave function F : R+ → R+ with F (0) = 0 to transform the weights into the valuation concept. That is, given a set of individuals S directly exerting influences on an individual v, v's valuation towards a commodity will become χv + F (Pi∈S wiv). Based on the monetary-concept incorporated LT-model [17], the propagation of social influences over the monetiz- ing social network happens whenever individuals adopt the commodity. An individual adopts the commodity if and only if 1) the pricing of the commodity is less than or equal to his/her valuation, or 2) this individual is an initial customer receiving a freebie. After an individual adopts the com- modity, he/she will then exert influences on his/her out- neighbors to encourage them and raise their valuations for adoption. The following shows an example of social influ- ences propagating over the monetizing social network. Example 1. Given the monetizing social network in Fig- ure 1 and the concave influence function F (x) = x, consider the promotion of a concert. Suppose that the pricing of the concert tickets is $7 and the seed group is A = {d}. Influ- enced by d, the valuations of a, b, and f are increased by F (5) = $5, F (4) = $4, and F (2) = $2, respectively. The val- uations of a, b and f thus become $2+$5 = $7, $0+$4 = $4, and $0 + $2 = $2, respectively. Then, note that as the val- uation of a is equal to the pricing of the concert tickets $7, a also adopts the concert ticket and exerts influences on its out-neighbors b and c. The valuations of b and c thus increase to $0 + F (4 + 2) = $6 and $3 + F (3) = $6, respec- tively. After that, as no other individuals adopt the concert ticket, the influence propagation stops. Consequently, under d's influence, a will also adopt the concert ticket, and the valuations of b, c and f become $6, $6, and $2, respectively. Consider another example of the seed group A = {d, f }. Under the influence of d and f , the valuations of a, b, c and e are raised to $7, $4, $4, and $7, respectively. (Here d's influence on f is neglected since f as an initial customer has already adopted the concert ticket.) Hence, a and e adopt the concert tickets and exert influences. Consequently, the valuations of b and c become: b : $0 + F (4(from d) + 2(from a) + 4(from e)) = $10 c : $3 + F (1(from f ) + 3(from a) + 2(from e)) = $9 In the end, a, b, c, and e all adopt the concert tickets since their final valuations are larger than or equal to the pricing of the concert tickets $7. (cid:4) Here we define that the revenue comes from the number of people paying for the commodity and the pricing of the commodity. Recall Example 1 where the pricing is $7 and the seed group is {d, f }, and suppose that the quantity of the concert tickets is 4. The revenue is $7 × 2 = $14, since two concert tickets are used as free tickets given to d and f , and only two concert tickets are left for sale (even though a, b, c, and e all want to purchase these concert tickets). Formally, given the quantity of commodities n, the pricing p of the commodity, and the seed group A, the revenue is defined as follows. Definition 1. Revenue function. Given the quantity n, the revenue at the pricing of p with the seed group A is R(n, p, A) = p × min{σ(A) \ A, n − A}, where σ(A) ⊇ A is the set of individuals adopting the com- modity under the influences of A. as initial customers that can bring maximum revenue. The proposed problem is formally defined as follows. Definition 2. The RMw/QC Problem: Revenue Max- imization with a Quantity Constraint. Given a mon- etizing social network G = (V, X, E, W, F ), a set of input prices P ⊆ R+, and a quantity of commodities n, the prob- lem is to determine the pricing pmax ∈ P of the commodity and find a seed group Amax ⊆ V as initial customers, where Amax ≤ n, such that the revenue R(n, p, A) is maximized, i.e., (pmax, Amax) = argmax R(n, p, A). p,A Note that the revenue function R(n, p, A) is not single- peaked with respect to the pricing, which means the ap- proaches such as the binary search and the gradient decent search are not applicable to finding out the optimal pric- ing. For example, following the setting of Example 1 and letting the quantity of the concert tickets be 4, we obtain the highest revenue at pricing of $6, $7, and $8 as $18, $14, and $16, respectively (with the seed groups {d}, {d, f }, and {d, e}, accordingly). Obviously, with respect to the pricing, R(n, p, A) is not single-peaked. Furthermore, the RMw/QC problem can be proved to be NP-hard. To show this, we first introduce a special case of RMw/QC, and then prove that this special case is NP-hard. As the special case is NP-hard, RMw/QC is thus NP-hard. Definition 3. SpecialRM. This problem is a special case of RMw/QC, and asks for only one input price and a sufficient quantity of commodities for the population. That is, given G, P = {p}, and n = V , SpecialRM is to determine a seed group A such that R(V , p, A) is maximized. Theorem 1. The problem of SpecialRM is NP-hard. Proof. We reduce the Minimum Vertex Cover (MVC) problem to the SpecialRM problem. Given every instance of MVC involving an undirected graph G′ = (V ′, E′), we can construct a corresponding instance G = (V, X, E, W, F ) of SpecialRM as follows. (1) Set V = V ′; (2) set X = {χv∀v ∈ V, χv = 0}; (3) direct all edges in both directions, i.e., for each euv ∈ E′, euv ∈ E and evu ∈ E; (4) for each euv ∈ E, define wuv = p din(v) , where din(v) is the in-degree of v in G; and (5) set F (x) = x. For the instance of SpecialRM, if there exists a minimum set A that maximizes the revenue, we can obtain another set A′ = A ∪ (V \ σ(A)). Then, it can be shown that A′ is the minimum vertex cover of G′ since σ(A′) ⊇ σ(A) ∪ σ(V \ σ(A)) ⊇ σ(A) ∪ (V \ σ(A)) = V. Theorem 1 is thus proved. 3. ALGORITHM To increase the revenue, finding the proper pricing p and identifying a proper seed group A is important. Consider the same setting mentioned above, but with an empty seed group and the pricing set as $1. The revenue is R(4, $1, ∅) = $1 × 4 = $4, which is less than R(4, $7, {d, f }) = $14. Since any company will expect to earn as higher revenue as possi- ble given a fixed amount of commodities, in this paper, we are interested in looking for such pricing and a seed group In this section, for the revenue maximization problem, we first propose Algorithm PRUB (Pricing searching strategy using Revenue Upper Bound) that is able to derive the opti- mal solutions. Note that finding the optimal pair of pmax and Amax in the revenue maximization problem is exhausted. Then, for better efficiency, a heuristic Algorithm PRUB+IF (PRUB with Importance Feedback) is introduced following the framework of PRUB. Table 1: (a) The maximum valuations; (b) the upper bounds of maximum revenue. (a) v Xmax(v) a b c d e f $8 $10 $9 $4 $7 $4 (b) Rbound(4, p) $4 $8 $12 $16 $20 $24 $28 $24 $18 $10 p $1 $2 $3 $4 $5 $6 $7 $8 $9 $10 3.1 Algorithm PRUB To tackle the RMw/QC problem, Algorithm PRUB is de- signed to obtain the optimal solutions. As mentioned pre- viously, finding a proper pair of pricing and seed group is critical in this problem, since the revenue comes from the pricing of the commodity and the number of people paying for the commodity. A naıve approach for finding the optimal pair of pricing pmax and seed group Amax is to search at all p ∈ P , enumerate all seed groups A, and calculate the cor- responding revenue R(n, p, A). The rationale of Algorithm PRUB is based on this naıve approach and prunes the search space by 1) progressively filtering out non-candidate pricing and 2) deriving an upper bound of the size of seed groups for each price. We illustrate the two ideas of pruning in the following. Non-candidate Pricing Filtering. The first idea is to prune the searching on non-candidate pricing. Motivated by the concern of only maximum revenue, this pruning derives an upper bound of maximum revenue at each price, and utilizes an achievable global revenue rglobal that records the maximum revenue discovered so far to progressively filter out the pricing that will not result in higher revenue. That is, if an upper bound of maximum revenue at each price can be derived, PRUB then does not need to seek the seed group for maximum revenue at a specific price when the upper bound at this price is less than or equal to rglobal. When rglobal is updated and increased progressively after the successful searching of the seed group at each price, the non- candidate pricing is also progressively detected and filtered out. In order to infer the upper bound of maximum revenue at a specific price, the maximum number of individuals who have potential for adopting the commodity at this price is needed. To find out whether or not an individual has this po- tential, it needs to estimate the valuation of the individual. Therefore, in the following, we first introduce the definitions of maximum valuations and potential buyers for defining the upper bound of maximum revenue. Definition 4. Maximum valuation. The maximum val- uation of an individual v is the valuation under the influences from all v's in-neighbors, which is denoted as Xmax(v) = χv + F ( X u∈v's in-neighbors wuv). Definition 5. Potential buyer. An individual v is re- garded as a potential buyer at a specific price p if v has po- tential for adopting the commodity at p, i.e., Xmax(v) ≥ p. Definition 6. Upper bound of maximum revenue. Given a quantity constraint n, the upper bound of maxi- mum revenue at a price p is Rbound(n, p) = p × min{n, mp}, (1) where mp is the number of potential buyers at p, i.e., mp = {vv ∈ V, Xmax(v) ≥ p}. Example 2. Given the monetizing social network in Fig- ure 1, the concave influence function F (x) = x, and a set of input prices P = {pp ∈ I+, 1 ≤ p ≤ 10}, consider the promotion of a concert. Table 1(a) shows the maximum val- uation of each individual. Suppose the quantity of the con- cert tickets is set as 4. The corresponding upper bounds of maximum revenue for all prices are listed in Table 1(b). (cid:4) In addition, to have better effectiveness of pruning by uti- lizing the upper bound of maximum revenue, PRUB searches the prices in a descending order of the upper bounds. Then, once PRUB discovers a price, at which the upper bound is less than or equal to the achievable global revenue rglobal, the searching for the following prices (including the current price) can be ignored. Therefore, in the above example, PRUB will start the examination of the prices from p = $7, p = $6, p = $8, · · · , and so on. Bound of Seed Group's Size. The second idea for pruning search space is to avoid enumerating useless seed groups under a specific price. The inspiration is, under the consideration of a specific price p, it involves more than rglobal quantities of commodities to be sold for finding the revenue higher than the achievable global revenue rglobal obtained so far. When considering the price p, Algorithm PRUB then bounds the size of the seed groups as p A < n − rglobal p , (2) since the quantity of commodities is limited. Follow Exam- ple 2, and suppose the achievable global revenue rglobal = $10. In order to find the revenue higher than $10, when searching at the price p = $7, PRUB expects more than 10 7 concert tickets left for sale and enumerates only the seed groups of sizes less than or equal to 2 (since the quantity of the concert tickets is set as 4). The searching on the seed groups of sizes 3 and 4 is thus pruned. Note that incorporating the two pruning methods is sat- isfactory to the accuracy. Therefore, Algorithm PRUB is still able to derive the optimal solutions, even though the search space is reduced. The details of PRUB are presented in Algorithm 1. In the following, we show an example to illustrate how PRUB figures out the optimal pair of pmax and Amax. Example 3. Follow Example 2, and initialize pmax, Amax, and rglobal as $0, an empty set, and $0, respectively. Accord- ing to the upper bounds of maximum revenue in Table 1(b), PRUB will consider the prices in the following order: p = $7, p = $6, p = $8, · · · , and so on. Beginning from the price $7, PRUB checks whether or not Rbound(4, $7) > rglobal. Since $28 > $0, PRUB looks for the maximum revenue at the price $7 by enumerating all the seed groups whose size is bounded by Equation (2) (includ- ing the size 0). First, for the empty seed group, no individ- ual adopts the concert ticket at $7. So PRUB goes to the size 1. Then, PRUB lists all the seed groups of size 1 since Algorithm 1: PRUB Input: A monetizing social network G = (V, X, E, W, F ); a set of input prices P ; a quantity of commodities n. Output: The pricing pmax; the seed group Amax. 1 pmax ← 0, Amax ← ∅, rglobal ← 0 2 Derive Rbound(n, p) for all p ∈ P 3 Sort all p ∈ P descendingly by Rbound(n, p) 4 for p ∈ P do 5 6 7 8 9 10 if p is non-candidate pricing then return pmax, Amax Enumerate all the seed groups whose size is bounded by Equation (2) (including the size 0) Compute R(n, p, A) for those enumerated seed groups if any R(n, p, A) > rglobal then pmax = p, Amax = A, rglobal = R(n, p, A) 11 return pmax, Amax 1 < 4 − 0 7 = 4. Among all the seed groups of size 1, PRUB finds the highest revenue R(4, $7, {d}) = $7 (referred to Ex- ample 1). As $7 is higher than rglobal = $0, PRUB updates pmax = $7, Amax = {d}, and rglobal = $7. Before seeking the seed groups of size 2 for maximum revenue, PRUB ensures 2 < 4 − 7 7 = 3. After all seed groups of size 2 are enu- merated, the highest revenue R(4, $7, {d, f }) = $14 is found (referred to Example 1). Because $14 > rglobal = $7, PRUB updates pmax = $7, Amax = {d, f }, and rglobal = $14. Later, note that 3 > 4 − 14 7 = 2. The searching for the maximum revenue at the price $7 stops. The next price considered is $6. A similar process is performed until PRUB finds such a price p that rglobal ≥ Rbound(4, p). In the end, the maximum revenue is R(4, $6, {d}) = $18, where the pair of pmax = $6 and Amax = {d} is the optimal solution. (cid:4) Theorem 2. The time complexity of PRUB is O(2V V 2P ). group is n. In total, there are thus Proof. We first show that PRUB costs O(2V V 2) time at a specific price for searching the maximum revenue. Given the quantity of commodities n, the largest size of the seed i (cid:1) seed groups. For a seed group of size i, there are i seeds exerting influences on the other O(V − i) individuals that are not seeds. Due to the influence cascade, it costs O((V −i)2) time to figure out the influence spread of a seed group of size i. Therefore, the total time complexity for searching the maximum revenue by enumerating seed groups is Pi=0(cid:0)V n O( n n n = O( = O( Pi=0(cid:0)V Pi=0 Pi=0 = O(V 2 i (cid:1)(V − i)2) (V −i)!i! (V − i)2) V 2(V −1)! (V −i−1)!i! − V (V −1)(V −2)! (V −i−1)!(i−1)! ) Pi=0(cid:0)V −2 Pi=0(cid:0)V −1 i−1 (cid:1) + V = O(2V −1V 2 − 2V −2V 2 + 2V −2V ) = O(2V V 2). (cid:1) − V 2 n n V ! i n Pi=0(cid:0)V −2 i−1 (cid:1)) As searching at a price costs O(2V V 2), the total time complexity of PRUB is thus O(2V V 2P ). Theorem 2 is proved. Note that the high complexity of Algorithm PRUB indi- cates the poor scalability of the optimal algorithm for real social networks which are usually large. Therefore, in the following subsection, we propose a heuristic based on the framework of PRUB to obtain the feasible solutions on larger instances. 3.2 Algorithm PRUB+IF In this section, the heuristic algorithm PRUB+IF (PRUB with Importance Feedback) is proposed as a feasible solu- tion. The heuristic PRUB+IF differs from PRUB at the way of finding the most proper seed group at each price. Fol- lowing the framework of PRUB, PRUB+IF introduces the concept of pricing-sensitive importance, accompanying the contribution feedback from the out-neighbors, for selecting seeds in a heuristic manner, instead of listing all seed groups. The main idea of PRUB+IF is that, an individual with greater potential for making others adopt the commodity should be regarded as more important. Selecting the most important individuals as seeds greedily is able to lead to a feasible solution. Then, the question is how to evaluate one's potential for making others adopt the commodity. The intu- ition is about how many others will be encouraged and how much their valuations can be increased for approaching the pricing, under one's influence. We then accumulate these effects to calculate one's importance. Here only the effects on potential buyers should be included in the accumulation since only the potential buyers have possibilities of paying for the commodity. In addition, note that the individuals who newly adopt the commodity under one's (direct and indirect) influence will further spread their influences to en- courage more others in adoption. In order to estimate one's importance more carefully, the effects through influence cas- cades should also be included in the accumulation. There- fore, PRUB+IF introduces the pricing-sensitive importance that sums up the consideration of the normalized weights, the influence propagation, and the potential buyers in the measurement of one's advantage in the commodity promo- tion at the given pricing. Then, the strategy is to select seeds in accordance with the pricing-sensitive importance. In the following, we introduce the three key points, Nor- malized Weight, Feedback of Influence Propagation, and Potential-Buyer Filtering, in measuring the pricing-sensitive importance. Briefly, for each individual u, 1) the Normalized Weight is used to evaluate u's importance according to u's direct effect on another individual v's adoption; 2) the Feed- back of Influence Propagation is incorporated to evaluate u's importance towards v by considering also the indirect effects through influence cascades; 3) the Potential-Buyer Filtering is considered to derive u's pricing-sensitive importance from accumulating all u's direct and indirect effects on all the other potential buyers. 1. Normalized Weight. By intuition, for commodity promotion, an individ- ual u's importance towards another individual v can be evaluated from how much v's valuation approaches the pricing due to u's effect. Inspired by this intuition, PRUB+IF calculates the normalized weight wuv, indi- cating u's importance towards v's adoption, as follows. wuv = 0,  min{1,  F (wuv + P wiv )−F ( P wiv ) i∈σ(A) i∈σ(A) p−XA(v) if p ≤ XA(v) , }, otherwise (3) wiv) is v's valuation of where XA(v) = χv + F ( Pi∈σ(A) the commodity under the current seed group A's ef- fects. In the case of p ≤ XA(v), it means v has adopted the commodity. So the normalized weight wuv = 0, in- dicating that u's importance towards v is none due to no impact from u on v's adoption of the commodity. For the other case, the normalized weight from u to v is bounded by 1, and is the portion of u's impact on v's adoption of the commodity. Example 4. Given the monetizing social network in Figure 1 and the concave influence function F (x) = x, consider the promotion of a concert. Given p = $7 and A = {}, no one has adopted the concert tickets. Under this condition, X{}(a) = $2 is less than the pricing of $7, and the normalized weight from d to a is wda = min{1, $5−$0 $7−$2 } = 1. This means that selecting d into the seed group {} can make a adopt the concert ticket immediately. Similarly, wdb = 4 7 , wdc = 0, wde = 0, wdf = 2 7 . (cid:4) 2. Feedback of Influence Propagation. Note that the effect of influence propagation is impor- tant in the commodity promotion. To carefully es- timate one's advantage in the promotion, PRUB+IF further takes the importance feedback from those indi- viduals i into account on u's importance, if i adopts the commodity due to u's direct or indirect effect and thus devotes to the propagation of u's effect. Therefore, u's importance towards v will be derived recursively as follows. IF (k+1)(u, v) = 0, (k) u u wiv}, if u 6= v , (4) otherwise min{1, IF (k)(u, v) + Pi∈V   where IF (0)(u, v) = wuv and V (k) contains the indi- viduals who newly adopt the commodity by u's effects at kth propagation, i.e., V (k) u = {ii ∈ V, IF (k)(u, i) = 1 ∧ ∀k′ < k, IF (k′)(u, i) < 1}. As the influence prop- agates, there are multiple updates for u's importance towards v. When the propagation stops, i.e., V (k) u = ∅, the final importance of u towards v is denoted as IF (u, v). In other words, Equation (4) evaluates the advantage of selecting u into the current seed group from the aspect of v's adoption, by considering the direct effect IF (0)(u, v) = wuv derived by Equation (3) and the indirect effects Pk Pi∈V wiv propagated (k) u through individuals i. In addition, Equation (4) en- sures that the importance of u towards v is bounded by 1, even though there may be many direct and indi- rect impacts from u to v. Example 5. Follow Example 4 and consider the indi- vidual d. Initially, V (0) d = {a}, because IF (0)(d, a) = wda = 1. IF (1)(d, ·) for all individuals (excluding d itself) are thus calculated as follows. Algorithm 2: PRUB+IF Input: A monetizing social network G = (V, X, E, W, F ); a set of input prices P ; a quantity of commodities n. Output: The pricing pmax; the seed group Amax. 1 pmax ← 0, Amax ← ∅, rglobal ← 0 2 Derive Rbound(n, p) for all p ∈ P 3 Sort all p ∈ P descendingly by Rbound(n, p) 4 for p ∈ P do 5 6 7 8 9 10 11 12 13 14 15 16 17 18 if p is non-candidate pricing then return pmax, Amax A ← ∅ Compute R(n, p, A) if R(n, p, A) > rglobal then pmax = p, Amax = A, rglobal = R(n, p, A) while A < n − rglobal p do for u ∈ V has not adopted the commodity do Compute Ψ(u) according to Equation (5) s ← the individual with the greatest Ψ(·) A ← A ∪ {s} Compute R(n, p, A) if r > rglobal then pmax = p, Amax = A, rglobal = R(n, p, A) 19 return pmax, Amax IF (1)(d, a) = min{1, 1 + waa} = 1 IF (1)(d, b) = min{1, 4 7 + wab} = 6 7 IF (1)(d, c) = min{1, 0 + wac} = 3 4 IF (1)(d, e) = min{1, 0 + wae} = 0 IF (1)(d, f ) = min{1, 2 7 + waf } = 2 7 Since no other individuals newly adopt the concert ticket, i.e., V (1) d = ∅, the propagation stops. Finally, IF (d, ·) = IF (1)(d, ·) are as above. (cid:4) 3. Potential-Buyer Filtering. Once the advantage of selecting an individual as a seed can be estimated from the aspect of another's adop- tion, intuitively, the importance of an individual can be derived by summing up his/her importance towards all the others. However, counting one's importance towards all the others may be misleading, since the advantage estimated from those who will never adopt the commodity at this price is also counted. To avoid overestimating the importance of an individual in the promotion, PRUB+IF thus incorporates the concept of potential buyers into the pricing-sensitive importance which is formally defined below. Ψ(u) = X i∈Vpotential IF (u, i) (5) where Vpotential is the set of potential buyers at this price, i.e., the individuals whose maximum valuation is larger than or equal to the price (the same as intro- duced in Section 3.1). As a result, only if an individual is a potential buyer who has potential for adopting the commodity at the price, the increase of his/her valua- tion will be regarded as important. Example 6. Follow Example 5. Since the potential buyers at the pricing of $7 are a, b, c, and e (referred to Table 1(a)), the pricing-sensitive importance of d is Ψ(d) = 1 + 6 (cid:4) 4 + 0 = 73 28 . 7 + 3 The algorithm of PRUB+IF is presented in Algorithm 2. PRUB+IF uses the framework of PRUB as a base, and dif- fers from PRUB at the strategy for seed selection (Algo- rithm 2 Lines 12-15). In the following, we go through the de- tails of PRUB+IF. Similarly to PRUB, PRUB+IF initializes pmax, Amax, and rglobal, compute the upper bounds of max- imum revenue for all prices, and then considers the prices one-by-one in a descending order of the upper bounds of maximum revenue (Lines 1-3). At a specific price p, PRUB enumerates all seed groups while PRUB+IF iteratively picks up a seed until the size of the seed group A reaches the bound in Equation (2) (Line 11). Specifically, when con- sidering a price p, PRUB+IF first checks whether or not p is non-candidate pricing that has no chance to yield higher revenue than the achievable global revenue rglobal (Line 5). If p passes the pruning, PRUB+IF first calculates the rev- enue regarding to the empty seed group (Lines 7-8). Af- ter that, PRUB+IF expands the seed group by one seed at a time according to the pricing-sensitive importance Ψ(·) in Equation (5) (Line 13). Each time the individual who has not yet adopted the commodity and has the greatest pricing-sensitive importance will be selected into the cur- rent seed group (Lines 12-15). In the case of the newly ob- tained revenue higher than rglobal, PRUB+IF updates pmax, Amax, and rglobal similarly to PRUB (Lines 17-18). Once the size of the seed group reaches the bound in Equation (2) (Line 11), PRUB+IF considers the next price. After all prices are examined, pmax and Amax are returned as the so- lution. The following example demonstrates the searching process of PRUB+IF. Example 7. Follow Example 2, and initialize pmax, Amax, and rglobal as $0, an empty set, and $0, respectively. Accord- ing to the upper bounds of maximum revenue in Table 1(b), the first price considered is $7. Since Rbound(4, $7) = $28 > rglobal = $0, PRUB+IF tries to seek for higher revenue at the price $7. First, for A = {}, there is no revenue since the inherent valuations of all individuals are less than $7. After that, for selecting the first seed, PRUB+IF computes the pricing-sensitive importance of all individuals in a similar way as shown in Example 6: Ψ(a) = 29 Ψ(d) = 73 28 , Ψ(b) = 1 28 , Ψ(e) = 15 5 , Ψ(c) = 0, 14 , Ψ(f ) = 65 28 . Hence, the first seed selected is d and the corresponding revenue will be R(4, $7, {d}) = $7 (referred to Example 1). As $7 > rglobal = $0, PRUB+IF performs the updates of pmax = $7, Amax = {d}, and rglobal = $7. Until now, the process for the first seed finishes, and PRUB+IF checks whether or not to continue selecting the second seed. Since A = {d} = 1 < n − rglobal 7 = 3, the pricing- sensitive importance of all individuals, except the individ- uals who have adopted the concert tickets, i.e., a and d, is calculated with respect to the current seed group A = {d}: = 4 − 7 p Ψ(b) = 0, Ψ(c) = 0, Ψ(e) = 2, Ψ(f ) = 3. Accordingly, f will be selected as the second seed and the revenue is R(4, $7, {d, f }) = $14 (referred to Example 1), which leads to the updates of pmax = $7, Amax = {d, f }, and rglobal = $14. Until now, the process for the second seed finishes, and PRUB+IF checks whether or not to continue selecting the third seed. However, A = 2 reaches the bound n − rglobal 7 = 2 so that the searching at the price $7 stops. p = 4 − 14 The searching at the remaining prices p = $6, p = $8, · · · , and so on, is performed in the same manner as that at the price $7. In the end, PRUB+IF will report the pricing of $6 and the seed group {d} as the answer. (cid:4) Theorem 3. The time complexity of PRUB+IF is O(nV 3P ). Proof. We first show that PRUB+IF costs O(nV 3) time at a specific price for searching the maximum revenue. Given the quantity of commodities n, the largest size of the seed group is n. When i seeds have been selected, it takes O((V − i)2) time to compute the pricing-sensitive impor- tance for each of the other O(V − i) nodes. Therefore, the total time complexity for searching the maximum revenue is O( n−1 X i=1 (V − i)3) = O(nV 3). As searching at a price costs O(nV 3), the total time com- plexity of PRUB+IF is thus O(nV 3P ). Theorem 3 is proved. 4. EXPERIMENTS In this section, we first provide the evidence that the rev- enue maximization problem with a quantity constraint dif- fers from that without a quantity constraint. Besides, we also show the approximation performance of PRUB+IF to PRUB. In order to demonstrate the effectiveness of PRUB+IF, we further conduct experiments on larger real social net- works and compare PRUB+IF with other heuristics. All the programs are implemented in Java with version 1.6.0 27. The experiments are performed on a quad-core Intelr Xeonr X5450 3.00GHz PC with 8GB RAM using Ubuntu 8.04.2. Datasets. We use three real social networks as follows. 1) The dataset highschool (sampled from the dataset [6] due to poor scalability of PRUB and the compared approach) is a friendship network for the boys in a small highschool in Illinois.1 The nodes are boys in the highschool, and each directed edge represents a boy choosing another as a friend in questionnaires. 2) The dataset digg [4] is a reply network of Digg.2 Each node is a user in Digg and each directed edge stands for a user replying to another. 3) The dataset face- book [22] is the communication network of Facebook.3 The nodes are the users in Facebook while each directed edge rep- resents that a user posts an article on another user's wall. For these datasets, the self-loops and isolated nodes are re- moved, and the edge weights are derived from the number of choices, replies, and articles of one to another, respectively. Both the degree distributions and weight distributions of all the datasets follow the well-known power law [5]. More details are shown in the left five columns of Table 2. Valuation Distributions. Note that there is lack of valuation information in these publicly available datasets. A naıve way is to learn the valuation information through questionnaires or historical sales data toward a specific com- modity. However, note that the valuation distributions vary with commodities. In this paper, we then explore the per- formance under different valuation distributions as follows. 1http://moreno.ss.uci.edu/data.html#high 2http://www.public.asu.edu/~mdechoud/datasets.html (The reply system has been out of service since 2012, but the data were collected in 2008.) 3http://socialnetworks.mpi-sws.org/data-wosn2009.html #nodes #edges Avg. degree Avg. weight Avg. clustering coeff. Table 2: Summaries of real datasets and the parameters of each valuation distribution. M-shape σ2 1.78 0.44 0.44 Normal σ2 µ 10 8.16 2.04 5 5 2.04 140 85,155 183,412 50 30,360 45,813 0.4754 0.0053 0.1106 µ 4 2 2 µ 16 8 8 σ2 1.78 0.44 0.44 Dataset highschool digg facebook 5.60 5.61 8.01 37.29 6.07 4.66 ) s r a l l o d d e r d n u h ( e u n e v e r . x a M 30 20 10 0 RandomizedUSM RandomizedUSM(p) PRUB+IF PRUB 0.05 0.1 0.15 0.2 0.25 0.3 1 n V ) s r a l l o d d e r d n u h ( e u n e v e r . x a M 30 20 10 0 RandomizedUSM RandomizedUSM(p) PRUB+IF PRUB 0.05 0.1 0.15 0.2 0.25 0.3 1 n V (a) highschool (N) (b) highschool (M) Figure 2: The comparison for maximum revenue. • Normal distribution (N): Most people have similar val- uations and a few people have extremely higher or lower valuations toward a commodity. • M-shape distribution (M) [18]: People do not have con- sensus on the value of a commodity. One group of people have higher valuations and the other group of people have lower valuations toward the commodity. In our experiments, we implement the M-shape distribution using two Normal distributions, where the valuation of each individual follows one of the Normal distributions with equal probabilities. The parameters for generating the valuations are listed in the right three columns of Table 2. Concave influence function. As introduced in Sec- tion 2, any non-negative, non-decreasing, and concave func- tion can be applied to the concave influence function. In our experiments, we consider the function F (x) = x to transform the weights into the valuation concept for simplicity. Input prices. By considering different currencies, costs, and cultures in different countries, the pricing of a commod- ity may be different. For simplicity, we set the prices as input parameters in the experiments. For highschool, the input prices are all integers (as the unit of the dollars) in [1, 300], due to the smaller size of the network. For digg and facebook, the input prices are all integers in [1, 2000]. 4.1 Consideration of Quantity Constraints In this subsection, we first show that the consideration of a quantity constraint in the revenue maximization prob- lem makes it differ from the original problem by comparing PRUB with the previous work [17], referred to as Random- izedUSM in this paper. Due to poor scalability of PRUB and RandomizedUSM, these experiments are conducted on the small dataset highschool with Normal and M-shape val- uation distributions. In addition, note that since Random- izedUSM does not consider a quantity constraint, we derive the revenue with two kinds of post-processes as follows. • RandomizedUSM: Given the solution pair of p and A RandomizedUSM reports, this post-process considers the quantity constraint n by calculating the quanti- ties left for sale and computing the revenue as p × min{σ(A) \ A, n − A}, where σ(A) ⊇ A is the set of individuals adopting the commodity under A's effects. • RandomizedUSM(p): This post-process considers the quantity constraint n at each price and then returns the highest revenue among all prices. For each price p and the corresponding seed group Ap obtained by Ran- domizedUSM, the revenue is p × min{σ(Ap) \ Ap, n − Ap}, where σ(Ap) ⊇ Ap is the set of individuals adopting the commodity under Ap's effects. n Figure 2 shows the maximum revenue reported by Ran- domizedUSM, RandomizedUSM(p), PRUB+IF and PRUB with respect to different ratios of the quantity of commodi- ties to the number of population, i.e., V . Accordingly, the revenue reported by RandomizedUSM and Randomize- dUSM(p) is, on average, less than 70% of that obtained by PRUB. Moreover, note that RandomizedUSM has the poor- est performance and even brings zero revenue at the cases of the supply ratio below 0.2. These results demonstrate that the capability of the previous approach [17] (even with the post-processes) is limited for the RMw/QC problem. On the other hand, even for the special case that the quantity is not constrained, i.e., the ratio of the quantity of commodities to the number of population n V = 1, PRUB+IF still out- performs RandomizedUSM and RandomizedUSM(p). This is because PRUB+IF selects seeds in order of the pricing- sensitive importance while RandomizedUSM and Random- izedUSM(p) consider the seeds in arbitrary order. On the same datasets, we then also explore the approxi- mation of PRUB+IF to PRUB (which derives the optimal solutions). According to the results in Figure 2, the per- formance of PRUB+IF is very close to that of PRUB, i.e., about 96% on average, and outperforms both Randomize- dUSM and RandomizedUSM(p). This implies that the pro- posed pricing-sensitive improtance of PRUB+IF is highly effective to identity the crucial individuals as seeds. 4.2 Performance of the PRUB+IF heuristic In this subsection, we conduct experiments on larger datasets digg and facebook to further show the performance of Algo- rithm PRUB+IF in terms of effectiveness, pricing, and effi- ciency. Here PRUB+IF is compared with two other heuris- tics PRUB+R and PRUB+SW. These two heuristics also take the PRUB approach as the framework while applying different strategies for seed selection. Specifically, PRUB+R (R standing for Random) selects seeds randomly; PRUB+SW (SW meaning Sum of the Weights) always picks up the in- dividual with the maximum sum of out-weights from those who have not yet adopted the commodity. Besides, in order to demonstrate the advantage of each part of PRUB+IF, the heuristics PRUB+N, PRUB+F, and PRUB+P represent the approaches that incorporate Normalized Weight, Feedback of Influence Propagation, and Potential-buyer Filtering, re- spectively, for seed selection. Effectiveness. Here we use the maximum revenue ob- tained without consideration of social influences (NoSocial), i.e., the adoption of an individual only depends on his/her in- e u n e v e r . x a M ) l a i c o S o N o t o i t a r e h t ( 4 3 2 1 e u n e v e r . x a M ) l a i c o S o N o t o i t a r e h t ( 4 3 2 1 PRUB+IF PRUB+SW PRUB+R e u n e v e r . x a M ) l a i c o S o N o t o i t a r e h t ( 4 3 2 1 PRUB+IF PRUB+SW PRUB+R e u n e v e r . x a M 8 6 4 2 ) l a i c o S o N o t o i t a r e h t ( PRUB+IF PRUB+SW PRUB+R e u n e v e r . x a M 8 6 4 2 ) l a i c o S o N o t o i t a r e h t ( PRUB+IF PRUB+SW PRUB+R 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 n V (a) digg(N) n V n V (b) digg(M) (c) facebook (N) Figure 3: The effectiveness comparison. n V (d) facebook (M) PRUB+IF PRUB+N PRUB+F PRUB+P e u n e v e r . x a M ) l a i c o S o N o t o i t a r e h t ( 4 3 2 1 PRUB+IF PRUB+N PRUB+F PRUB+P e u n e v e r . x a M 8 6 4 2 ) l a i c o S o N o t o i t a r e h t ( PRUB+IF PRUB+N PRUB+F PRUB+P e u n e v e r . x a M 8 6 4 2 ) l a i c o S o N o t o i t a r e h t ( PRUB+IF PRUB+N PRUB+F PRUB+P 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 n V (a) digg(N) n V n V n V (b) digg(M) (c) facebook (N) (d) facebook (M) Figure 4: The advantage of each part of PRUB+IF. herent valuation, as the baseline, and show the effectiveness of the heuristics in ratios to the baseline. Figure 3 reports the effectiveness with respect to different ratios of the quan- tity of commodities to the number of population, i.e., n V . For these results, we have two observations as follows. First, on digg and facebook with both Normal and M-shape valu- ation distributions, PRUB+IF is the best, and PRUB+SW outperforms PRUB+R only in the cases of small n V . The reason is that, to estimate the advantage of selecting an indi- vidual in the promotion, PRUB+IF introduces the pricing- sensitive importance, which considers the normalized effects of the influence propagated through the social network, while PRUB+SW only takes the sum of weights on one's direct out-neighbors. RRUB+R picks the seeds blindly. Second, as n V decreases, the performance of PRUB+IF becomes even more noticeable (compared to PRUB+SW and PRUB+R). This is because the number of potential buyers reduces when the pricing of the commodity increases due to scarcity. The less the number of potential buyers is, the more challenging the seed selection is. Hence, the results demonstrate that the strategy of PRUB+IF for the seed selection outperforms those of PRUB+SW and PRUB+R. In order to demonstrate the advantage of each part of PRUB+IF, Figure 4 shows the effectiveness of PRUB+IF, PRUB+N, PRUB+F, and PRUB+P with respect to dif- ferent ratios of the quantity of commodities to the num- ber of population, i.e., n V . Accordingly, the three parts of PRUB+IF are more or less all equally important. Pricing. In addition to the demonstration of effectiveness by maximum revenue, whether or not the suggested pricing complies with the common sense is also an interesting ques- tion. For answering this question, we plotted the trend of the pricing suggested by PRUB+IF, PRUB+SW, PRUB+R, and NoSocial with respect to different ratios of the quan- tity of commodities to the number of population, i.e., n V , in Figure 5. Accordingly, PRUB+IF suggests higher pric- ing in most cases than the other approaches to gain higher maximum revenue (as shown in Figure 3) in all cases. This implies that PRUB+IF performs the most elegant strategy for seed selection. The smart utilization of word-of-mouth effects can help the promotion of commodities in higher pric- ing, which complies with the common sense. Furthermore, for all methods, there is a upward trend in the pricing as n V decreases. The less the quantity is, the more precious the commodity could be, which also complies with the com- mon sense. There are some exceptions to this pricing trend: PRUB+IF at 0.25 on digg(M), and both PRUB+SW and PRUB+R at 0.25 or 0.3 on facebook (N). The reason is that a quantity of supply is used as freebies. This may allow higher pricing in some cases by leaving less quantities for sale. The tiny example in Figure 6 explains such a case in more de- tails. (F (x) = x is used as the concave influence function.) For the case of the quantity of the concert tickets as 2, the maximum revenue is R(2, $3, ∅) = $6 (i.e., b and c adopt the concert tickets). Now consider that the quantity of the concert tickets is increased to 3. The maximum revenue is R(3, $7, {a, c}) = $7 (i.e., b adopts the concert ticket under the impact of a and c). The pricing is higher even though the quantity increases. This is because 2 out of 3 concert tickets are used as free tickets and only 1 concert ticket is left for sale. Hence, according to these results, PRUB+IF is capable of suggesting elegant marketing strategies. Efficiency. Now we compare the efficiency of the three heuristics. Figure 7 shows the runtime with respect to dif- ferent ratios of the quantity of commodities to the number of population, i.e., n V , on digg(N), digg(M), facebook (N), and facebook (M). PRUB+IF spends more execution time than PRUB+SW and PRUB+R in all cases, since PRUB+IF con- siders the influence propagation in the derivation of pricing- sensitive importance for seed selection. PRUB+R generally 100 g n i c i r P 50 0 PRUB+IF PRUB+SW PRUB+R NoSocial 0.05 0.1 0.15 0.2 0.25 0.3 n V (a) digg(N) PRUB+IF PRUB+SW PRUB+R NoSocial 0.05 0.1 0.15 0.2 0.25 0.3 100 g n i c i r P 50 0 100 g n i c i r P 50 0 PRUB+IF PRUB+SW PRUB+R NoSocial 0.05 0.1 0.15 0.2 0.25 0.3 100 g n i c i r P 50 0 PRUB+IF PRUB+SW PRUB+R NoSocial 0.05 0.1 0.15 0.2 0.25 0.3 n V n V n V (b) digg(M) (c) facebook (N) (d) facebook (M) Figure 5: The pricing comparison. a($1) 2 b($3) c($3) 2 Figure 6: An example for the exception to the pric- ing trend. spends a little bit more time than PRUB+SW due to the blind seed selection (that makes PRUB+R need to search more prices for finding maximum revenue). Nevertheless, the runtime of all the three heuristics is not sensitive to n V . For PRUB+IF, other factors such as the local structure of potential buyers and the influence cascades will also affect the runtime. 5. RELATED WORKS Influence Maximization. The influence maximization problem aims at identifying a group of seeds so that the num- ber of the active people is the largest [3, 7, 15, 19]. To the best of our knowledge, the first study could be traced to the work [7], where Domingos et al. studied the influence maxi- mization problem as an algorithmic problem. Then, Kempe et al. [15] formally modeled the problem as a discrete op- timization, which is to identify k seeds for maximizing the influence spread over the social network. Meanwhile, Kempe et al. also showed that the influence maximization problem is NP-hard under both the Linear Threshold (LT) and the Independent Cascade (IC) models, and proposed a greedy strategy with approximation guarantees. Specifically, in the LT model, the influences on an individual are cumulative, and each individual has his/her own activation threshold. An individual becomes active if the sum of weights from his/her active neighbors is larger than or equal to his/her activation threshold. Then, this active individual will also propagate influences to his/her inactive neighbors. In the IC model, each influence an individual receives is indepen- dent. For each influence, there is one and only one chance to activate the individual with a probability. If the individual becomes active, he/she futher spreads his/her influence in the same mannar. In the work [3], Chen et al. showed that, given seeds, computing the influence spread under the LT model is #P-hard, and provided a scalable heuristic based on the fast computation for directed acyclic graphs (DAGs). Singer [19] concerned the inherent costs of making individ- uals as seeds and followed the incentive compatible mecha- nism to extract the true information about individuals' costs for identifying and rewarding the seeds. As mentioned in Section 1, all these influence maximization problems do not take the monetary effects on people's purchase decisions into account, and thus differ from our problem. Revenue Maximization. The problem of revenue max- imization is to derive the marketing strategy that brings the optimal revenue under the social influence, and was first addressed by Hartline et al. [11]. As a solution, Hartline et al. [11] proposed a marketing strategy, named influence-and- exploit (IE), to tackle the problem in two steps. In the influ- ence step, IE identifies a group of customers as seeds. After that, in the exploit step, IE visits the remaining customers in a random order and offers each of them the optimal (myopic) pricing of the product in order to maximize the revenue. The decision whether or not an individual purchases the product depends on the pricing offered and the individual's valua- tion, which takes the social influences into consideration. Hartline et al. [11] also discussed the inferences of the val- uations from social influences by Uniform Additive Model, Symmetric Model, and Concave Graph Model. Later, Fo- takis et al. [9] proposed a polynomial-time approach to ap- proximate the maximum revenue in the Uniform Additive Model. Another work [16] distinguishes between activation and adoption. When an individual is active by the social in- fluence, he/she will then determine whether or not to adopt the product with respect to the pricing and his/her valua- tion. The marketing strategy of all these works is to deter- mine customized pricing for different customers. Mirrokni et al. [17] argued that offering the product at fixed pricing is more reasonable since offering customized pricing is hard to implement in the real world. Hence, their objective is to discover a seed group with the fixed pricing to maximize the revenue. Mirrokni et al. [17] adopted the Concave Graph Model proposed in the work [11] to incor- porate the social influence into the valuation, and presented a (1/2)-approximation based on the randomized linear time approximation algorithm for the Unconstrained Submodular Maximization problem. However, all the works above assumed that there is an unlimited supply of commodities, whereas we consider the scenario with limited supply such as limited edition com- modities and concert tickets. As shown in Sections 1 and 4.1, it is unapplicable for these works to determine the proper marketing strategies. 6. CONCLUSION In this work, we addressed the revenue maximization prob- lem with a quantity constraint on a monetizing social net- work. To maximize the revenue, the marketing strategy is to determine the pricing of the commodity and find a seed group of individuals as the initial customers. Hence, we pro- vided Algorithm PRUB to derive the pricing and the seed group for the optimal revenue. For better efficiency, we fur- 105 103 ) e t u n i m ( PRUB+IF PRUB+SW PRUB+R 105 103 ) e t u n i m ( PRUB+IF PRUB+SW PRUB+R 105 103 ) e t u n i m ( PRUB+IF PRUB+SW PRUB+R 105 103 ) e t u n i m ( PRUB+IF PRUB+SW PRUB+R e m T i 101 e m T i 101 e m T i 101 e m T i 101 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 0.05 0.1 0.15 0.2 0.25 0.3 n V (a) digg(N) n V n V (b) digg(M) Figure 7: The runtime comparison. (c) facebook (N) n V (d) facebook (M) Review 75: 424-440, 1985. [15] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the Spread of Influence through a Social Network. In ACM SIGKDD, 2003. [16] W. Lu and L. V. Lakshmanan. Profit Maximization over Social Networks. In IEEE ICDM, 2012. [17] V. S. Mirrokni, S. Roch, and M. Sundararajan. On Fixed-Price Marketing for Goods with Positive Network Externalities. In WINE, 2012. [18] K. Ohmaa. The Impact of Rising Lower-Middle Class Population in Japan. Tokyo: Kodan-sha Publishing Company, 2006. [19] Y. Singer. How to Win Friends and Influence People, Truthfully: Influence Maximization Mechanisms for Social Networks. In ACM WSDM, 2012. [20] A. Sundararajan. Local Network Effects and Complex Network Structure. The BE Journal of Theoretical Economics 7(1), 2007. [21] S. Worchel, J. Lee, and A. Adewole. Effects of Supply and Demand on Ratings of Object Value. Journal of Personality and Social Psychology 32.5 (1975): 906. [22] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the Evolution of User Interaction in Facebook. In ACM WOSN, 2009. ther proposed Algorithm PRUB+IF as a heuristic algorithm based on the framework of PRUB for a feasible solution. The experiments on real datasets with different valuation distri- butions showed the effectiveness of PRUB and PRUB+IF. 7. REFERENCES [1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu. Pricing Strategies for Viral Marketing on Social Networks. In WINE, 2009. [2] S. E. Asch. Effects of Group Pressure on the Modification and Distortion of Judgments. In H. Guetzkow (Ed.), Groups, leadership and men(pp. 177-190). Pittsburgh, PA:Carnegie Press, 1951. [3] W. Chen, Y. Yuan, and L. Zhang. Scalable Influence Maximization in Social Networks under the Linear Threshold Model. In IEEE ICDM, 2010. [4] M. D. Choudhury, H. Sundaram, A. John, D. D. Seligmann. Social Synchrony: Predicting Mimicry of User Actions in Online Social Media. In IEEE CSE, 2009. [5] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law Distributions in Empirical Data. In SIAM review 51.4, 2009. [6] J. S. Coleman. Introduction to Mathematical Sociology. London Free Press Glencoe, 1964. [7] P. Domingos and M. Richardson. Mining the Network Value of Customers. In ACM SIGKDD, 2001. [8] D. Easley and J. Kleinberg. Information Cascades. In Networks, Crowds, and Markets: Reasoning about a Highly Connected World (chap. 16, pp. 483-508). Cambridge University Press, 2010. [9] D. Fotakis and P. Siminelakis. On the Efficiency of Influence-and-Exploit Strategies for Revenue Maximization under Positive Externalities. In WINE, 2012. [10] H. Fromlet. Predictability of Financial Crises: Lessons from Sweden for Other Countries. Business Economics 47.4, 2012. [11] J. Hartline, V. S. Mirrokni, and M. Sundararajan. Optimal Marketing Strategies over Social Networks. In ACM WWW, 2008. [12] B. Hu, M. Jamali, and M. Ester. Learning the Strength of the Factors Influencing User Behavior in Online Social Networks. In IEEE ASONAM, 2012. [13] S. Y. Jung, J.-H. Hong, and T.-S. Kim. A Statistical Model for User Preference. In IEEE TKDE, 2005. [14] M. L. Katz and C. Shapiro. Network Externalities, Competition, and Compatibility. American Economic
1308.5168
1
1308
2013-08-23T16:14:15
Is Somebody Watching Your Facebook Newsfeed?
[ "cs.SI" ]
With the popularity of Social Networking Services (SNS), more and more sensitive information are stored online and associated with SNS accounts. The obvious value of SNS accounts motivates the usage stealing problem -- unauthorized, stealthy use of SNS accounts on the devices owned/used by account owners without any technology hacks. For example, anxious parents may use their kids' SNS accounts to inspect the kids' social status; husbands/wives may use their spouses' SNS accounts to spot possible affairs. Usage stealing could happen anywhere in any form, and seriously invades the privacy of account owners. However, there is no any currently known defense against such usage stealing. To an SNS operator (e.g., Facebook Inc.), usage stealing is hard to detect using traditional methods because such attackers come from the same IP addresses/devices, use the same credentials, and share the same accounts as the owners do. In this paper, we propose a novel continuous authentication approach that analyzes user browsing behavior to detect SNS usage stealing incidents. We use Facebook as a case study and show that it is possible to detect such incidents by analyzing SNS browsing behavior. Our experiment results show that our proposal can achieve higher than 80% detection accuracy within 2 minutes, and higher than 90% detection accuracy after 7 minutes of observation time.
cs.SI
cs
Is Somebody Watching Your Facebook Newsfeed? 1Shan-Hung Wu, 2Man-Ju Chou, 3Ming-Hung Wang, 4Chun-Hsiung Tseng, 2Yuh-Jye Lee, and 3Kuan-Ta Chen 1Dept. of Computer Science, National Tsing Hua University 2Dept. of Computer Science, National Taiwan University of Science and Technology 2Inst. of Information Science, Academia Sinica 3Dept. of Information Management, Nanhua University 3 1 0 2 g u A 3 2 ] I S . s c [ 1 v 8 6 1 5 . 8 0 3 1 : v i X r a ABSTRACT With the popularity of Social Networking Services (SNS), more and more sensitive information are stored online and associated with SNS accounts. The obvious value of SNS ac- counts motivates the usage stealing problem -- unauthorized, stealthy use of SNS accounts on the devices owned/used by account owners without any technology hacks. For ex- ample, anxious parents may use their kids' SNS accounts to inspect the kids' social status; husbands/wives may use their spouses' SNS accounts to spot possible affairs. Usage stealing could happen anywhere in any form, and seriously invades the privacy of account owners. However, there is no any currently known defense against such usage stealing. To an SNS operator (e.g., Facebook Inc.), usage stealing is hard to detect using traditional methods because such at- tackers come from the same IP addresses/devices, use the same credentials, and share the same accounts as the owners do. In this paper, we propose a novel continuous authentica- tion approach that analyzes user browsing behavior to de- tect SNS usage stealing incidents. We use Facebook as a case study and show that it is possible to detect such inci- dents by analyzing SNS browsing behavior. Our experiment results show that our proposal can achieve higher than 80% detection accuracy within 2 minutes, and higher than 90% detection accuracy after 7 minutes of observation time. 1. INTRODUCTION Many people use Social Networking Services (SNS, such as Facebook) daily, and have associated a lot of personal and sensitive information with their SNS accounts. These information generally include friend lists, feeds from their friends, non-public posts/photos, private interactions with others (such as chats and messages), purchased apps/items, etc., and its obvious value makes the SNS accounts one of the most targeted online resources by hackers to steal. To protect user privacy, SNS sites today have done a lot to pre- vent account stealing. For example, Facebook records the regular IP addresses and devices used by each account. If an account logs in with an unusual IP address or device, the ac- count is prompted to either answer some secret questions [1] or enter a security code sent to the account owner's mobile device [2] in order to verify if the login is authentic. Face- book also allows users to report account stealing manually if they suspect that their accounts have been stolen. Despite of all the efforts to prevent account stealing, user privacy can also be compromised by another form of breach called usage stealing -- unauthorized, stealthy use of SNS ac- counts on the devices owned/used by account owners with- out any technology hacks. Usage stealing could happen any- where in any form. For example, anxious parents may use their kids' SNS accounts to inspect the kids' social status; husbands/wives may use their spouses' SNS accounts to spot possible affairs. Similarly, colleges, supervisors, friends, or siblings, just to name a few, may also have their own motives to use acquaintances' accounts for different reasons. Usage stealing is common in practice due to the follow- ing reasons. First, when using their own computers, people tend to choose "yes" when the browsers ask whether they would like to save their (SNS) passwords for automatic lo- gins in the future. This is especially true when users are using their mobile devices because it is cumbersome to in- put passwords [22, 15]. Mobile devices also ease the usage stealing in other aspects, in that they can be physically ac- cessed by acquaintances or strangers [29], and that most of them are not locked by PINs [10]. In addition, many SNS sites use cookies to save the trouble of future account au- thentications within a short time. For example, once logged into Facebook, a user need not login again during at most 60 following days [5]. From the above, if someone (mostly an acquaintance) can access the computer or mobile devices of an SNS user, it is likely that the person, without the need of technical background, can peep the information associated with the SNS account. However, there is no any currently known defense against such usage stealing. To an SNS site, usage stealing is hard to detect using traditional methods because the attackers come from the same IP addresses/devices, use the same creden- tials, and share the same accounts as the owners do. More- over, because users normally do not see the logs, victims can hardly sense and report the stealthy usage. Contributions. In this paper, we identify the usage stealing problem in SNS and propose a novel continuous au- thentication approach [19, 20] that analyzes users' browsing behavior to detect usage stealing incidents. We use Face- book as a case study, and show that it is possible to detect such incidents by analyzing their browsing behavior on the SNS sites, namely, clicks on newsfeeds1, friend lists, profiles, likes, messages, photos/videos, and comments. Our user study shows that our proposed scheme can achieve above 80% accuracy with a high confidence within 2 minutes, and higher than 90% accuracy after 7 minutes of observation time. Deployment. Our detection approach is designed to run on SNS servers and to serve as the first line of defense against account usage stealing. The deployment is straight- forward: an SNS server collects the behavior of an account's session and feeds it into a detection model in real time. The model determines whether the user of the session is suspi- cious, and if so, the SNS server can either 1) trigger more sophisticated analysis/monitoring, and/or 2) challenge the session user immediately by secret questions or via a second channel such as mobile phone authentication [2]. Note that since we are at the first line of defense, there is no need for an 100% accurate detection model, rather, a reasonable detec- tion power is sufficient and the key is a prompt and efficient detection. Also, please note that the proposed methodology is neither tied to a specific SNS site nor to a certain learning technique as it is based on the standard supervised learn- ing framework. For example, while we adopt the smooth SVM [14] as the detection model in this paper, the service operators (e.g., Facebook Inc.) may choose the asymmetric SVM [26] or similar methods if they wish to further reduce the false positive rates. Implications. We believe that the usage stealing prob- lem, while not being well studied so far, will be much more critical in the future, as people put more and more sensitive information online. In fact, this problem may not only oc- cur in the social services, but also online email services such as Gmail and Outlook.com, time management services such as Google Calender and Remember The Milk, photo album services such as Instagram, and much more. Except asking users to repeatedly authenticate themselves (practically pro- hibited by usability issues), continuous authentication seems to be the only feasible solution for attacks of this kind. The rest of this paper is organized as follows. We review the related work in Section 2. Section 3 discusses the ra- tionale behind detecting usage stealing based on browsing behavior. In Section 4, we describe our user study on Face- book and analyze the users' behavior. Section 5 elaborates our detection methodology. We evaluate the performance of our scheme in Section 6, and analyze the security issues in Section 7. Finally, Section 8 concludes the paper. 2. RELATED WORK In this section, we review existing studies on the privacy issues on SNS and continuous authentication. SNS Privacy. Privacy is always a concern for SNS users. Many efforts have been devoted to protect user privacy. He et al., Zheleva et al., and Tang et al. [11, 21, 30] observe a privacy hole that attackers can infer private information (such as sexual orientation) of a user from his/her public SNS records/activities. Felt et al. and Wishart et al. [7, 24] prevent privacy leaks from SNS developer APIs and from 1A Facebook newsfeed, which locates at the center column of one's home page, is a constantly updated list summarizing the status of people that one follows on Facebook. the software based on them. Mahmood et al. [16] focus on another type of privacy attacks called the frequent account deactivation. Meanwhile, in the industry, Facebook takes a vector of measures to protect user privacy. For example, it provides an official page [4] to educate users about the correct privacy and security settings, and records the IP ad- dresses, web browsers, and devices used by each account [6]. If an account logs-in with unknown records, Facebook will challenge the user either by secret questions [1] or via mo- bile phone authentication [2]. Facebook also allows users to report account stealing incidents manually. However, none of the above attempts can protect user privacy when the attackers sneak in using the same devices owned by the victims. Since the passwords, credentials, and cookies are usually stored in users' devices to avoid repeated account authentication [5, 15, 22], attackers who have phys- ical access to these devices can easily bypass all the above detection schemes and obtain the sensitive information as- sociated with the SNS accounts. Continuous Authentication. Continuous authentica- tion is an implicit, automatic re-authentication method that analyzes the follow-up user actions after his/her initial au- thentication to make sure if the user is still authentic. The actions can be keyboard typing behavior [20], mouse move- ments [19], operations on mobile devices [28], facial char- acteristics (if a webcam is available) [17], or any other soft biometric traits [18, 27]. However, the above analyses are per-person-based; that is, a detection model is required for each user. This may be cost-prohibitive on SNS servers given that an SNS site usually have more than millions of users2. The continu- ous authentication method proposed in this paper analyzes web browsing behavior performed by only three predefined user groups. The detection model is universal to all users and it introduces low data collection and computation over- head. Another advantage of our proposal is that the scheme can be applied to a new account whose associated biomet- ric behavior is not yet clear. Note that our proposal is not a replacement for existing continuous authentication ap- proaches. Rather, it can serve a low-cost filter for suspicious accounts, with which the servers can trigger more sophisti- cated, personalized analysis whenever necessary. 3. RATIONALE BEHIND OUR DETECTION APPROACH Nowadays, an SNS service such as Facebook is not merely a place for people to maintain their friend lists. They are more like a platform where people engage various social ac- tivities, such as posting own status, reading others' com- ments on news, chatting, and meeting new people, etc. Stud- ies [9, 13] show that there is no typical user behavioral pat- tern on a complicated, open platform like Facebook, as every single user seems to have his/her own behavioral tendency on an SNS service. For example, some people tend to fulfill their desire on self-presentation, so they spend most time on sharing their own latest status and posting the latest pho- tos/events. In the meantime, some people may manage to engage new friends online; some chat with familiar friends; some spend time discovering new social games; and some others like to stalk certain other users. 2For example, Facebook has more than a billion monthly active users as of December 2012. Given the diversity in user behavioral patterns determined by users' personal characteristics and social status, it is hard to profile every user's browsing behavior when they are us- ing an SNS service. However, we argue that users would normally exhibit significantly different behavior when they are browsing their own and others' pages. In the context of usage stealing, each user can have one of the three following roles when using an SNS service: 1) owner, when he/she is using his/her own account; 2) ac- quaintance (as a stalker), when he/she is using the account of someone he/she knows; and 3) stranger (as a stalker), when he/she is using the account of an unknown person. Intuitively, when checking the Facebook newsfeed as the owner, a user would focus more on the latest information of friends and use the "like" or "share" function to interact with others. On the other hand, when browsing a news- feed as a stalker (either an acquaintance or a stranger), the user may be interested in earlier information that is more interesting to the stalker. He/she may not interact with others because he/she does not want the owner to discover the stealthy usage later. In summary, we believe that users would normally behave differently at different roles because • The way people treat familiar information (or infor- mation from familiar friends) would be different than the way they treat unfamiliar information; • People at different roles would have different inten- tions; • In order not to be found by the account owners, people as the stalkers may behave differently with the time pressure. We call the above differences in users' browsing behavior as the role-driven behavioral diversity. We conjecture that Facebook users, as well as users of the other SNS services, possess such diversity, and this serves as the main rationale behind our detection scheme. In the following, we shall prove that the role-driven be- havioral diversity indeed exists using the datasets we collect in a user study on Facebook (Section 4) and then show that our detection scheme can rely on this property to classify account owners from stalkers (Section 5). 4. FACEBOOK USER BEHAVIOR We use Facebook as a case study on users' role-driven behavior. 4.1 Data Collection To capture the role-driven behavioral diversity, we hire a number of Facebook users to be our subjects and design experiments in which subjects browse Facebook newsfeed at different roles. In other words, we ask each subject to browse 1) his/her own newsfeed, 2) his/her friend's newsfeed, and 3) a stranger's newsfeed. To conduct the experiment, we hire pairs of subjects from an one-million-user Internet community. Each pair of sub- jects must be with at least one of the following relationships: friends, family members, colleagues, classmates, and cou- ples. Each subject is paid 10 USD and we get the subject's permission to record all actions (e.g., clicks, typing, page views, etc.) he/she performs when browsing a newsfeed. A Account A A Account B B Account C C Account D D Round 1 Round 2 Round 3 A C D B B A C D D B A C 30 minutes 30 minutes 30 minutes time (A, B) and (C, D) are pairs of acquain- Figure 1: tances. Each experiment comprises 3 rounds. In each round, each subject is assigned to an account randomly ; overall, each subject is guaranteed to browse his/her own account, the account of acquain- tance, and an account of stranger in the three rounds with a randomized order. Property # experiments Total time # subjects # male subjects # female subjects # sessions # self-usage # acquaintance-usage # stranger-usage Avg. session length Avg. action rate Avg. page switching rate Value 28 9302 min 112 56 44 278 100 81 97 30 min 3.0 action/min 0.7 page/min Table 1: A summary of the experiments and raw dataset. subject is hired only if he/she is an active Facebook user -- the subject must have more than 50 friends and consistently stay on Facebook longer than 4 hours per week. Each experiment comprises 3 rounds. In each round, a subject is asked to browse the newsfeed of an account (ei- ther of his/her, his/her friend's, or a stranger's own) for 30 minutes. The subjects and accounts are paired randomly, but each subject is guaranteed to play all the 3 roles in the 3 rounds, as shown in Figure 1. During each round, the users can perform any action they like (e.g., uploading photos, leaving comments, etc.), but not including sabotage activi- ties (e.g., changing the account password). Actions to follow external links (such as videos) are allowed, but the subjects are asked not to stay with external content for longer than 1 minute each time. In order to capture the subjects' activities performed on Facebook, we use Fiddler, a free Web debugging proxy, to monitor all the HTTP/HTTPS GET/POST requests issued Actions Interactive Page- Switching √ √ √ √ √ √ √ √ √ √ Expand Comments Likes View Cards View Likes View Messages View Photos To Friend List Page To Note Page To Photo Page To Wall Page To Fan Page To Feed Page To Group Page To Message Page Add Comments Delete Comments Click Hyper-links Expand Page √ √ √ √ √ √ √ √ Table 2: 18 types of common user actions we col- lected on Facebook. Time stamp Action Target Person 1345837539249.47 1345837568519.15 1345837586398.26 1345837732512.73 1345837756445.03 1345837770260.55 1345837773293.04 1345837828598.01 1345837875240.45 Likes View Cards Add Comment Group page Likes View Cards View Message Likes Expand Page Friend A Account Owner Friend A Friend B Non-Friend C Friend A Non-Friend C Table 3: An exemplary list of the collected actions. by a browser. By parsing the HTTP/HTTPS request logs, we are able to capture every action performed by a user (to be explained later). Table 1 summarizes the experiments and the raw dataset we collect. Note that, although we have administrators overseeing the experiment process, some sub- jects do not follow the contract to browse the given Face- book newsfeeds. Out of 311 sessions, we remove 33 "noisy sessions" of those subjects who are obviously not focusing on the newsfeeds, i.e., sessions with any idle, non-active period longer than 5 minutes. We categorize the common user activities on Fcebook into 18 different actions, as shown in Table 2. Among these ac- tions we can identify 2 groups: 1) interactive actions: those by which the user interacts with a certain person; and 2) page-switching actions: those lead the browser to switch to another Facebook page. By parsing the HTTP/HTTPS re- quest logs, we obtain a chronological action list for each session, as exemplified in Table 3. Each record in the list contains the action name, the occurrence time stamp, and, if the action is interactive, the target person the user inter- acts with. Based on the account owner's profile and friend list, we annotate the target person with either the "account owner," "friend," or "non-friend." 4.2 Defining Features Next, we define a number of features and obtain their val- ues for every session we collect so that the machine learning algorithms can be applied. Even we have a perfect learning algorithm, without features that encode information about who is controlling a session, the algorithm will have no way to distinguish the account owners from stalkers. How to de- fine features that we need is a key issue in this work, and is usually challenging because it requires insights, domain knowledge, creativity, and even "black arts" [3]. We interview heavy users of Facebook about their regu- lar usage patterns and the ways they discover and explore interesting information. Based on the results, we define 139 features. All the features of a particular session can be ex- tracted from the session's action list (see Table 3). Our features can be basically summarized as follows: 1. f.<action>: the frequency of a certain action (per minute). The <action> can be any action defined in Table 2. We also keep f.acts and f.acts.excluding. page.expand, the frequencies of all actions and all ac- tions except the "expand page3" action respectively. The reason we capture the latter feature is that we want to determine how much a user really does in ad- dition to merely browsing pages. 2. f.<target_type>.<action>: the frequency of a cer- tain action targeting a certain target user type. The <action> is an interactive action in Table 2 and <target_type> can be self (if the target person is the account owner), friend (if the target person is a friend of the account owner), or nonfriend (if the target person is not a friend). 3. b.<xxx>: the binary version of all the above features; i.e., b.<xxx>= 1 iff f.<xxx> is greater than 0. For example, b.<action> denotes whether or not a certain action occurs during the session. 4. f.act.<target_type>: the frequency of all interactive actions performed on a certain target user type. 5. ts.page.<page_type>: the time the session user spends on a certain page type. The <page_type> can be feed (the account's newsfeed), msg (the account's message box), self (pages, such as the wall/friend list/note/photos, of the account owner), friend (pages of friends), nonfriend (pages of non-friends), or public (fans or groups pages). 6. f.act.page.<page_type>: the frequency of all actions performed on a certain page type. We also keep f.act. expand.page.<page_type> and f.act.non.expand.page. <page_type>, the frequencies of the "expand page" ac- tion and all other actions performed on a certain page type respectively. 7. n.act.person: the number of target people the user interacts with during the session. 8. n.act.person.<statistics>: the statistics of the counts of visits to different users' pages during the session. The <statistics> include mean, standard_deviation, 3In Facebook, some pages (e.g., newsfeeds, walls, etc.) and page items (e.g., comments, notifications lists, etc.) are expandable. For clarity, these pages/items show ear- lier/detailed information only upon expansion. median, and maximum. For example, suppose that the user visits his/her own pages 1 time, friend A's pages 3 times, friend B's pages 1 time, and non-friend C's pages 2 times, then we obtain mean= 1.75, standard_ deviation= 0.96, median= 1.5, and maximum= 3. The reason we capture these features is that we want to de- termine whether a user pays attention to any specific person. After extracting the features for each session, we obtain a dataset ready for analysis. Each session is labeled with ei- ther "owner," "acquaintance," or "stranger," depending on the user's role for the session in the experiment. 4.3 Role-Driven Behavioral Diversity To justify the existence of the role-driven behavioral diver- sity between the account owners, acquaintances, and strangers, we carry out some analysis of the user behavior performed at different roles. Our observations are summarized as follows. General Diversity. As shown in Figure 2(a), all ses- sions controlled by the three user roles have similar values in f.acts. However, in f.acts.excluding.page.expand (Fig- ure 2(b)), the sessions controlled by the account owners ex- hibit higher values than those by the acquaintances, which in term give higher values than those by strangers. This implies that the acquaintances/strangers usually pay more attention to reading/searching for interesting information. They also care more about earlier information, as the con- tent hidden by expandable pages/items by default are older. The sessions used by acquaintances/strangers also yield much lower values in f.act_add_comment (Figure 2(c)) and f.act_like (Figure 2(d)) than those by the account owners. The reason is obvious: Acquaintances/strangers normally do not want to leave a clue of their peeping behavior. What Stalkers Do Not Care. Although the acquain- tances/strangers expand pages more frequently (Figure 2(b)), they do not expand the comment lists as commonly as the account owners do. This is because the acquaintances/strangers may not know the people leaving the comments, therefore showing less interest to them. Due to similar reasons, ac- quaintances/strangers also express less interests in the fans/ groups pages (Figure 2(e)) and who likes a post (Figure 2(f)); in addition, they also spend less time in the accounts' newsfeeds (Figure 2(g)). In particular, strangers tend to ig- nore most of the newsfeeds because they generally do not know people whose information appear in the feeds (Figure 2(h)). What Acquainted Stalkers Care. As compared with the other roles, the acquaintances pay more attention to the accounts' friend lists (Figure 2(i)). This is because an ac- quaintance may know the account owner's friends and be curious about these friends' status (especially the status of those people who are not currently a friend of the acquain- tance). The acquaintances are generally most interested in the message boxes (Figure 2(j)) and the profile cards of the accounts' friends (Figure 2(k)) due to similar reasons. What Stranger Stalkers Care. Interestingly, the ac- count owners' profiles (Figure 2(l)) and photos (Figure 2(m)) are most viewed by strangers rather than the account own- ers' friends or the owners themselves. This is because the strangers do not know the account owners, so they are usu- ally curious about who the owners are and how they look like. The strangers are also less affected by the account own- ers' social relationship. For example, they are more willing User SNS Client SNS Server Detection Model (1) Start session. (2) Collect actions for n minutes (6) If yes, challenge user. (3) Extract features (4) Feed inn (5) Suspicious?. Figure 3: The flow chart of our detection scheme. to check out non-friends (Figure 2(n)) and external links (Figure 2(o)). We believe that the above findings suffice to prove the existence of the role-driven behavioral diversity. Next, we show how this diversity can be further utilized to implement a low-cost detector for usage stealing. 5. DETECTION SCHEME This section introduces a scheme for detecting the usage stealing on SNS sites. In our dataset, each session is labeled with either "account owner," "acquaintance," or "stranger." Since our goal is to distinguish stalkers from the account owners, in the follow- ing, we replace the "acquaintance" and "stranger" labels with a single "stalker" label. Figure 3 gives an overview of our detection scheme. After a user starts a session (by either logging-in newly or us- ing existing authentication cookies, Step 1), the SNS server monitors and collects a list of actions performed by the user for an observation period of n minutes, where n is a con- figurable parameter (Step 2). After the observation period, the SNS server extracts the features of the monitored session based on the recorded action list (Step 3), where the features are defined in Section 4.2. It then feeds the session features into a detection model (Step 4), which determines whether the session owner is suspicious by predicting the label of the session (Step 5). If the predicted label is "stalker," the SNS server can challenge the user by secret questions or via a second channel such as mobile phone authentication (Step 6). Alternatively, the server can trigger a more sophisticated (but costly) detection scheme. Note that the scheme has low runtime cost on an SNS server because it requires only one detection model for all SNS users, taking the advantage of the role-driven behav- ioral diversity. Also note that, although we employ a two- class detection model to distinguish stalkers from the ac- count owners, the scheme can be readily extended to iden- tify the account owners, acquaintances, and strangers if a multi-class detection model is adopted. We obtain our detection model by training it using the labeled sessions we collected. Clearly, the effectiveness of our detection scheme largely depends on the quality of pre- dictions made by the detection model. In order to obtain high-quality predictions, we take rigorous steps in training the model, as summarized below. 0 3 . 0 2 . 0 1 . . 0 0 5 1 0 . 0 1 . 0 5 0 . 0 0 0 0 . 8 0 . 6 . 0 4 . 0 2 . 0 0 . 0 f.acts f.acts.excluding.page.expand f.act_add_comment f.act_like f.page_group 5 2 . 0 2 . . 5 1 0 1 . 5 . 0 . 0 0 2 1 . 0 8 0 . 0 4 0 0 . 0 0 0 . 0 2 . 0 0 1 0 . 0 0 0 . Self Friend Stranger Self Friend Stranger Self Friend Stranger Self Friend Stranger f.friend.view_likes ts.page.feed f.page_feed f.page_friends 0 0 6 0 0 4 0 0 2 0 0 2 . 0 5 1 0 . 0 1 . 0 5 0 0 . 0 0 0 . 4 0 . 0 2 0 0 . 0 0 0 . Self Friend Stranger f.page_message 3 0 . 0 2 0 . 0 1 0 0 . 0 0 0 . 0 2 . 0 5 1 0 . 0 1 0 . 5 0 0 . 0 0 0 . Self Friend Stranger Self Friend Stranger Self Friend Stranger Self Friend Stranger Self Friend Stranger f.view_card f.self.page_wall f.self.view_photo ts.page.nonfriend f.act_follow_link 0 2 . 0 5 1 . 0 0 1 . 0 5 0 . 0 0 0 . 0 0 2 0 0 . 0 1 0 . 0 0 0 0 . 0 0 5 1 0 0 1 0 5 0 6 0 . 0 4 0 . 0 2 0 . 0 0 0 . 0 Self Friend Stranger Self Friend Stranger Self Friend Stranger Self Friend Stranger Self Friend Stranger Figure 2: The evidence of role-driven behavioral diversity. 5.1 Model Development For ease of numeric operations, we treat the labels "stalker" and "account owner" as 1 and −1 respectively. Given a train- ing dataset D of size n, D = {(x1, y1), (x2, y2), · · · , (xn, yn)}, where xi ∈ Rd is a labeled instance (i.e., session) with d fea- tures and yi ∈ {1, −1} is the corresponding label, our goal is to obtain a function f : Rd → R such that given a new instance x′ with an unknown label y′, we have f (x′) > 0 iff y′ = 1. The function f is the detection model in our scheme. In Figure 3(4), the SNS server feeds the session x′ into f . In Figure 3(5) the SNS server gets f (x′) and determines whether the session is suspicious by sgn(f (x′)). We obtain f based on the Support Vector Machine (SVM) technique. The SVM is a very popular and promising ma- chine learning algorithm for binary classification problems. The idea is to let f be a linear function, i.e., f (x) = w⊤x+ b for some w ∈ Rd and b ∈ R, and then find w and b such that the hyperplane {x : w⊤x+ b = 0} separates the positive and negative instances in D while leaving the largest "margin" between {x : w⊤x + b = 1} and {x : w⊤x + b = −1}, i.e., w⊤xi + b ≥ 1 for all (xi, yi) ∈ D ∧ yi = 1 and w⊤xi + b ≤ −1 for all (xi, yi) ∈ D ∧ yi = −1 (or equiva- lently, yi(w⊤xi +b) ≥ 1 for all (xi, yi) ∈ D if we combine the two inequations), as shown in Figure 4. Simple calculation shows that the margin equals . Therefore, to maximize the margin, we can instead minimize kwk2, which leads to the objective below: kwk2 2 arg min w,b,ξ kwk2 2 s.t. yi(w⊤xi + b) ≥ 1 for i = 1, 2, · · · , n. (1) In practice, the training dataset D usually contains instances that are noises or outliers (i.e., instances with wrong labels). To tolerate these instances, the SVM does not insist the positive and negative instances to be placed exactly at the two sides of the margins. It introduces a slack variable ξi, ξi ≥ 0, for each instance xi in D and requires only yi(w⊤xi+ b) ≥ 1 − ξi. So noises and outliers can be placed inside the margin or even at opposite sides. This gives the objective of linear SVM: arg min w,b,ξ n kwk2 2 + C X ξi i=1 (2) s.t. yi(w⊤xi + b) ≥ 1 − ξi and ξi ≥ 0, for i = 1, 2, · · · , n. Note that the slacks are minimized as well (in the term Pn i=1 ξi) in order to penalize the noises and outliers and keep their numbers small. The hyperparameter C controls the trade-off between maximizing the margin and minimiz- ing the number of noises/outliers. The linear SVM can be extended to nonlinear SVM by utilizing the kernel trick. Define a function φ : Rd → Rd′ , d′ > d, that maps an instance x to a point in a higher (pos- sibly infinite) dimensional space, the nonlinear SVM finds a separating hyperplane in that space. Since d′ > d, the found hyperplane may not be linear anymore in the origi- nal d-dimensional input space. It can be shown that, if we choose φ carefully such that the inner product φ(a)⊤φ(b) can be represented by a kernel function K : Rd × Rd → R (i.e., φ(a)⊤φ(b) = K(a, b)) for any a, b ∈ Rd, then we can solve the objective of nonlinear SVM in a manner whose Feature Extraction Candidate Features Set Selection (1-norm SVM) Detection Model (SSVM) Forward Feature Selection Figure 5: The steps in training a detection model. [31] to determine a candidate set of features. In the second stage, we use the forward feature selection [25] algorithm to determine the best final features from the candidate set for training the detection model. Unlike the SVM which minimizes kwk2 (2)), the 1-norm SVM minimizes kwk2 2 in its objective (Eq. 1 (called the LASSO penalty [23]) instead. We employ the 1-norm SVM to determine the candidate set because it usually finds a sparse w (i.e., w that tends to have zeros) thanks to its "compressed sensing" interpretation [8]. We obtain the can- didate set by keeping only those features that correspond to the non-zeros in w, as the features corresponding to zeros are usually redundant or noise features [31]. And then, we use the forward feature selection algorithm to determine the final features from the candidate set. The algorithm starts with an empty set for keeping the final fea- tures. At each step, one feature from the candidate set that improves the prediction accuracy4 of SSVM most is added to this set. The algorithm then repeats the above step until the candidate set becomes empty or there is no feature in the candidate set that improves the accuracy. 6. PERFORMANCE EVALUATION In this section, we evaluate the performance of the pro- posed detection model. 6.1 Settings and Metrics After data cleaning (described in Section 4.1), there are 278 instances (i.e., sessions) in D, among which 178 in- stances are positive (i.e., labeled by +1, which denotes "ac- quaintance" or "stranger") and 100 instances are negative (i.e., labeled by −1, which denotes "account owner"). Each instance is presented by 139 feature values. To the best of our knowledge, currently there is no other detection scheme for the usage stealing problem in SNS ser- vices. Thus we compare the detection model to itself by imposing different observation periods. Specifically, given an observation period L, we extract the feature values of a session only from those actions that are performed within L minutes after the start of the session. We study the performance of the detection model given L = 1, 2, · · · , 25 minutes. Although a subject was asked browse an SNS ac- count for 30 minutes during each round of the experiment described in Section 4.1, we set the maximal value of L to 25 rather than 30 because some subjects appear to lose pa- tience and become idle after 25 minutes. Under the premise of data consistency, we consider L ≤ 25 here. As described in Sections 5.2 and Section 5.1, to obtain our detection model, we first employ the 1-norm SVM to get the candidate features, and then use the forward feature selec- tion and SSVM with 10-fold cross validation to find the best 4We use the 10-fold cross validation [25] to measure the accuracy. Figure 4: The separating hyperplane and margin of SVM. complexity is independent of the higher dimension d′. This is known as the kernel trick. The nonlinear SVM usually makes better predictions than the linear SVM does when the input dimension d is not very high. Practical Considerations. The objective of conven- tional SVM (either linear or nonlinear) can be solved by standard quadratic programming software. However, when applied to an SNS service like Facebook, the solver needs to deal with an extremely large D due to the huge user base owned by the SNS service. To speed up the training pro- cess, we adopt the Smooth SVM (SSVM) [14] in this paper. The SSVM, a variant of SVM, adds b 2 into the objective of SVM and employs the squares of slacks ξ2 i to penalize the noises/outliers. The SSVM utilizes the KKT optimization condition to convert the conventional SVM to an uncon- strained minimization problem that can be solved efficiently using the Newton's method with an Armijo stepsize. 2 The kernel trick applies to the SSVM too. In our experi- ment, we pair up the nonlinear SSVM with the RBF kernel, which is defined as K(a, b) = e−γka−bk2 2 . There are 2 hyperparameters we have to determine in the nonlinear SSVM: the penalty coefficient C and γ in the RBF kernel function. We use the uniform design model selection method [12] with 9-13 stages to search for an appropriate combination of these hyperparameters. 5.2 Feature Selection The training of SSVM is preceded by a feature selection process [25], where we select only a subset of features in D for the training. This process is necessary because 1) given a tremendous amount of sessions (Figure 3(1)) that will be monitored by the SNS servers, it helps the SSVM scale up in making predictions by considering only a small set of features; 2) the selected features give us a hint on what is useful to distinguish the stalkers from the account owners. By ignoring those features that are not helpful, we can collect fewer actions (Figure 3(2)) and save the cost of feature extraction (Figure 3(3)) on each SNS server; and 3) our results show that it improves the prediction accuracy of the final SSVM we obtain. The feature selection precess is divided into two stages, as shown in Figure 5. In the first stage, we use the 1-norm SVM Predicted Pos. Neg. Real Pos. #True Positives (TP) #False Negatives (FN) Neg. #False Positives (FP) #True Negatives (TN) Table 4: The confusion matrix. With Oversampling Without Oversampling With Feature Selection F -score Without Feature Selection F -score Acc: 93.53% FPR: 5.00% FNR: 7.30% 0.9483 Acc: 91.37% FPR: 6.00% FNR: 10.11% 0.9302 Acc: 90.29% FPR: 18.00% FNR: 5.06% 0.9260 Acc: 87.77% FPR: 22.00% FNR: 6.74% 0.9071 Table 5: The results achieved under various condi- tions. final features and best combination of the hyperparameters C and γ. We report the performance of our model by using the leave-one-out cross validation [25] on D5. To measure the performance, we first obtain a confusion table shown in Table 4 by counting the numbers of True Positives (TP), False Positives (FP), True Negatives (TN), and False Negatives (FN) made by the model when predict- ing the labels of instances in the testing dataset. And then we calculate the following metrics: Accuracy = T P +T N T P +T N +F P +F N , F P R = F N R = T P R = P recision = Recall = F P T P F N T N +F P , T P +F N , T P +F N , T P +F P , T P +F N , T P T P F -score = 2 ∗ P recision∗Recall P recision+Recall , with various observation periods. 6.2 Detection Performance at 25 Minutes We first study the performance of our detection model when L = 25 minutes. Table 5 shows the results achieved by the model with and without feature selection. As we can see, feature selection does improve the performance by giv- ing higher accuracy/F -scores and lower FPR/FNR. This is because the noisy features are successfully eliminated. Fig- ure 6 shows that there are only 60 features remain after the applying the 1-norm SVM for candidate set selection. We notice that the dataset D is imbalanced -- the ratio of positive instances to negative ones is 1.78 : 1. Since there are more positive than negative instances, we tend to obtain a higher FPR. To overcome this issue, we adopt an over- sampling approach by randomly selecting and duplicating 78 negative instances to balance the ratio between positive and negative instances. The effect of duplicating an instance is to double the penalty if we misclassify the instance. So 5We do not partition D into the training, validation, and testing sets because D is not large enough. t i h g e W 4 3.5 3 2.5 2 1.5 1 0.5 0 0 20 40 60 80 100 120 140 Number of ranked features Figure 6: The weights in w found by the 1-norm SVM over the corresponding features. The features are ranked by their weights. Only 60 features re- main in the candidate feature set. 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 e t a r e v i t i s o p e u r T AUC = 0.9620 0 0 0.1 0.2 0.3 0.4 0.6 False positive rate 0.5 0.7 0.8 0.9 1 Figure 7: The ROC curve and AUC given by the model at 25-minutes. by duplicating negative instances in D we can avoid aliasing and reduce the FPR. Note that because there exists random- ness when applying the oversampling technique, we train 10 models and average their results. Table 5 shows the re- sults achieved by our model with and without oversampling. We can see that the oversampling successfully controls the trade-off between FPR and FNR. Figure 7 shows the ROC curve and AUC of our model when both the feature selection and oversampling are ap- plied. We get a fairly high AUC (0.962). In particular, the ROC curve shows that we can achieve 90% TPR at 4.5% FPR. 6.3 Early Detection Performance To prevent the leak of sensitive information, we should perform the usage stealing detection as early as possible for each session. To see how our model performs with time limits, we vary L from 1 to 25 minutes and train respective models for each L with feature selection and oversampling. Figure 8 shows the accuracy achieved by these models. After 7 minutes, we can get stable and reasonably good results, with the accuracy rate higher than 90% with L ≥ 7 minutes. Even at 2 minutes, we obtain an accuracy above 80%, which is still satisfactory when the scheme is used as a trigger for more sophisticated analysis. 1 0.95 0.9 0.85 0.8 0.75 y c a r u c c A 0.7 0 5 10 15 Observation period (minutes) Minute Mean Std. Mean Std. Mean Std. Mean Std. 20 25 2 3 4 5 6 7 81.9% 83.2% 85.3% 87.5% 88.8% 89.2% 0.7% 0.5% 0.8% 0.5% 0.8% 1.0% 8 9 10 11 12 13 91.3% 92.9% 92.2% 91.5% 91.0% 92.0% 0.3% 0.4% 0.5% 0.4% 0.4% 0.6% 14 15 16 17 18 19 90.8% 92.7% 93.6% 92.6% 92.0% 92.0% 0.5% 0.6% 0.4% 0.4% 0.3% 0.5% 20 21 22 23 24 25 92.5% 93.3% 93.3% 92.1% 93.5% 92.6% 0.4% 0.8% 0.4% 0.7% 0.5% 0.4% Figure 8: Accuracy for every minute. It shows that our detection model can achieve stable and reason- ably good results after 7 minutes. 1 0.95 0.9 0.85 0.8 0.75 y c a r u c c A 0.7 0 5 10 15 Observation period (minutes) 20 25 Figure 9: The accuracy achieved by 20 models trained using the 10-fold cross validation on 20 ran- domly permuted datasets. The thick line represents the average accuracy. To test the robustness of our model, we randomly per- mute D for 20 times and train one model using the 10-fold cross validation [25] for each of the 20 permutations. Fig- ure 9 and Table 6 show the mean accuracy and standard deviation given by the 20 models. The results indicate that the accuracy has a very low standard deviation regardless of L. In addition, comparing Figure 9 with Figure 8, we can see that our model performs consistently no matter it is trained (using the 10-fold cross validation) or tested (using the leave-one-out cross validation), which means the perfor- mance of our detection scheme is very robust. 7. SECURITY ANALYSIS As shown in Figure 3, all the data collection, processing, decision, and follow-up actions (such as challenges and pun- ishment) in our scheme can all be performed on the server side. So there is no way for attackers to compromise the scheme from the clients. Since our detection methodology is running at the server side (i.e., at operators), the attackers cannot evade our de- tection scheme -- once logged-in, each user (including the at- tacker) must be monitored by an SNS server running our scheme. The only way for an attacker to continuously use Table 6: Mean and standard deviation of the accu- racy given by the models trained using the 10-fold cross validation on 20 randomly permuted datasets. the victim's account is to evade the detection model. The detection model does not rely on any cryptography technology and is completely user-behavior-based. So, in order not to be detected by the model, attackers have to 1) mimic the owners' actions; or 2) do as few actions as possible and run away. The attackers of the first kind are less likely because the owner's action model is not well known [13]. Even if some attackers read this paper and successfully mimic the owners, they are forced to spend time on something they are not really interested and skip some information they de- sire more. This makes the attacks less harmful. For the at- tackers of the second kind, our scheme imposes a high time pressure because the detection model can achieve close to 80% accuracy even if an attackers browse the victims' news- feeds for only 1 minute. Again, the time pressure makes the attacks less harmful because the attackers may not be able to find the information they want within such a limited time. Note that our detection scheme is not tied to any spe- cific detection model. For example, a personalized detection model can be particularly helpful to identify the attackers of the first kind because it is even harder to imitate each individual's behavior. Also, a detection model that takes the timestamp of each action into account may be helpful to identify the attackers of the second kind, because users (either the account owners or stalkers) often take actions in some order they are used to. In fact, while this work firstly points out a new direction for future research against the us- age stealing, it is certainly possible to develop more sophis- ticated detection models to fight against the ever-smarter attackers. 8. CONCLUSION In this paper, we have proposed a novel continuous au- thentication approach for SNS that analyzes users' browsing behavior to detect usage stealing incidents. We use Face- book as a case study and show that 1) the role-driven be- havioral diversity does exist; 2) based on the so-called role- driven behavioral diversity property, we can design a low- cost detection scheme applicable to all users; and 3) the scheme is hard to evade and it renders reasonable detection performance after an observation period of 2 minutes. As future work, we plan to study the browsing behavior of individuals and develop personalized detection models. 7 6 5 4 3 2 1 s e m T i 0 n,act.person.m ean n.act.person.m ed f.act.page.friend f.friend.page_wall f.expand_page f.friend.view_card f.act.expand.page.public f.self.expand_co m m ents f.act.expand.page.feed f.self.view_card Figure 10: Top-3 features used to identify the posi- tive instances (stalkers) in the first 7 minutes. 7 6 5 4 3 2 1 s e m T i 0 b.act_add_co m m ent b.friend.act_like f.friend.view_likes n.act.person.m ean n.act.person.m ed f.friend.view_card f.act.expand.page.public Figure 11: Top-3 features used to ientify the nega- tive instances (owners) in the first 7 minutes. These models can be triggered only when needed and serve as the detailed analyzers for suspicious sessions. We also plan to improve our low-cost detection model to give higher detection accuracy within the first 7 minutes. Such an im- provement is possible because we see different user behav- ior in short- and long-term. To share our observation, we count features corresponding to the 3 most positive and 3 most negative weights in w identified by SSVM when the observation period L varies from 1 to 7. Figures 10 and 11 show the histograms of counts of the 3 most positively- and negatively-weighted features respectively. Some features are rather surprising as they are not prominent in the full 30- minute traces discussed in Section 4.3. We hope this study can motivate in-depth studies on developing more sophisti- cated models against usage stealing issues. 9. REFERENCES [1] Josh Constine. Facebook has users identify friends in [2] Josh Constine. Facebook asks every user for a verified phone number to prevent security disaster. http://techcrunch.com/2012/06/14/facebook-security-tips/, 2012. Online; accessed 2012. [3] Pedro Domingos. A few useful things to know about machine learning. Communication of the ACM, 55(10), 2012. [4] Facebook. Facebook security. http://www.facebook.com/security. Online; accessed 2012. [5] Facebook. Removal of offline_access permission. https://developers.facebook.com/roadmap/offline-access-removal/. Online; accessed 2012. [6] Facebook. Facebook's privacy policy - 2. information we receive. http://www.facebook.com/note.php, 2009. Online; accessed 2012. [7] A. Felt and D. Evans. Privacy protection for social networking apis. 2008 Web 2.0 Security and Privacy (W2SP), 2008. [8] Mario Figueiredo, Robert Nowak, and Stephen Wright. Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE Journal of Selected Topics in Signal Processing, 1(4):586 -- 597, 2007. [9] Keith Hampton. Social networking sites and our lives part 2: Who are social networking site users? http://pewinternet.org/Reports/2011/Technology-and-social-networks/Part-2/Facebook-activities.aspx, 2011. Online; accessed 2012. [10] Ed Hans- berry. Most consumers don't lock mobile phone via pin. http://www.informationweek.com/mobility/security/most-consumers-dont-lock-mobile-phone-vi/231700155, 2011. Online; accessed 2012. [11] J. He, W. Chu, and Z. Liu. Inferring privacy information from social networks. Intelligence and Security Informatics, pages 154 -- 165, 2006. [12] Chien-Ming Huang, Yuh-Jye Lee, Dennis Lin, and Su-Yun Huang. Model selection for support vector machines via uniform design. Computational Statistics & Data Analysis, 52(1):335 -- 346, 2007. [13] Adam N Joinson. Looking at, looking up or keeping up with people?: motives and use of facebook. In Proc. of the SIGCHI conf. on Human Factors in Computing Systems, pages 1027 -- 1036, 2008. [14] Yuh-Jye Lee and Olvi Mangasarian. SSVM: A smooth support vector machine for classification. Computational Optimization and Applications, 20(1):5 -- 22, 2001. [15] Paul Mah. Stored passwords add to mobile security risks. http://www.itbusinessedge.com/cm/blogs/mah/stored-passwords-add-to-mobile-security-risks/?cs=47183, 2011. Online; accessed 2012. [16] S. Mahmood and Y. Desmedt. Your facebook deactivated friend or a cloaked spy. In Proc. of the 10th IEEE Int'l Conf. on Pervasive Computing and Communications Workshops (PERCOM Workshops),, pages 367 -- 373, 2012. [17] Koichiro Niinuma and Anil K Jain. Continuous user photos to verify accounts, prevent unauthorized access. http://www.insidefacebook.com/2010/07/26/facebook-photos-verify/, 2010. Online; accessed 2012. authentication using temporal information. In Proc. of Biometric Technology for Human Identification VII, page 76670L, 2010. [18] Koichiro Niinuma, Unsang Park, and Anil K Jain. Soft biometric traits for continuous user authentication. IEEE Trans. on Information Forensics and Security, 5(4):771 -- 780, 2010. [19] Maja Pusara and Carla E Brodley. User re-authentication via mouse movements. In Proc. of the ACM Workshop on Visualization and data mining for computer security, pages 1 -- 8, 2004. [20] SJ Shepherd. Continuous authentication by analysis of keyboard typing characteristics. In European Convention on Security and Detection, pages 111 -- 114, 1995. [21] C. Tang, K. Ross, N. Saxena, and R. Chen. What's in a name: A study of names, gender inference, and gender behavior in facebook. Database Systems for Adanced Applications, pages 344 -- 356, 2011. [22] Credant Technologies. Phone data makes 4.2 million* brits vulnerable to id theft. http://www.credant.com/news-a-events/press-releases/69-phone-data-makes-42-million-brits-vulnerable-to-id-theft.html. Online; accessed 2012. [23] Rob Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267 -- 288, 1996. [24] R. Wishart, D. Corapi, A. Madhavapeddy, and M. Sloman. Privacy butler: A personal privacy rights manager for online presence. In Proc. of the 8th IEEE Int'l Conf. on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 672 -- 677, 2010. [25] Ian Witten, Eibe Frank, and Mark Hall. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 2005. [26] Shan-Hung Wu, Keng-Pei Lin, Chung-Min Chen, and Ming-Syan Chen. Asymmetric support vector machines: low false-positive learning under the user tolerance. In Proc. of the 14th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pages 749 -- 757, 2008. [27] Roland HC Yap, Terence Sim, Geraldine XY Kwang, and R Ramnath. Physical access protection using continuous authentication. In Proc. of IEEE Conf. on Technologies for Homeland Security, pages 510 -- 512. IEEE, 2008. [28] Sausan Yazji, Xi Chen, Robert P Dick, and Peter Scheuermann. Implicit user re-authentication for mobile devices. In Proc. of the 6th Int'l Conf. on Ubiquitous Intelligence and Computing, pages 325 -- 339, 2009. [29] Roger Yu. Lost cellphones added up fast in 2011. http://usatoday30.usatoday.com/tech/news/story/2012-03-22/lost-phones/53707448/1, 2012. Online; accessed 2012. [30] E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In Proc. of the 18th Int'l Conf. on World Wide Web (WWW), pages 531 -- 540, 2009. [31] Ji Zhu, Saharon Rosset, Trevor Hastie, and Rob Tibshirani. 1-norm support vector machines. In Advances in Neural Information Processing Systems, volume 16, pages 49 -- 56, 2003.
1604.07781
1
1604
2016-04-26T18:19:47
The dynamics of publishing of posts and comments on facebook (the russian segment, the first five months of 2013)
[ "cs.SI" ]
The article presents a study of some characteristics of post and comment publishing in the Russian segment of Facebook. A number of non-trivial results has been obtained. For example, a significant anomaly has been detected in the number of user accounts with the rate of publishing posts of approximately two posts per three days. The analysis has been carried out at the level of basic characteristics that are shared by most social media platforms. It makes possible a direct comparison of obtained results with data from other platforms. The article presents an approach to formalization and ordering of structural and informational elements on social media platforms. The approach is based on the representation of these structural elements in the form of a coherent hierarchy of container objects and their relations. This method allows to structure and analyze raw data from different social media platforms in a unified algorithmic design. The described approach is more formal, universal and constructive than other known approaches.
cs.SI
cs
ArXiv.org PACS: 89.20.Hh, 89.65.-s, 89.75.Fb, 05.45.-a, 05.45.Tp. THE DYNAMICS OF PUBLISHING OF POSTS AND COMMENTS ON FACEBOOK (THE RUSSIAN SEGMENT, THE FIRST FIVE MONTHS OF 2013) A. V. Makarenko Constructive Cybernetics Research Group, P.O. Box 560, Moscow, 101000, Russia Institute of Control Sciences RAS, ul. Profsoyuznaya 65, Moscow, 117997, Russia e-mail: [email protected] Received November 14, 2013 Abstract. The article presents a study of some characteristics of post and comment publishing in the Russian segment of Facebook. A number of non-trivial results has been obtained. For example, a significant anomaly has been detected in the number of user accounts with the rate of publishing posts of approximately two posts per three days. The analysis has been carried out at the level of basic characteristics that are shared by most social media platforms. It makes possible a direct comparison of obtained results with data from other platforms. The article presents an approach to formalization and ordering of structural and informational elements on social media platforms. The approach is based on the representation of these structural elements in the form of a coherent hierarchy of container objects and their relations. This method allows to structure and analyze raw data from different social media platforms in a unified algorithmic design. The described approach is more formal, universal and constructive than other known approaches. Keywords: social media, data representation scheme, Facebook, dynamics of publishing, posts, comments. DOI: 1. Introduction There is no doubt about the high degree of informatization of today's society. Its scope is so vast that a significant proportion (both in content and in volume terms) of various data about individuals and social groups is available on social media and public repositories of digital data. Social media is a set of online technologies that allow users to communicate with each other [1, 2]. This communication can take many forms: users can share their views, experience and knowledge, can interact with each other making new contacts, and can share news, information, photos, videos, music and hyperlinks to various content. In this context, content manipulation functions on the ideological and technological base of Web 2.0 (user-created content) [3]. The described phenomenon gives rise to various social processes with far-reaching implications. These processes manifest in various aspects: financial, political, cultural, scientific, etc. Comprehensive research of social media is essential for understanding current events, making forecasts and keeping negative tendencies in check. At the initial stage, it requires studying social media behavior at the levels of individuals, social groups, nations and of humanity as a whole. The present paper focuses on the study of some characteristics of information activity of social media user accounts. The object of the study is the Russian segment of Facebook in the first four months of 2013. The study was carried out at the level of posts and comments on these posts. Specific properties of Facebook (such as "Likes") were not included in order to facilitate comparison of obtained results with data from other social media platforms. This article is organized as follows. Section 2 describes the methodology of analysis and the format of input data presentation. Section 3 presents the results of the analysis of the dynamics of publishing of posts and comments. Section 4 presents general conclusions. 2 A. V. Makarenko 2. Methodology of Analysis and Initial Data The approach to studying the dynamics of publishing of posts and comments that we have chosen is quite universal. First, a model has been developed for structuring and comparing data from different social media platforms within the framework of a unified construction. Second, the analysis has been carried out at the level of basic characteristics that are shared by most social media platforms. These solutions make it possible to directly compare the obtained results to data from different platforms. We have implemented formalization and ordering of informational elements of social media in the form of a hierarchy of containers (see Fig. 1a): E – (enviroment); P – (platform) – a single social media platform; A – (account) – a message published from a specific account; M – (message) – a message from a specific user account (posts and comments); B – (block) – a logically complete section of a message. (a) E P … P A … A (b) X P A P (c) A A A M M B B B B M B M B B B A B M B M … M B … B CD MD D D S S D D S S Ex Im X … (d) 1 … N X X 1 … N 1 N 1 … N X 1 … N X Fig. 1. Basic concepts of the approach to structuring and collation of data from different social media platforms: (a) – hierarchy of container objects; (b) – decomposition scheme of a container object; (c) – example of possible relations between objects; (d) – two types of relations (directional and non-directional). Next, containers are decomposed according to the following scheme (see Fig. 1b). Each container consists of two constituents: CD – (contents); MD – (metadata). Each of the constituents can contain the following components: D – (data) – facts, information, indicators; S – (sence) – sense, meaning, opinion. Each of the components can be of two types: Ex – (explicit) – explicitly given (at the level of formal semantic markup); Im – (implicit) – implicitly given (inferred with varying level of confidence). Apart from container objects and their constituents, connections between objects (relations of various kinds) are also an important structural component of social media and it is important to The dynamics of publishing of posts and comments on facebook… 3 two-point – a relation where each elementary link unites two objects; understand that these relations are established at the level of decomposition of objects (CD/MD, D/S). Usually these relations are: • elementary – a relation has the one target identity; • • horizontal – a relation that combines objects at the same level of the hierarchy, see Fig. 1c; • homogeneous – a relation that unites identical constituents/components. By fixing relations (their target identity) on the set of container objects (and/or their constituents/components), we obtain a graph of relations. It stands to mention that all the edges in the graph (at a fixed target identity) are either directional or non-directional (mixing is prohibited, see Fig. 1d). The graph can then be marked and weighed both by edges and by vertices, depending on the purpose of analysis and target identity of relations. Multiple edges (if any) are then replaced by a single edge, but the weights of multiple edges and degree of multiplicity are recorded as additional parameters into the weight of the final edge. The approach to the representation of structural elements of social media as a hierarchy of container objects and their relations is more formal, universal and constructive than other known approaches [4, 5]. The hierarchy of objects and the relations between them are encoded as a tabular key-value store, as a relational database, or as RDF triples, depending on configuration of data and the purpose of analysis [6]. In particularly difficult cases, all three methods of data representation are usually combined (with regard to their ranges of adequacy). We implement full transition from character identifiers to variable size unsigned integer identifiers for encoding (from bit fields up to 64-bit number representation). It significantly speeds up the processing of data (including processing on GPU, clusters and GRID systems), allows to manage memory flexibly and to use standard tools for storage and processing. A detailed description of the encoding methods and of data processing is beyond the scope of this article and it is not included. # 1 … N ID of post ID of post's author Time of publication of post (a) MessageID (unsigned INT64) UserAccountID (unsigned INT64) TimeMessageCreate (Unix Time) … … … MessageID (unsigned INT64) UserAccountID (unsigned INT64) TimeMessageCreate (Unix Time) ID of comment MessageID (unsigned INT64) … ID of comment's author UserAccountID (unsigned INT64) … Time of publication of comment ID of post (or ID of parental comment) (b) TimeMessageCreate (Unix Time) MessageID (unsigned INT64) … … MessageID (unsigned INT64) UserAccountID (unsigned INT64) TimeMessageCreate (Unix Time) MessageID (unsigned INT64) # 1 … N # 1 … N ID of post's or comment's author UserAccountID (unsigned INT64) … URL of post's or comment's author UserAccountURL (string) … UserAccountID (unsigned INT64) UserAccountURL (string) (c) # 1 … N ID of post or comment MessageID (unsigned INT64) … MessageID (unsigned INT64) URL of post or comment MessageURL (string) … MessageURL (string) Fig. 2. of the representation of input data: (a) – posts; (b) – comments; (c) – reference tables. 4 A. V. Makarenko For the purposes of this article, we have analyzed one social media platform (Facebook) and two levels of hierarchy (user accounts and messages). Messages have been divided into two types: posts and comments. The content of messages has not been analyzed. Two metadata parameters have been included into the analysis: author and date of publishing. The analysis has been limited to the posts published by the users on their own timelines (account pages). The initial data was provided by "Digital Society Laboratory (DSL)" under the agreement of cooperation with the Institute of Control Sciences RAS. These data have been processed and presented as arrays, as seen in Fig. 2a and 2b. These arrays are used as input data for the processing program. Numeric IDs have been associated with actual URLs by means of reference tables (see Fig. 2c). 3. Results and Discussion Summary information on the analyzed period (for posts) is shown in Table 1. Summary information on the analyzed period (for posts) Table 1. Parameter Date of publication of the first analyzed post Date of publication of the last analyzed post Duration of the analyzed period Number of published posts Number of active user accounts the number of posts: Representation Value pst bT pst eT pst beT pstN uac pstN January 1, 2013, 00:00:01 UTC July 2, 2013, 01:10:01 UTC ~ 152 days 96 745 854 2 864 213 Table 1 can be used to determine basic performance (rate of publishing) for user accounts by  pst S uac = N N pst uac pst ≈ 34 . 9 In fact, there is a strong variation in performance (4 orders of magnitude). Figure 3a shows the distribution . The median of uac pstδ of the number of user accounts by the number of published posts pst uacS max pst uac uacS P = , see Fig. 3b. Maximum performance of ) ( pst uac uacSδ pst In Figure 3a, we see a local maximum in dependence (area f100). Detailed analysis indicates that the area of the anomaly f100, as a first-order approximation, f100 = [85,160] has the following limits: , see Fig. 3c. They are detected by a deviation in the monotony and smoothness of dependence of . Excluding area f100, this dependence can uac pst uacSδ pst be approximated with acceptable adequacy by the following formula: 35922 = . in the area pst uacS pst uacS pst uacS 102 = ) (  uac δ pst ( S pst uac ) = 41 − 0 ( S pst uac ) 1 − 295376 ( 2.78 0.1 + S pst uac − 1.545 ) 1 + 1 . Whereby the relative error of approximation does not exceed 0.137 on the interval of 1 For underscore that the interval of 1 the error increases (due to the increased fluctuations of covers 98.22 % of all user accounts. 245 . uac pstδ ). It is necessary to 245 pst uacS 245 pst uacS≤ ≤ > ≤ Figure 3d shows the difference: ′ uac δ pst pst uacS≤  uac δ δ pst uac pst − = As a first-order approximation, the summation of . pstδ′ uac value in area f100 gives us an estimate The dynamics of publishing of posts and comments on facebook… 5 0 96623+ 5181 − of analysis to identify specific user accounts in area f100. for the total of abnormal user accounts. At the moment, we are performing the f100 (a) 1 10 100 1000 104 pst uacS data  uac pstδ (c) uac pstP 1.0 0.8 0.6 0.4 0.2 pstδ′ uac 5000 4000 3000 2000 1000 (b) 1 10 100 pst uacS 1000 104 (d) lb, rb – bounds of f100 lb rb uac pstδ 105 104 1000 100 10 1 uac pstδ 6000 5000 4000 3000 2000 1000 0 60 80 100 140 120 pst uacS ( uac pst uacSδ pst ) 160 180 0 60 80 100 120 pst uacS 140 160 180 Fig. 3. (a) – dependence ; (b) – cumulative share of user accounts, depending on the increase in performance area f100. pst uacS ; (c) – a close up of the area of anomaly f100; (d) – graph of relative value pstδ′ uac in Share distribution of published posts pstp (of the total pstN ) as a function of the performance of user accounts pst uacS is very informative. The distribution is defined by: ( pst uac pst uac S pst uac ( S . = S ) ) pst p uac δ pst N pst (b) 0.008 pstp 0.006 0.004 0.002 0.000 f100 (a) a8 1 10 100 1000 104 pst uacS 1.0 pstP 0.8 0.6 0.4 0.2 0.0 Fig. 4. (a) – Distribution of the share of posts of ; (b) – cumulative share of posts pst uacS pstP in function pst uacS . f100 1 10 100 1000 104 pst uacS pstp corresponding to the accounts with the performance 10 1 1 10 min. 100 1 hour 1 day 104 106 pst uacτ 6 A. V. Makarenko pst uacS 9 Figure 5 is shows pst 8 = , The distribution is shown in Fig. 4a where both areas f100 and a8, with the maximum of can be seen. In view of the discrete nature of the variables, the value of this maximum is consistent with the value of = . Figure 4b shows that the median P = 112 . pst uacS pst pst uacS pst pst 3 max 43703 uacτ = uacτ = 1291507 uacτ , i.e. the distribution of time intervals (in seconds) between publishing seconds (about 12 hours). The of posts for individual user accounts. The median (about 149.48 days). There is a considerable maximum registered interval proportion of intervals equal to 0, in total – 365349 intervals. Apparently, these 0 intervals are registered, because UnixTime has the resolving power of 1 second. p τδ uac 105 104 103 102 fortnight 1 week 2 days Fig. 5. The distribution of time intervals (in seconds) between publishing of posts by individual user accounts. Figure 5 shows that the most common time intervals between posts of individual user accounts are 1 hour, 1 day, 2 days, 1 week and 2 weeks. The interval of 1 week is much more common than the intervals of 3, 4, 5 days and even than 2 days. To illustrate the scope of performance values of various accounts, we make the following basic estimates, with normalization to the duration of analysis period: • 10 posts per user account, about 1 post every two weeks; • 100 posts per user account, about 2 posts every three days; • 35 922 posts per user account (the registered maximum), a post every six minutes. The following points are worth mentioning: 1. The performance of 1 post per week (two weeks) is a typical performance of regular users, writing on topics important to them. 2. The performance of 1-2 posts a day (two days) is a typical performance of professional copywriters or users who actively share photos via their mobile devices. 3. User accounts with higher performance values (over 1 post per hour) are usually communities, news agencies or advertising spam bots. Summary information on publishing of comments is presented in Table 2. The dynamics of publishing of posts and comments on facebook… 7 Summary information on the analyzed period (for comments) Table 2. Parameter Date of publication of the first analyzed comment Date of publication of the last analyzed comment Duration of the analyzed period Number of posts with comments Number of authors of posts that have comments. Number of published comments Number of commentators comments: Representation Value cmt bT cmt eT 1 Janurary 2013, 0:0:2 UTC 2 June 2013, 0:11:9 UTC pst beT pst cN uac pst cN cmtN uac cmtN ~ 152 days 5 893 995 660 961 21 366 037 2 030 855 Table 2 can be used to determine basic performance for user accounts by the number of (b) 1 10 100 1000 104 cmt uacS (d) 1 10 100 1000 104 cmt uacS (c) cmt uacS 104 1 10 1000 100 ( Fig. 6. (a) – dependence ; (b) – cumulative share of user accounts, depending on the increase in ) cmt uacSδ ; (d) – cumulative share of published comments, depending performance on the increase in the user account performance. ) ; (c) – dependence uac cmt uacSδ cmt cmt uacS cmt ( In fact, there is a significant variation in performance values (4 orders of magnitude). Figure 6a cmtδ , depending on the number of published shows the distribution of the number of user accounts uac P = , 2 see Fig. 6b. Maximum performance comments cmt . The median of cmt uacS cmt uac uac S  cmt S uac = N N cmt uac cmt ≈ 10.5 . (a) 10 100 1000 104 cmt uacS uac cmtP 1.0 0.9 0.8 0.7 0.6 0.5 1.0 cmtP 0.8 0.6 0.4 0.2 0.0 uac cmtδ 106 105 104 103 102 10 1 1 106 cmtδ 105 104 103 8 A. V. Makarenko = cmt uacS of max function of user performance 8408 cmtδ is the distribution of the number of published comments in the . In Fig. 6c, cmt uacS : cmt δ S cmt uac uac δ cmt ( S cmt uac ) , ( S cmt uac ) = , see Fig. 6d. the median of cmt uacS cmt P = 71 receive comments: Table 2 can be used to make a basic estimate of the number of comments on posts that  S cmt pst c = N N cmt pst cmt ≈ 3.6 . Figure 7a presents the real distribution cmt pst cS the number of comments registered aggregation of max published comments in the function of the number of comments per post pst cδ of the number of posts with comments, depending on = , see Fig. 7b. The maximum cmtδ of the number of cmt pst cS . The median of cmt pst cS . Figure 7c shows distribution 4756 cmt pst cS pst c P = 2 : the median of cmt pst cS cmt P cmt ( S δ ) = = , see Fig. 7d. cmt pst c 7 S cmt pst c pst c δ S cmt pst c ( ) , (b) 1 10 100 1000 cmt pst cS 1 10 100 1000 cmt pst cS (c) 1.0 cmtP 0.8 0.6 0.4 0.2 (d) 1000 cmt pst cS 1 10 100 1000 cmt pst cS 1 10 100 ( ) pst c cmt pst cSδ Fig. 7. (a) – dependence increase in the number of comments per post published comments, depending on the increase in the number of comments per post ; (b) – cumulative share of posts with comments, depending on the ; (d) – cumulative share of ; (c) – dependence cmt pst cSδ cmt pst cS ) ( cmt cmt pst cS . (a) pst cP 1.0 0.9 0.8 0.7 0.6 0.5 pst cδ 106 105 104 103 102 10 1 cmtδ 106 105 104 103 The dynamics of publishing of posts and comments on facebook… 9 Figure 8a shows distribution cmt s pst cS number of comments per post median of cmt s pst cS pst c P pst cδ of the number of posts with comments, depending on the registering only the comments by the author of the post. The = , see Fig. 8b. The maximum registered aggregation of max 0 cmt s pst cS = 688 . (b) pst cδ 106 104 100 1 0 1 5 10 uac pst cδ 105 104 103 102 10 1 cmtδ 105 104 103 (a) 1.0 pst cP 0.9 0.8 0.7 0.6 uac pst cP (a) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 1.0 cmtP 0.8 0.6 0.4 0.2 0.0 Fig. 8. (a) – dependence increase in the number of comments per post cmt s pst cSδ pst c 50 100 ) ( 500 cmt s pst cS ; (b) – cumulative share of posts with comments, depending on the cmt s pst cS 50 100 500 5 10 0 1 cmt s pst cS registering only the comments by the author of the post. 1 10 100 1000 (b) 104 S cmt uac p (d) 1 10 100 1000 104 S cmt uac p (c) 1000 ) 1 10 100 104 S cmt uac p 1 10 100 1000 104 S cmt uac p Fig. 9. (a) – dependence depending on (c) – dependence in the number of comments made by the author of the post ( uac Sδ pst c increase the ) ( cmt Sδ cmt uac p in number of comments made by ; (b) – cumulative share of the authors of the posts with comments, cmt pst cS ; ; (d) – cumulative share of the published comments, depending on the increase the author of the post cmt uac p cmt pst cS . Table 2 can be used to make a basic estimate of the number of comments made by the author of the post with comments: 10 A. V. Makarenko  cmt S uac p = N N cmt uac cmt ≈ 32 . Figure 9a shows the real distribution S comments they received registered aggregation of max published comments in the function of the number of comments comments by the author of the post: ( S uac pst cδ of the number of authors, depending on the number of = , see Fig. 9b. The maximum cmtδ of the number of registering only the . Figure 9c shows distribution cmt pst cS . The median of cmt uac p cmt uac p S 33585 uac P pst c cmt uac p cmt uac p cmt uac p uac pst c δ = S 4 , S ( ) ) the median of S cmt uac p cmt P = Figure 10a shows distribution δ 321 cmt = cmt uac p S , see Fig. 9d. number of commentators they attracted maximum observed aggregation of max uac c pst cS uac c pst cS = . The median of 2252 . pst cδ of the number of posts with comments, depending on the 1 = , see Fig. 10b. The pst c P uac c pst cS pst cδ 106 105 104 103 102 10 1 (a) 1.0 pst cP 0.9 0.8 0.7 0.6 0.5 (b) 1 5 10 50 100 uac c pst cS 500 1000 ; (b) – cumulative share of posts with comments, depending on the 5 1 10 uac c pst cS Fig. 10. (a) – dependence increase in the number of comments per post. 50 100 ( 500 1000 ) uac c pst cSδ pst c Figure 11a shows distribution depending on the number of commentators they attracted S uac c S Fig. 11b. The maximum registered aggregation of max uac p uac c uac p = . The median of 12263 . uac pst cδ of the number of authors of posts with comments, = , see S 3 uac P pst c uac c uac p uac pst cδ 105 104 103 102 10 1 1 10 100 1000 uac pst cP (a) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 (b) Fig. 11. (a) – dependence depending on the increase in the number of commentators per post. uac c uac p ( Sδ uac pst c ) 104 1 10 100 1000 uac c S uac p ; (b) – cumulative share of authors of posts with comments, uac c uac p S 104 The dynamics of publishing of posts and comments on facebook… 11 Figure 12a shows distribution S number of posts per commentator maximum registered number of posts per one commentator is max cmtδ of the number of authors of comments, depending on the uac P = , see Fig. 12b. The pst c uac cS cmt = . The median of 2 4068 pst c uac c S . uac c uac p uac uac cmtδ 106 105 104 103 102 10 1 1 10 (a) uac cmtP 1.0 (b) 0.9 0.8 0.7 0.6 0.5 1000 pst c uac cS 1 10 100 1000 pst c uac cS 100 ( ) Fig. 12. (a) – dependence increase in the number of posts made by the author of a comment. uac pst c uac cSδ cmt ; (b) – cumulative share of the authors of comments, depending on the Figure 13a shows distribution uac p number of authors of posts per commentator uac c maximum registered number of authors of posts per commentator is max cmtδ of the number of authors of comments, depending on the uac P = , see Fig. 13b. The cmt uac p uac cS . The median of 1 521 = uac p uac cS S . uac uac cmtδ 106 105 104 103 102 10 1 1 5 10 50 (a) uac cmtP 1.0 (b) 0.9 0.8 0.7 0.6 uac p uac cS 500 1 5 10 50 100 uac p uac cS 500 100 ) ( Fig. 13. (a) – dependence increase in the number of authors of posts per author of a comment. uac uac p uac cSδ cmt ; (b) – cumulative share of authors of comments, depending on the pst f cτ . The median Figure 14a shows distribution pst cδ of the number of posts with comments, depending on the time delay from the moment of publication of the post to the publication of the first seconds (about 51 minutes). The maximum registered comment time delay max seconds (about 5 years 9 months), see Fig. 14b. The most common time delay is 50 seconds (see area g50 in Fig. 14a). Time delay intervals of 0 – 86 seconds have been registered. Apparently, these 0 intervals are registered, because UnixTime has the resolving power of 1 second. f c Pτ 182274110 pst f cτ = 3076 pst c = pst 12 pst cδ 1000 100 10 1 g50 1 100 104 A. V. Makarenko 1.0 pst cP 0.8 (a) (b) 0.6 0.4 0.2 0.0 108 pst f cτ 1 100 104 106 pst f cτ 108 106 ) ( δ τ ; (b) – cumulative share of posts with comments, depending on the Fig. 14. (a) – dependence increase in the delay between the moment of publication of the post and the time of publication of the first comment. pst f c pst c pst pst c pst : τ f c < = 11901711 for negative It stands to mention that negative values of the posts with comments. The median 180523 − pst f cτ = − f cτ have been registered, 18273 in total or time values 0.31 % of all pst Pτ 0 seconds (about 2 days 2 hours), see Fig. 15. The maximum registered f c negative delay time min seconds, whereby the publishing of a comment precedes the publishing of the post by about 4 months 17 days. A bug in Facebook can be one of the possible causes [7]. pst cδ 14 12 10 8 6 4 2 0 pst c ( pst f c time values between ) δ τ Fig. 15. Dependence for negative delay the moment of publication of the post and the time of publication of the first comment. pst f cτ -106 -104 -100 -1 104 103 102 10 1 h21 1 day 2 days 7 das 8 days 1 100 104 106 cmt uacτ Fig. 16. The distribution of time intervals (in seconds) between publishing of comments by different user accounts. The dynamics of publishing of posts and comments on facebook… 13 Distribution cmt uacτ of the time intervals (in seconds) between the publishing of comments by uacτ = seconds (about 86 minutes). different user accounts is shown in Fig. 18. The median 1 1290045 The maximum registered interval (about 149.311 days). There is a considerable number of 0 intervals, 3265613 in total. Apparently, these 0 intervals are registered, because UnixTime has the resolving power of 1 second. cmt uacτ = Figure 16 shows that the most common intervals are from 1 to 8 days with 24 hour increments. There is a notable local maximum of 21 seconds (h21). cmt 5163 max 4. Conclusion The article presents the results of the analysis of Facebook, which has been carried out from the standpoint of the dynamics of publishing of posts and comments. The object of the study is the Russian segment of the network in the period from 1.01.2013 to 02.06.2013. The content of posts and comments has not been analyzed. Two initial parameters have been used in the analysis: author and time of publication of a message. The analysis and the calculations have yielded a set of descriptive values that provide insight into the processes of publishing of posts and comments by the users of Facebook. Several distinguished features have been identified: 1) A significant anomaly in the number of user accounts with the performance of approximately two posts per three days has been detected. The total number of such accounts exceeds the theoretical value by . The theoretical value has been calculated by approximated power distribution. 0 96623+ 5181 − 2) About 50 % of all posts are published by users with the performance of no more than three posts per two days. 3) The average time interval (median) between publishing of posts for individual user accounts is about 12 hours. 4) About 50% of all comments are published by users with the performance of no more than one comment per two days. 5) About 50% of the posts that have at least one comment have no more than two comments. 6) About 50% of all comments are made on posts that receive no more than 7 comments. 7) About 55% of posts with at least one comment are not commented by the authors themselves. 8) About 50 % of users with posts that receive at least one comment, in total, get no more than 4 comments each (during the period of the analysis ~ 152 days). 9) About 50 % of all comments are received by authors of posts (with at least one comment) that, in total, receive no more than 321 comments each (during the period of the analysis). 10) About 50% of the posts that have at least one comment have no more than one commentator. 11) About 50 % of all comments are received by authors of posts (with at least one comment) that have no more than three commentators. 12) About 50% of all commentators commented on no more than one post each (during the period of the analysis ~ 152 days). 13) About 50% of all commentators commented on posts of no more than one other user account each (during the period of the analysis ~ 152 days). 14) About 50% of the posts receive the first comment within 51 minutes after the publication of the post. The most probable time of first comment is 50 seconds after the publication of the post. 14 A. V. Makarenko The maximum registered delay time between the publication of the post and the first comment is 5 years 9 months. 15) We have determined that 18273 posts have negative time difference between their publication moment and the first comment [7]. About 50% of these posts have negative delay time of up to 20 days 2 hours. 16) About 50% of the commentators (with two or more subsequent comments) publish comments at the interval of no more than 86 minutes. This interval have a notable local maximum of 21 seconds. Our results allow to assess the dynamics of publishing of posts and comments in the Russian segment of Facebook. These results are important for addressing a number of other issues, including: • Studying the structural (topological and metric) characteristics of network-describing links between commentators and posts authors. Identifying sustainable communities of users from the standpoint of the stationary nature of their relations when commenting on posts. Identifying the most efficient user accounts using the criterion of their information activity (their appeal to the community of users). • • • Developing an adequate quantitative model for studying and forecasting informational activity of Facebook users (in terms of writing posts and comments). The author is grateful to Professor D. A. Novikov for his support and interest to this study, as well as to Ph.D. D. A. Gubanova for the preparation of the initial data. Acknowledgements References 1. Ahlqvist T., Bäck, A., Halonen M. and Heinonen S. Social media road maps exploring the futures triggered by social media // VTT Research Notes (2008) 2454:13. 2. Kaplan A.M. and Haenlein M. Users of the world, unite! The challenges and opportunities of social 3. Governor J., Hinchcliffe D. and Nickull D. Web 2.0 Architectures: What Entrepreneurs and Information media. // Business Horizons (2010) 53:1. p. 61. Architects Need to Know. O'Reilly (2009). 4. Hassanien A.E., Abraham A. and Snsel V. Computational Social Network Analysis Trends, Tools and Research Advances. New York: Springer (2009). 5. Bing L. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data. New York: Springer (2011). 6. Resource Description Framework (RDF) Model and Syntax Specification. Eds: O. Lassila and Ralph R. Swick // W3C Proposed Recommendation 05 January 1999. 7. FaceBook Developers: Bugs created_time incorrect in Posts (2013, Nov.). [Online]. Available: URL: https://developers.facebook.com/bugs/514380435304761 Andrey V. Makarenko – was born in 1977, since 2002 -- Ph. D. of Cybernetics. Founder and leader of the Research & Development group "Constructive Cybernetics". Author and coauthor of more than 60 scientific articles and reports. Member IEEE (IEEE Signal Processing Society Membership; IEEE Computational Intelligence Society Membership). Research interests: Analysis of the structure dynamic processes, predictability; Detection, classification and diagnosis is not fully observed objects (patterns); Synchronization and self-organization in nonlinear and chaotic systems; System analysis and math. modeling of economic, financial, systems and processes; Convergence of Data Science, Nonlinear Dynamics and Network-Centric. social and bio-physical
1310.4899
1
1310
2013-10-18T03:33:35
Laplacian Spectral Properties of Graphs from Random Local Samples
[ "cs.SI", "cs.DM", "math.OC" ]
The Laplacian eigenvalues of a network play an important role in the analysis of many structural and dynamical network problems. In this paper, we study the relationship between the eigenvalue spectrum of the normalized Laplacian matrix and the structure of `local' subgraphs of the network. We call a subgraph \emph{local} when it is induced by the set of nodes obtained from a breath-first search (BFS) of radius $r$ around a node. In this paper, we propose techniques to estimate spectral properties of the normalized Laplacian matrix from a random collection of induced local subgraphs. In particular, we provide an algorithm to estimate the spectral moments of the normalized Laplacian matrix (the power-sums of its eigenvalues). Moreover, we propose a technique, based on convex optimization, to compute upper and lower bounds on the spectral radius of the normalized Laplacian matrix from local subgraphs. We illustrate our results studying the normalized Laplacian spectrum of a large-scale online social network.
cs.SI
cs
Laplacian Spectral Properties of Graphs from Random Local Samples Zhengwei Wu Victor M. Preciado Abstract The Laplacian eigenvalues of a network play an impor- tant role in the analysis of many structural and dynam- ical network problems. In this paper, we study the re- lationship between the eigenvalue spectrum of the nor- malized Laplacian matrix and the structure of 'local' subgraphs of the network. We call a subgraph local when it is induced by the set of nodes obtained from a breath-first search (BFS) of radius r around a node. In this paper, we propose techniques to estimate spec- tral properties of the normalized Laplacian matrix from a random collection of induced local subgraphs. In par- ticular, we provide an algorithm to estimate the spec- tral moments of the normalized Laplacian matrix (the power-sums of its eigenvalues). Moreover, we propose a technique, based on convex optimization, to compute upper and lower bounds on the spectral radius of the normalized Laplacian matrix from local subgraphs. We illustrate our results studying the normalized Laplacian spectrum of a large-scale online social network. 1 Introduction Understanding the relationship between the structure of a network and its eigenvalues is of great relevance in the field of network science (see [3], [16] and references therein). The growing availability of massive databases, computing facilities, and reliable data analysis tools has provided a powerful framework to explore this relationship for many real-world networks. On the other hand, in many cases of practical interest, one cannot efficiently retrieve and/or store the exact full topology of a large-scale network. Alternatively, it is usually easy to retrieve local samples of the network structure. In this paper, we focus our attention on local sample of the network structure given in the form of a subgraph induced by the set of nodes obtained from a breath-first search (BFS) of small radius r around a particular node. We study the relationship between the normalized Laplacian spectrum of a graph and a random collection of local subgraphs. We show how local structural information contained in these localized subgraphs can be efficiently aggregated to infer global properties of the normalized Laplacian spectrum. Our analysis reveals that certain spectral properties, such as the so-called spectral moments (the power-sums of the eigenvalues), can be efficiently estimated from a random collection of localized subgraphs. Furthermore, applying recent results connecting the classical moment problem and convex optimization, we propose a series of semidefinite programs (SDP) to compute upper and lower bounds on the Laplacian spectral radius from a collection of local structural samples. 1.1 Previous Work Studying the relationship be- tween the structure of a graph and its eigenvalues is the central topic in the field of algebraic graph theory [1],[3],[5],[12]. In particular, the spectrum of the Lapla- cian matrix has a direct connection to the behavior of several networked dynamical processes, such as random walks [10], consensus dynamics [16], and a wide variety of distributed algorithms [11]. In many cases of practical interest it is unfeasible to exactly retrieve the complete structure of a network of contacts, making it impossible to compute the graph spectrum directly. However, in most cases one can easily retrieve local subgraphs obtained via BFS of small radius. To estimate spectral properties from localized structural samples, researchers have proposed a variety of random network models in which they can prescribe features retrieved from these samples, such as the degree distribution [4],[15], local correlations [13],[17], or clustering [14]. Although random networks are the primary tool to study the impact of local structural features on spectral network properties [4], this approach presents a major flaw: Random network models implicitly induce structural properties that are not directly controlled in the model construction, but can have a strong influence on the eigenvalue spectrum. For example, it is possible to find two networks having the same degree distribution, but with very different eigenvalue spectra. 1.2 Our contribution In this paper, we develop a mathematical framework, based on algebraic graph the- ory and convex optimization, to study how localized samples of the network structure can be used to com- pute spectral properties of the normalized Laplacian matrix of (possibly weighted) graphs. The following are our main contributions: • We develop a sublinear time algorithm to estimate the spectral moments (power-sums of the eigenval- ues) of the normalized Laplacian matrix of a graph from a random set of local subgraphs samples. In our analysis, we use Hoeffding inequality to provide quality guarantees of our estimators as a function of the number of samples. • We provide a convex program to compute, in lin- ear time1, upper and lower bounds on the Lapla- cian spectral radius from a random set of local sub- graph samples. Our results are based on recent re- sults connecting the classical moment problem with semidefinite programs (SDP). 2 Problem Formulation. 2.1 Notation and Preliminaries. Let G := (V,E) be an undirected unweighted graph (or network), where V := {v1, v2, ...vn} represents the set of nodes and E ⊆ V×V represents the set of edges2. The neighborhood of vi ∈ V is defined as Ni := {vj ∈ V : {vi, vj} ∈ E}. The degree of node vi is di := Ni. A weighted graph is defined as the triad H := (V,E,W), where W is a weight function W : E → R+ that assigns a real positive weight to each edge in E. We define the weight coefficient as wij := W({vi, vj}) if {vi, vj} ∈ E, and wij = 0 otherwise. The weighted degree of node vi in a weighted graphs is defined as dH i j=1 wij . A walk of length k from node vi0 to vik is defined as an ordered sequence of vertices p := (vi0 , vi1 , . . . , vik ), where {vil, vil+1} ∈ E, l = 0, 1, . . . , k − 1. If vi0 = vik , the walk is said to be closed. Given a walk p = (vi0 , vi1 , . . . , vik ) in a weighted graph H, its weight is defined as the product of the edge weights, ωH(p) := wi0i1 wi1i2 ....wik−1ik . The distance δij between nodes vi and vj is defined as the minimum number of hops from vi to vj. :=Pn The adjacency matrix of an unweighted network G is defined as the n× n Boolean symmetric matrix AG := [aij], defined entry-wise as aij = 1 if vi is connected to vj, and aij = 0 otherwise. The adjacency matrix of a weighted graph H is defined as the symmetric matrix WH := [wij ], where wij are the weight coefficients. The degree matrix of a weighted graph H is the diagonal matrix of its weighted degrees, i.e., DH = diag(dH i ). The normalized Laplacian matrix of a weighted graph H is defined as (2.1) −1/2WHDH −1/2. LH := I − DH 1Our algorithm runs in linear time assuming that the size of the local subgraphs are much smaller than n. 2We consider only graphs with no self-loops (i.e., edges of the type {vi, vi}). The normalized Laplacian LH is a symmetric, positive semidefinite matrix [3]. Thus, it has n nonnegative eigenvalues λ1 ≥ λ2 ≥ . . . ≥ λn ≥ 0 and a full set of orthogonal eigenvectors v1, . . . , vn. The largest eigenvalue λ1 is called the spectral radius of LH, which satisfies λ1 ≤ 2, [3]. Given a n × n symmetric matrix M with (real) eigenvalues ν1, . . . , νn, we define the k-th spectral moment of M as (2.2) mk(M ) := 1 n nXi=1 νk i . We now provide graph-theoretical elements to char- acterize the information contained in local subgraphs of the network. Given a weighted graph H, we de- fine the r-th order neighborhood around node vi as the subgraph Hi,r = (Ni,r,Ei,r,W) with node-set Ni,r := {vj ∈ V : δi,j ≤ r} and edge-set Ei,r := {{v, w} ∈ E s.t. v, w ∈ Ni,r}. Notice that Hi,r is the subgraph of H induced3 by the set of nodes that are at a distance r or less from vi. This set of nodes can be found using a BFS of radius r starting at node vi. Motivated by this in- terpretation, we call Hi,r the egonet of radius r around node vi. Egonets can be algebraically represented via submatrices of the weighted adjacency matrix WH, as follows. Given a set of k nodes K ⊆ V, we denote by WH (K) the k × k submatrix of WH formed by selecting the rows and columns of WH indexed by K. In par- ticular, given the egonet Hi,r, we define its adjacency matrix as Wi,r(H) := WH (Ni,r). By convention, we as- sociate the first row and column of the submatrix Wi,r with node vi ∈ V (the 'center' of the egonet), which can be done via a simple permutation of Wi,r. 2.2 Problem Statement. The Laplacian eigenval- ues of a graph can be efficiently computed for graphs of small and medium size. In graphs of large size, this computation is much more challenging. Furthermore, in many real-world networks, one cannot retrieve the complete network structure due to, for example, pri- vacy and/or security constrains (e.g. Facebook). Al- ternatively, it is usually easy to retrieve local samples of the graph structure in the form of egonets. For ex- ample, one can acquire information about the network structure by extracting egonets of radius r around a ran- dom sample of nodes. Therefore, it is realistic to assume that one does not have access to the complete topology of a large-scale network; instead, one can access only a (relatively small) number of egonets in the network. Clearly, egonets do not completely describe the it is impossible to compute network structure; thus, 3An induced subgraph is a subset of the vertices of a graph G together with any edges whose endpoints are both in this subset. exactly the graph spectrum from local egonets. In this paper, we show that, despite this limitation, we are able to compute many spectral graph properties from the egonets. We show that given a (sufficiently large) random collection of egonets of radius r, one can efficiently estimate the spectral moments of the normalized Laplacian matrix, mk(LH), for k ≤ 2r + 1. Furthermore, we show that, given a truncated sequence of spectral moments, one can derive bounds on relevant spectral properties, such as the spectral radius of the Laplacian. As part of our analysis, we provide quality guarantees for all the estimators and bounds herein proposed. 3 Spectral Moments for Random Egonets We start our analysis assuming the (unrealistic) situ- ation in which one can access all the egonets in the network. Under this assumption, we shall derive ex- pressions for the spectral moments of the normalized Laplacian matrix. Afterwards, we shall relax our as- sumptions and consider the more realistic case in which one can only access a (relatively small) number of ran- dom egonets. In this case, we propose estimators for the spectral moments and analyze their quality using Hoeffding inequality. 3.1 Spectral Moments as Averages. We derive an expression for the k-th spectral moments of the normalized Laplacian matrix of a weighted graph, LH, from local egonets of radius r, Hi,r. In our derivations, we use the following lemma from algebraic graph theory [1]: Lemma 3.1. Let H be an undirected, weighted graph with adjacency matrix WH = [wij ], then (3.3) H(cid:3)ii = Xp∈Pi,k (cid:2)W k ωH(p), where (cid:2)W k H(cid:3)ii is the (i, i)-th entry of the k-th power of the adjacency WH and Pi,k is the set of all closed walks of length k starting and finishing at node vi. Using Lemma 3.1, we can compute the spectral moments of the weighted adjacency matrix WH, as follows: Theorem 3.1. Consider a weighted, undirected graph H with adjacency matrix WH. Let Wi,r(H) be the (weighted) adjacency matrix of the egonet of radius r around node vi, Hi,r. Then, the spectral moments of WH can be written as (3.4) mk (WH) = 1 n nXi=1(cid:2)W k i,r (H)(cid:3)11 , for k ≤ 2r + 1. Proof. Since the trace of a matrix is the sum of its eigenvalues, we can expand the k-th spectral moment of the adjacency matrix as follows: nXi=1(cid:2)W k H(cid:3)ii . (cid:2)W k H(cid:3)ii (3.5) mk (WH) = 1 n H(cid:1) = Trace(cid:0)W k 1 n that From Lemma 3.1, we have Pp∈Pk,i = ωH(p). Notice that for a fixed value of k, closed walks of length k in H starting at node vi can only touch nodes within a certain distance r (k) of vi, where r (k) is a function of k. In particular, for k even (resp. odd), a closed walk of length k starting at node i can only touch nodes at most k/2 (resp. ⌊k/2⌋) hops away from vi. Therefore, closed walks of length k starting at vi are always contained within the neighborhood of radius ⌊k/2⌋. In other words, the egonet Hi,r of radius r contains all closed walks of length up to 2r + 1 starting at node vi. We can count these walks by applying Lemma 3.1 to the local ωH(p) adjacency matrix Wi,r. (since, by convention, node 1 in the local egonet Hi,r corresponds to node i in the graph H). Therefore, for k ≤ 2r + 1, we have that (3.6) is equal to (cid:2)W k i,r (H)(cid:3)11 (cid:2)W k i,r (H)(cid:3)11 In particular, Pp∈Pk,i H(cid:3)ii . ωH(p) =(cid:2)W k = Xp∈Pk,i Then, substituting (3.6) into (3.5), we obtain the state- ment of our Theorem. to us The above theorem allows com- pute a truncated sequence of spectral moments {mk (WH) , k ≤ 2r + 1}, given all the egonets of radius r, {Hi,r, vi ∈ V}. According to (3.4), the k-th spec- tral moment is simply the average of the quantities , i = 1, ..., n. For a fixed k, each value , i = 1, . . . , n, can be computed in time (cid:2)W k i,r (H)(cid:3)11 (cid:2)W k i,r (H)(cid:3)11 O(cid:16)Ni,r3(cid:17), where Ni,r is the number of nodes in the local egonet Hi,r. Notice that, if Ni,r = o (n), we can compute the k-th spectral moments in linear time (with respect to the size of the network) using (3.4). In what follows, we use the above results to compute the spectral moments of the Laplacian matrix of a weighted graph, LH. Before we present our results, we define the so-called Laplacian graph: Definition 3.1. Given a weighted graph H, we define its Laplacian graph as L (H) := (cid:16)V,E ∪eE, Π(cid:17), where eE := {{v, v} : v ∈ V} (the set of all self-loops), and the weight function Π : E ∪eE → R is defined as: Π ({vi, vj}) := for vi = vj, for {vi, vj} ∈ E, vi 6= vj otherwise, 1, −wij√dH 0, is the weighted degree of node vi in H. (3.7) where dH i i dH , j Notice that the weighted adjacency matrix of the Laplacian graph L (H), denoted by WL(H), is equal to the normalized Laplacian matrix of the weighted graph H, LH. Thus, mk(LH) = mk(cid:0)WL(H)(cid:1) and we can compute the spectral moments of the normalized Laplacian matrix using weighted walks in the Laplacian graph. In particular, the Laplacian spectral moments satisfy = mk(LH) = mk(cid:0)WL(H)(cid:1) L(H)iii nXi=1hW k nXi=1(cid:2)W k i,r (L (H))(cid:3)11 1 n 1 n = (3.8) i,r (L (H))(cid:3)11 where (cid:2)W k graph L (H). Notice that (cid:2)W k is the (1, 1)-th entry of the k- th power of the weighted adjacency matrix representing the egonet of radius r around node vi in the Laplacian is a real number that depends solely on the structure of the egonet Wi,r(H); thus, it is a variable that can be computed using local information about the structure of the network around node vi. i,r (L (H))(cid:3)11 Thus, φ(k) is a local variable associated to the r-th i,r neighborhood around node vi. According to (3.8), the k-th Laplacian spectral moment can be computed as the average, (3.10) mk(LH) = 1 n nXi=1 φ(k) i,r , Let us now assume that we do not have access to φ(k) i,r , for all vi ∈ V; instead, we only have access to φ(k) i,r for vi ∈ S, where S ⊂ V is a subset of randomly sampled nodes. Since the spectral moment is a global average, we propose the following estimator of mk(LH): (3.11) 1 S Xvi∈S φ(k) i,r . emk(LH) := In what follows, we establish the quality of this estima- tor using Chernoff-Hoeffding inequality. Lemma 3.2. (Hoeffding Inequality) Let X1, X2, . . . , Xk be independent random variables with P (Xi ∈ [a, b]) = 1 for 1 ≤ i ≤ k. Define the mean of these variables as X = 1 i=1 Xi, then for any positive t, the following inequality holds kPk P r{(cid:12)(cid:12)X − E(X)(cid:12)(cid:12) ≥ t} ≤ 2 exp(cid:18) −2kt2 (b − a)2(cid:19) , where E(X) is the expected value of X. (3.12) In order to apply the above lemma, we need the following result: In theory, if we had access to all the egonets in the graph, we could calculate W k i,r (L (H)) for all vi ∈ V, and compute the spectral moments of the Laplacian matrix in linear time (under certain sparsity assump- tions). However, it is often impractical to traverse all the egonets of a real-world large-scale network because of high computational cost. In the following subsection, we introduce a method to approximate the spectral mo- ments of a network in sublinear time from a random collection of s egonets and analyze the quality of our approximation as a function of s. i,r ≤ 2k−1 i,r satisfies 0 ≤ φ(k) Lemma 3.3. The variable φ(k) for all i ∈ [n], k ≥ 1. Proof. Let λi and vi denote the eigenvalues and eigen- vectors of the Laplacian matrix LH, for i = 1, 2, . . . , n. Since LH is symmetric is always diagonalizable and it has a complete set of orthonormal eigenvectors. Fur- thermore, LH is also positive semidefinite; thus, its eigenvalues are nonnegative. Define the matrix V whose columns are the eigenvectors vi, and the diagonal ma- trix Λ = diag(λ1, λ2..., λn). Then, LH = V ΛV T , and 3.2 Sampling Egonets and Moment Estimation. Define the following 'local' variable (3.13) Lk H = V ΛkV T = j vj vT λk j . nXj=1 (3.9) φ(k) i,r :=(cid:2)W k i,r (L (H))(cid:3)11 , k ≤ 2r + 1. Notice that φ(k) i,r is a function of the egonet of radius r around node vi, since Wi,r (L (H)) is the weighted adjacency matrix of the egonet in the Laplacian graph. Denoting the i-th element of vector vj as vj,i, we have (3.14) [Lk H]ii = λk j v2 j,i. nXj=1 From (2.1), we have that [LH]ii = 1. Thus, (3.15) [LH]ii = λj v2 j,i = 1. nXj=1 According to [3], the eigenvalues satisfy 0 ≤ λi ≤ 2 for any i ∈ [n]. Thus, [Lk H]ii = λjv2 j,i · λk−1 j nXj=1 ≤  nXj=1 ≤  nXj=1 = 2k−1, λjv2 λjv2 1 j,i λk−1 j,i 2k−1 where we have used the fact that 2 ≥ λ1 ≥ λi, for all i. Also, notice from (3.14), that every element in the summation is nonnegative, then [Lk H]ii is nonnegative. From Lemmas 3.3 and 3.2, we obtain the following quality guarantee on our estimator: k S Theorem 3.2. Consider a set S ⊂ V of nodes chosen the k-th Laplacian spectral moment defined in (3.11) satisfies uniformly at random. Then, the estimator emk(LH) for 4k (cid:19) . Pr{emk(LH) − mk(LH) ≥ tk} ≤ 2 exp(cid:18)−8t2 i,r for Xi and (cid:2)0, 2k−1(cid:3) for [a, b]. Proof. The proof is a direct application of Lemma 3.2 after substituting φ(k) Using this result, we can calculate the number of samples S needed to achieve a particular error in our moment estimation with a given probability. For each value of k, we denote by sk the sample size needed to achieve an error tk with a probability less or equal to 4k (cid:17). Let us define the normalized error εk := tk samples, we achieve an error tk with probability at most δk, i.e., 2k−1 , then taking sk = 1 δk = 2 exp(cid:16) −8t2 Pr{emk(LH) − mk(LH) ≥ tk} ≤ δk. 4 Moment-Based Spectral Analysis. 2 ε−2 k ln 2 δk ksk Using Theorem 3.1, we can get a truncated sequence of approximated spectral moments of the Laplacian matrix LH, {mk(LH)}k≤2r+1, from a set of local egonets of radius r. We now present a convex optimization framework to extract information about the largest eigenvalue of the weighted adjacency matrix, λ1 (LH), from this sequence of moments. 4.1 Moment-Based Spectral Bounds We can state the problem solved in this subsection as follows: Problem. Given a truncated sequence of Laplacian spectral moments {mk(LH)}k≤2r+1, find tight upper and lower bounds on the largest eigenvalue λ1 (LH). Our approach is based on a probabilistic interpreta- tion of the eigenvalue spectrum of a given network. To present our approach, we first need to introduce some concepts: Definition 4.1. Given a weighted, undirected Lapla- cian matrix LH with (real) eigenvalues λ1, ..., λn, the Laplacian spectral density is defined as, (4.16) µLH (x) , 1 n nXi=1 δ (x − λi) , where δ (·) is the Dirac delta function. The spectral density can be interpreted as a discrete probability density function with support 4 on the set of eigenvalues {λi, i = 1...n}. Let us consider a discrete random variable X whose probability density function is µLH. The moments of this random variable satisfy the following [19]: EµLH(cid:0)X k(cid:1) = mk (LH) , for all k ≥ 0. We now present a convex optimization framework that allows us to find bounds on the endpoints of the smallest interval [a, b] containing the support of a generic random variable X ∼ µ given a sequence of moments (M0, M1, ..., M2r+1), where Mk , ´ xkdx. Subsequently, we shall apply these results to find bounds on λ1 (LH). Our formulation is based on the following matrices: Definition 4.2. Given of moments M2r+1 = (M0, M1, ..., M2r+1), let H2r (M2r+1) and H2r+1 (M2r+1) ∈ R(r+1)×(r+1) be the Hankel matrices defined by5: sequence a (4.17) [H2r]ij , Mi+j−2, [H2r+1]ij , Mi+j−1. The above matrices are called the moment matrices associated with the sequence M2r+1. 4Recall that the support of a finite Borel measure µ on R, is the smallest closed set B such that denoted by supp (µ), µ (R\B) = 0. 5For simplicity in the notation, we shall omit the argument M2r+1 whenever clear from the context. Given a truncated sequence of moments of a proba- bility distribution, we can compute a bound on its sup- port as follows [8][7]: Given a sequence of spectral moments, we can com- pute upper bounds on the largest eigenvalue λ1 (LH) using the following result [18][19]: Theorem 4.1. Let µ be a probability density function on R with associated sequence of moments M2r+1 = (M0, M1, ..., M2r+1), all finite, and let [a, b] be the small- est interval which contains the support of µ. Then, b ≥ β∗ (M2r+1), where β∗ r (M2r+1) := minx x (4.18) s.t. H2r (cid:23) 0, x H2r − H2r+1 (cid:23) 0. where Theorem 4.3. Let LH be the normalized Laplacian matrix of a weighted, undirected graph with (real) eigen- values λ1 ≥ ... ≥ λn. Then, given a truncated se- quence of its Laplacian spectral moments m2r+1 = (m0, m1, ..., m2r+1), we have that Observe that, for a given sequence of moments M2r+1, the entries of xH2r − H2r+1 depend affinely on the variable x. Then β∗ (m2r+1) is the solutions to a semidefinite program6 (SDP) in one variable. Hence, β∗ (M2r+1) can be efficiently computed using standard optimization software, e.g. [6], from a truncated se- quence of moments. Applying Theorem 4.1 to the spectral density µLH of a given graph H with spectral moments (m0, m1, ..., m2r+1), we can find a lower bound on its largest eigenvalue, λ1 (LH), as follows [19]: Theorem 4.2. Let LH be the normalized Laplacian matrix of a weighted, undirected graph with (real) eigen- values λ1 ≥ ... ≥ λn. Then, given a truncated sequence of the spectral moments of LH, m2r+1 = (m0, m1, . . . , m2r+1), we have that (4.19) λ1 (LH) ≥ β∗ r (m2r+1) , where β∗ r (m2r+1) is the solution to the SDP in (4.18). Using the optimization framework presented above, we can also compute upper bounds on the spectral radius of H from a sequence of its spectral moments, as follows. In this case, our formulation is based on the following set of Hankel matrices: Definition 4.3. Given the Laplacian matrix of a weighted, undirected graph LH with n nodes and spectral moments m2r+1 = (m0, m1, ..., m2r+1), ∈ let T2r+1 (y; m2r+1, n) R(r+1)×(r+1) be the Hankel matrices defined by7: T2r (y; m2r+1, n) and (4.20) (4.21) [T2r]ij := [T2r+1]ij := n n n−1 mi+j−2 − 1 n−1 mi+j−1 − 1 n−1 yi+j−2, n−1 yi+j−1. 6A semidefinite program is a convex optimization problem that can be solved in time polynomial in the input size of the problem; see e.g. [20]. 7We shall omit the arguments from T2r and T2r+1 whenever λ1 ≤ δ∗ r (m2r+1, n) , δ∗ r (m2r+1, n) := maxy y (4.22) s.t. T2r (cid:23) 0, yT2r − T2r+1 (cid:23) 0, T2r+1 (cid:23) 0. The optimization program in (4.22) is not an SDP, since the entries of the matrices T2r (y; m2r+1, n) and T2r+1 (y; m2r+1, n) are not affine functions in y. Never- theless, the program is clearly quasiconvex [2] and can be efficiently solved using a simple bisection algorithms. In summary, using Theorems 3.1, 4.2, and 4.3, we can compute upper and lower bounds on the largest eigenvalue of the normalized Laplacian matrix of a weighted, undirected network, λ1 (LH), from the set of local egonets with radius r, as follows: (Step 1 ) Using (3.4), compute the truncated sequence of mo- ments {mk(LH)}k≤2r+1 from the egonets, and (Step 2 ) using Theorems 4.2 and 4.3, compute the upper and lower bounds, δ∗ r (m2r+1), respec- tively. However, the approach presented in this section is based on the assumption that we have access to all the egonets in the network. In Subsection 3.2, we have provided estimators of the spectral moments from a ran- dom sample of egonets. In the following subsection, we will illustrate how to use these estimators to derive up- per and lower bounds on the Laplacian spectral radius from a random sample of egonets. r (m2r+1, n) and β∗ 4.2 Bounds on Spectral Radius from Sampling Egonets From Theorem 3.2, we have that the k-th Laplacian spectral moment mk = mk (LH) satisfies 4k (cid:19) , Pr{mk ∈ [emk − tk,emk + tk]} ≤ 2 exp(cid:18)−8t2 where emk = emk(LH) was defined in (3.11)8. Then, the probability of a truncated sequence of moments k S 8We shall omit the arguments LH from mk and emk unless clear from the context. there is need for specification. if (4.23) tk = 2k−1 ln1/2 4r 1 − ∆ . Proof. First, we have that Pr 2r+1\k=2 k = 2, . . . , 2r + 1, satisfies the following proposition (notice that m1 = 1, for any LH): Proposition 4.1. For a given ∆ ∈ [0, 1], we have that (mk)k≤2r+1 satisfying mk ∈ [emk − tk,emk + tk] for {mk ∈ [emk − tk,emk + tk]}! ≥ ∆, p2 S Pr 2r+1\k=2 {mk ∈ [emk − tk,emk + tk]}! = 1 − Pr 2r+1[k=2 {mk /∈ [emk − tk,emk + tk]}! 2r+1Xk=2 Pr (mk /∈ [emk − tk,emk + tk]) exp(cid:18)−8t2 4k (cid:19) . 2r+1Xk=2 ≥ 1 − 2 ≥ 1 − k S The last probability can be made equal to a desired ∆ by choosing t2 k/4k = α for all k = 2, . . . , 2k + 1 with α satisfying ∆ = 1 − 4r exp (−8αS). Or equivalently, α = 1 1−∆ , which implies the statement of the Proposition, after simple algebraic manipulations. 8S ln 4r We can then apply the result in Theorem 4.2 to compute a probabilistic lower bound on the spectral radius by solving a modified version of the SDP in (4.18), as follows. First, given a sample set of nodes S, we extract the corresponding egonets of radius r. Then, using (3.11) and (3.9), we compute a sequence of estimators emk for k = 2, . . . , 2r+1. Finally, according to Proposition 4.1, we modify the SDP in (4.18) to obtain our main result. Theorem 4.4. Given a uniform sample set S ⊂ V and the egonets of radius r around the nodes in S, the spectral radius of the normalized Laplacian matrix satisfies x H2r − H2r+1 (cid:23) 0, k = 2, . . . , 2r + 1, emk − tk ≤ mk ≤ emk + tk, Pr(cid:16)λ1 (LH) ≥ eβr(cid:17) ≥ ∆, where eβr := minx x s.t. H2r (cid:23) 0, H2r+1 defined in (4.17), and tk defined in (4.23). with mk and emk defined in (3.9) and (3.11), H2r and The proof of the above theorem is a direct adapta- tion of Theorem 4.2 using Proposition 4.1. The same adaptation can be applied to derive an upper bound on the spectral radius of the normalized Laplacian matrix from Theorem 4.3 and Proposition 4.1. 5 Numerical Analysis In this section, we will present the numerical analysis of spectral radius estimation, and verify the quality of estimation based on sampled nodes. In our simulations, we will use data from the Euro-Email network [9]. The network is composed of 36,692 nodes, which are connected by 183,831 edges. Here we consider the network as unweighted, undirected simple graph. Two nodes are connected as long as either user sent email to another. From the simple graph, we can construct the weighted Laplacian graph that corresponds to the simple graph. To be able to compute the spectral radius, we extract a small network with 5000 nodes via BFS, so that we could compare the performance of sampling with the accurate computation. The subgraph with 5000 nodes will be the object of our analysis. The nodes are assigned with indexes without con- sideration about their topology. To get a uniform sam- pling, the indexes are picked randomly, which compose the collection of sampled nodes. In Figure 1, we take different number of samples from the network to estimate the bounds of the spectral radius based on egonet with radius r0 = 3. In the simulation, the normalized error bound for the elements tk in the moment sequence is fixed, i.e. 2k−1 = 0.08. Here we assume that the moments for k = 1, 2...5 can be accurately computed, because it does not cost much to compute the power of the Laplacian matrix up to 5-th order. However, for the 6-th and 7-th moment, we take uniform samples from the whole network and approximate the moment using the estimator proposed in the previous sections, using average of the sampled egonets to approximate the global average. i.e. Thus for each k > 5, mk ∈ [fmk − tk,fmk + tk]. With the size of the sampled nodes increasing, the quality (accuracy guarantee) of the estimator increases. From the upper part of the figure, it can be seen that the lower bound does not change much when the number of samples changes. For the upper bound, when the number of samples increases, the bound gets looser, but the accuracy guarantee that the spectral radius is within the bounds increase. The dotted lines are the bounds calculated by considering the egonets t e e n a r a u G y c a r u c c A 2.5 2 1.5 1 0.5 0 0 Lower Bound Upper Bound Spectral Radius 100 200 300 400 500 600 Number of Samples Figure 1: Estimation when the size of the samples varies. (1) The normalized error for each moment are the same. Samples with different sizes give different estimations of the bounds. (2) Quality guarantee is a function of the size of the sample. When the number of sample increases, the quality of the estimator increases. i s u d a R l a r t c e p S f o n o i t a m i t s E 2 1.8 1.6 1.4 1.2 1 0 5 10 15 20 25 Trial 30 35 40 45 Figure 2: Spectral bounds for trials with the same sample size S = 21. When the number of samples are the same, 25 20 15 10 5 0 1.65 Wrong Estimation: 14% Accurate Estimation: 86% 1.7 1.75 1.8 1.85 1.9 1.95 2 2.05 2.1 Distribution of Estimation of every nodes in the network. And the circles are the estimated bounds when different sets of nodes are taken as samples. The lower part of Figure 1 gives the curve for the number of samples versus the accuracy guarantee. Though the network has 5000 nodes, taking 600 samples will give the estimation with nearly 100 percent. In Figure 2, we take different samples with the same sample size to verify the quality of estimation. The normalized error is set to be εk = 0.2, and δk = 0.4, thus the sample size needed is S = 21. From the figure, it can be seen that the lower bound is much loose, and almost the same when the sample pool are different. Checking whether the estimation range is correct for each trial, we can see from Figure 3 that the accuracy rate is 86%, which is much higher than the theoretical accuracy probability 1 − δk = 0.6. Figure 3: Distribution of estimation when the size of the sample is the same. 6 Conclusion In this paper, we apply graph theories and convex op- timization techniques to study the spectrum property of the normalized Laplacian matrix. Instead of analyz- ing the whole network, we focus on localized structural features with radius r. Due to the high cost of traversing all the nodes, we have proposed to take uniform samples from the net- work pool and use the sampled egonets to estimate the moments of the normalized Laplacian. With Hoeffding inequalities, we characterize the quality of the estima- tors in terms of normalized error and size of the sam- ple. In addition, we have derived the lower and upper bounds of the spectral radius by solving a series of SDP problems, based on the collection of random subgraphs. The combination of quality guarantee of moment se- quence and the optimization problems provides us with the estimation guarantee of the spectral radius. References [1] N. Biggs, Algebraic Graph Theory, Cambridge Uni- versity Press, 1993. [2] S. Boyd and L. Vandenberghe, Convex Optimiza- tion, Cambridge university press, 2004. [3] F. Chung, Spectral Graph Theory, vol. 92, AMS Bookstore, 1997. [4] F. Chung, L. Lu, and V. Vu, Spectra of random graphs with given expected degrees, Proceedings of the National Academy of Sciences, 100 (2003), pp. 6313– 6318. [5] D. Cvetkovi´c, P. Rowlinson, and S. Simi´c, An In- troduction to the Theory of Graph Spectra, Cambridge University Press Cambridge, 2010. [6] M. Grant, S. Boyd, and Y. Ye, Cvx: Matlab software for disciplined convex programming, 2008. [7] J.-B. Lasserre, Moments, Positive Polynomials and Their Applications, vol. 1, World Scientific, 2009. [8] , Bounding the support of a measure from its marginal moments, Proceedings of the American Math- ematical Society, 139 (2011), pp. 3375–3382. [9] J. Leskovec, Stanford large network dataset collec- tion. http://snap.stanford.edu/data/index.html. [10] L. Lov´asz, Random walks on graphs: A survey, Com- binatorics, Paul erdos is eighty, 2 (1993), pp. 1–46. [11] N.A. Lynch, Distributed algorithms, Morgan Kauf- mann, 1996. [12] B. Mohar and Y. Alavi, The laplacian spectrum of graphs, Graph theory, combinatorics, and applications, 2 (1991), pp. 871–898. [13] M. Newman, Assortative mixing in networks, Physical review letters, 89 (2002), p. 208701. [14] , Random graphs with clustering, Physical review letters, 103 (2009), p. 058701. [15] M. Newman, S. Strogatz, and D. Watts, Random graphs with arbitrary degree distributions and their applications, Physical Review E, 64 (2001), p. 026118. [16] R. Olfati-Saber, Flocking for multi-agent dynamic systems: Algorithms and theory, IEEE Transactions on Automatic Control, 51 (2006), pp. 401–420. [17] R. Pastor-Satorras, A. V´azquez, and A. Vespig- nani, Dynamical and correlation properties of the in- ternet, Physical review letters, 87 (2001), p. 258701. [18] V.M Preciado and A. Jadbabaie, Moment-based spectral analysis of large-scale networks using local structural information, ACM/IEEE Transactions on Networking, 21 (2013), pp. 373–382. [19] V.M Preciado, A. Jadbabaie, and G.C. Vergh- ese, Structural analysis of laplacian spectral properties of large-scale networks, IEEE Transactions on Auto- matic Control, 58 (2013), pp. 2338–2343. [20] L. Vandenberghe and S. Boyd, Semidefinite pro- gramming, SIAM review, 38 (1996), pp. 49–95.
1610.00086
1
1610
2016-10-01T04:59:05
Consistency Ensuring in Social Web Services Based on Commitments Structure
[ "cs.SI", "cs.AI" ]
Web Service is one of the most significant current discussions in information sharing technologies and one of the examples of service oriented processing. To ensure accurate execution of web services operations, it must be adaptable with policies of the social networks in which it signs up. This adaptation implements using controls called 'Commitment'. This paper describes commitments structure and existing research about commitments and social web services, then suggests an algorithm for consistency of commitments in social web services. As regards the commitments may be executed concurrently, a key challenge in web services execution based on commitment structure is consistency ensuring in execution time. The purpose of this research is providing an algorithm for consistency ensuring between web services operations based on commitments structure.
cs.SI
cs
Consistency Ensuring in Social Web Services Based on Commitments Structure Marzieh Adelnia Department of Computer Engineering University of Isfahan Isfahan, Iran [email protected] Mohammad Reza Khayyambashi Department of Computer Engineering University of Isfahan Isfahan, Iran [email protected] Abstract - Web Service is one of the most significant current discussions in information sharing technologies and one of the examples of service oriented processing. To ensure accurate execution of web services operations, it must be adaptable with policies of the social networks in which it signs up. This adaptation implements using controls called "Commitment". This paper describes commitments structure and existing research about commitments and social web services, then suggests an algorithm for consistency of commitments in social web services. As regards the commitments may be executed concurrently, a key challenge in web services execution based on commitment structure is consistency ensuring in execution time. The purpose of this research is providing an algorithm for consistency ensuring between web services operations based on commitments structure. Index Terms– Commitment, Social Commitment, Consistency, Social Network, Social Web Service, Web Service. I. INTRODUCTION Web is the largest transformable-information framework. Many research has been accomplished about the web and related technologies in the past two decades. Web 1.0 as a web of cognition, web 2.0 as a web of communication, web 3.0 as a web of co-operation and web 4.0 as a web of integration are introduced as four generation of the web since the advent of the web. "Web 2.0 was presented in 2004 as a read-write web. The technologies of web 2.0 allow assembling and handling large global crowds with common interests in social interactions" [1]. Today, web services have become one of the most important information sharing technologies on the web and one of the examples of service oriented processing. A Web service is a software designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a format that is processed by machine. Other systems communicate with the web service in a format of SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other web-related standards. In fact a web service is an abstract notion that must be implemented by a concrete agent. The agent is the base component of software or hardware that sends and receives messages, while the service is the resource characterized by the abstract set of functionality that is provided. Although if the agent changes, the web service don't change. According to the W3C, a web service "is a software application identified by a URI, whose interfaces and binding are capable of being defined, described, and discovered by XML artifacts and supports direct interactions with other software applications using XML based messages via Internet-based applications". In recent years, many users have registered in various social networks that use web services. Regarding the growth of social networks and the tendency of users for registering on them, web services can be studied from a social computing viewpoint. Social computing is an area of computer science that is concerned with the intersection of social behavior and computational systems. Social computing is basically the use of a computer for social goals. A prime example for these processes is applications based on web 2.0 like social networks and blogs. With merging service oriented computing and social computing, social web services are produced that are more complicated than regular web services. To ensure accurate execution of web services operations, they must be adaptable with the policies of the social networks in which they sign up. This adaptation is implemented using controls called "Commitment". In other words, transactions between web services components and social networks lead to the creation, management and use of commitments [2]. As regards to the concurrent execution of social web services and commitments in a social network, consistency of commitments is one of the most important challenges in this topic. In previous research [3], commitments structure is analyzed and based on their attributes classified. In this paper, the algorithm is designed. In addition to this, supplemental commitments are defined to optimizing the social web services operation and the algorithm is checked with Facebook dataset. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201669https://sites.google.com/site/ijcsis/ ISSN 1947-5500 contracting. In SweetDeal approach, a business contract is a set of activities that can be decomposed into sub-activities. The terms of contracts use a set of commitments to execute operation by agents. The algorithm uses a coordination method to manage agent activities [9]. In 2005, Bentahar et al. presented a new persuasion dialogue game for agent communication. They modeled dialogue game by a framework based on social commitments and arguments, named CAN1. CAN framework allows to model dynamic communication in levels of activities that agents apply to commitments and in levels of argumentation relations. This dialogue game is specified by indicating its entry, dynamic and exit conditions. They proposed a set of algorithms for the implementation of the persuasion protocol and discussed their termination, complexity and correctness [10]. In 2006, Carabelea et al. studied the one of the main challenge in multi agent system. This challenge was the coordination ensuring of autonomous agent in open heterogeneous system. They used social commitments to solve this challenge. In fact they combined two models of coordinating agent, commitment-based interactions and organizations. They described how one can use social commitments to represent the expected behavior of an agent playing a role in an organization. They defined an organizational structure as a collection of roles, where a role is considered to be the subject of different types of social commitments and policies [11]. In 2008, Narendra defined a contract as a collection of the participant's commitments toward each other. The interactions that take place in a contract are understood in terms of how they operate on the participant's commitments. The operation on a commitment cause its state changes according to a life cycle [12]. in terms of low "existing regards formulated In 2009, Singh et al. advocated for examining Service- Oriented Architecture (SOA) principles from a commitment service-oriented perspective. As architectures are level abstractions far removed from business services", In CSOA2, the components are business services and the connectors are patterns, considered as commitments, which protect key elements of service engagements. Each participant is implemented as an agent; interacting agents perform a service engagement by creating and elaborating commitments to one another [13]. In 2010, El-Menshawy et al. showed that current methods fail to capture the meaning of interactions that arise in real- life business scenarios and proofed commitments increase flexibility and intuitively in protocols. They presented an exploder definition for commitments for using in a larger level. their definition, a new grammar named "Computation Tree Logic" (CTL) and terms like 𝑆𝐶𝑃 for unconditional commitments and 𝑆𝐶𝐶 for conditional In II. BACKGROUND Many research exists about social web services, commitments and consistency in web services. This section provides an overview on these topics. The section is partitioned into three groups and each group is assigned to one topic. A. Overview on Social Web Services. The synergy between social computing and service oriented computing has eventuated into social web services. Existing research focuses on adoption of web services to social networks. In 2010, Maaradji proposed a social constructor named "SoCo" that suggests and helps users for next their operations (like selecting specific web service). So users may like to perform an operation that their friends have done in social networks [4]. In the other research in 2011, Maamar et al. categorized social networks to three groups including [5]:  Collaboration social networks. "By emerging their respective functionalities, social Web services have the capacity to work together and response to complex user requests. In fact, a social Web service manages its own network of collaborators".  Substitution social networks. "Although social web services compete against each other, they can still help each other when they fail as long as they offer similar functionalities."  Competition social networks. "Social web services compete against each other when they offer similar functionalities. Their non-functional properties differentiate them when users' non-functional requirements must be satisfied." Maamar also purposed an approach for weaving social networks operation using web services. The results of his research lead to creating social web services [6]. In 2013, Maamar et al. studied the social qualities that web services present at run time to identify and assign adequate social qualities to communities that host these web services. They discussed the binding of communities of web services to social qualities like selfishness. The quality of communities is presented based on how web services respond to the scenarios like collaboration, delegation, competition and coopetition [7]. B. Overview on commitments Fornara and Colombetti are the first who studied and used for formula commitments. They defined a general commitments and used them for speech evaluation [8]. In 2003, Grosof et al. proposed a rule-based method for representation of e-contracting. It is named "SweetDeal" and uses XML rules and ontologies for simulating business 1 Commitment and Argument Network 2 Commitment - based Service Oriented Architecture International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201670https://sites.google.com/site/ijcsis/ ISSN 1947-5500 commitments are added. CTL tree and commitments are the nodes of tree that are organized in the tree base on logical regulation in transaction execution time [14]. logical is a In 2012, Maamar et al. implemented social web services using commitments. They presented the architecture implementing social web services installation in terms of monitoring level, social level and service level. They introduced "Responsibility" concept in social web services and based on this concept, designed commitments for responsibility of social web services [2]. In 2013, Maamar et al. presented a set of responsibilities for social web services based on commitments and defined requirement commitments for responsibilities. A key challenge in this research is consistency ensuring between commitments in social web services that this paper has proceeded it [15]. In 2014, Sultan et al. merged knowledge and social commitments and presented a new framework to model and alter stochastic multi-agent systems. They defined a new multi model logic called PCTLkc 1. The PCTLkc merge probabilistic logic of knowledge (PCTLK) and probabilistic logic of commitments (PCTLC) [16]. In 2015, Nardi et al. proposed a commitment-based account of the concept of service that uses a core reference ontology [17]. This mechanism called UFO-S2. UFO consists of three base element as follows: 1. UFO-A. It is an ontology of objects. 2. UFO-B. It is an ontology of event. 3. UFO-C. It is an ontology of social entities based on UFO-A and UFO-B. C. Overview on Consistency in Web Services In 2004, Heckel et al. discussed an approach to model consistency management for component-based architectures and its application to web service architectures. They proposed an algorithm that receives activity diagram of web service and translate it into CSP3. The CSP analyzes it for deadlock freedom [18]. In 2005, Greenfield et al. proposed a protocol to checking dynamic consistency. Their protocol can be run at the termination of a service-based application. The key of their work is establishing a relationship between internal service states, messages and application-level protocols. This protocol is based on the way that the reflection and transfer of critical state within messages links the local consistency expressions for each of the participating services. It should let verify global consistency at termination without needing global consistency expressions and an overall coordinator to evaluate them [19]. 1 Probabilistic Computation Tree Logic of Knowledge and Commitments 2 Unified Foundational Ontology - Service 3 Communicating Sequential Processes In 2008, Choi et al. suggested a mechanism to ensure consistency for web services transactions. This mechanism recognizes inconsistent states of transactions and replaces them with consistent states. Mechanism operation is designed by a waiting graph of web services transactions and a coordinator that check waiting graph. If coordinator is certified about deadlock lack, allows transaction to execute. Also if deadlock occurred, coordinator recognizes a safe state using waiting graph and replaces it instead deadlock state. Based on this mechanism, WTDP4 is designed [20]. In 2011, Shan-liang discussed a model for transactions processing coordination based on BPEL. In this model a coordinator is used for web services transactions and if deadlock occurred, coordinator rollbacks operations [21]. In 2011, also Hemel et al. studied consistency checking of web applications as a problem. Regards to parts of an application are defined with separate domain-specific languages, which are not checked for consistency with the rest of the application, they presented a declarative, rule- based approach to linguistic integration and consistency checking in web application. They argued that domain- specific languages should be designed from the ground up with static verification and cross-aspect consistency checking in mind, providing linguistic integration of domain-specific sublanguages [22]. In 2014, Adelnia et al. proposed an approach for commitment classification based on commitment structure. The between commitments is designed based on attributes of commitments structure [3]. consistency algorithm for ensuring III. COMMITMENTS DEFINITION This section describes commitments. First commitments types are explained then the commitments structure are expanded. In this section the responsibilities are required in social networks, are presented and their commitments are defined and expounded. A. Commitments Types Two types of commitments are defined [15]: 1. Social Commitments: Responsibilities bonded by one agent to another agent. Agents are usually the web services in social networks. Social commitments guarantee the proper use of the social networks in which they sign up. 2. Business Commitments: Arise when social web services take part in compositions and guarantee the proper development of composite web services in response to users' requests. 4 Web service Transaction Dependency management Protocol International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201671https://sites.google.com/site/ijcsis/ ISSN 1947-5500 B. Commitments Structure Maamar et al. suggested a standard formula for social commitments based on Fornara's formula. Fornara and Colombetti note that "...intuitively a social commitment is made by an agent (the debtor) to another agent (the creditor), that some fact holds or some action will be carried out (the content)". In addition to this formula, Maamar also presented a list of responsibilities for social web services. A commitment structure is defined as: 𝐶𝑅𝑒𝑠𝑝𝑖 (debtor, creditor, content [condition]). Condition parameter is optional [2]. Social commitments defined by Maamar et al. are listed as follows [15]: to 1. Resp1. "Collecting any detail (d) in a social network would require indicating the purpose (p) of this collection (o)". This responsibility formula can be represented as: Permission(Collect(d, o, valid(p))). The commitment of this responsibility is defined as: CResp1 ( swsi, swsj ,Collect( d, swsj) valid(pd)). this detail's owner 2. Resp2. "Posting any detail (d) on a social network should be correct." This responsibility formula can be represented as Obligation( Post( d, true)). The commitment of this responsibility is defined as: CResp2 (swsi, snauth, Post( dself )). 3. Resp3. "Collecting any detail (d) from a social network should not be tampered after information collection." This responsibility can be represented as Obligation( not-Tamper( d, o, collection (d))) and its commitments is defined as: CResp3 (swsi, swsj, not- Tamper( dpublic, swsj ). It can 4. Resp4. "Signing off from a social network would require the completion of all the pending assignments as (ass). Permission(Signoff(status(ass))). Sign-off the action and status is a function that assesses the progress (e.g., ongoing, complete, and failed) of ass." And the commitment for it is defined as: CResp4(swsi, snauth, Sign-off()status(ass)). represented be is represented indefinitely, 5. Resp5. "Revealing any public detail (d) to the non- members (not(m)) of a social network should not be authorized as Obligation(not-Reveal(d, o, m, collection(d))). not- Reveal is the action, m corresponds to the non- members of a social network, and collection is a function that checks if collecting d is approved in compliance with Resp1." The commitment of this responsibility defined as: CResp5 (swsi, snauth, not- Reveal(dpublic, o, nm)collection(dpublic)). Business commitments structure are defined like social commitments. They are expounded in [15]. IV. SUPPLEMENTAL COMMITMENTS As for increasing the variety of activities in social networks, commitments may be added or changed. In this section, two commitments that can optimize and complete social web services operation, are added and described as follows: be can and defined valid(p))) 1. Resp6. Sharing any information in a social network would require specifying the goal of this action. This responsibility as: Permission(Share(Info, o, its commitment is: CResp6 (swsi, swsj, Share (Info, swsj)valid(pInfo)). Permission is the function that checks the goal, Share is the action of social web service, Info is the information which would be shared in social network like a video or a text from other social networks, o is the writer of info like a social web service, valid is the method that checks purpose of social web service and p is the purpose of social web service. This responsibility checks the goal of social web service and if its goal is valid, allows to social web services to share information on an account. 2. Resp7. Posting any activity of user in other social networks must be correct. This responsibility can be defined as: Obligation( PostActivity( act, true)) and its commitment is: CResp7( swsi, PostActivity( act, swsj) valid(pact)). PostActivity is the action of social web service, act is the activity of the user in other social networks, swsi is the social web service that posts the activity of user in a social network and valid(pact) is the function that checks purpose of this action and if it is valid, allows the social web service to be execute. V. COMMITMENTS CLASSIFICATION For achieving consistency of commitments, commitments are classified based on their effect on databases and information of social network into [3]: 1. Reader Commitments: "this category of commitments don't change the information of database and social network and usually act as an information collector for other social networks or purpose checker in social web services. Note that the goal of social web services that use reader commitments must be valid. Also privacy must be protected." social networks. They 2. Writer Commitments: "unlike reader commitments, this category can change the information of database and share Information and post activity on other social networks. So writer commitments are more effective than reader commitments in social web service transactions. Like reader commitments, in writer commitments, privacy must be controlled." This classification of commitments is showed in Fig.1. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201672https://sites.google.com/site/ijcsis/ ISSN 1947-5500 Commitments Reader Commitments Writer Commitments Figure 1. Commitments Classes Information Collecting Goal Checking Infoarmation sharing Post Activity Sharing VI. CONSISTENCY GUARANTOR ALGORITHM As farther described, the action of the social web service is implemented using commitments and as regards both reader and writer commitments may be executed on social networks concurrently, a major problem that must be considered is consistency ensuring of commitments in social web services. To designing the consistency guarantor algorithm, three concepts are considered as follows: 1. Friend: Commitments are Friend if they are reader commitments. So they are consistent in all states and database is in the safe state. It can be formulated as: isReader(Ci) isReader(Cj) → IsFriend(Ci ، Cj). These commitments may collect the information of social networks or check the goal of social web services. For example if CResp1 and CResp3 are executed on an account in a social network, they are Friend. Family: Commitments are Family if they are writer commitments. In fact they effect on the state of database and information. It can be formulated as: isWriter(Ci) isWriter(Cj) → IsFamily(Ci ، Cj). These commitments may share the information of social networks. For example if execute two or more CResp2 concurrently on an account in a social network, they are Family. 2. Strange: If commitments neither Friend nor Family are Srange. In this state, commitments may be reader or writer. It can be formulated as: isReader(Ci) isWriter(Cj) → IsStrange(Ci ، Cj). For example if CResp1 and CResp2 are executed concurrently on an account in a social network they are Strange. Since writer commitments impress database and information, so if arrival commitments of the social web services and active commitment that is running, be Family or Strange, conflict may occur. In this state, consistency must be guaranteed and if deadlock happened it would be removed and system needs to be recovered. Suppose that a web service signs up in a social network, first authority component recognizes it. If the web service is valid in social network, it can sign up in the social network and a specific responsibility is assigned it. Also its commitments will be created based on its responsibility. This time, consistency checking between commitments is critical. Because of another commitment is executing on same account in social network, they may be inconsistent and conflict may happen. To guarantee consistency, first, condition of current commitment is checked towards active commitment that is executing. Three conditions may occur between concurrent commitments on an account in a social network: 1. 2. 3. change they don't IsFriend: If current commitment that has arrived recently and active commitment that is running are Friend, both can be executed concurrent. They are consistent because the information. IsFamily: If current commitment that has arrived recently and active commitment that is running are Family, current commitment would wait until active commitment execution is finished. Regards to both commitments change the information and database, if they are executed concurrently, inconsistency may happen. IsStrange: If current commitment that has arrived recently and active commitment that is running are Strange, current commitment would wait until the execution of active commitment is finished. In this state if reader commitment reads the information that may be changed by writer commitment, conflict may occur. The three states are described, are summarized in Fig.2. Friend • isReader(Ci) isReader(Cj) Family • isWriter(Ci) isWriter(Cj) Strange • isReader(Ci) isWriter(Cj) Figure 2. Commitments States Sometimes several commitments can be created concurrently in a time slice. In this state, commitments can be executed based on two policy: International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201673https://sites.google.com/site/ijcsis/ ISSN 1947-5500 1. FCFS1: Commitments are serviced based on creation time in social network. This policy is fairness. In this policy commitments are pushed in waiting queue based on creation time and next commitment is selected from front of queue. So all commitments are created, can be executed. 2. Priority: Commitments are serviced by priority. The priority of commitment is assigned by social network and can change based on the social network policies. In this policy next commitment is selected based on its priority. In fact it uses a priority queue for waiting commitments. Note that from waited commitments is reader, algorithm can be executed as follows: if selected commitment 1. In FCFS policy, all reader commitments in front of waiting queue, are selected for execution, because they are Friend and they can be executed concurrently. 2. In Priority policy, all reader commitments that have same priority of selected commitment, are selected for execution, because they are Friend and they can be executed concurrently. Figure 3. Implementation UI  SoundCloud: It is a music social network. Some activity like play music, like and share music on other social network can be done in it.  Facebook: This section is central social network in this implementation that communicates with other social networks. The user activities in other social network can receive and display in this section. When social web services sign up in Facebook social network, commitments are created and consistency guarantor algorithm is executed.  Commitments Monitoring: For monitoring the state of the commitments in any time, this section is designed and shows the number and state of all VII. IMPLEMENTATION This paper uses the application designed for suggestion algorithm in previous research [3]. The user interface application is shown in Fig 3. In this application five sections have been considered as follows:  LinkedIn: This section simulates LinkedIn social network. This social network receives some information like contact list from Facebook social network.  YouTube: This section simulates YouTube social network operation. In this simulation, the user can share the videos on Facebook social network. 1 First Come, First Serve International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201674https://sites.google.com/site/ijcsis/ ISSN 1947-5500 commitments for all active social web services in a social network. The algorithm is checked with Facebook wall posts datasets. Experiments show that the algorithm is efficient for ensuring consistency between commitments in social web services. Also based on the experiments, the number of Friend, Family and Strange states are completely haphazard and depend on the time and order of incoming social web services in social networks. Figure 4 illustrates this result. Also the number of commitments that are waited in queue showed in Figure 5. n o i t u c e x E s t n e m t i m m o C 35 30 25 20 15 10 5 0 s t n e m t i m m o C d e t i a W f o r e b m u N 30 30 30 19 12 7 12 8 3 16 5 4 Friend Family Strange Authority Exp. 1 Exp. 2 Exp. 3 Experiments Figure 4: Number of States between Commitments in 3 Experiments 25 20 15 10 5 0 5 10 3 20 23 15 8 30 40 50 Number of Web Services Figure 5: Number of Waited Commitments in Five Experiments When a web service signs up in a social network, if it is authenticated by an authority component, it will be registered in the social network and changed to a social web service. Based on its operation, one or several responsibilities are assigned to this social web service. For each responsibility, commitments are defined that can accomplish tasks of social web services. For a user account in social networks, if no commitment is active, commitments of responsibility could be active and execute their operations. But if another commitment is active on this user account, consistency must be protected. Thus the algorithm checks the state of current commitments towards active commitments and decides whether commitments should be executed or waited. For example in Fig.3, user activity are as follows: 1. Share a video on Facebook social network 2. Like a music on SoundCloud social network 3. Retrieve some information from Facebook Social network for LinkedIn account International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201675https://sites.google.com/site/ijcsis/ ISSN 1947-5500 The order of commitment execution is: 1. CResp6 2. CResp2 3. CResp7 4. CResp1 First user shares a video on Facebook social network and then like a music on SoundCloud social network and collect information from his account of Facebook. If these actions are executed in a time slice, consistency must be guaranteed. Regards to first CResp6 and CResp2 for information sharing are created, first, goal of social web service is checked and then social web service shares the video. Also CResp7 and CResp1 have been created and are waiting for execution. Because of CResp2 is active commitment, CResp7 and CResp2 are Family. Also CResp2 and CResp1 are Strange. When CResp2 is finished, CResp7 is selected from waiting commitments and will be executed. After CResp7 execution is finished, CResp1 is selected from waiting queue and will be executed. Some of results showed in Table 1. Time of YouTube Sharing Time of LinkedIn Collect Information Time of SoundClou d Like Table 1: Result of Algorithm Time of Status Order of Commitments execution SoundCloud Play Node Type Node Type Node Type Node Type 2013-06-18 2013-06-18 2013-06-18 16:15:07 16:15:05 UTC 16:15:09 UTC Users of Youtube website Robot UTC Individual Persons 2014-02-03 04:35:22 UTC Users of Youtube website 2014-02-03 04:35:20 UTC Individual Persons 2014-07-18 2014-07-18 02:21:14 02:21:10 UTC Robot UTC Users of Youtube website 2014-07-18 02:21:18 UTC SoundCloud User Account Inconsistent CResp1: Collects Information is Active CResp2: Shares Information is Waiting CResp6: Post Activity is Waiting CResp1: Collects Information is Deactivate CResp2: is Signal CResp2: Shares Information is Active CResp2: Shares Information is Deactivate CResp6: is Signal CResp6: Post Activity is Active CResp6: Post Activity is Deactivate Inconsistent CResp6: Post Activity is Active CResp2: Shares Information is Waiting CResp6: Post Activity is Deactivate CResp2: is Signal CResp2: Shares Information is Active CResp2: Shares Information is Deactivate Consistent CResp1: Collects Information is Active CResp1: Collects Information is Deactivate CResp2: Shares Information is Active CResp2: Shares Information is Deactivate CResp6: Post Activity is Active CResp6: Activity is Deactivate VIII. CONCLUSION This study set out to present an algorithm to ensure the consistency of commitments in social web services. Also two commitments are considered and added to base commitments for optimizing. In consistency guarantor algorithm, first, commitments are classified into two groups containing Reader Commitments and writer commitments. Based on this classification and inspiration of main concepts in social networks like "Family" and "Friend", the algorithm is designed. If commitments don't change the information and database, they are called Reader Commitments and if they affect and change information and database, they are called Writer Commitment. Commitments can have three states into each other. They may be Friend, Family or Strange based on their operations. The algorithm manages different states that International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201676https://sites.google.com/site/ijcsis/ ISSN 1947-5500 may occur in commitment execution of a social web service operation. Facebook dataset is used for algorithm checking. There are several research directions in future works of this paper. One of the future works is weaving suggested algorithm for consistency ensuring in business commitments. Also this algorithm must be checked on the professional social networks and other social networks with special performance. [1] [2] [3] [4] [5] [6] [7] [8] [9] REFERENCES S. Aghaei, M. A. Nematbakhsh and H. Khosravi Farsani, "EVOLUTION OF THE WORLD WIDE WEB: FROM WEB 1.0 TO WEB 4.0," International Journal of Web & Semantic Technology (IJWesT), vol. 3, no. 1, January 2012. Z. Maamar, N. Faci, M. Luck and S. Hachimi, "Specifying and Implementing Social Web Services Operation using Commitments," SAC, pp. 1955-1960, ACM 2012. M. Adelnia and M. R. Khayyambashi, "Consistency of Commitments in Social Web Services," (IJCSIS) International Journal of Computer Science and Information Security, vol. 12, no. 11, pp. 1-5, November 2014. A. Maaradji, H. Hacid, J. Daigremont and N. Cresp, "Towards a Social Network Based Approach for Services Composition," in 2010 IEEE International Conference on Communications (ICC'2010), 2010. Z. Maamar, H. Yahyaoui, E. Lim and P. Thiran, "Social Engineering of Communities of Web Services," in the 11th Annual International Symposium on Applications and the Internet (SAINT'2011), Munich, Germany, 2011. Z. Maamar, H. Hacid and M. N. Huhns, "Why Web Services Need Social Networks," IEEE Internet Computing, vol. 15, no. 2, pp. 90- 94, 2011. Z. Maamar, N. Faci, E. Kajan, A. Pljasković, E. Ugljanin and F. Akhter, "From Social Web Services to Social Communities of Web Services," Advances in Information Sciences (AIS), vol. 1, no. 1, pp. 22-37, 2013. N. Fornara and M. Colombetti, "Operational Specification of a Commitment-Based Agent Communication Language," in AAMAS'02, Bologna, Italy, July 15-19, 2002. B. N. Grosof and T. C. Poon , "SweetDeal: Representing Agent Contracts With Exceptions using XML Rules, Ontologies, and international conference on, Process Descriptions," Budapest, Hungary, 2003. in 12th [10] J. Bentahar, B. Moulin and B. Chaib-draa, "Specifying and Implementing a Persuasion Dialogue Game Using Commitments and Arguments," in Argumentation in Multi-Agent System, 2005, pp. 130-148. [11] C. Carabelea and O. Boissier, "Coordinating Agents in Organizations Using Social Commitments," Electronic Notes in Theoretical Computer Science, vol. 150, no. 3, p. 73–91, May 2006. [12] N. C. Narendra, "Generating Correct Protocols from Contracts: A Commitment-based Approach," SERVICES I, pp. 407-414, IEEE Computer Society 2008. [13] M. P. Singh, A. K. Chopra and N. Desai, "Commitment-Based Service-Oriented Architecture," Computer, vol. 42, no. 11, pp. 72- 79, Nov 2009. [14] M. El-Menshawy, J. Bentahar and R. Dssouli, "Verifiable Semantic Model for Agent Interactions using Social Commitments," in Languages, Methodologies and Developement Tools for Multi- Agents Systems, 2010, pp. 128-152. [15] Z. Maamar, N. Faci, K. Boukadi, Q. Z. Sheng and L. Yao, "Commitments to Regulate Social Web Services Operation," IEEE Transaction on Service Computing, vol. 7, no. 2, pp. 154-167, 2013. [16] k. Sultan, J. Bentahar, W. Wan and F. Al-Saqqar, "Modeling and verifying probabilistic Multi-Agent Systems using knowledge and social commitments," Expert Systems with Applications, p. 6291– 6304, 2014. [17] J. C. Nardi, J. P. A. Almeida, G. Guizzardi, L. F. Pires, M. J. van Sinderen, N. Guarino, C. M. Fonseca and R. A.Falbo, "A commitment-based reference ontology for services," Information Systems, 2015. [18] H. Reiko, V. Hendrik, J. KUSTER and S. THONE, "Towards Consistency of Web Service Architectures," University of Paderborn, Paderborn, Germany, 2004. [19] P. Greenfield, D. Kuo, S. Nepal and A. Fekete, "Consistency for Web Services Applications," 31st international conference on Very large data bases(VLDB), pp. 1199-1203, 2005. [20] S. Choi, H. Kim, H. Jang, J. Kim, S. M. Kim, J. Song and Y.-J. Lee, "A framework for ensuring consistency of Web Services Transactions," Information and Software Technology, no. 50, p. 684–696, 2008. [21] P. Shan-liang, L. Ya-Li and L. Wen-juan, "A framework for ensuring consistency of Web Services Transactions based on WS-BPEL," Modern Education and Computer Science, no. 4, pp. 47-54, 2011. [22] Z. Hemel, D. M. Groenewegen, L. C. Kats and E. Visser, "Static consistency checking of web applications with WebDSL," Journal of Symbolic Computation, vol. 46, no. 2, pp. 150-182, 2011. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 201677https://sites.google.com/site/ijcsis/ ISSN 1947-5500
1602.05744
1
1602
2016-02-18T10:18:00
Benchmarking Measures of Network Influence
[ "cs.SI", "physics.soc-ph" ]
Identifying key agents for the transmission of diseases (ideas, technology, etc.) across social networks has predominantly relied on measures of centrality on a static base network or a temporally flattened graph of agent interactions. Various measures have been proposed as the best trackers of influence, such as degree centrality, betweenness, and $k$-shell, depending on the structure of the connectivity. We consider SIR and SIS propagation dynamics on a temporally-extruded network of observed interactions and measure the conditional marginal spread as the change in the magnitude of the infection given the removal of each agent at each time: its temporal knockout (TKO) score. We argue that the exhaustive approach of the TKO score makes it an effective benchmark measure for evaluating the accuracy of other, often more practical, measures of influence. We find that none of the common network measures applied to the induced flat graphs are accurate predictors of network propagation influence on the systems studied; however, temporal networks and the TKO measure provide the requisite targets for the hunt for effective predictive measures.
cs.SI
cs
Benchmarking Measures of Network Influence Aaron Bramson1 2 3 Benjamin Vandermarliere 2 4 July 2, 2021 Abstract Identifying key agents for the transmission of diseases (ideas, technology, etc.) across social networks has predominantly relied on measures of centrality on a static base network or a temporally flattened graph of agent interactions. Various measures have been proposed as the best trackers of influence, such as degree centrality, betweenness, and k-shell, depending on the structure of the connectivity. We consider SIR and SIS propagation dynamics on a temporally-extruded network of observed interactions and measure the conditional marginal spread as the change in the magnitude of the infection given the removal of each agent at each time: its temporal knockout (TKO) score. We argue that the exhaustive approach of the TKO score makes it an effective benchmark measure for evaluating the accuracy of other, often more practical, measures of influence. We find that none of the common network measures applied to the induced flat graphs are accurate predictors of network propagation influence on the systems studied; however, temporal networks and the TKO measure provide the requisite targets for the hunt for effective predictive measures. keywords: networks, temporal webs, centrality, influence, immunization 1. Introduction There are two main strategies to identifying the key agents for disease/idea spread: (1) the discovery of "super-spreaders" (Kempe et al. 2005, Wang et al. 2010, Kimura et al. 2010, Chen et al. 2012, Saito et al. 2012) and (2) finding effective immunization/removal targets (Chen et al. 2008, Yu et al. 2010, Kuhlman et al. 2010). The difference is not the goal of the analysis; both approaches seek to ascertain the actual or potential influence of each node on the propagation of a property across the network by performing an isolated contingency analysis. The first approach is some version of variably seeding an infection and determining how well it spreads in each setup (Newman 2002, Newman et al. 2002, Dekker 2013). The second approach is some version of setting nodes as firewalls and measuring changes in how the property/idea/disease spreads with different firewalls (Chen et al. 2008). By toggling the status of any one node and examining the differences it generates one can ask, "How much of the propagation is this node responsible for?" Here we propose a knockout sensitivity analysis on temporally extruded networks that combines the spreading and 1Laboratory for Symbolic Cognitive Development, Riken Brain Science Institute 2Department of General Economics, Ghent University 3Department of Software and Information Systems, University of North Carolina at Charlotte 4Department of Physics and Astronomy, Ghent University 1 removal approaches for use as a benchmark test for evaluating the ability of network measures to capture or predict system influence. The dominant technique to assess individual influence is to take a set of agents and a network of potential interactions among them and simulate the propagation of a property using a variation of SI/SIR/SIS dynamics across the network to see how far and how fast it spreads. There are vari- ations in the (generated or empirical) network structure used, the number and placement of initial infections, the disease parameters, and with these there are variations in the identified best measure of influence (see Danon et al. (2011) for an extensive review on the possible variations). The most important lesson from these analyses is that different structures make different targets more effec- tive for immunization. For example, connectivity on some network structures is resilient to random node removals but sensitive to targeted removal of nodes with certain properties, such as high de- gree agents in scale-free networks (Albert et al. 2000, Callaway et al. 2000, Pastor-Satorras and Vespignani 2002). For other network structures, high degree is not the best measure of importance; betweenness, k-core, and other measures have been proposed as capturing key individuals in certain specific network structures and real-world datasets (Kitsak et al. 2010). In order to evaluate network measures' ability to track influence one must have an independent assessment of that influence -- the ground truth to be matched. A common way to measure this is to seed the initial infection at each node and measure the resulting spread, typically as cumulative cases for SIR. However, an individual's impact on the dynamics of propagation on complex networks is more nuanced than these simple propagation measures indicate. Even when a disease starts at node x, some later-infected node y may be more responsible for the scope of the spread. In actual disease propagation dynamics (Hufnagel et al. 2004, Brockmann and Helbing 2013) it is also possible that an agent being infected early reduces the eventual scope of the infection by altering the set of individuals that agent comes in contact with while infected. In light of these possibilities it is clear that one must analyze how the full dynamics unfold in order to correctly assess influence over those dynamics. To incorporate the temporal aspect into our influence analysis we capture the infection propagation in a temporally extruded network struc- ture called a "temporal web" -- a variant of temporal networks (Holme and Saramakid 2012, Holme 2015) in which the interactions extend across time creating a single acyclic digraph rather than layered networks (Bramson and Vandermarliere 2015, Michail 2015, Speidel et al. 2015). This tem- poral web provides a time-extruded version of cumulative cases that we call "magnitude" combining both the number of infected individuals and the length of their infections (Saito et al. 2012). To perform the isolated contingency analysis we propose a measure called "temporal knockout" (TKO) that combines the super-spreader and immunization approaches and also includes the timing of infections to more accurately measure each agent's influence/impact on the propagation. TKO is not an alternative network measure for approximating influence, but rather an all-things-considered empirical measurement of each agent's time-dependent potential to change propagation outcomes for use as a benchmark in evaluating network measures. First we explain the temporal web construction in more detail, then we describe the process to calculate the disease magnitude and temporal knockout score. Because the temporal knockout score calculation is computationally expensive, it is desirable to have a simpler proxy measure, or set of proxy measures, that accurately reflects agent influence. Toward this end we run a battery of experiments on small world and scale-free networks and evaluate the effectiveness of some standard flat/static network measures to capture influence using the TKO scores as a benchmark measure. Although the limited evaluation of network measures presented here is indicative of the need for improved ways to capture propagation influence, our focus here is the presentation of TKO as a standardized benchmark metric for performing such investigations. 2 2. Approach Our analysis proceeds through the following steps: (1) create collections of scale-free and small world base networks; (2) build temporal webs encapsulating a fixed set of potential interactions for each one; (3) simulate propagation dynamics across each temporal web for each agent of each network; (4) calculate the temporal knockout of each node in the temporal web; (5) generate the flattened network and analyze the flat networks using centrality measures; (6) examine the degree to which the flat network measures capture the agents influence as measured by TKO. 2.1 Network and Disease Parameters We simulate the spread of an infectious disease using an agent-based model realizing SIR and SIS dynamics. Our networks have 200 agents connected in either a small world or scale free network with 800 and 784 edges respectively.1 For each combination of network type and interaction prob- ability - 0.10, 0.15, and 0.20 -, we generate 25 instantiations (150 total). We note that the SIR and SIS versions of a given combination run on the same instantiations, thus using the same link activations at each time step2. There is one initially-infected agent per run and we perform a run of the model using each agent as the initial agent for each of the 25 instantiations of each network type. Each infectious agent has a probability to infect susceptible network neighbors and as already mentioned we run the full battery of simulations using probabilities 0.10, 0.15, and 0.20. In each period, the probability of infectious agents converting to recovered/susceptible (I→R and I→S for SIR and SIS models respectively) is 1/15. Each run lasts 200 periods; this is typically sufficient for SIR dynamics to run their course, and is used for SIS models for parsimony of analysis. 2.2 Building a Temporal Web We run our simulations using simultaneous updating so that each agents' state at t + 1 depends on their state at t and interactions initiated at t. When represented as an intertemporal network the interaction edges therefore run across time from agents at t to other agents at t + 1 in addition to "inheritance edges" from each agent at t to its t + 1 self (see Figure 1). We call this version of intertemporal networks a "temporal web" because it produces a single acyclic directed graph across time rather than connected layers. We first build the temporal web "skeleton" that includes all of the state changing and interaction probabilities which may be needed for any particular run. With non-adaptive interaction probabili- ties, who interacts with whom and when all become fixed for those runs. Therefore when we run the simulation using each agent as the initially infected agent, the overall dynamics are kept constant while we monitor the propagation so that the only difference is the initial agent. 1The small world base networks are undirected connected Watts-Strogatz networks where each agent is connected to k = 8 neighbors and the probability of rewiring is set to p = 0.025. The scale-free base networks are undirected Barabasi-Albert networks with m = 4 as the number of edges to attach from a new node to an existing one. The networks were generated using the implementation of the python package NetworkX Hagberg et al. (2008). 2In each iteration of the model, the probability that a given link is activated is −1 j(cid:80) k pij = −1 n k Ki with kj being the undirected degree of agent j, and the summation in the denominator is over each network neighbor (n) of node i (written Ki). 3 Figure 1: A simplified example of building a "temporal web" style intertemporal network from state-change and interaction data for an SIR model. This procedure differs from temporally layered networks in that the interaction edges are cross-temporal to capture simultaneous updating in the generated data, thus creating a single acyclic directed graph across time. 2.3 Disease Magnitude The temporal structure facilitates a variety of new measures, which are defined and explored else- where (Nicosia et al. 2013, Pfitzner et al. 2013, Bramson and Vandermarliere 2015). Specifically for epidemiology it becomes natural to switch to a temporally extended refinement of the standard cumulative cases measure. Rather than (or in addition to) reporting the number of agents that are ever infected, the disease magnitude is calculated as the number of agent-times (i.e., nodes in the temporal web) that are in the infectious (or exposed) state. It is equivalent to the cumulative sum of the number of infectious agents across iterations (Saito et al. 2012). This measure better captures disease morbidity because it accounts for both the number of infections and how long the infections persist -- a large number of very short infections could be considered preferable to a few persistent long-term infections. Depending on the application, the node count or a normalized version may be preferable -- the number of nodes is the same for all of our experiments described below, so we use the "raw magnitude." 2.4 Calculating the Temporal Knockout Scores Temporal knockout (TKO) measures influence by aggregating two levels of contingency. First we select an agent from the population to be initially infected and run the disease model while capturing each agent's state and interactions at each iteration in a temporal web. The resulting collection of infectious nodes (agent-times) embodies the magnitude of the illness contingent on that agent being the initially infected one. Then for each node in the temporal web we perform a knockout analysis: remove that node and run the same infection dynamics and measure the difference in the disease magnitude. Thus for each node we capture the change in disease magnitude contingent upon that agent being removed at that time, contingent upon that particular initially infected agent. The initially infected agent at the t0 iteration will have a marginal infection effect equaling the whole magnitude. Note that removing a noninfectious node at t0 still prevents it from being infected later, which affects the marginal infection score of that agent at t0; however, the pre-infection time nodes for an agent will have the same TKO as the first infected time node; thus the calculation can be performed on just the infected subset and backtracked to earlier times. Perhaps counter-intuitively this effect can be negative; i.e., it is possible to remove an agent from the system at a particular time 4 and have the overall disease spread increase. This can happen when agents that are infected by the knocked out agent would normally have quickly lead to dead ends, but when instead infected later by other agents they spread the disease to many more others. We perform this knockout analysis for every node in the temporal web to get the marginal infection score conditional on that initial agent. We repeat this process using each of the agents as the initially infected agent and set each node's TKO score as the average marginal infection score across those runs. Thus we have the conditional marginal infection spread for each agent at each time step for all possible single-agent disease carrier initial conditions. This algorithm therefore captures the potential for each agent at each period to influence the spread of the disease. Because TKO is an overt counting of infected agent-times given the contingent hypothetical- empirical results instead of a summary measure we believe that it stands as a reliable benchmark for the influence of each agent (in networked epidemiological systems). Also note that TKO's hypothetical-empirical approach means that the change in total infection after a knockout of agent Ai at any time tτ cannot be calculated except through the resimulation of the infection dynamics across the rest of the temporal web. Because of this TKO is thoroughly descriptive, but it is not predictive. 2.5 Base and Flattened Graphs In order to predict which agents are most likely to facilitate diffusion, we wish to compare the TKO identification with measures on flat, non-temporal networks. Specifically we would like to know how well each of various centrality measures does in capturing each agent's network influ- ence as benchmarked by TKO. Two versions of flat graphs are relevant here: (1) the base potential interaction network from which the actual interactions were probabilistically generated and (2) the flattened empirically observed interactions. Our results for the base network and weighted and un- weighted flattened networks are nearly identical, so we focus on the base network here and leave the flattened network for the supplementary materials. We have twenty-five distinct base networks for each scenario (although each SIR and SIS pair use the same networks) and for every node in each one we calculate the following centrality measures: k-core, degree, closeness, betweenness, eigenvector, and Katz centralities. 3. Results The infection dynamics in our model match other models with similar network structures and dis- ease parameters (Rahmandad and Sterman 2008, Danon et al. 2011). We briefly summarize the contagion results in order to provide context for the centrality measures and to facilitate compar- isons to other models. For our SIR models the cumulative cases and magnitude measures are nearly perfectly correlated (0.99458) because the fixed 1/15 probability of I→R transitions implies a uni- form expected/average infection duration time of 15 iterations. For SIS models reinfection can multiply an agent's contribution to magnitude but still only be counted once by the number of cu- mulative cases, so the correlation is reduced (0.93595), but is still high due to the relatively short time horizon for our SIS simulations (200-iterations). As seen in Table 4 both network types show high variation in magnitude depending on the initial agent; however, when aggregated across the 25 implementations of each network type they reveal similar magnitude profiles (see supplementary material for details). For ease of reading we present the raw (non-normalized) magnitude scores (i.e., the number of infectious nodes in the temporal web). As you can see in figure 3 there are a large number of runs in which the disease never catches 5 on (what we call "duds") and although these outcomes drag the mean magnitude down and raise the variance, for our purposes there is no benefit in separating out the duds and, for example, testing the remaining infections for matches to known distributions. Infection Type Network Type Infection Probability Mean Magnitude Magnitude StDev Percent Duds SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS Scale Free Scale Free Scale Free Small World Small World Small World Scale Free Scale Free Scale Free Small World Small World Small World 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 143.352 584.744 1296.44 88.9266 227.321 445.033 548.746 5003.03 10800.6 308.734 2526.97 7036.79 288.549 774.628 1142.24 131.743 324.207 559.017 1155.19 5237.44 8150.76 536.106 2839.26 5623.18 0.625 0.482 0.380 0.584 0.457 0.352 0.593 0.445 0.344 0.557 0.433 0.333 Table 1: Results summary of infection spread for each model variation. Each row aggregates 5000 runs (one run initialized at each of 200 agents for each of the 25 base network implementations). Duds are defined as runs in which the raw magnitude is fewer than 50 agent-times. 3.1 TKO vs Magnitude Correlations Results We first compare the TKO score of each agent to the initial-agent resulting magnitude in order to evaluate whether this standard measure of influence effectively captures a node's ability to spread disease. The TKO algorithm accounts for the idiosyncrasies of the agent interactions across time, but as a result it assigns scores across time as well. In order to compare TKO node scores to initial- agent-spread scores we first need to aggregate them to the individual agents. For each node we determine two versions of TKO: (1) the proportional change in the number of infectious nodes and (2) the change in the fraction of nodes that become infectious. The proportional change of node i is calculated as the number of agents that are infected when node i has been removed divided by the number of nodes that were originally infected, and then that subtracted from one so that a value of one means that no nodes become infected if this one is removed. Alternatively the delta fraction is the fraction of infected nodes in the original run minus the fraction of nodes that become infected when node i is removed. For both versions negative values occur when more nodes become infected contingent upon i's removal compared to the original run. An agent that was never infected will have a TKO value of zero for all its temporal nodes. For each of these temporal node-based measures we aggregate them to agents by considering both the maximum value an agent achieves across time and its average TKO score across time. The Pearson correlations for agent TKO scores and magnitude appear in Table 2; in the most correlated scenario (SIR smallworld 0.10 infection rate) the best match is to maximum TKO with a correlation coefficient just under 0.50 (marked with *). Although we initially believed that the Spearman rank correlations would be higher, they are actually very similar and not consistently better or worse (a table of Spearman correlations appears in the Supplementary Materials). For example, the best-case scenario for the Spearman correlation is the same, with a Spearman rho value of 0.51658. For both types of correlation the performance drops dramatically as the disease magnitude increases (via higher infection rates), indicating that the large proportion of runs with 6 almost no spread ("duds") are trivially improving the correlations and overstating the ability of agent-initiated magnitude to measure propagation impact. Disease Type Network Type InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.402831 0.0674457 0.0457449 0.494424∗ 0.043098 0.0297556 0.346553 0.0566606 0.0446214 0.404204 0.0240389 0.0502245 0.404905 0.246309 0.219299 0.471569 0.264589 0.19209 0.375933 0.247974 0.233998 0.417726 0.201376 0.190489 0.288126 0.0644679 0.0781154 0.366466 0.0770296 0.0154106 0.268197 0.0838702 0.0585834 0.353329 0.0452133 0.0420603 0.292081 0.157114 0.158489 0.363984 0.188738 0.118696 0.282026 0.153358 0.107849 0.370916 0.149954 0.10682 Table 2: The mean Pearson correlations coefficients across the 25 network instantiations of the disease magnitude given an agent is the initially infected agents and the TKO scores for that agent. The low correlations imply that using the disease spread based on initial infection is a poor measure of influence. The poor correlations between TKO and agent-initiated magnitude have multiple explanations. To understand the relationship better we present a few select plots of the agent TKO scores across time in Figure 2. These plots present the change in magnitude resulting from removing each in- fectious agent at each time averaged across the 200 runs initialized with each agent being infected. So a value of m means that on average removing this agent at this time decreases morbidity by m agent-times. As we saw, there are many dud runs in which the disease doesn't spread beyond a few initial agents; such cases bring down the average values. A TKO score of twenty might mean 500 saved agent-times in one run and none in the others, or 50 in ten runs, etc. So TKO scores can be small if the disease tends not to spread much because no agent at no time will be a key player in the localized infections. On the other hand, when the infection rate is 0.20 the disease spreads to many more agents across time, enough that no single agent could be responsible for the scale of the infection across multiple initializations. There are just too many infection paths for any one agent to be a key player on enough of them to have a high knockout effect. Up to this point we have argued that temporal magnitude is more accurate than cumulative cases as a measure of disease morbidity because it accounts for variations in the length of infection and also reinfection. A network measure's ability to capture an agent's influence on disease is standardly compared to the eventual spread of the disease contingent upon it starting at that agent, but our analysis of correlations with TKO shows that this standard measure of impact itself fails to capture how much disease spread that agent is responsible for because it lacks sensitivity to the structure of the interactions across time. From these results we tentatively conclude that TKO stands as the best measure of an agent's influence on network propagation. We now turn to testing the ability of static network measures to identify a system's high-impact agents. 3.2 Predicting Temporal Knockout from the Static Interaction Network The temporally extruded network structure captures the system dynamics in a way that facilitates contingency analyses, however one must already have the data across time to measure those prop- erties, including TKO. For predictive purposes we would like to know if there is some property of 7 Figure 2: Plot of TKO scores across time for SIR dynamics and a scalefree network. These examples shows that the most influential agent-times often do not occur during the initial phases of a disease, but can indicate bottlenecks in the spread of the disease. This also shows the appearance of negative TKO agents, the removal of which actually increases the morbidity of the disease. the known interaction structure that can identify key players (Yu et al. 2010). Although temporal networks are gaining popularity (see (Holme 2015) for a review), most network analysis is still per- formed on flat networks because there are already measures available with known interpretations. The question here is whether any flat graph property can accurately predict the conditional marginal infection as measured by agent-aggregated temporal knockout. We ran the three comparisons between the four aggregated TKO measures five network central- ity measures. Both Pearson and Spearman correlations were calculated. Furthermore, because the standard network centrality measures only purport to capture the highest value agents properly; i.e., rather than a claim to assigning accurate values to all nodes we also compared the overlap between the ten agents (5%) with the top TKO scores with the ten agents with the top centrality scores Kitsak et al. (2010). We compared the maximum proportional and maximum delta fraction TKO as well as the average proportional and average delta fraction TKOs with degree, closeness, betweenness, eigenvector, and Katz centrality (k-core values were too undifferentiated on our base networks to be meaningful). The full output of the analysis appears in the Supplementary Materials. Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.12721 0.12514 0.13992 −0.00492 0.04866 0.06674 0.13528 0.16164 0.23309 0.02536 0.06834 0.12315 Closeness Betweenness Eigenvector 0.10583 0.09557 0.11872 0.03076 0.07044 0.12695 0.08851 0.09822 0.16747 0.0545 0.10208 0.17406 Katz 0.09757 0.07997 0.0977 0.08398 0.11485 0.10137 −0.00766 −0.01483 0.06403 0.08047 0.05665 0.02619 0.06804 0.09088 0.10646 0.08486 0.16756 0.13834 −0.0126 0.0042 0.05613 0.02545 0.0522 0.12552 0.09908 0.10187 0.11503 0.01898 0.08208 0.10153 0.11109 0.127 0.19103 0.01982 0.11029 0.24128∗ Table 3: The Pearson correlations between the mean proportional TKO score with each of five base network agent centrality scores. Other results tables appear in the Supplementary Materials. 8 We find that neither the Pearson or the Spearman correlations are systematically higher, nor is any one of the network measures consistently better than all the others (although eigenvector and Katz centrality are consistently worse). Although the correlations are typically positive, the correlation coefficients and Spearman Rhos are almost entirely below 0.20. Differences between the proportional and delta fraction TKOs are small (as expected), but not negligible; delta fractional correlations tend to be better but not in every case. Similarly, the correlations with mean TKO tend to be slightly higher than maximum TKO, but the differences are small and inconsistent. For the top ten overlap comparison we find that the centrality measures only rarely manage to find one of the top ten TKO agents; eigenvector and Katz centrality never do. There are other patterns in the results that may offer clues to where to look for improved net- work measures. For example, for each disease type, each network type, and each TKO version the correlations of all measures tend to be higher with larger infection rates. Unsurprisingly, degree centrality typically performs better on the scalefree networks than the small world networks. How- ever, any such pattern may be spurious because the correlation values are too low and similar for our sample size to provide adequate power. In summary, the result is that none of the five centrality measures on the flat interaction network can predict which agents have the greatest influence on spreading a disease. 4. Conclusions In this paper we have argued that using temporal networks to capture disease spread has the benefits of incorporating the details of the interaction timing which is necessary for judging each agent's level of influence/impact on the spread. The number of infectious agent-time nodes, a measure we call magnitude, is a superior to cumulative cases because it captures both the length of infections and reinfection. However, adapting the standard measures of influence -- eventual spread contin- gent upon the starting agent or blocked spread contingent upon removing the agent -- to magnitude is insufficient to properly capture an agent's overall level of influence. Although eliminating the initial agent is a sure-fire way to stop the spread, that is not informative for deciding whom to re- move before the disease starts. What is needed is the change in the spread of disease contingent upon each agent being removed generalized over all possible initial agents. But the degree of in- fluence is also dependent on when the agent is removed because the interaction dynamics of these systems are complex: removing an agent early can increase the eventual spread. We present the temporal knockout measure to capture all these contingencies and provide a general benchmark for propagation influence. One key insight from this study is that an agent's influence depends on how the dynamics unfold through time, which cannot be accurately predicted by historic interaction data or known communi- cation channels. Nascent measures on temporal network structure (i.e., ones that operate on the full temporal web) can accurately track the TKO property with considerably less computational time, but they still require knowing the complete interaction structure over time ?. Thus, they work as effective proxy measures, but are not viable predictor measures. Although we do not have improved static network measures to offer at this stage, we believe that having a proper benchmark for such measures provides the foundation necessary for developing them. For most realistic health applications, by the time an intervention occurs there are already several infectious individuals, and for this reason there is interest in measures/strategies for scenarios with multiple initially infected agents (Danon et al. 2011). The problem is in the combinatorics; e.g., instead of 200 runs per network, with two initial agents it becomes(cid:0)200 just three initial agents it becomes 1,313,400 runs. Because TKO generalizes marginal conditional (cid:1) = 19, 900 runs -- for 2 9 spread of every agent-time across all initially infected agents, the TKOs scores can be combined post hoc without needing to rerun the simulations. So, although the TKO algorithm is computationally intense compared to the single initial agent runs, There would be considerable time savings when compared to testing every combination of initially infected agents. As noted by Kitsak et al. (2010), when using cumulative cases to capture the influence of partic- ular agents it makes sense to keep the infection probabilities small enough that the disease typically will not spread to the whole population -- otherwise the role of any single individual will be difficult to discern. TKO does not suffer from this limitation because the disease magnitude measure also detects delays in infection even if the whole population does eventually get infected. Again, the timing of the interactions is important, so in addition to facilitating a reduction in morbidity, TKO is useful for developing adaptive intervention strategies. Recent papers have introduced new measures with claims of increased accuracy (at least in cer- tain contexts). However, those accuracy claims are based on how well their own measure matched their own chosen metric on their own chosen network and spread parameters. We propose that TKO, in its exhaustive marginal contingent effect calculation, can act as a benchmark metric against which the performance of proposed measures can be judged -- essentially establishing a ground truth for the influence of each agent (at each time) in a network. We acknowledge that the version of temporal knockout presented here is not the only option for benchmarking epidemiological network studies. One direction to look for further improvement is increasing the refinement of the measures through, for example, another layer of contingency. Another direction is to expand the breadth of the simulations to more closely approach an exhaustive analysis of interaction possibilities. We visit these ideas in follow-up research to establish shared benchmarks for evaluating measures of network influence on a variety of standardized networks similar to how Zachary's Karate Club has been used to test community detection methods. Before such benchmark networks can be established, we as a community must agree on what counts as a measure of influence. We propose that temporal knock out may fill that role, and at the very least is a useful step in the right direction. Acknowledgements We would like to thank Koen Schoors for making this collaboration possible. This work is supported by the Research Foundation Flanders (FWO-Flanders). References R´eka Albert, Hawoong Jeong, and Albert-L´aszl´o Barab´asi. Error and attack tolerance of complex networks. Nature, 406:378 -- 382, 2000. Aaron Bramson and Benjamin Vandermarliere. Dynamical properties of interaction data. Journal of Complex Networks, page cnv009, 2015. Dirk Brockmann and Dirk Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337 -- 1342, 2013. Duncan S. Callaway, M. E. J. Newman, Steven H. Strogatz, and Duncan J. Watts. Network robust- ness and fragility: Percolation on random graphs. Physical Review Letters, 85, 25:5468 -- 5471, 2000. 10 Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and Tao Zhou. Identifying influential nodes in complex networks. Physica a: Statistical mechanics and its applications, 391(4):1777 -- 1787, 2012. Yiping Chen, Gerald Paul, Shlomo Havlin, Fredrik Liljeros, and H Eugene Stanley. Finding a better immunization strategy. Physical review letters, 101(5):058701, 2008. Leon Danon, Ashley P Ford, Thomas House, Chris P Jewell, Matt J Keeling, Gareth O Roberts, Joshua V Ross, and Matthew C Vernon. Networks and the epidemiology of infectious disease. Interdisciplinary perspectives on infectious diseases, 2011, 2011. A H Dekker. Network centrality and super-spreaders in infectious disease epidemiology. In 20th International Congress on Modelling and Simulation (MODSIM2013), 2013. Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dynamics, and function using NetworkX. In Proceedings of the 7th Python in Science Conference (SciPy2008), pages 11 -- 15, Pasadena, CA USA, August 2008. Petter Holme. Modern temporal network theory: a colloquium. The European Physical Journal B, 88(9):1 -- 30, 2015. Petter Holme and Jari Saramakid. Temporal networks. Physics Reports, 519(3):97 -- 125, 2012. Lars Hufnagel, Dirk Brockmann, and Theo Geisel. Forecast and control of epidemics in a globalized world. Proceedings of the National Academy of Sciences of the United States of America, 101 (42):15124 -- 15129, 2004. David Kempe, Jon Kleinberg, and ´Eva Tardos. Influential nodes in a diffusion model for social networks. In Automata, languages and programming, pages 1127 -- 1138. Springer, 2005. Masahiro Kimura, Kazumi Saito, Ryohei Nakano, and Hiroshi Motoda. Extracting influential nodes on a social network for information diffusion. Data Mining and Knowledge Discovery, 20(1):70 -- 97, 2010. Maksim Kitsak, Lazaros K. Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H. Eugene Stan- ley, and Hern´an A. Makse. Identification of influential spreaders in complex networks. Nature Physics, 6:888 -- 893, 2010. Chris J Kuhlman, VS Anil Kumar, Madhav V Marathe, SS Ravi, and Daniel J Rosenkrantz. Finding In Machine critical nodes for inhibiting diffusion of complex contagions in social networks. Learning and Knowledge Discovery in Databases, pages 111 -- 127. Springer, 2010. Othon Michail. An introduction to temporal graphs: An algorithmic perspective. In Algorithms, Probability, Networks, and Games, pages 308 -- 343. Springer, 2015. Mark EJ Newman. Spread of epidemic disease on networks. Physical review E, 66(1):016128, 2002. Mark EJ Newman, Stephanie Forrest, and Justin Balthrop. Email networks and the spread of com- puter viruses. Physical Review E, 66(3):035101, 2002. Vincenzo Nicosia, John Tang, Cecilia Mascolo, Mirco Musolesi, Giovanni Russo, and Vito Latora. Graph metrics for temporal networks. arXiv:1306.0493 [physics.soc-ph], 1306, 2013. 11 R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65: 036104, 2002. Ren´e Pfitzner, Ingo Scholtes, Antonios Garas, Claudio J. Tessone, and Frank Schweitzerk. Between- ness preference: Quantifying correlations in the topological dynamics of temporal networks. Physical Review Letters, 110:198701 1 -- 5, 2013. Hazhir Rahmandad and John Sterman. Heterogeneity and network structure in the dynamics of diffusion: Comparing agent-based and differential equation models. Management Science, 54 (5):998 -- 1014, May 2008. Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. Efficient discovery of in- fluential nodes for sis models in social networks. Knowledge and information systems, 30(3): 613 -- 635, 2012. Leo Speidel, Taro Takaguchi, and Naoki Masuda. Community detection in directed acyclic graphs. The European Physical Journal B, 88(8):1 -- 10, 2015. Yu Wang, Gao Cong, Guojie Song, and Kunqing Xie. Community-based greedy algorithm for min- ing top-k influential nodes in mobile social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1039 -- 1048. ACM, 2010. Yintao Yu, Tanya Y Berger-Wolf, Jared Saia, et al. Finding spread blockers in dynamic networks. In Advances in Social Network Mining and Analysis, pages 55 -- 76. Springer, 2010. 12 Supplementary Material Model Scenarios and Infection Sizes: Includes a 3D histogram with a row for each scenario showing the frequency of infections of each size. We also have a set of twelve 3D histograms (one for each scenario) with a row for each of the 25 skeletons showing the disease variation resulting from network structure; however, in consideration of space and the real focus of this paper they are excluded (available upon request). We also provide a table of the mean and standard deviations of the raw magnitudes for each scenario. When excluding the duds the distributions approximate normal distributions, but the large numbers of duds make the normal approximation inappropriate and it is not the case that the disease results follow any single distribution with the mean and stan- dard deviations in the table. The mean and standard deviation do, however, capture the relative all-things-considered expected infection sizes for each scenario. Correlations between Agent-Initialized Magnitude and TKO Measures: The Pearson and Spearman correlation coefficients between (a) the disease magnitude reached when agent i is the initial agent and (b) four different versions of the TKO aggregated across time for agent i. The correlations are performed separately for each scenario between the lists of values for all 200 agents combined across all 25 network skeletons. With the highest scores near 0.50 and most much lower, the result is that measuring an agent's impact using the super-spreader approach alone is not accu- rate in capturing an agent's actual influence compared to TKO. Comparisons of Network Measures to TKO scores: This section starts with one page of further methodological description, especially about the flattened observed interaction dynamics networks. Following that are eight pages of table triplets each showing the Pearson, Spearman, and Top Ten comparisons between each of five common network centrality measures. Each of the four TKO variation has it's one page of tables for both the base and the flattened networks. Because the base and unweighted flattened networks are nearly identical, so are the correlations. The weighted versions of the flattened measure are excluded in consideration of the space to describe them in light of the result that they also do not significantly covary with any TKO measures. 13 Model Scenarios and Infection Sizes Figure 3: Results histogram of infection spread in terms of the number of temporal nodes infected (raw magnitude) across 5000 runs for each scenario (one run initialized at each of 200 agents for each of the 25 base network implementations). Notice that a very large proportion of runs are "duds" in which the infection fails to spread beyond 50 temporal nodes. The SIS models naturally have greater magnitude values due to reinfection. These dynamics are typical of SIR and SIS models with similar parameters. Infection Type Network Type Infection Probability Mean Magnitude Magnitude StDev Percent Duds SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS Scale Free Scale Free Scale Free Small World Small World Small World Scale Free Scale Free Scale Free Small World Small World Small World 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 143.352 584.744 1296.44 88.9266 227.321 445.033 548.746 5003.03 10800.6 308.734 2526.97 7036.79 288.549 774.628 1142.24 131.743 324.207 559.017 1155.19 5237.44 8150.76 536.106 2839.26 5623.18 0.625 0.482 0.380 0.584 0.457 0.352 0.593 0.445 0.344 0.557 0.433 0.333 Table 4: Results summary of infection spread for each model variation. Each row aggregates 5000 runs (one run initialized at each of 200 agents for each of the 25 base network implementations). Duds are defined as runs in which the raw magnitude is fewer than 50 agent-times. 14 Correlations between Agent-Initialized Magnitude and TKO Measures Disease Type Network Type InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction Pearson Correlations of Agent-Initialized Magnitude and TKO Measures. SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.402831 0.0674457 0.0457449 0.494424∗ 0.043098 0.0297556 0.346553 0.0566606 0.0446214 0.404204 0.0240389 0.0502245 0.404905 0.246309 0.219299 0.471569 0.264589 0.19209 0.375933 0.247974 0.233998 0.417726 0.201376 0.190489 0.288126 0.0644679 0.0781154 0.366466 0.0770296 0.0154106 0.268197 0.0838702 0.0585834 0.353329 0.0452133 0.0420603 0.292081 0.157114 0.158489 0.363984 0.188738 0.118696 0.282026 0.153358 0.107849 0.370916 0.149954 0.10682 Table 5: The mean Pearson correlations coefficients of (a) the disease magnitude given an agent is the initially infected agent and (b) the TKO score for that agent. The on-average low correlations imply that using the disease spread based on initial infection is a poor measure of influence. Further- more, the correlations are nearly always worse with increasing infection rates (and hence increasing magnitudes and fewer dud runs) implying that much of the ability to match TKO relies on the cases in which both scores are near zero. Disease Type Network Type InfectionRate MaxProportion MaxDeltaFraction AveProportion AveDeltaFraction Spearman Correlations of Agent-Initialized Magnitude and TKO Measures. SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.40153 0.0630928 0.0277719 0.516584∗ 0.0671833 0.0375412 0.296555 0.0487628 0.0370982 0.335403 0.0256655 0.0449195 0.305474 0.221007 0.203116 0.420064 0.292652 0.222854 0.252962 0.198384 0.184936 0.280811 0.190925 0.187943 0.388263 0.105923 0.0667476 0.461123 0.149355 0.0577158 0.277245 0.0806729 0.027529 0.29627 0.0797812 0.0447358 0.308888 0.193733 0.168757 0.404163 0.270376 0.171541 0.235637 0.13593 0.069931 0.255873 0.160578 0.11443 Table 6: The mean Spearman Rank correlation coefficients (rho) of (a) the disease magnitude given an agent is the initially infected agent and (b) the TKO score for that agent. The correlations reveal similar values and a similar pattern to the Pearson correlations, reinforcing that using the disease spread based on initial infection is a poor measure of influence. 15 Comparisons of Network Measures to TKO scores The following twelve sets of three data tables present the results of determining how well common network centrality measures capture agent influence. Although the main result is that none of the network measures successfully capture/predict agent influence as measured by four versions of TKO in any scenario, the specific changes in the data reveal patterns -- and those patterns may point to improved measures. Although the paper focuses on the base network analysis, we also analyzed the network gener- ated by flattening the observed interactions. We record who interacts with whom over time in the temporal network skeleton, then we flatten this skeleton to achieve both a weighted by interaction frequency and an unweighted flat network representation. If the model runs long enough the ob- served interactions converge to the base network of potential interactions, but in many applications the flattened network is observable/derivable from data while the base network is unknown and/or theoretical. In our simulations, because the probability that a given link is active in a time step is ∝ 1/k, k is low (typically single digit except a few agents in the scale free networks), and there are 200 time steps, the base and unweighted flattened graphs are nearly identical. Because for each base network we generate the skeleton including all transition and interaction probabilities, the empirically derived flattened network connections are always the same for each run of the same skeleton (i.e., starting from each agent). In the current model the infection state does not alter the interaction probability. If it did, then the observed transitions would vary from run to run even using the same network skeleton because what is stored in the skeleton is a set of draws from probability distributions rather than a fixed interaction structure. If, for example, being infectious reduced the probability of interaction, then the probability stored in the skeleton would be compared to a different interaction threshold and thus could alter which interactions occur. However, using the same skeletons for multiple runs of different dynamics on the same structure at least satisfies the Markov condition for these simulations, which is not maintained when running the dynamics independently for each initial agent run. Flattened graphs are potentially better at tracking influence because they allow one to create weighted networks from the observed interaction frequencies. However, in our experiments the correlation valued between TKO and the weighted network centrality measures were no better, although they were slightly different. For this reason and considerations of space we have excluded them from this paper. 16 Maximum TKO and Base Interaction Network Pearson Correlations of Centrality Measures and Maximum TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.12254 0.1475 0.14354 0.00727 0.05936 0.08282 0.13835 0.11807 0.09523 0.02154 0.0637 0.11755 Closeness Betweenness Eigenvector 0.09622 0.11315 0.11432 0.0654 0.0854 0.17901 0.09571 0.08243 0.07743 0.07993 0.11582 0.13727 Katz 0.08855 0.06909 0.11531 0.09876 0.11355 0.09922 0.00047 −0.0051 0.0749 0.08465 0.07405 0.03241 0.07816 0.09935 0.0866 0.07341 0.07262 0.06029 −0.01334 0.00489 0.05537 0.02679 0.06551 0.13365 0.09557 0.127 0.11925 0.03754 0.11007 0.1399 0.11868 0.09698 0.07644 0.03546 0.11384 0.22958 Spearman Correlations of Centrality Measures and Maximum TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.19228 0.19853 0.21217 0.01237 0.05613 0.08772 0.18963 0.18795 0.19385 0.01626 0.08308 0.11411 Closeness Betweenness Eigenvector 0.10423 0.10738 0.12175 0.02756 0.09342 0.17172 0.0922 0.08439 0.08551 0.04382 0.15921 0.16911 Katz 0.09346 0.06062 0.10471 0.07401 0.11573 0.08827 0.03103 0.01127 0.06225 0.04637 0.07409 0.08572 0.08388 0.0518 0.08274 0.05498 0.08034 0.04848 −0.00418 −0.00617 0.05083 0.03365 0.13965 0.09623 0.18884 0.17779 0.20802 0.03768 0.09055 0.10234 0.18953 0.17362 0.19045 0.02805 0.14567 0.20342 Top Ten Overlap of Centrality Measures and Maximum TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.004 0.004 0.008 0. 0.004 0.004 0.008 0. 0.008 0. 0.016 0.02 Closeness Betweenness Eigenvector 0.012 0.008 0.004 0.008 0.004 0.004 0.012 0.004 0.012 0.008 0.004 0.008 0.008 0.004 0.016 0.004 0.02 0.008 0.012 0. 0.004 0.012 0.012 0.028 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 7: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the maximum proportional TKO score with each of five base network agent centrality scores. 17 Maximum TKO and Flattened Interaction Network - Unweighted Pearson Correlations of Unweighted Centrality Measures and Maximum TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.12308 0.14731 0.14399 0.00727 0.05936 0.08282 0.13867 0.11804 0.09568 0.02154 0.0637 0.11755 Closeness Betweenness Eigenvector 0.09402 0.11036 0.11477 0.0654 0.0854 0.17901 0.09368 0.07891 0.07786 0.07993 0.11582 0.13727 Katz −0.01539 0.071 0.05439 0.01392 0.03457 0.00323 −0.03346 −0.0077 0.04161 −0.00132 −0.02131 0.01624 0.00385 0.07499 0.06998 0.02266 0.02772 0.01391 −0.00236 −0.00627 0.01076 0.00063 −0.03648 0.02426 0.09698 0.1275 0.12008 0.03754 0.11007 0.1399 0.11945 0.09743 0.07724 0.03546 0.11384 0.22958 Spearman Correlations of Unweighted Centrality Measures and Maximum TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.19227 0.19851 0.2122 0.01237 0.05613 0.08772 0.18963 0.1879 0.19386 0.01626 0.08308 0.11411 Closeness Betweenness Eigenvector 0.10395 0.10683 0.12236 0.02756 0.09342 0.17172 0.09154 0.08214 0.08589 0.04382 0.15921 0.16911 Katz 0.06804 −0.01847 0.02382 0.06697 0.03882 0.00276 −0.05264 −0.00279 0.05751 −0.00228 0.01547 0.02494 0.05854 −0.00145 0.06379 0.03914 0.02634 0.01455 −0.01907 −0.01421 0.00706 0.04287 −0.0002 0.0116 0.18916 0.18072 0.20727 0.03768 0.09055 0.10234 0.19067 0.17613 0.18989 0.02805 0.14567 0.20342 Top Ten Overlap of Unweighted Centrality Measures and Maximum TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.004 0. 0.008 0. 0.004 0.004 0.008 0.004 0.008 0. 0.016 0.02 Closeness Betweenness Eigenvector 0.004 0.008 0. 0.008 0.004 0.004 0.016 0.004 0.012 0.008 0.004 0.008 0.004 0.012 0.016 0.004 0.02 0.008 0.012 0. 0.004 0.012 0.012 0.028 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 8: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the maximum proportional TKO score with each of five flattened observed interaction network agent centrality scores. 18 Maximum Delta Fraction TKO and Base Interaction Network Disease Type Network Type InfectionRate Pearson Correlations of Centrality Measures and Maximum Delta TKO on Base Network Closeness Betweenness Eigenvector 0.08344 0.13195 0.12103 0.08652 0.1837 0.20727 0.08506 0.10067 0.08954 0.11559 0.23611 0.20109 Katz 0.07491 0.05781 0.13926 0.12469 0.1196 0.10376 −0.00663 −0.00979 0.09028 0.07832 0.10154 0.04081 0.0728 0.08919 0.1063 0.09209 0.08694 0.07255 −0.00982 0.00079 0.07326 0.04475 0.07395 0.15273 scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld Degree 0.10286 0.16692 0.15331 0.00478 0.08566 0.11087 0.11816 0.13843 0.11433 0.01778 0.08102 0.14115 0.08 0.15128 0.12757 0.04694 0.14683 0.16839 0.10179 0.11605 0.09371 0.04528 0.15822 0.26869 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS Disease Type Network Type InfectionRate Spearman Correlations of Centrality Measures and Maximum Delta TKO on Base Network Closeness Betweenness Eigenvector 0.10484 0.12246 0.13404 0.05484 0.17675 0.24107 0.08878 0.09828 0.09769 0.07497 0.26058 0.23591 Katz 0.09269 0.05831 0.11981 0.08953 0.1246 0.09275 0.0346 0.00932 0.07697 0.06284 0.07399 0.08672 0.07923 0.04705 0.0964 0.06375 0.08987 0.05166 −0.01973 −0.0145 0.06764 0.05387 0.14568 0.09482 scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld Degree 0.19207 0.22213 0.23221 0.01617 0.06147 0.09899 0.18397 0.22487 0.22593 0.01798 0.08985 0.13121 0.19034 0.21438 0.2258 0.0493 0.09661 0.14145 0.18672 0.21779 0.22199 0.04538 0.16032 0.23906 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Top Ten Overlap of Centrality Measures and Maximum Delta TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.008 0.016 0.004 0.004 0.02 0.004 0.016 0.008 0.008 0.008 0.008 0.028 Closeness Betweenness Eigenvector 0.012 0.004 0.004 0.008 0.008 0.008 0.004 0.004 0.016 0.016 0.004 0.012 0.008 0.016 0.012 0.004 0.024 0.02 0.016 0.004 0.008 0.016 0.024 0.024 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 9: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the maximum change in fractional TKO score with each of five base network agent centrality scores. 19 Maximum Delta Fraction TKO and Flattened Interaction Network - Unweighted Pearson Correlations of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.10322 0.16637 0.15391 0.00478 0.08566 0.11087 0.1181 0.13813 0.11505 0.01778 0.08102 0.14115 Closeness Betweenness Eigenvector 0.08126 0.12859 0.12173 0.08652 0.1837 0.20727 0.08238 0.09611 0.09018 0.11559 0.23611 0.20109 Katz −0.00984 0.0504 0.06161 0.02626 0.04181 0.00983 −0.03715 −0.00275 0.00211 0.07864 −0.0042 −0.00451 0.00915 0.06581 0.08351 0.02489 0.03574 0.01906 −0.01955 0.00412 0.01473 0.03885 −0.04363 0.01438 0.08119 0.15112 0.12867 0.04694 0.14683 0.16839 0.102 0.11633 0.09494 0.04528 0.15822 0.26869 Disease Type Network Type InfectionRate Spearman Correlations of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network Katz 0.06511 −0.02302 0.01792 0.07393 0.00736 0.05252 −0.05967 0.00591 0.00537 0.11312 0.02893 0.0099 0.00408 0.05192 0.0759 0.03789 0.04268 0.02456 −0.01514 −0.01234 0.10784 0.0099 0.00745 −0.01646 Closeness Betweenness Eigenvector 0.10443 0.12175 0.13514 0.05484 0.17675 0.24107 0.08785 0.09573 0.09808 0.07497 0.26058 0.23591 scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld Degree 0.19206 0.22211 0.23223 0.01617 0.06147 0.09899 0.18396 0.22485 0.22593 0.01798 0.08985 0.13121 0.19097 0.21708 0.22504 0.0493 0.09661 0.14145 0.18809 0.22064 0.22135 0.04538 0.16032 0.23906 SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Top Ten Overlap of Unweighted Centrality Measures and Maximum Delta TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.008 0.012 0.004 0.004 0.02 0.004 0.016 0.008 0.012 0.008 0.008 0.028 Closeness Betweenness Eigenvector 0.012 0.004 0. 0.008 0.008 0.008 0.008 0.004 0.008 0.016 0.004 0.012 0.012 0.016 0.012 0.004 0.024 0.02 0.016 0.004 0.012 0.016 0.024 0.024 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 10: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the maximum change in fractional TKO score with each of five flattened ob- served interaction network agent centrality scores. 20 Mean TKO and Base Interaction Network Pearson Correlations of Centrality Measures and Mean TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.12721 0.12514 0.13992 −0.00492 0.04866 0.06674 0.13528 0.16164 0.23309 0.02536 0.06834 0.12315 Closeness Betweenness Eigenvector 0.10583 0.09557 0.11872 0.03076 0.07044 0.12695 0.08851 0.09822 0.16747 0.0545 0.10208 0.17406 Katz 0.09757 0.07997 0.0977 0.08398 0.11485 0.10137 −0.00766 −0.01483 0.06403 0.08047 0.05665 0.02619 0.06804 0.09088 0.10646 0.08486 0.16756 0.13834 −0.0126 0.0042 0.05613 0.02545 0.0522 0.12552 0.09908 0.10187 0.11503 0.01898 0.08208 0.10153 0.11109 0.127 0.19103 0.01982 0.11029 0.24128 Spearman Correlations of Centrality Measures and Mean TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.1905 0.20983 0.22161 0.00607 0.05186 0.05635 0.20006 0.27654 0.32109 0.00761 0.06719 0.11495 Closeness Betweenness Eigenvector 0.09194 0.11228 0.13071 0.01531 0.08794 0.15674 0.08366 0.10011 0.13576 0.02375 0.15883 0.20274 Katz 0.08058 0.04674 0.1079 0.07657 0.12272 0.09371 0.02495 0.00735 0.07049 0.05397 0.05611 0.05825 0.07421 0.03927 0.09862 0.05359 0.12637 0.07313 −0.01435 −0.01696 0.04759 0.0364 0.11563 0.0699 0.19137 0.19027 0.21508 0.0249 0.08288 0.0957 0.2032 0.26282 0.31428 0.01917 0.13379 0.21729 Top Ten Overlap of Centrality Measures and Mean TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.012 0.012 0.02 0.004 0.008 0.016 0.012 0.012 0.016 0.004 0.02 0.012 Closeness Betweenness Eigenvector 0.008 0.02 0.004 0.008 0.024 0.008 0.008 0.008 0.028 0.004 0.012 0.016 0.012 0. 0.016 0.004 0.008 0.016 0.016 0.008 0.02 0.016 0.016 0.032 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 11: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the mean proportional TKO score with each of five base network agent centrality scores. 21 Mean TKO and Flattened Interaction Network - Unweighted Pearson Correlations of Unweighted Centrality Measures and Mean TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.12815 0.12567 0.14023 −0.00492 0.04866 0.06674 0.13606 0.16208 0.23404 0.02536 0.06834 0.12315 Closeness Betweenness Eigenvector 0.10446 0.09498 0.11871 0.03076 0.07044 0.12695 0.08709 0.09486 0.16759 0.0545 0.10208 0.17406 Katz −0.0147 0.06 0.06054 −0.00984 0.01406 0.04537 −0.0322 −0.01334 0.04724 −0.00565 −0.00722 0.01564 0.01291 0.08012 0.01734 0.09913 0.10685 0.01614 0.00807 0.00569 0.0242 0.01523 0.00142 −0.004 0.10138 0.10378 0.1158 0.01898 0.08208 0.10153 0.11292 0.12839 0.19278 0.01982 0.11029 0.24128 Spearman Correlations of Unweighted Centrality Measures and Mean TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.19049 0.20984 0.22161 0.00607 0.05186 0.05635 0.20004 0.27653 0.32109 0.00761 0.06719 0.11495 Closeness Betweenness Eigenvector 0.09173 0.11246 0.13124 0.01531 0.08794 0.15674 0.08303 0.09826 0.13629 0.02375 0.15883 0.20274 Katz 0.05292 −0.0181 0.02852 0.07219 0.04265 −0.00284 −0.04346 0.00171 0.00793 0.05263 0.03002 0.00901 0.00635 0.05261 0.07858 0.04579 0.05399 0.02333 −0.01027 −0.00899 0.06029 0.00663 0.02264 −0.00918 0.19154 0.19295 0.2144 0.0249 0.08288 0.0957 0.2042 0.26503 0.31345 0.01917 0.13379 0.21729 Disease Type Network Type InfectionRate Top Ten Overlap of Unweighted Centrality Measures and Mean TKO on Flattened Network Closeness Betweenness Eigenvector 0.004 0.016 0.012 0.008 0.024 0.008 0.02 0.008 0.02 0.004 0.012 0.016 scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld Degree 0.008 0.008 0.016 0.004 0.008 0.016 0.012 0.016 0.016 0.004 0.02 0.012 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS 0.008 0.004 0.02 0.004 0.008 0.016 0.012 0.004 0.02 0.016 0.016 0.032 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 12: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the mean TKO score with each of five flattened observed interaction network agent centrality scores. 22 Mean Delta Fraction TKO and Base Interaction Network Pearson Correlations of Centrality Measures and Mean Delta TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.11126 0.14889 0.16805 −0.00009 0.07554 0.10399 0.1261 0.18292 0.24463 0.02352 0.09169 0.14818 Katz 0.07232 0.11078 0.12793 Closeness Betweenness Eigenvector 0.09799 0.11732 0.14606 0.04849 0.15629 0.17922 0.08495 0.11692 0.17563 0.08397 0.22063 0.2428 0.0877 0.12374 0.14173 −0.01346 −0.015 0.0855 0.08021 0.0903 0.03744 0.06882 0.08869 0.12508 0.10177 0.17664 0.14665 −0.01187 0.00138 0.07855 0.04315 0.0684 0.15092 0.08769 0.12976 0.13956 0.0285 0.11958 0.14133 0.10497 0.14573 0.20131 0.02964 0.15242 0.2825 Spearman Correlations of Centrality Measures and Mean Delta TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.1898 0.21847 0.22746 0.01018 0.0516 0.0699 0.19765 0.29223 0.32746 0.00888 0.07207 0.11845 Closeness Betweenness Eigenvector 0.09614 0.12032 0.13761 0.03939 0.14602 0.21156 0.08699 0.10894 0.13763 0.05328 0.24837 0.25568 Katz 0.08385 0.04946 0.11745 0.08826 0.1287 0.09995 0.02556 0.00609 0.0788 0.0599 0.05664 0.06476 0.07697 0.04237 0.10884 0.06348 0.12769 0.07348 −0.02485 −0.02329 0.05916 0.05486 0.11974 0.07612 0.1907 0.20791 0.21875 0.03931 0.08077 0.12171 0.2017 0.28278 0.32083 0.03496 0.14039 0.22694 Top Ten Overlap of Centrality Measures and Mean Delta TKO on Base Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.016 0.028 0.024 0.008 0.012 0.02 0.012 0.024 0.024 0.012 0.012 0.012 Closeness Betweenness Eigenvector 0.012 0.016 0.012 0. 0.02 0.02 0.024 0.004 0.044 0.008 0.02 0.012 0.012 0.032 0.02 0. 0.008 0.012 0.016 0.012 0.028 0.02 0.032 0.028 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 13: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the mean change in fractional TKO score with each of five base network agent centrality scores. 23 Mean Delta Fraction TKO and Flattened Interaction Network - Unweighted Pearson Correlations of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.11209 0.14898 0.16834 −0.00009 0.07554 0.10399 0.12659 0.18318 0.24569 0.02352 0.09169 0.14818 Closeness Betweenness Eigenvector 0.09676 0.11589 0.14605 0.04849 0.15629 0.17922 0.08274 0.11273 0.17587 0.08397 0.22063 0.2428 Katz 0.04575 −0.00955 0.07341 0.00383 0.05829 0.01177 −0.03495 −0.00892 0.06106 −0.00153 −0.00044 0.00307 0.01533 0.07632 0.1164 0.02053 0.11365 0.01806 −0.00576 0.01179 0.01275 0.04087 −0.00623 0.00016 0.08987 0.13081 0.14042 0.0285 0.11958 0.14133 0.10637 0.14702 0.20314 0.02964 0.15242 0.2825 Spearman Correlations of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.18978 0.21847 0.22745 0.01018 0.0516 0.0699 0.19763 0.29223 0.32746 0.00888 0.07207 0.11845 Closeness Betweenness Eigenvector 0.09581 0.12017 0.13857 0.03939 0.14602 0.21156 0.08611 0.10699 0.13833 0.05328 0.24837 0.25568 Katz 0.05107 −0.02437 0.02238 0.06814 0.00276 0.04818 −0.05202 0.00721 0.01342 0.09211 0.03232 0.00737 0.01168 0.05174 0.08752 0.04597 0.05933 0.02361 −0.00993 −0.00835 0.11152 0.00933 0.01745 −0.01791 0.19107 0.21048 0.21806 0.03931 0.08077 0.12171 0.20295 0.28511 0.31985 0.03496 0.14039 0.22694 Top Ten Overlap of Unweighted Centrality Measures and Mean Delta TKO on Flattened Network Disease Type Network Type InfectionRate SIR SIR SIR SIR SIR SIR SIS SIS SIS SIS SIS SIS scalefree scalefree scalefree smallworld smallworld smallworld scalefree scalefree scalefree smallworld smallworld smallworld 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 0.10 0.15 0.20 Degree 0.016 0.024 0.028 0.008 0.012 0.02 0.012 0.02 0.028 0.012 0.012 0.012 Closeness Betweenness Eigenvector 0.02 0.008 0.024 0. 0.02 0.02 0.016 0.004 0.024 0.008 0.02 0.012 0.012 0.024 0.016 0. 0.008 0.012 0.012 0.012 0.02 0.02 0.032 0.028 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Katz 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. 0. Table 14: The Pearson and Spearman correlations as well as the average percent of matching Top Ten agents between the mean change in fractional TKO score with each of five flattened observed interaction network agent centrality scores. 24
1610.07772
1
1610
2016-10-25T07:56:43
Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events
[ "cs.SI" ]
Online Social Networks explode with activity whenever a crisis event takes place. Most content generated as part of this activity is a mixture of text and images, and is particularly useful for first responders to identify popular topics of interest and gauge the pulse and sentiment of citizens. While multiple researchers have used text to identify, analyze and measure themes and public sentiment during such events, little work has explored visual themes floating on networks in the form of images, and the sentiment inspired by them. Given the potential of visual content for influencing users' thoughts and emotions, we perform a large scale analysis to compare popular themes and sentiment across images and textual content posted on Facebook during the terror attacks that took place in Paris in 2015. Using state-of-the-art image summarization techniques, we discovered multiple visual themes which were popular in images, but were not identifiable through text. We uncovered instances of misinformation and false flag (conspiracy) theories among popular image themes, which were not prominent in user generated textual content, and can be of particular inter- est to first responders. Our analysis also revealed that while textual content posted after the attacks reflected negative sentiment, images inspired positive sentiment. To the best of our knowledge, this is the first large scale study of images posted on social networks during a crisis event.
cs.SI
cs
Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events Prateek Dewan1, Varun Bharadhwaj2∗, Aditi Mithal1∗, Anshuman Suri1∗, Ponnurangam Kumaraguru1 1Indraprastha Institute of Information Technology - Delhi (IIIT-D) 2National Institute of Technology, Tiruchirappalli, India 1{prateekd,aditim13122,anshuman14021,pk}@iiitd.ac.in, [email protected] 6 1 0 2 t c O 5 2 ] I S . s c [ 1 v 2 7 7 7 0 . 0 1 6 1 : v i X r a ABSTRACT Online Social Networks explode with activity whenever a crisis event takes place. Most content generated as part of this activity is a mixture of text and images, and is partic- ularly useful for first responders to identify popular topics of interest and gauge the pulse and sentiment of citizens. While multiple researchers have used text to identify, ana- lyze and measure themes and public sentiment during such events, little work has explored visual themes floating on networks in the form of images, and the sentiment inspired by them. Given the potential of visual content for influenc- ing users' thoughts and emotions, we perform a large scale analysis to compare popular themes and sentiment across images and textual content posted on Facebook during the terror attacks that took place in Paris in 2015. Using state- of-the-art image summarization techniques, we discovered multiple visual themes which were popular in images, but were not identifiable through text. We uncovered instances of misinformation and false flag (conspiracy) theories among popular image themes, which were not prominent in user generated textual content, and can be of particular inter- est to first responders. Our analysis also revealed that while textual content posted after the attacks reflected negative sentiment, images inspired positive sentiment. To the best of our knowledge, this is the first large scale study of images posted on social networks during a crisis event. 1. INTRODUCTION "Use a picture. It's worth a thousand words." Tess Flanders, 1911 The last decade has witnessed a revolution in commu- nication technology with the introduction of Online Social Networks like Facebook and Twitter. Especially during cri- sis events like earthquakes, bomb blasts, terror attacks etc., ∗These authors contributed equally to the paper. ACM ISBN 978-1-4503-2138-9. DOI: 10.1145/1235 people switch to social media to share updates, experiences, and stay up to date [7, 13]. All of this user generated content makes OSNs a crucial source of information for first respon- ders to get a sense of the pulse and sentiment of the public on a global scale in almost real time. In the last few years, multiple researchers have analyzed the textual part of the content to identify and analyze sen- timent and popular topics of discussion among the masses on OSNs during crisis event, for example, [1, 8, 10, 16, 21]. Sentiment and topic analysis of textual content on OSNs is widely used by researchers and first responders to gauge the pulse of citizens and make decisions accordingly. How- ever, all OSN content is not necessarily in textual format. Researchers have reported high percentage of posts gener- ated during real world events to contain only images, and no text at all. 1 This points to the fact that the methodology adopted for most of the aforementioned research misses out on such sections of content, which do not contain text. More- over, even if a post contains text along with an image, the text may not be representative of the topic or sentiment de- picted by the accompanying image. Consider the post in Fig- ure 1 for instance. While sentiment analysis on text would reveal positive sentiment for this post, the sentiment associ- ated with the image is contrasting. Considering the human brain's affinity towards visual content, 2 it is likely that the pulse and sentiment of user generated content as perceived by researchers through text, differs from the true sentiment, since most past research does not consider images to draw inferences. In this paper, we study a large dataset of over 57,000 im- ages posted on Facebook during the terrorist attack in Paris in November, 2015. We employ state-of-the-art image anal- ysis techniques for mining and measuring the themes and sentiment of content posted through images on a large scale, and compare the findings with similar analysis performed on textual content. Results of this measurement reveal sizeable differences in topics, themes, and sentiment drawn from im- ages and text. We observed that textual content embedded in images, as well as text contained in posts depicted neg- ative sentiment. On the other hand, images in general were found to inspire positive sentiment. Upon manual inspection, we observed that this contrasting behavior was largely due to the popularity of images offering support and solidarity to the victims of the attacks. Using a Convolutional Neural 1http://precog.iiitd.edu.in/blog/2016/08/ imagesononlinesocialmedia/ 2http://changingminds.org/explanations/learning/active learning.htm 2. RELATED WORK There exists prior literature in the space of studying im- ages during crisis events on a small scale on OSNs, as well as studying crisis events on OSNs otherwise. Our work con- tributes towards enhancing the work done in both these cat- egories, as we discuss below. 2.1 Images on OSNs during crisis events Multiple researchers have attempted to study images posted on OSNs to analyze crisis events. Gupta et al. at- tempted to identify and characterize the spread of fake im- ages on Twitter during Hurricane Sandy in 2013. Although the paper was focused on identifying fake images, the method- ology adopted by the authors did not involve image analysis. Authors manually identified a set of fake images from news articles and blogs, and used the URLs of these fake images to expand their dataset of tweets containing fake images. This dataset was used to extract user and tweet level fea- tures to automatically identify tweets containing fake image URLs from tweets containing real image URLs [9]. Vis et al. conducted an exploratory analysis of images shared on Twitter during the 2011 UK riots. Similar to Gupta et al.'s approach, authors manually classified images into 14 cate- gories for characterization [23]. More similar work includes empirical analysis of Twitter images during the 2012 Israeli- Hamas conflict, where authors examined images shared by two Twitter accounts over a 2 month time frame. A total of 243 images were captured, and studied manually to dis- cover prominent themes and frames, human characters, etc. present in the images [18]. Kharroub et al. studied 581 Twit- ter images from the 2011 Egyptian revolution and found more images depicting crowds and protest activity as com- pared to images depicting violent content. In addition to most prominent visual themes, authors of this work tried to find whether user information helps in predicting image retweets, and whether image themes vary across different phases of the event [11]. As evident from prior research, images play a crucial role in measuring public sentiment during crisis and mass emer- gency events like terror attacks, and in cases of detecting online radicalization. All aforementioned research however, is restricted to small scale, because of the manual effort in- volved in measurement and analysis. The use of images for analyzing events on a large scale remains largely unexplored. We attempt to bridge this gap to an extent, by exploring automated methods to extract meaningful information from images posted on Facebook during the Paris Attacks in 2015. 2.2 Crisis event related studies on OSNs Numerous researchers have looked at textual content to study crisis events on OSNs. Hughes et al. studied the use of the Twitter social network during four emergency events, and compared how this behavior was different from general Twitter use. Authors found that Twitter messages sent dur- ing these types of events contained more displays of infor- mation broadcasting and brokerage as compared to general Twitter messages. Textual features like replies, URLs, and presence of certain keywords were used to draw these find- ings [10]. Gupta et al. presented a study to identify and char- acterize communities from a set of users who post messages on Twitter during three major crisis events in that took place in 2011. Authors used textual content similarity in addition to link (network) and location similarity to identify clus- Figure 1: Example of a Facebook post where sentiment as- sociated with the post text is in contrast with the sentiment associated with the text embedded in the image. Network (CNN) based image summarization model, we ex- tracted visual themes from images and found that two of the top 10 most popular themes among images were associated with instances of misinformation and were not prominent in textual content. Further, textual content extracted from images revealed multiple (potentially sensitive) topics asso- ciated with "refugees", "passports", etc. which were popular in image text, but not in post text. These findings indicate the presence of useful information in the form of images posted on OSNs during crisis events, which haven't been widely explored in literature. Such infor- mation can be vital for first responders to get a better sense of the pulse and sentiment of the masses, and identify and monitor instances of misinformation and sensitive informa- tion flowing on the network in the form of images. To the best of our knowledge, this is the first large scale study to understand visual themes and sentiment on social networks during crisis events. Further, the resulting methodology de- veloped during our analysis scales to a generalizable model that can be applied to any similar crisis event in the future. About the event: A series of coordinated terrorist at- tacks took place in Paris on November 13, 2015 at 21:20 Central European Time. Suicide bombers and gunmen at- tacked a stadium in Saint-Denis, Paris. This was followed by mass shootings, and a suicide bombing, at cafes and restau- rants. Gunmen carried out another mass shooting and took hostages at a concert in the Bataclan theatre, leading to a stand-off with police. The attackers were shot or blew themselves up when police raided the theatre. A total of 130 people were killed, and 368 others were injured. News about the event spread instantly on all OSN platforms in- cluding Facebook. Hundreds of users posted live pictures of the event, and thousands posted messages offering condo- lence and support. 3 3http://www.bbc.com/news/world-europe-34818994 ters of users similar users [8]. Rudra et al. proposed a novel framework to assign tweets posted during mass emergency events into different situational classes, and then summarize those tweets. Similar to Hughes et al's approach of using textual features, authors of this work also extracted features like numerals, nouns, locations, verbs, etc. present in tweet text to identify and extract event summary [16]. Thelwall et al. studied sentiment of English tweets during a month long period and found that popular events were normally associ- ated with increases in negative sentiment strength. Authors completely relied on tweet text to extract sentiment strength and draw inferences [21]. All aforementioned research used textual content to study events on OSNs and draw inferences, thereby missing out on a large section of content pertaining to images. As discussed previously, researchers have tried to look at images on OSNs using manual techniques, and reported interesting findings. The aforementioned research highlights the need for auto- mated large scale techniques to study and mine images to extract sentiment, themes, and other similar useful informa- tion that can be used by researchers to better understand the users' reactions with respect to crisis events on OSNs and draw more accurate inferences. 3. METHODOLOGY 3.1 Data collection We collected data using Facebook's Graph API Search endpoint [6] between November 14, and November 25, 2015. Until April 2015, Facebook provided developers with the ca- pability to search for public posts given a keyword using the Graph API version 1.0. This feature was disabled with ef- fect from April 30, 2015, with the introduction of version 2.0 of the Graph API. However, in early 2015, a vulnera- bility discovered in the Graph API highlighted that access tokens generated by Facebook's mobile apps had some extra permissions which were not documented by Facebook. 4 On further exploration, we discovered that access tokens gen- erated by Facebook's mobile apps were able to access the post search endpoint of the Graph API version 1.0 even af- ter April 30, 2015. We used this work-around to query and collect data from the Graph API in November 2015. Table 1 provides the detailed description of our dataset. Keywords used Unique posts Unique users Posts with images Unique users posting images Total images extracted Unique images extracted #ParisAttacks, #PrayForParis 131,548 106,275 75,277 67,570 57,748 15,123 Table 1: Descriptive statistics of our dataset we collected from Facebook during the Paris Attacks in 2015. The Graph API returns posts in JSON format (JavaScript Object Notation), and each post has a type associated with it. We filtered out all posts of type "photo" and re-queried the Graph API in February 2016 to obtain the actual images in these posts. Upon re-querying the Graph API, we noticed that some of the posts had been deleted from Facebook, and were no longer accessible. Also, posts with entire photo albums were also categorized as type "photo", and images 4http://www.7xter.com/2015/02/how-i-hacked-your-facebook- photos.html inside these albums were not directly accessible via the API. Eventually, we were able to collect 57,748 images in total. We identified duplicates using the difference hash (dHash) image hashing algorithm 5 and obtained a total of 15,123 unique images (Table 1). 3.2 Image characterization Understanding and interpreting images is a complex task. As discussed in Section 2.1, past research on studying the role of images on OSNs has largely relied on manual methods to perform measurement studies on images [9, 15, 23]. This methodology is time consuming and not scalable for bigger datasets containing more than a few hundred images. With millions of images generated on OSNs every day 6, manually looking at images is a futile way to understand visual content and draw any meaningful conclusions. To overcome this drawback, we attempt to use automated methods to characterize images in our dataset. We use Ten- sorFlow implementation of Google's Inception-v3 model for image classification [20]. Inception-v3 is trained for the Im- ageNet Large Visual Recognition Challenge using the data from 2012, and tries to classify images into 1,000 classes [17]. This model reports a state-of-the-art top-1 error rate of 17.2%, signifying that the most probable label predicted by this model is correct in 82.8% of the cases in the test dataset. However, it is important to note that the generated label comes from a fixed set of 1,000 labels, which is not large enough for characterizing the wide variety of images we usu- ally come across on social networks in practice. To establish the accuracy of this model on our dataset, we recruited hu- man annotators and got a random sample of 2,545 unique images annotated by two or more annotators. The job of each annotator was to mark whether they agreed with the label generated by the Inception-v3 model for the given im- age, or not. Using majority voting, we found that the model achieved an accuracy of 38.87% on our data sample. Given that there are 1,000 possible output labels, this accuracy value is much better than random guessing; assuming equal class sizes, the probability of a random guess being correct is 0.1%. However, through a small manual exercise, we were able to boost this accuracy significantly. We hypothesized that images in our dataset with the same labels are highly likely to be similar, regardless of the labels associated with them being correct or not. This is because of the fact that CNNs model the vision system in animals, and are likely to group similar images together. We tested this hypothesis for the images associated with the top 20 most frequently occurring labels in our dataset, and found it to hold true. For example, the "Peace for Paris" symbol created by French graphic designer Jean Jullien, was labeled "bolo tie" by the model (Figure 2). Using this observation, we renamed 8 out of the top 20 labels to better suit the images under each of these labels. Table 2 shows the 8 out of the 20 most common labels that were generated by the Inception- v3 model for our dataset, and the labels we replaced them with. This exercise of renaming labels boosted the accuracy of the model to 51.34% on our random sample. We used these modified labels for our analysis. 5http://www.hackerfactor.com/blog/?/archives/529-Kind-of- Like-That.html 6http://www.businessinsider.in/Facebook-Users-Are- Uploading-350-Million-New-Photos-Each-Day/articleshow/ 22709734.cms Label generated by Inception-v3 Label they were replaced with book jacket, dust cover, dust jacket, dust wrapper Poster bolo tie, bolo, bola tie, bola church, church building obelisk envelope stupa, tope drilling platform, offshore rig radio telescope, radio reflector Jean Jullien's "Peace for Paris" symbol Eiffel tower Eiffel tower Poster Eiffel tower Eiffel tower Eiffel tower No. of occurrences in our dataset of unique images 1,024 350 258 210 204 173 137 68 Table 2: List of labels generated by the Inception-v3 model, and the labels they are renamed with. This renaming process boosted the accuracy of the model on our dataset by almost 13%. (a) What a "bolo tie" looks like (b) Jean Jullien's "Peace for Paris" symbol Figure 2: Visual similarity between a bolo tie and the fa- mous 'Peace for Paris' symbol. This similarity (in addition to others) is captured by the Inception-v3 model, and can be exploited to increase accuracy. 3.3 Text extraction from images Past studies on analysing topics, events, sentiment, etc. on OSNs have been largely limited to using textual content generated by users to draw inferences [8, 10, 16, 21]. This technique however, misses out on a large section of textual information embedded in images, making it prone to missing out on being able to capture the complete picture. Figure 3 shows an example of textual content embedded in an image in our dataset. We tested and evaluated two optical character recogni- tion (OCR) libraries – PyTesseract 7 (Python wrapper for Tesseract OCR 8), and OCRopy 9 – to extract text from the images in our dataset. To compare the performance of the two libraries, we first established a ground truth dataset by manually extracting text from a random sample of 1,000 images from our dataset. We then used five string similarity metrics (Jaro Winkler distance, Jaccard index, Cosine simi- larity, Hamming distance, and Levenshtein distance) to com- pare the results produced by PyTesseract and OCRopy with the ground truth, separately. Scores from all five metrics in- dicated that PyTesseract performed better on our dataset than OCRopy (p-value < 0.01 for all five metrics), so we used PyTesseract for our final analysis. In all, we were able to extract text from a total of 31,869 images in our dataset. 7https://pypi.python.org/pypi/pytesseract/ 8https://github.com/tesseract-ocr/tesseract 9https://pypi.python.org/pypi/ocropy Figure 3: Example of text embedded in an image posted on Facebook during the Paris Attacks in 2015. We found thousands of images containing text in our dataset. 3.4 Identifying image sentiment Sentiment derived from textual content generated by users on OSNs has been widely used by researchers in various con- texts [2, 19, 21, 22]. However, few attempts have been made to understand the sentiment associated with images posted on OSNs [24, 25, 26]. Studies suggests that the human brain is hardwired to recognize and make sense of visual infor- mation more efficiently. 10 Thus, it is likely that sentiment extracted from textual content alone may not be represen- tative of the overall sentiment associated with a theme or event. To this end, we attempt to extract sentiment from images using state-of-the-art supervised learning techniques and datasets. The Inception-v3 model (discussed in Section 3.2) can be retrained to perform other visual recognition tasks using features extracted by the model during the training phase. This concept is known as transfer learning, and is available in the form of an open-source implementation, called Deep Convolutional Activation Feature (DeCAF). 11 DeCAF is a state-of-the-art deep CNN architecture for transfer learn- ing based on a supervised pre-training phase [5]. We use this open-source implementation to retrain the Inception-v3 model on the SentiBank dataset to identify image sentiment. The SentiBank database comprises of a total of half mil- 10https://www.eyeqinsights.com/power-visual-content-images- vs-text/ 11https://www.tensorflow.org/versions/r0.8/how tos/image retraining/index.html lion Flickr images, extracted by querying the network using Adjective-Noun Pairs (ANPs) [3]. Since noun queries such as "dog", "baby", or "house" do not portray a well-defined emotion, these queries were prefixed with adjectives to form ANPs like "happy dog", "adorable baby", "abandoned house" etc., which associate these nouns with a strong emotion. We manually segregated these ANPs (and therefore, the images associated with them) into positive and negative classes for binary sentiment classification, and skipped the ANPs which did not fit clearly into a positive or negative sentiment. This exercise left us with a total of 305,100 positive sentiment im- ages and 133,108 negative sentiment images. We performed a 10-fold random subsampling to balance the classes, and ob- tain an unbiased model. For each fold, we split the dataset into three parts in a 80:10:10 ratio for training, validation, and testing respectively, and achieved a maximum accuracy of 69.8%. 4. ANALYSIS AND RESULTS Themes and sentiment are two of the most widely studied aspects of OSN content during crisis events in literature [4, 12]. We therefore focus on these two aspects of the images in our dataset, and present our findings. 4.1 Most prominent visual themes featured mis- informative images Using our methodology for characterizing images as de- scribed in Section 3.2, we assigned a label to all 57 thou- sand images we collected (Table 1). Table 3 shows a list of the most commonly occurring image labels, along with their description according to our dataset. We manually browsed through images corresponding to each of the top 20 labels, and found that the most common types of images comprised of posters, banners, screenshots of Facebook posts, Twit- ter tweets, etc. Cartoons and animated posters resembling a comic book were also very popular. More examples include the Pray for Paris peace symbol by French artist Jean Jul- lien (label: Bola Tie), images of candles and lamps offering support to the victims of the attacks (label: Candle wax- light), and images of the Eiffel Tower under varying lights, angles, and from various distances, that became very popu- lar (labels: Obelisk, Crane, etc.). We were also able to identify some peculiar topics and themes which were popular on the network during the event. The "Malinois" label appearing in the top 20 (see Table 3) corresponded to the breed of the police dog that died during the attacks, and evidently became very popular. However, the cause of death of the dog was incorrectly quoted in mul- tiple such images. Figure 4a shows one such picture of the police dog and states that the dog was killed when a suicide bomber detonated her explosive vest. However the real cause of the dog's death, as later clarified by French police, was multiple gunshot wounds caused by the French police forces' "Brenneke" bullets. 12 We collected all such images quoting misinformation in our dataset and found that these images had gathered over 1.1 million likes, 321 thousand shares, and 38 thousand comments. Similarly, one of the blasts during the attacks took place outside a football stadium, whose pictures quoted incorrect 12http://www.dailymail.co.uk/news/article-3446511/Confirmed- Diesel-hero-police-dog-Paris-attacks-shot-dead-wounded- innocent-neighbours-reckless-shooting.html Label Website Count Description 12,416 Images of posts, tweets, banners, etc. 5,383 Posters, banners, etc. 3,803 Cartoons, animated posters 1,264 1,248 Posters, banners, etc. 1,246 People wearing suit-like clothes 1,135 Fountains at various locations speeches, Book jacket Comic book Fountain Envelope Suit (clothing) Stage Candle waxlight 1,021 Malinois Scoreboard Microphone Menu Bola Tie Bell cot Jersey, T-shirt Crane Memorial Tablet Church Palace Obelisk 995 971 906 868 781 745 743 677 633 629 586 547 Stages during public mass gathering events, etc. Lit candles and lamps offering sup- port to victims Police dog who died during the at- tack Images of sports stadium Individuals addressing the masses, reporters, etc. using microphones Images containing well formatted text Peace for Paris symbol originally created by Jean Jullien Various buildings People wearing t-shirts Images of Eiffel Tower during twi- light Variety of posters, hand written messages on boards, etc. Dark and grey scale images of Eiffel Tower Large buildings, Tower from a distance Eiffel Tower including Eiffel Table 3: Top 20 most common image labels in our dataset. Majority of the images comprised of posters, banners, art work, etc. offering support for victims. information and became viral. These pictures were captured using the "Scoreboard" label; manual verification of images marked with this label revealed that most of these images captured the sports stadium. Figure 4b shows one such pic- ture of the stadium and states that a Muslim security guard named Zouhier stopped a suicide bomber from entering the Stade de France stadium, thus saving hundreds of innocent lives of people inside the stadium. It was later confirmed by BBC that it wasn't actually him who turned away the bomber. Instead, Zouheir was stationed elsewhere in the sta- dium, and related what he heard from colleagues who were closer to the bomb blast. 13 All instances of this misinforma- tive image in our dataset garnered over 21 thousand likes, 11 thousand shares, and 450 comments. This technique of automatic identification of themes and topics from images on a large scale can be particularly help- ful for first responders to identify popular instances of mis- information spread through images. Slight modifications to Convolutional Neural Network (CNN) based labeling models like Inception-v3, can aid in identifying potentially harmful and sensitive content such as guns, blood, etc. in images, and help monitor the flow of such images, and react in a timely manner, if needed. 4.2 Text embedded in images featured sensi- tive topics and reflected negative sentiment Applying optical character recognition (OCR) on images in our dataset revealed 31,869 images (55% of all images in our dataset) which contained text embedded in them (as described in Section 3.3). 13http://www.bbc.com/news/blogs-trending-34845882 and post text had less than 45% overlap, highlighting that popular words among image text were considerably different from those in post text. Text extracted from posts was dominated by words like "prayers", "prayfortheworld", "life", "support", "god" etc., de- picting support and solidarity for the victims. Text extracted from images however, revealed some potentially sensitive topics like refugees, passports, etc. which were not amongst the most talked about topics in post text. The terms "refugees" and "texas" in Table 4 captures the scanned image of a letter from the Governor of Texas to the president of the United States, which went viral. The letter stated that Texas would not accept any refugees from Syria in the wake of the attacks. Other similar examples of images containing text comprised of quotes from famous personalities including The Dalai Lama, Stacy Washington, Barrack Obama, Martin Luther King Jr., etc. We also uncovered a popular conspiracy the- ory surrounding the Syrian "passports" that were found by French police near the bodies of terrorists who carried out the attacks, and were allegedly used to establish the iden- tity of the attackers as Syrian citizens. Text embedded in images depicting this theme questioned how the passports could have survived the heat of the blasts and fire. This conspiracy theory was then used by miscreants to label the attacks as a false flag operation, influencing citizens to ques- tion the policies and motives of their own government. The popularity of such memes on OSN platforms can have un- desirable outcomes in the real world, like protests and mass unrest. It is therefore vital for first responders to be able to identify such content and counter / control its flow to avoid repercussions in the real world. All such popular textual content in the form of images is a rich source of information which is capable of playing an important role in driving the pulse of the audience, but has been largely untapped in literature so far. Interestingly, 8,273 of these 31,869 images (25.95%) did not contain any user generated textual content otherwise, indicating that most prior work on event analysis using text on OSNs would have entirely missed this set of data during their analysis, as discussed previously [10, 8, 21, 16]. Text sentiment: Researchers in the past have looked at text sentiment to draw inferences about the overall senti- ment and emotion of users about a topic on OSNs. How- ever, as we just discussed, there is a large volume of tex- tual content flowing through the network in the form of im- ages, which differs from conventional textual content posted by users. Since most modern content monitoring techniques also focus on textual content, obfuscating sensitive textual content like hate speech and propaganda by embedding it in images is a lucrative way for malicious entities to avoid detection. Thus, we hypothesize that the sentiment of text embedded in images would be very different from the senti- ment of textual content posted by users in the conventional form. To confirm our hypothesis, we employed Linguistic Enquiry and Word Count (LIWC) [14] to determine and compare the emotion of the image text and post text in our dataset. We found that text embedded in images was neg- ative on average, and twice in magnitude as post emotion (Mann Whitney U test: p−value < 0.01). Figure 5 shows the distribution of emotions across the two classes (image text and post text). Although we found more negative emotion in both images and posts as compared to positive emotion, the magnitude of negative emotion as compared to positive emo- (a) Diesel the dog who was allegedly killed by terrorists (b) Zouheir, the security guard who was claimed to have stopped a terrorist from entering the stadium Figure 4: Rumors spread on Facebook in the form of im- ages during the Paris Attacks in 2015. We used CNN based image summarization techniques to identify image themes and discovered that some of the most popular image themes were associated with rumors. Prominent topics: Table 4 shows a mutually exclusive set of the 20 most frequently occurring relevant words in the text we extracted from images and posts. We picked 500 most commonly occurring words in images that were not present in post text, and vice versa, to identify prominent themes among image and post text independently. We no- ticed that the most commonly occurring words among image Top words in posts Word retweeted 1. time 2. prayers 3. news 4. prayfortheworld 5. life 6. let 7. support 8. 9. god 10. war 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. thoughts need last lives said place country city everyone live Norm. freq. 0.0055 house 0.0052 safety 0.0050 washington 0.0047 sisters 0.0044 learned 0.0043 mouth 0.0042 0.0042 0.0040 0.0039 0.0038 0.0038 0.0037 0.0037 0.0034 0.0034 0.0033 0.0032 0.0032 0.0032 Top words in images Norm. Word freq. 0.0045 0.0044 0.0042 0.0039 0.0038 0.0038 0.0037 0.0037 0.0036 0.0035 0.0028 0.0027 0.0026 0.0026 0.0026 0.0025 0.0025 0.0025 0.0025 0.0025 stacy passport americans refugee japan texas born dear syrians similar deadly services accept necessary Table 4: Mutually exclusive set of 20 most frequently occur- ring relevant keywords in post and image text, with their normalized frequency. We identified some potentially sensi- tive topics among image text, which were not present in post text. Word frequencies are normalized independently by the total sum of frequencies of the top 500 words in each class. tion was much higher in images as compared to text. We also noticed that positive emotion in posts was 2.6 times higher in magnitude than positive emotion in images. For negative emotion, this magnitude dropped down to 1.25. These results indicate that textual content flowing on the network in the form of images is a critical source of informa- tion that needs to be taken into consideration and analyzed thoroughly while making a judgement on the pulse and sen- timent of the audience about any topic or event. during crisis events, incorrect judgement of citizen sentiment can lead to undesirable consequences in the real world, like mass unrest and public protests, which can otherwise be stopped by law and order agencies if they are able to capture a complete picture of the situation in time. 4.3 Images inspired positive sentiment Inferring image sentiment through the sentiment of text embedded in it (as discussed previously), is a small part of understanding the sentiment associated with an image. Text is only a part of the overall sentiment that an image may reflect. Moreover, there may be no text present in an image at all. Researchers have acknowledged the problem of un- derstanding image sentiment, and come up with some solu- tions recently [24, 25, 26]. Using some of the most advanced techniques in the domain of image sentiment extraction (as described in Section 3.4), we performed sentiment analysis of images in our dataset. Contrary to text sentiment, we found that images, on av- erage, portrayed a positive sentiment. Figure 6 shows the normalized sentiment scores of all the images in our dataset. As is evident from the figure, we observed that close to 60% of the 57 thousand images in our dataset depicted a positive sentiment. However, as discussed in Section 3.4, the accu- racy of our image sentiment model wasn't too high (approx- imately 70%). Therefore, to verify the validity of our obser- vations, we recruited human annotators to manually mark a small random sample of 2,545 images from our dataset as positive, negative, or neutral. Participants were also given an option to skip. Each image was annotated by at least 2 (and at most 3) participants. After removing the skipped images and using majority voting, we found that 50.95% images were marked as positive, whereas only 16.21% im- ages were marked as negative. The remaining images were marked as neutral. This exercise confirmed our findings and affirmed the dominance of positive sentiment images in our dataset. Figure 5: Distribution of positive, negative, and neutral text emotion in our dataset of images containing text, and posts. We found more negative emotion in both categories, but the magnitude of negative emotion as compared to positive emotion was higher in images. Differences in text sentiment obtained from images and posts highlight that studying images is essential to correctly gauge the sentiment of users about a topic on OSNs. With the large volume and popularity of images on OSNs in recent times, it is imminent that results drawn from text alone fail to accurately capture the pulse of the audience. Especially Figure 6: Cumulative distribution of sentiment values ob- tained from our image sentiment prediction model for all 57 thousand images in our dataset. A value over 0.5 depicts pos- itive sentiment. We observed that close to 60% of all images depicted positive sentiment. This observation can be attributed to the large number of pictures depicting support and solidarity for the victims of the attacks, which included posters, banners, people holding lit candles and lamps, the famous Peace for Paris symbol, etc. Such images inspire a positive sentiment on the viewer, as confirmed by our human annotators as well as the pre- trained sentiment prediction model. Interestingly, we came across a substantial number of in- 0%20%40%60%80%100%ImagesPostsPositiveNegativeNeutral0.00.20.40.60.81.0Sentiment value020406080100Percent images (CDF)Sentiment stances where image sentiment conflicted with the sentiment of the text present in the post. Consider the post shown in Figure 7 for example. While the text in the post reads, "Hor- rible news.. No words :( :(" reflecting highly negative sen- timent, the image depicts the Eiffel tower lit up in French colors, signifying support for the victims and reflecting a pos- itive sentiment. We observed that, out of the 19,954 posts in our dataset which contained user generated textual content as well as an image, 25.33% of the posts (5,056 posts) had conflicting image and text sentiments. Out of these, 10.98% of the posts (2,192 posts) contained an image depicting a negative sentiment, whereas the textual content present in the post reflected positive sentiment. Similarly, 14.35% of the posts (2,864 posts) contained an image depicting a pos- itive sentiment, whereas the textual content present in the post reflected negative sentiment. Figure 7: Example of a post published during the Paris at- tacks, showing conflicting sentiments across image and text. This post was published by a verified page, garnering over 65 thousand likes and was shared 1,774 times. Through this analysis, we uncovered a new dimension for mining sentiment from user generated content on OSNs, which has been largely unexplored in prior OSN related lit- erature. Our results shed light on the varying sentiment de- picted by images and text during the Paris attacks. While textual sentiment analysis revealed negative sentiment, we found that images shared on Facebook during the event de- picted positive sentiment. We also found a considerable pro- portion of posts where textual sentiment and image senti- ment depicted opposite polarity. It is important to note that while text has been widely accepted in literature as a means to infer user sentiment during crisis events (and otherwise) on OSNs, the sentiment perceived by users is not restricted to text only. Instead, given the affinity of the human mind towards visual content, images are likely to contribute much more to the perceived sentiment of users as compared to text. 5. LIMITATIONS We understand that our image labeling (Inception-v3) and sentiment detection models are not completely accurate. However, these models are trained using CNNs, which form the basis for one of the most advanced state-of-the-art tech- niques for learning features from visual media in the modern age. These models can be further improved by feeding them true positive datasets of images. Generating a big enough dataset for such models is however, a challenging task, and out of scope of this work. Text extracted using Tesseract is limited by the perfor- mance of modern OCR techniques. We came across instances in our dataset where we were manually able to recognize text, but the OCR failed to identify this text. Most such in- stances involved the presence of calligraphic text, and noisy background. The percentage of such instances was low as compared to the number of images for which we were able to identify and extract text. 6. DISCUSSION Images are an integral part of OSN content, and are nat- urally more appealing to the human mind than text. OSN statistics explicitly support this phenomenon and makes im- ages an interesting avenue for researchers to explore. In this paper, we discovered a new dimension of content on Face- book through images. This study highlights the vast amount of information that can be mined from images alone, by mak- ing use of some modern image analysis techniques. We also highlight how this information may be different from textual content that has been previously used in literature to infer users' pulse and sentiment. Pictures posted on OSNs are a critical source of informa- tion that can be useful for law and order organizations to understand public sentiment, especially during crisis events. With the enormous volume and velocity of data being gen- erated on OSNs, it is extremely difficult to monitor visual media at present, because of lack of automated methods for measurement and analysis of such content. Through our ap- proach, we propose a semi-automated methodology for min- ing knowledge from visual content and identifying popular themes and citizens' pulse during crisis events. Although this methodology has its limitations, it can be very effective for producing high level summaries and reducing the search space for organizations with respect to content that may need attention. We also described how our methodology can be used for automatically identifying (potentially sensitive) misinformation spread through images during crisis events, which may lead to major implications in the real world. Various researchers have used text to measure the sen- timent and mood of users in diverse contexts like natural calamities, politics, sports, etc. We believe that the results drawn from all these studies can be improved by taking vi- sual content into consideration. Brands and organizations invest heavily in social media marketing and rely on textual responses generated by users to gauge their reactions, and in turn, the performance of their products. Being able to understand the users' pulse through images is likely to help such organizations mea- sure the response to their products much better, and cover a larger section of the audience. Moreover, while analyzing sentiment and emotion through text is largely limited by language, such a barrier does not exist for images. 7. REFERENCES [1] A. Acar and Y. Muraki. Twitter for crisis communication: lessons learned from japan's tsunami disaster. International Journal of Web Based Communities, 7(3):392–402, 2011. [2] J. Bollen, H. Mao, and X. Zeng. Twitter mood predicts the stock market. Journal of Computational Science, 2(1):1–8, 2011. ACM Conference on Hypertext and Social Media, pages 137–147. ACM, 2016. [17] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015. [3] D. Borth, T. Chen, R. Ji, and S.-F. Chang. Sentibank: [18] H. Seo. Visual propaganda in the age of social media: An empirical analysis of twitter images during the 2012 israeli–hamas conflict. Visual Communication Quarterly, 21(3):150–161, 2014. [19] S. Stieglitz and L. Dang-Xuan. Political communication and influence through microblogging–an empirical analysis of sentiment in twitter messages and retweet behavior. In System Science (HICSS), 2012 45th Hawaii International Conference on, pages 3500–3509. IEEE, 2012. [20] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna. Rethinking the inception architecture for computer vision. CoRR, abs/1512.00567, 2015. [21] M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment in twitter events. Journal of the American Society for Information Science and Technology, 62(2):406–418, 2011. [22] A. Tumasjan, T. O. Sprenger, P. G. Sandner, and I. M. Welpe. Predicting elections with twitter: What 140 characters reveal about political sentiment. In Proceedings of the fourth international AAAI conference on weblogs and social media, pages 178–185, 2010. [23] F. Vis, S. Faulkner, K. Parry, Y. Manyukhina, and L. Evans. Twitpic-ing the riots: analysing images shared on twitter during the 2011 uk riots. Twitter and Society, pages 385–398, 2013. [24] C. Xu, S. Cetintas, K.-C. Lee, and L.-J. Li. Visual sentiment prediction with deep convolutional neural networks. arXiv preprint arXiv:1411.5731, 2014. [25] Q. You, J. Luo, H. Jin, and J. Yang. Robust image sentiment analysis using progressively trained and domain transferred deep networks. arXiv preprint arXiv:1509.06041, 2015. [26] J. Yuan, S. Mcdonough, Q. You, and J. Luo. Sentribute: image sentiment analysis from a mid-level perspective. In Proceedings of the Second International Workshop on Issues of Sentiment Discovery and Opinion Mining, page 10. ACM, 2013. large-scale ontology and classifiers for detecting sentiment and emotions in visual content. In Proceedings of the 21st ACM international conference on Multimedia, pages 459–460. ACM, 2013. [4] M. Cheong and V. C. Lee. A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via twitter. Information Systems Frontiers, 13(1):45–59, 2011. [5] J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang, E. Tzeng, and T. Darrell. Decaf: A deep convolutional activation feature for generic visual recognition. In ICML, pages 647–655, 2014. [6] Facebook Developers. Facebook graph api search. https:// developers.facebook.com/ docs/ graph-api/ using- graph-api/ v1.0#search, 2013. [7] J. D. Fraustino, B. Liu, and Y. Jin. Social media use during disasters: a review of the knowledge base and gaps. 2012. [8] A. Gupta, A. Joshi, and P. Kumaraguru. Identifying and characterizing user communities on twitter during crisis events. In Proceedings of the 2012 Workshop on Data-driven User Behavioral Modelling and Mining from Social Media, DUBMMSM '12, pages 23–26, New York, NY, USA, 2012. ACM. [9] A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi. Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In Proceedings of WWW companion, pages 729–736, 2013. [10] A. L. Hughes and L. Palen. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management, 6(3):248–260, 2009. [11] T. Kharroub and O. Bas. Social media and protests: An examination of twitter images of the 2011 egyptian revolution. New Media & Society, page 1461444815571914, 2015. [12] M. Mendoza, B. Poblete, and C. Castillo. Twitter under crisis: Can we trust what we rt? In Proceedings of the first workshop on social media analytics, pages 71–79. ACM, 2010. [13] L. Palen. Online social media in crisis events. Educause Quarterly, 31(3):76–78, 2008. [14] J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, and R. J. Booth. The development and psychometric properties of liwc2007, 2007. [15] R. Q. Redondo. The image use on twitter during the 2015 municipal election campaign in spain. Revista Latina de Comunicaci´on Social, 71:85–107, 2016. [16] K. Rudra, S. Banerjee, N. Ganguly, P. Goyal, M. Imran, and P. Mitra. Summarizing situational tweets in crisis scenario. In Proceedings of the 27th
1707.05150
1
1707
2017-07-13T18:10:40
Information diffusion in interconnected heterogeneous networks
[ "cs.SI", "physics.soc-ph" ]
In this paper, we are interested in modeling the diffusion of information in a multilayer network using thermodynamic diffusion approach. State of each agent is viewed as a topic mixture represented by a distribution over multiple topics. We have observed and learned diffusion-related thermodynamical patterns in the training data set, and we have used the estimated diffusion structure to predict the future states of the agents. A priori knowledge of a fraction of the state of all agents changes the problem to be a Kalman predictor problem that refines the predicted system state using the error in estimation of the agents. A real world Twitter data set is then used to evaluate and validate our information diffusion model.
cs.SI
cs
INFORMATION DIFFUSION IN INTERCONNECTED HETEROGENEOUS NETWORKS Shahin Mahdizadehaghdam, Han Wang, Hamid Krim North Carolina State University, Department of Electrical and Computer Engineering, Raleigh, NC Liyi Dai Army Research Office, RTP, Raliegh, NC ABSTRACT In this paper, we are interested in modeling the diffusion of in(cid:173) formation in a multilayer network using thermodynamic dif(cid:173) fusion approach. State of each agent is viewed as a topic mix(cid:173) ture represented by a distribution over multiple topics. We have observed and learned diffusion-related thermodynami(cid:173) cal patterns in the training data set, and we have used the es(cid:173) timated diffusion structure to predict the future states of the agents. A priori knowledge of a fraction of the state of all agents changes the problem to be a Kalman predictor prob(cid:173) lem that refines the predicted system state using the error in estimation of the agents. A real world Twitter data set is then used to evaluate and validate our information diffusion model. Index Terms- Multilayer networks, Kalman-Bucy filter, predictor, diffusion network 1. INTRODUCTION Different topics are discussed/diffused in social networks and because of the distinct dynamics of these diffusions, agents in the social networks are affected in different extents. The temporal and spatial dynamics of diffusion have been stud(cid:173) ied through sequences of activation nodes and observed as spreading cascades in a network [1]. The information diffusion process models can be classi(cid:173) fied into three major groups, probabilistic models, thermo(cid:173) dynamic models, and counting models. NETINF [2], NE(cid:173) TRATE [3] and INFOPATH [4] are the probabilistic mod(cid:173) els which infer the underlying diffusion network among in(cid:173) formation sources using consecutive hit times of the nodes by a specific cascade. The main idea behind the thermody(cid:173) namic models [5, 6, 7, 8] is that heat will propagate from a warmer region to a colder region or gas will move from the region with higher density to the region with lower density. Modeling the information as heat or gas, we can write the rate at which information is changing in agent i as: dft' = D Lj A(i, j)('I/Jj - 'I/Ji )- Where '1/J; (t) is the state of the i th agent at time t, D is the diffusion constant which reflects the amount of information passing from an agent to another agent in a small interval of time, and A( i, j) is the i, j element of adjacency matrix. The counting models [9] form counting processes to find the number of nodes in each group of sus(cid:173) ceptible or infected nodes. SIS [ 10] and SIR [ 11] models are two of the well-known ones in this group. One central challenge in modeling information diffusion is to understand the structure of the cascades; the existence of unknown external influence factors and unclear graph con(cid:173) nections obscures this query. In this paper, we have for the first time modeled the simple diffusion on a general multi(cid:173) layer network and applied the model to publication networks and social media data. The multilayer network connectivity structure has been proposed and studied in [12, 13, 14, 15, 16], in particular, a two-layer network has been studied in [7] under the Lapla(cid:173) cian dynamics. However, the information flow following a Laplacian process on a multilayer network in its most general form has yet to be studied. A multilayer network (illustrated in Fig. I) takes into consideration additional connection possi(cid:173) bilities when the true connections for the agents are uncertain. For example, social media such as biogs consist of a set of documents generated by bloggers over time; these documents may share some topical similarities in spite of the different sources they are generated from. It is possible to structure the document similarities into the relational property as a net(cid:173) work of documents. Then one can further associate this layer of connection with the connection of bloggers ( e.g., according to following-follower connection). This leads to a multilayer network model where information diffuse both within a single layer and across the inter-layers. The additional paths due to the multilayer structure will diffuse the information at a sec(cid:173) ondary degree, specifically, an absence of a direct connection between two bloggers may be reestablished by counting the topical similarities between the documents they are associated with. We will refer to the resulting network from a multilayer construction as an interconnected network of heterogeneous nodes. In a community-like network setting with common inter(cid:173) est, such as a network of professors with their publications, online forum community, we have observed diffusion related thermodynamical patterns. It turns out that the simple diffu(cid:173) sion model on the interconnected network structure is very effective in predicting the future state of the agents. (a) Single layer network (b) Multiplex network ( c) Interconnected network Fig. 1: a) A single layer. Dashed edges show connections among bloggers. b) A multiplex network. The top layer is based on the hyperlink inter-connectivity of the bloggers, and the bottom layer is the friendship network between the bloggers. The straight inter-layer edges are showing that the bloggers are the same people in both layers. c) An interconnected network of heterogeneous nodes of agents and documents. The dotted edges are showing which blogger (agent) has produced which document. The paper is organized as follows: We propose our new approach in Section 2, and present substantiating experimen(cid:173) tal results in Section 3. We finally provide the concluding remarks in Section 4. 2. THE PROPOSED METHOD In closed systems, all changes in the states of agents are a result of interaction of the agents in the network. In a single layer network, a diffusion process based on heat equation has been studied in [5 , 6, 7, 8). Independent of the nodes in a multilayer network being agents or documents, we generalize the single layer diffusion process to: The D (i) is the intra-layer diffusion constant of nodes in layer i, and L (M) is the Laplacian matrix of the intra-layer connec(cid:173) tivity of layer M . The inter-layer supra-Laplacian can be written as .C.1 = I:~=l (JC'f - W'f ), where the K'f is the diagonal inter-layer degree matrix of layer o:, showing the inter-layer degree of the nodes in layer o: and the W'f is the inter-layer connectivity matrix of the nodes in layer o: with the nodes in the other layers. The JC'f and W'f are formally defined in Eqns. (4 and 5) respectively: K'f = e co:.o:J ® ( L D (o:,f3J x (o:,f3J) , M /3=1/3,;fo: W'f = L (e(o:,/3) ® (D (o:,/3) w (o:,/3))), M (4) (5) dX - = - .C.X. dt (I) /3=1/3,;fo: Where X is a N x T matrix, N being the number of nodes in the multilayer network, and each row of X is storing a T(cid:173) dimensional state vector for each node . .C. is a N x N supra(cid:173) Laplacian matrix defined in proposition(!). Proposition 1 We can generally write the supra-Laplacian matrix of an M layer multiplex network with N nodes in each layer as Eqn. (2). Where .C.L is the supra-Laplacian matrix of the intra-layer connectivity and .C. 1 is the supra-Laplacian matrix of the inter-layer connectivity. .C.L may be in turn, written as direct sum of the Laplacian matrices of the inde(cid:173) pendent intra-layer connectivities: .C. = .C.L + .C.1 , [ D<' IL <'I M C L= EB D ("') L (a) = o=l (2) DIMILIM) ] · (3) where D (o:,/3) is the inter-layer diffusion constant of agents from layer o: to agents in layer /3, K (o:,/3) is the diagonal ma(cid:173) trix reflecting the degree of each node in the inter-layer con(cid:173) nectivity between layer o: and layer /3, w<o: ,/3) quantifies the inter-layer connectivity of the layer o: nodes to the layer /3 nodes and e(a,/3) is an all 0, M x M, matrix with an only 1 element in ( o:, /3). ® denotes the kronecker product. Proof of proposition (1) can be found in the extended ver(cid:173) sion of the paper [17]. Much of the existing work in information diffusion mod(cid:173) els have a limited scope (of agents, documents, parameters) when predicting the future state of the nodes. More specifi(cid:173) cally, agent states may be varied by external sources which are not captured in the network, or by some agent actions which may even to some extent, conflict with the model prediction. Considering an interconnected network with supra-Laplacian matrix .C., to address this additional auxiliary input, we are further generalizing Eqn. (I) to an open system model as fol(cid:173) lows: dX(t) = - .C.X(t)dt + :EdB(t). (6) B(t) is a T x T matrix, whose columns are T-dimensional vectors with components as independent standard Brownian motions of variances u i and :E is N x T matrix, and each row shows the u i vector for agent i. Inspired by the Ornstein(cid:173) Uhlenbeck (0.U.) process [18], Eqn. (6) describes the veloc(cid:173) ity of the topical-state of the nodes as a Brownian motion in presence of friction. In other words, to describe the uncer(cid:173) tainty due to external effects, we proceed to view the whole system as a massive Brownian particle. The drift term (first term in right-hand side of Eqn. (6)), however, moves the ve(cid:173) locity from a martingale state of u idB( t) towards a consen(cid:173) sus (captured by the drift term). Solution of the differential equation in Eqn. (6), can be expressed as: given the states of nodes at time t0 we can predict the states at time t 1 , t 1 > t 0 as follows: Where e.C(s-t, +to) is a matrix exponential and itself is a N x N matrix. Our proposed learning procedure will evaluate the diffu(cid:173) sion constants in the supra-Laplacian matrix C as well as the :E matrix. To that end, we proceed to minimize the Frobenius norm of the difference between X and it's predict X, resulting from, (8) Solving this optimization problem helps us decompose the predicted matrix into two main components on the right-hand side of Eqn. (7), the first term representing the interactions in the network, while the second quantifying the uncertainty which results from auxiliary inputs into the system. 2.1. Diffusion Network Estimation (Leaming the Supra(cid:173) Laplacian Matrix) The supra-Laplacian matrix C which we use in Eqn. (6) for state prediction, is a result of the network connectivity (refer to Eqn. (2)). In practice, hidden connections are pervasive, in(cid:173) troducing uncertainty in the prediction, which are causing the information diffusion to require more than the predefined, ex(cid:173) plicit connections from the network. To that end, consider ob(cid:173) servations ofX(t) overt E [O, t 1J, denote x(t) := vec(X(t)), the vectorization of X(t) to obtain a vector differential system in order to learn the supra-Laplacian matrix C of Eqn. (6): t(t) = Ax(t) + w(t) , o :S t :S ti, and we have A = Ir @ (- C), the Kronecker product of T(cid:173) by-T identity matrix with (-C) and w(t) is the vectorization ofw(t) = :Ed!~t). We consider the simple cost function J = !t:r E, where E = x - i, and hence for the estimation A we have A = 'Y(x - i)xr (derivative of J with respect to x), where the estimation i(t + 1) = cAx(t) , and~/ > 0 is chosen appropriately as the scaling gain. In optimization iterations, the estimated value of A at ith iteration is as follows: We use A.0 =Ir @ (-C), the graph Laplacian of the explicit following-follower network (as initialization). The learned A may, however, not be exactly structured as Ir @ (-C), due to dependence of topics in the state space, as well as the non(cid:173) linearity and non-homogeneity of the diffusion. The resulting error E shall be considered for the estimation of the noise in the Kalman-Bucy filter as discussed next. 2.2. A Refined Prediction: Kalman-Bucy Filtering In prediction applications, the actual states of some of the nodes are sometimes known, and we want to predict those of all remaining nodes. An example of this may be seen in social networks, where state of the hub nodes, such as fa(cid:173) mous people or users with less restrictive privacy policies are known to the public, and one is interested in predicting the state of other less accessible users. Having partial knowledge of the states of a fraction of the nodes in the network, changes the state prediction problem to a Kalman predictor problem, and helps to refine the predicted states using a Kalman filter. We propose a Kalman-Bucy filter as the optimal linear pre(cid:173) dictor for our system, and we write the observation equation as y(t) = (Ir @H)x(t) +v(t), with Has a diagonal indicator matrix with 1 in all the observed entries, and O in all other entries. A having been learned (see above Section), Kalamn(cid:173) Bucy equations may be written as: t(t) = Ax(t) + w(t) , y(t) = 1lx(t) + v(t) , (9) (10) where 1l = Ir @ Hand the noises w(t) and v(t) are zero(cid:173) mean white (temporally) processes, i.e, E(w(t)w(sf) = Qtc5(t - s), E(v(t)v(sf) = Rtc5(t - s), E(w(t)v(sf) = O. By considering small time intervals on discretization of the linear continues time system ( c5t = 1 ), one can write the state equation as x(t + 1) = Fx(t) + w(t), where F =I+ A. Having Eqn. (10) and x(t + 1) = Fx(t) + w(t) as the state and observation equations respectively, we can predict and refine the predicted states of the nodes using Algorithm ( 1 ). The "learning phase" of the Algorithm (1) is estimating the supra-Laplacian matrix A (see above Section). The sec(cid:173) ond phase of the algorithm, is refining the estimated state of the nodes. Note that Rt is the covariance of the observational error, and Xt 2 1t, denotes the linear prediction of x at time t 2 given observations up to and including time t 1 • The state co(cid:173) variance Ilt satisfies the Riccati equation: • A r Ilt = Ailt + IltA + Qt - GtRtGt . Ar (11) Algorithm 1 Leaming phase: 1: x(t) +- vec(X(t)) 2: A f- Ir 0 (-C) 3: repeat: i(t + 1) +- eAx(t) 4: s: A +- , (x -. i)xr 6: 7: until f fx - if f 2 < r,. Kalman filter prediction on test data: A +-A + A t> Initial state. • . . ,~~ .. - - ) • .1 • Oi!ll<enc:e_...::onsi..,... ... 1n_ + OJ,el,•)"119fflprlO!icllon{TIYM-i0,)'W-) • n.- .... iem .. .. ,, ..... ,. .. . . • • 0.0582000 2002 20(),I """ ""' Time (a) t> Convergence criteria. I: Re,t f- Rt + 1lIItlt- l1lT 2: xt 1t +- xt it-1 + rrt1t-11lrR;,; [j\ -1lxt1t-1l 3: Iltlt f- Iltlt- 1 - II11t- 11lTR;,;1lIItlt- 1 4: Ff- I+ A t> Updating. t> Predicting. While the Gt is the Kalman gain Gt = IIt 1lTRt 1 simplicity, we further assumed that the errors in the state pre(cid:173) diction and observation are Gaussian processes. . For The designed algorithm shows the discrete time, state up(cid:173) date of the Kalman predictor. The estimated states of the available nodes, 1li(t), are compared with the state of the available nodes, y(t) , as measurements observed over time, to evaluate the extent of statistical noise and other inaccura(cid:173) cies in predicting phase. 3. EXPERIMENTS Fig. (2a) shows the prediction based on a network of 79 pro(cid:173) fessors. A three-layer network is formed with the first layer showing if the two professors have ever published in the same venue or not. The second layer being the research group membership of these professors and the third layer showing the similarity network between the papers published by these professors (extracted by LDA [19] topic modeling of the ab(cid:173) stract of the papers with dimension I 0). State of the agents are the I 0-dimensional topical vectors which are the mean of the topical representation of the documents produced by the agents. Over time more documents are getting added and the topical state of the agent are changing. The error measure used in all the experiments is the Frobenius norm of the differ(cid:173) ence of the estimated state of the nodes and ground truth state of the nodes normalized by the Frobenius norm of the ground truth matrix. As may be seen in Fig. (2a), the prediction method based on a three-layer network achieves a lower er(cid:173) ror than the prediction based on a single-layer network. Note, the single-layer network does not help in predicting the top(cid:173) ical states of the agents. The reason is that there are only 79 agents in this experiment and the co-authorship network be(cid:173) tween the agents is not particularly suited to predict the future 008.' · - - - - · , . ,~ . . . . ooe • . ,~ • . , . - -~ · • .,.-... . 0"'----·(cid:173) 41111\ • Open•:,1arnpn,c1,c;1.,.,(~i.y.r,.-_..) + Open•:,1-pt90ic<,on{l"_,..._) 0 Openoyo...,pn,dict.,.,(T_,..._.)_~l ~ Time (b) Fig. 2: (a) Experiment for college professor network with 1000 publication documents. (b) Experiment over Twitter network with 5000 agents and 8 Hashtags. state of the agents. Fig. (2b) is an experiment based on 5000 Twitter users. The first layer is a network among users and the second layer is a network between eight Hashtags used in June 2009. The Hashtags are as follows: #jobs, #spymaster, #neda, #l40mafia, #tcot, #musicmonday, #lranelection, #iremember showing how much these Hashtags are similar to each other by counting and normalizing the number of times they have appeared in the same tweet. The average prediction improve(cid:173) ment achieved by the two-layer network is about 13 percent. The prediction by first estimating the Laplacian matrix, has about 15 percent improvement over the single layer prediction method. Fig. (3) displays the results of an experiment in a small single layer dataset with 300 Twitter agents available. Figs. (3a), (3b), (3c) and (3d) are the same experiments with dif(cid:173) ferent observation sizes of 10 percent, 15 percent, 20 percent and 25 percent of state of all the agents in the network re(cid:173) spectively. As may be seen in the figures , the prediction error based on the estimated Laplacian matrix yields a lower error than fully trusting the connectivity structure in the network. This as expected, is due to static connectivity network (usu(cid:173) ally demonstrates the physical or online relation among the agents), falling short on affecting the actual underlying diffu(cid:173) sion structure on the network. Having a prior partial knowl(cid:173) edge of the agents enabled us to use a Kalman predictor to further refine our prediction. ,oe••o' (a) ,oe ' '0"' .... . .. .. .;· .... , - •.•,.••!':.. ........ • :· •• 10• : • !02 • . . ~. . , . , . . , •• •• · · .-. • . , .... , • . . • 10 •o~ "° ~ 'O ..q, ., ... co,oeq, , . e 11 00 ~ ~ OO QO ~ O ~ Q) 0 0 ,.e ... --!(-(cid:173) . .,, .. . ~ ~..._ • w'w,,; v,wry~w,, ~ w ", • · - - a h a.!L o --..,..-L ,1 •• ~ • (b) ~ TimP (c) T ime (d) Fig. 3: Experiment over Twitter network with 300 agents. Predicting the state of the agents using a fixed Laplacian ma(cid:173) trix, using an estimated Laplacian matrix, and Prediction us(cid:173) ing Kalman filter with IO percent, 15 percent, 20 percent, and 25 percent of observation of state of all the agents in Figs. (a), (b), (c) and (d) respectively. 4. CONCLUSIONS ther refine our state prediction by learning over the prediction error of the observed subset. In future work, we will explore the information diffusion problem with a goal to develop nec(cid:173) essary tools to analyze diffusion in more complex network structures. 5. REFERENCES [I] A. Guille, "Information diffusion in online social net(cid:173) works," in Proceedings of the 2013 SIGMOD!PODS Ph. D. symposium. ACM, 2013, pp. 31-36. [2] M. Gomez Rodriguez, J. Leskovec, and A. Krause, "In(cid:173) ferring networks of diffusion and influence," in Proceed(cid:173) ings of the 16th ACM S/GKDD international conference on Knowledge discovery and data mining. ACM, 20 I 0, pp. 1019-1028. [3] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Un(cid:173) covering the temporal dynamics of diffusion networks," arXiv preprint arXiv: I 105.0697, 2011. [4] M. Gomez Rodriguez, J. Leskovec, and B. Scholkopf, "Structure and dynamics of information pathways in online media," in Proceedings of the sixth ACM inter(cid:173) national conference on Web search and data mining. ACM, 2013, pp. 23-32. [5] M. Newman, Networks: an introduction. Oxford Uni(cid:173) versity Press, 2010. [6] F. Escolano, E. R. Hancock, and M. A. Lozano, "Heat diffusion: Thermodynamic depth complexity of net(cid:173) works," Physical Review E, vol. 85, no. 3, p. 036206, 2012. [7] S. Gomez, A. Diaz-Guilera, J. Gomez-Gardefies, C. J. Perez-Vicente, Y. Moreno, and A. Arenas, "Diffusion dynamics on multiplex networks," Physical review let(cid:173) ters, vol. 110, no. 2, p. 028701, 2013. [8] A. Sole-Ribalta, M. De Domenico, N. E. Kouvaris, A. Diaz-Guilera, S. Gomez, and A. Arenas, "Spectral properties of the laplacian of multiplex networks," Phys(cid:173) ical Review E, vol. 88, no. 3, p. 032807, 2013. [9] H. W. Hethcote, "The mathematics of infectious dis(cid:173) eases," SIAM review, vol. 42, no. 4, pp. 599-653, 2000. In this paper, we proposed a signal processing technique to model and predict states in a multilayer network. The actual diffusion network has been learned by looking at previous dif(cid:173) fusion data and has been applied to predicting the future states of agents in the network. Having partial observation of the state of the agents changes the state-space dynamics model to a Kalman filter problem. The Kalman filter allows us to fur- [ 10] I. Nasell, "The quasi-stationary distribution of the closed endemic sis model," Advances in Applied Proba(cid:173) bility, pp. 895-932, 1996. [ 11] B. Shulgin, L. Stone, and Z. Agur, "Pulse vaccination strategy in the sir epidemic model," Bulletin of Mathe(cid:173) matical Biology, vol. 60, no. 6, pp.1123-1148, 1998. [12] M. De Domenico, A. Sole-Ribalta, E. Cozzo, M. Kivela, Y. Moreno, M. A. Porter, S. Gomez, and A. Arenas, "Mathematical formulation of multilayer networks," Physical Review X, vol. 3, no. 4, p. 041022, 2013. [13] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. G6mez-Gardefies, M. Romance, I. Sendifia-Nadal, Z. Wang, and M. Zanin, "The structure and dynamics of multilayer networks," Physics Reports, vol. 544, no. 1, pp. 1-122, 2014. [14] F. Battiston, V. Nicosia, and V. Latora, "Structural measures for multiplex networks," Physical Review E, vol. 89,no. 3,p. 032804,2014. [15] B. Oselio, A. Kulesza, and A. Hero, "Information ex(cid:173) traction from large multi-layer social networks," in 2015 IEEE International Conference on Acoustics, Speech IEEE, 2015 , pp. and Signal Processing (JCASSP). 5451-5455. [16] B. Oselio, A. Kulesza, and A. 0 . Hero, "Multi-layer graph analysis for dynamic social networks," IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 4,pp.514-523,2014. [17] S. Mahdizadehaghdam, H. Wang, H. Krim, and L. Dai, "Information Diffusion of Topic Propagation in Social Media," ArXiv e-prints, Feb. 2016. [18] G. E. Uhlenbeck and L. S. Ornstein, "On the theory of the brownian motion," Phys. Rev., vol. 36, pp. 823-841, Sep 1930. [Online]. Avail(cid:173) able: http://link.aps.org/doi/l 0.1103/PhysRev.36.823 [19] D. M. Blei, A. Y. Ng, and M. I. Jordan, "La(cid:173) tent dirichlet allocation," J. Mach. Learn. Res., vol. 3, pp. 993-1022, Mar. 2003. [Online] . Available: http://dl.acm.org/citation.cfm ?id=9449 l 9 .944937
1509.00556
2
1509
2017-09-28T17:01:27
Efficient Detection of Communities with Significant Overlaps in Networks: Partial Community Merger Algorithm
[ "cs.SI", "physics.soc-ph" ]
Detecting communities in large-scale networks is a challenging task when each vertex may belong to multiple communities, as is often the case in social networks. The multiple memberships of vertices and thus the strong overlaps among communities render many detection algorithms invalid. We develop a Partial Community Merger Algorithm (PCMA) for detecting communities with significant overlaps as well as slightly overlapping and disjoint ones. It is a bottom-up approach based on properly reassembling partial information of communities revealed in ego networks of vertices to reconstruct complete communities. Noise control and merger order are the two key issues in implementing this idea. We propose a novel similarity measure between two merged communities that can suppress noise and an efficient algorithm that recursively merges the most similar pair of communities. The validity and accuracy of PCMA is tested against two benchmarks and compared to four existing algorithms. It is the most efficient one with linear complexity and it outperforms the compared algorithms when vertices have multiple memberships. PCMA is applied to two huge online social networks, Friendster and Sina Weibo. Millions of communities are detected and they are of higher qualities than the corresponding metadata groups. We find that the latter should not be regarded as the ground-truth of structural communities. The significant overlapping pattern found in the detected communities confirms the need of new algorithms, such as PCMA, to handle multiple memberships of vertices in social networks.
cs.SI
cs
ZU064-05-FPR pcma 9 August 2017 22:51 Under consideration for publication in Network Science 1 Efficient Detection of Communities with Significant Overlaps in Networks: Partial Community Merger Algorithm Elvis H.W. Xu and Pak Ming Hui Department of Physics, The Chinese University of Hong Kong, Shatin, New Territories, Hong Kong, China (e-mail: {hwxu,pmhui}@phy.cuhk.edu.hk) Abstract Detecting communities in large-scale networks is a challenging task when each vertex may belong to multiple communities, as is often the case in social networks. The multiple memberships of vertices and thus the strong overlaps among communities render many detection algorithms invalid. We develop a Partial Community Merger Algorithm (PCMA) for detecting communities with signifi- cant overlaps as well as slightly overlapping and disjoint ones. It is a bottom-up approach based on properly reassembling partial information of communities revealed in ego networks of vertices to reconstruct complete communities. Noise control and merger order are the two key issues in implementing this idea. We propose a novel similarity measure between two merged communities that can suppress noise and an efficient algorithm that recursively merges the most similar pair of communities. The validity and accuracy of PCMA is tested against two benchmarks and compared to four existing algorithms. It is the most efficient one with linear complexity and it outperforms the compared algorithms when vertices have multiple memberships. PCMA is applied to two huge online social networks, Friendster and Sina Weibo. Millions of communities are detected and they are of higher qualities than the corresponding metadata groups. We find that the latter should not be regarded as the ground-truth of structural communities. The significant overlapping pattern found in the detected communities confirms the need of new algorithms, such as PCMA, to handle multiple memberships of vertices in social networks. Keywords: Community Detection, Community Structure, Overlapping Community, Partial Commu- nity, Social Networks, Vertex Memberships, Metadata Groups, Linear Complexity 7 1 0 2 p e S 8 2 ] I S . s c [ 2 v 6 5 5 0 0 . 9 0 5 1 : v i X r a 1 Introduction Community structure is commonly found in networked systems in nature and society (Girvan & Newman, 2002). While it is almost common sense to realize the existence of communities, extracting such mesoscopic structures efficiently and accurately remains a challenging task and yet it is crucial to the understanding of the functionality of these systems. Although the definition of community remains ambiguous and a commonly accepted definition is lacking, many detection algorithms have been developed in the past decade (Fortunato, 2010) with most of them motivated by an intuitive notion that there should be more edges within the com- munity than edges connecting to the outside (Seidman, 1983; Girvan & Newman, 2002; ZU064-05-FPR pcma 9 August 2017 22:51 2 Elvis H.W. Xu and Pak Ming Hui Radicchi et al., 2004). This viewpoint on what a community is about implies that com- munities are almost disjoint, and it is behind the design of non-overlapping community detection algorithms. However, it was soon found by empirical studies that it is common for communities to overlap, i.e. each vertex may have multiple memberships (Palla et al., 2005) and thus it may be shared by communities. Several approaches have been proposed for detecting overlapping communities, including clique percolation (Palla et al., 2005), link partitioning (Evans & Lambiotte, 2009; Evans & Lambiotte, 2010; Ahn et al., 2010), local expansion and optimization (Baumes et al., 2005; Lancichinetti et al., 2009; Lancichinetti et al., 2011), and label propagation (Raghavan et al., 2007; Gregory, 2010; Xie et al., 2011). Some of them inherit the notion of non-overlapping communities and then loose constraint to allow vertices to be shared by communities. For example, algorithms of local expansion and optimization usually use a fitness function that is positively correlated to the ratio between the number of internal and external edges of a community. We remark that the fitness function is fine with disjoint or slightly overlapping communities, but is not applicable to significantly overlapping communities of which most vertices have multiple memberships. For example, if most members of a community have more than one membership, it is very likely that the community has much more edges to the outside than edges within the community, which is often the case in social networks. We think a new concept fundamen- tally different from non-overlapping communities is needed that imposes no constraints or implications on the fraction of overlapping vertices and the number of communities a vertex may have. Taking the two aspects into consideration, we propose a general concept of overlapping community that each member of a community should connect to a certain fraction of the other members. There are no constraints on whether the community has more internal than external edges or whether a member devotes most of its edges to this community. This intuitive idea is similar to k-core, but it is fraction-based and we name it f -core. Unlike k-core that cannot overlap, an f -core allows its members to belong to arbitrary number of f -cores and thus it is suitable to be a definition of overlapping community. Yet, f -core only focuses on edge densities and does not specify how members are connected to each other. To make it a useful concept in the context of communities, a further constraint that a community has members who are densely connected to each other and thus a relatively high value of clustering coefficient will prove effective. Structurally, communities with significant overlaps are hidden under dense and messy edges, unlike the cases of disjoint and slightly overlapping communities. Identifying such communities is highly non-trivial from a global or top-down viewpoint. Starting locally from a vertex, however, it is easier to identify which groups a vertex belongs to in the subnetwork consisting of the vertex itself and its neighbors, i.e. the ego network of a vertex, as illustrated in Fig. 1 using data from an online social network. Several com- munity detection algorithms that take advantage of such local community structure in ego networks have been developed in recent years. Coscia et al. proposed a method DEMON (Coscia et al., 2012; Coscia et al., 2014) that let each vertex vote for the communities it sees in its ego network democratically and then merges similar communities repeatedly if the overlap between two communities is above a threshold. The method EgoCluster- ing by Rees et al. (Rees & Gallagher, 2012) follows a very similar idea with a different merger criterion. Later on Soundarajan and Hopcroft proposed the Node Perception algo- rithm (Soundarajan & Hopcroft, 2015), which is a general algorithm template consisting of ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 3 three steps: firstly detect subcommunities in the neighborhood of each vertex; then create a new network of which each vertex represents a subcommunity and the edges represent some relationship between subcommunities; and finally detect communities in the network of subcommunity. Since the merger of similar subcommunities can be reinterpreted as the second and the third step, DEMON and EgoClustering can be regarded as implementations and special cases of the template. This intuitive local-first approach is easy to conceive. The key to success lies in how to implement it, especially for the latter two steps, i.e. finding a proper way of merging similar communities. There are two key issues to be addressed: merger order and noise control. In DEMON, a community A is immediately merged with another community B if the overlap between them is above a threshold, without considering whether there exists a better candidate C to be merged with A. This would lead to less accurate results, and we think always merging with the best candidate is preferable. Also, the detected communities in ego networks may contain noise, i.e. vertices that are misclassfied into these communities. The noise accumulates quickly as the merger proceeds and the similarity measure, i.e. the overlap between two merged communities used in DEMON and EgoClustering, becomes less and less accurate. It eventually leads to poor accuracy, as we will show in benchmarking in Sec. 3. Taking these aspects into account, we develop a Partial Community Merger Algorithm (PCMA) based on the same local-first approach for detecting communities with significant overlaps as well as slightly overlapping and disjoint ones. We propose a sophisticated yet efficient similarity measure between merged communities that can trace the merger history and suppress noise ac- cumulated during the process. The mathematical properties of the measure allow us to design a linear complexity merger algorithm that always merges the most similar pair of communities. The variables used in the measure can be utilized to establish a set of thresholds for further reducing noise after merger. Besides the efficiency and accuracy ensured by the proposed similarity measure, our method is also equipped with many fea- tures that are essential to dealing with large-scale real networks. Like other algorithms based on local approaches, the method does not require an input of the total number of communities to be detected. Most importantly, the assumption of disjoint or slightly overlapping communities is abandoned and the method is designed to handle the possibility of multiple memberships of a vertex and detect significantly overlapping communities. Our method also allows vertices to be isolated, i.e., they do not belong to any communities. Community detection algorithms must be able to distinguish real communities from pseudo communities (Bianconi et al., 2009; Lancichinetti et al., 2010). We are well aware of the issue and our method sifts out real communities by applying proper thresholds. All these advantages make the method uniquely capable of detecting communities with significant overlaps efficiently in large-scale real networks with hundreds of millions of vertices. The plan of the paper is as follows. In Sec. 2, we introduce the details of the algorithm, including similarity measure, merger of similar communities, thresholds, and applicability. In Sec. 3, the method is tested against two benchmarks and its performance in accuracy and efficiency is compared with four other recently proposed algorithms. In Sec. 4, we apply the method to two huge social networks and compare the communities detected with the metadata groups. We show that significantly overlapping communities are common in social networks. Results are summarized in Sec. 5. ZU064-05-FPR pcma 9 August 2017 22:51 4 Elvis H.W. Xu and Pak Ming Hui Fig. 1. (Color online) An ego network of a vertex provides the local information and reveals several partial communities. The network was constructed from data collected from Sina Weibo, an online social network akin to the hybrid of Facebook and Twitter. The partial communities are found by an existing algorithm as described in Appendix A. PCMA is an efficient and accurate algorithm for detecting complete communities in a huge network by properly merging partial communities revealed by the ego networks of all the vertices. 2 Partial Community Merger Algorithm 2.1 General Principle We aim to detect communities in a network in which vertices could span from being isolated to belonging to multiple communities. This renders many top-down algorithms invalid. We first give a physical picture of our algorithm. Consider a community in which every member is connected to a certain fraction of the other members. At the local level of the members, they only known their own neighbors and have no knowledge of the complete community. They are given the task of compiling a roster of the community and identify who the core members are. To complete the task, each member shares its local information consisting of a name list including itself and all its neighbors. A complete roster can in principle be derived by merging these individual name lists skillfully. Those who appear frequently on the lists are the core members, while those with less occurrence are on ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 5 the periphery of the community. This merger process is the core idea of our method of detecting communities. Practically, we start with exploring the ego network of a vertex, i.e. the subnetwork consisting of the vertex itself and its neighbors, and identifying the communities hidden in it. This is illustrated in Fig. 1 for a vertex (the central one) in an online social network. This local view lets us see the communities clearly. Since a vertex may not know all the members in each of its communities, the identified communities in the ego network of a vertex are incomplete. We refer to them as the partial communities from the viewpoint of the vertex. This process can be carried out for every vertex. Although each member only helps reveal part of the whole picture, the idea is that aggregating local information should reveal the complete communities, i.e., every community with all its members. With the partial communities revealed by different vertices, the next step is to determine which ones are actually different parts of the same community. It is a technically difficult task as the number of partial communities may even be greater than the number of vertices in the whole network and vertices may be misclassified into partial communities that they actually do not belong to. Merger of corresponding partial communities in principle recon- structs the complete community. It, however, also causes the noise in partial communities to be accumulated. A cleaning process or post-processing scheme is then invoked to eliminate the misclassified vertices and sift out the real and complete communities. Our method thus consists of three steps: 1. Find the partial communities in the ego network of each of the vertices. 2. Merge partial communities that are parts of the same community to reconstruct complete communities. 3. Clean the merged communities to sift out real communities. For easy reference, we call the method Partial Community Merger Algorithm or PCMA in short. For Step 1, many existing algorithms are available and we use the one proposed by Ball et al. (Ball et al., 2011), with details given in Appendix A. The new elements are Step 2 and Step 3. Below, we introduce our implementation of Steps 2 and 3 in detail. 2.2 PCMA Step 2: Merger The merger process aims to reassemble partial communities that are part of the same complete community. As discussed in Sec. 1, care must be taken over the merger order and noise control to make the process effective. We propose an efficient hierarchical clustering based algorithm that always merges the most similar pair of communities and it can handle noise properly. The key here is to find a suitable similarity measure between communities, each of which is represented by a set of vertices. The Jaccard index is a commonly used similarity measure. It is defined to be the size of the intersection divided by the size of the union of two sets. A drawback of the index is that the members are assumed equal. A merged community, however, contains core members, peripheral members, and even misclassified ones. They should be treated differently. Here we propose a novel similarity measure that incorporates the different importance of members and hence reduce significantly the interference of the misclassified vertices on the measure. ZU064-05-FPR pcma 9 August 2017 22:51 6 Elvis H.W. Xu and Pak Ming Hui For a Vertex i in Community C, let Si,C be a score that represents its importance in C. Without loss of generality, we define Si,C = 0 if i /∈ C. Let lC be the number of partial communities that have merged to form Community C. Before the merger, the partial com- munities identified by Step 1 all have l = 1 and all members carry an initial score of 1. When two communities A and B merge into one, e.g. C = A∪ B, the quantities Si,C and lC are given by Si,C = Si,A + Si,B lC = lA + lB (1) (2) Physically, Si,C traces the number of occurrences of Vertex i in the lC partial communities that have merged to form Community C. Vertices with a high value of S/l are regarded as core members, and those with a small S, say less than 3, are very likely vertices that are misclassified. Consider two communities A and B. We define an asymmetric measure f (A, B) to take into account the different importance of members as f (A, B) = ∑ i Si,B lB · Si,A wA , (3) where wA = ∑ i Si,A. The term Si,B/lB represents a normalized importance of Vertex i in B, ranging from 0 to 1, and Si,A/wA is a weighting factor of Vertex i in A. So f (A, B) measures the weighted average importance of A's members in B. The product Si,B· Si,A ensures that f will not be affected much by the misclassified vertices, i.e. those with small values of S. A large value of f (A, B) indicates that the core members of A are also core members of B, but not vice versa as f (A, B) 6= f (B, A) in general. This measure has the following properties: (4) f (A, B) + f (A,C) lB f (A, B∪ C) = lB + lC lC lB + lC f (B∪ C, A) = wB wB + wC f (B, A) + wC wB + wC f (C, A) , (5) which can be readily shown. Let {A} ({B}) denote the set of partial communities that form the Community A (B). It follows from Eqs. (4) and (5) that f (A, B) = f (∪x∈{A}x,∪y∈{B}y) = ∑ x∈{A} y∈{B} wx wAlB f (x, y) . (6) Recall that x and y are partial communities and thus f (x, y) is the portion of members of x who are also members of y, i.e. f (x, y) = x∩ y x . (7) Equation (6) indicates that f (A, B) is actually a weighted average of the overlap portion f (x, y) over all combinations of partial communities forming A and B, i.e. with {(x, y), x ∈ {A}, y ∈ {B}}. The merger of two communities A and B is different from either A absorbing B or B absorbing A. Thus, a symmetric analogy of f (A, B) is preferred for deciding a merger. To motivate the construction of such a parameter, we introduce a measure g(C) of a Community C in a way similar to Eq. (6) that compares members in the partial communities ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm forming C: 7 (8) g(C) =( 1 ∑ x,y∈{C} x6=y if lC = 1 if lC > 1 wx f (x,y) wC(lC−1) It gives the average portion of overlap between partial communities in a merged commu- nity. Its physical meaning can be seen by considering the special case that C is an ER random network G(n, p) with members randomly connected with a probability p. A partial community now consists of a vertex and all its neighbors. The expected portion of overlap between two partial communities f (x, y) is roughly p, giving g(C) ≈ p. This indicates that g(C) is approximately a measure of the fraction of other members that a member is connected to. A larger g(C) implies denser internal edges in the community and thus members are connected tightly to each other. It can be used as an indicator on whether a merged community is a real community or just a wrongly merged set of vertices. For the case C = A∪ B, g(C) satisfies g(C) = where 1 wC(lC−1) {wA(lA − 1)g(A) + wB(lB − 1)g(B) +(wAlB + wBlA) fs(A, B)} , fs(A, B) = wAlB f (A, B) + wBlA f (B, A) wAlB + wBlA = 2 ∑i Si,A · Si,B wAlB + wBlA . (9) (10) There are three terms in Eq. (9) for g(C). The first and second terms give the overlap portions within A and within B, respectively. The third term in Eq. (9) measures the overlap between A and B. It is important to note that a symmetric measure fs(A, B), as defined in Eq. (10), emerges. It is a weighted average of the asymmetric measures f (A, B) and f (B, A) and yet itself satisfies fs(A, B) = fs(B, A). It follows from Eq. (10) that fs(A, B∪ C) is given by a weighted average of fs(A, B) and fs(A,C), and thus fs(A, B∪ C) 6 max{ fs(A, B), fs(A,C)} . (11) We are thus led to apply fs as a symmetric similarity measure between two communities that accounts for the different importance of the members. We remark that fs is not the only option but it is a good one because of its many advantages: fs has a clear physical meaning that measures the average overlap portion of partial communities between A and B; it respects the different importance of members of a community; it is linear and easy to calculate; and its mathematical property expressed in Eq.( 11) allows us to optimise the merger process to be of linear complexity as we will discuss shortly. Based on the idea of agglomerative hierarchical clustering, the merger process using fs as the similarity measure can be implemented as follows. Given a set C of communities to be merged, a straightforward way is to: 1. Calculate fs for each pair of communities in C and maintain a priority queue of fs in descending order. 2. Merge the pair with the largest fs and update the priority queue. 3. Repeat 2 until the largest fs in the priority queue falls below a threshold t fs . The time complexity of this algorithm is O(n2 log n), where n is the number of communities in C . The space complexity is O(n2) as we need to maintain the priority queue of fs. For ZU064-05-FPR pcma 9 August 2017 22:51 8 Elvis H.W. Xu and Pak Ming Hui detecting communities in large-scale networks, a more efficient algorithm is desirable. In what follows, we propose two optimizations to reduce both the time and space complexity to O(n). We define the best merger candidate of a community A as bmc(A) = arg max X∈C /A fs(A, X) . (12) We argue that the algorithm above is equivalent to: 1: given a set of communities C 2: repeat choose a community A from C B ← bmc(A) while bmc(B) 6= A do A ← B B ← bmc(A) end while if fs(A, B) > t fs then 3: 4: 5: 6: 7: 8: 9: 10: 11: merge A and B remove A and B, add A∪ B to C end if 12: 13: until no communities can be merged anymore 14: return C The algorithm makes use of the property of fs given in Eq. (11). If A and B are the best merger candidates of each other, there does not exist a community C that gives fs(A,C) > fs(A, B), where C can be any combination of communities in C /A. Therefore, even if fs(A, B) is not at the top of the fs priority queue, the merger of A and B can be moved forward since other mergers higher on the priority queue that would take part will not affect the merger of A and B. An advantage is that merges are not required to proceed in order in the algorithm, and thus there is no need to maintain the fs priority queue. The space complexity is reduced from O(n2) to O(n). The search on bmc(A) is formally within the set C /A. Practically, the search area can be reduced significantly, as most of the communities in C /A do not even share a single mem- ber with A in sparse networks. A good approximation is to limit the search to the partial communities from the viewpoints of A's members and the merged communities containing these partial communities. As such, the time complexity of calculating bmc(A) does not scale with n, providing that the community size and the number of partial communities per vertex are independent of the network size. The number of iterations of finding a pair of communities to merge should also be independent of n. The repeated loop requires a time complexity of O(n). Since n usually scales linearly with the network size, it can also be regarded as the network size. We thus argue that the time complexity of our optimized merger algorithm is approximately O(n). This is verified numerically in Sec. 3. The choice of the value of t fs depends on the networks being analyzed, and one's subjec- tive view of how dense the internal edges of a community should be. There is no standard answer. For example, setting t fs = 0.1 means we aim to detect communities of which the members know more than 10% of the other members on average. Using a higher value ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 9 means PCMA will focus on communities with denser internal edges or the cores inside them, and those with a lower density are not acknowledged as communities. Lowering t fs would bring in more peripheral vertices as members and would cause further merger of similar communities. Tuning t fs from high to low may extract the core-periphery and possible hierarchical structure of communities. It is another important topic that is beyond the scope of the present work, we leave it to future work. We think t fs = 0.1 is a good choice for social communities and it is harsh enough for those with a large size. However, it can easily be satisfied by small ones. For example, two partial communities of size 10 only need one common member to satisfy the threshold. Since partial communities detected in PCMA Step 1 may contain a lot of misclassified members, such loose threshold for small partial communities may result in a lot of mergers of partial communities that are actually not part of the same complete community. We suppress such unwanted mergers of small partial communities by forcing the similarity fs (A, B) = 0 if ∑i Si,A· Si,B/ max{lA, lB} < t f0 . It means two partial communities can merge only if the number of their common members is no less than t f0 . A better solution is to use a dynamic t fs that depends on the sizes of communities and we leave it to future work. 2.3 PCMA Step 3: Post-processing After merging communities, a cleaning process is needed to handle two types of noise. First, we need to identify which merged communities are real communities and which are simply merged sets of vertices by coincidence. The latter usually contain only a small number of partial communities because they are merged by accidents. The more partial communities a merged community contains, the more likely it is a real community. Thus, the parameter l of a community can be used as a measure of whether a detected community is trustful. A way to sift out real communities is to set a threshold tl and require all real communities to have l > tl. The threshold can be set in many ways, e.g. setting tl based on each community's size, as a larger community usually caries a larger l. Second, we need to identify and eliminate vertices that are misclassified into partial communities in Step 1. Recall that Si,C is the number of occurrences of Vertex i in lC partial communities that formed the Community C. Excluding Vertex i's own partial communities (if any), the remaining score S′i,C can roughly be interpreted as the number of other members that Vertex i is connected to in Community C. Usually S′i,C = Si,C − 1. If the probability of Vertex i being misclassified into a partial community is 10%, then being misclassified into S′i,C partial communities of C is 0.1S′i,C. Therefore, the probability of Vertex i being a false member drops sharply with increasing S′i,C. Thus, a threshold tS′ can be set to eliminate vertices with S′ < tS′ . Normally tS′ = 4 is sufficiently stringent and it should not be less than 2. There remain vertices with S′ > tS′ but S′/l ≈ 0. They may still not be members since they know too few other members. The ratio S′/l gives an estimate on the fraction of the other members that a member is connected to. Another criterion S′/l > tS′/l becomes useful, with tS′/l being a threshold that requires each member be connected to at least tS′/l × 100% of the other members. This criterion echoes the concept of f -core discussed in Sec 1. The threshold tS′/l can either be set uniformly for all communities or individually for each community based on the value of g, which reflects the average portion that a member is connected to the other members. Since different kinds of networks may have ZU064-05-FPR pcma 9 August 2017 22:51 10 Elvis H.W. Xu and Pak Ming Hui different community structures, the choice of tS′/l depends on the nature of communities of a specific network under study. 2.4 Applicability PCMA works under two conditions: Existence of partial communities (Step 1) and ad- equate overlap between partial communities for mergers (Step 2). Usually, the second condition is satisfied automatically when the network under study meets the first condition. For the first condition, the existence of partial communities from the viewpoint of a vertex requires that there are sufficient number of neighbors and a high density of edges among the neighbors, i.e., a high local clustering coefficient of the vertex. We expect a community detected by PCMA to have the following properties: 1. Two members with common neighbors are highly likely neighbors of each other. As a consequence, the community has a relatively high value of clustering coefficient. 2. The shortest distances between most pairs of members are generally short and not longer than 3. Thus, most members are connected to each other either directly or via one/two intermediate member(s). 3. Each member is connected to at least a certain fraction of the other members. From another perspective, these properties can be taken as a broad descriptive definition of community, and are well suited for describing communities with significant overlaps. PCMA is designed to detect this kind of communities, which are important in large-scale systems with vertices typically having multiple memberships. 3 Benchmarking We tested PCMA using two benchmark models to illustrate its performance and applicabil- ity. Results are compared with DEMON (Coscia et al., 2012), which shares the same gen- eral idea as that of PCMA, and also three other fast and accurate overlapping community detection algorithms that are among the best (Xie et al., 2013): namely OSLOM (Lancichinetti et al., 2011), SLPA (Xie et al., 2011), and BIGCLAM (Yang & Leskovec, 2013b). First, a simple benchmark model in the spirit of the planted ℓ-partition model (Condon & Karp, 2001) is used. The network is generated as follows: 1. Generate an ER random network of n vertices with a mean degree hki that serves as background noise. 2. Randomly sample s vertices as a community, with s satisfying the Poisson distribu- tion with an expected value of hsi. Connect each pair of members with a probability p. 3. Repeat the step to generate n·hci communities. Here, hci is the expected number of communities that a vertex belongs to. This model is flexible in that the total number, size, and intra-community edge density, as well as the background noise level can be directly controlled. In addition, vertices can belong to an arbitrary number of communities, including zero. There is no guarantee that there are more edges within a community than edges going out. These features make many ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 11 existing community detection algorithms invalid. They reflect the challenges posed by real social networks, in which a person often simultaneously belongs to many groups, on community detection. PCMA is designed to solve the problem. Consider a network with n = 105, hki = 20, p = 0.3, hsi = 40, and hci = 2 generated as described. The threshold t fs = 0.1 is chosen for the merger process. Fig. 2 shows the actual community size distributions generated by the model (diamonds). The results as detected by PCMA before (circles) and after post-processing (squares) are shown for comparison. As discussed in Sec. 2.3, the merged communities without post-processing are noisy. The results show a peak at a small community size due to many coincidentally merged sets of vertices, which are targeted for removal in post-processing. The results also show a bump in the distribution at large community sizes. Although these are real communities, the many misclassified vertices make their sizes bigger than their actual sizes. Hence, results before post-processing could be misleading. By setting the thresholds properly, as given in Table A 2 in Appendix B, the distribution after post-processing is in good agreement with the actual community size distribution. n o i t u b i r t s i D 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0.00 0 Generated distribution Detected distribution (before post-processing) Detected distribution (after post-processing) 50 100 150 200 Community Size Fig. 2. (Color online) Community size distribution as generated by the benchmark model (diamonds) described in the text. The corresponding results as detected by our method before (circles) and after (squares) applying the post-processing scheme are shown for comparison. The thresholds are given in Table A 2 in Appendix B. To qualify the accuracy of PCMA, we adopt the widely used Normalized Mutual Infor- mation (NMI) (Danon et al., 2005) as extended by Lancichinetti et al. (Lancichinetti et al., 2009) to compare overlapping communities. As a recent study showed there may be cases in which NMI is biased (Zhang, 2015), we use two additional measures, namely the Omega Index (Murray et al., 2012) and F1 Score, to make the evaluation more comprehensive. The F1 Score in the present work is defined as F1(D, G ) = 2· Precision(D, G )· Recall(D, G ) Precision(D, G ) + Recall(D, G ) , (13) ZU064-05-FPR pcma 9 August 2017 22:51 12 Elvis H.W. Xu and Pak Ming Hui Precision(D, G ) = 1 D ∑ D∈D max G∈G D∩ G D∪ G , Recall(D, G ) = Precision(G , D) , (14) (15) where D and G are the detected communities and the ground-truth, respectively. Fig. 3(a) compares the performance of DEMON, OSLOM, BIGCLAM, and PCMA on synthetic networks with different intra-community edge densities. Results of SLPA are not shown because the method cannot detect isolated vertices. DEMON failed to detect communities generated by this benchmark as values of the NMI and Omega Index are almost zero. As discussed in Sec. 1, a main reason is that the misclassified vertices invalidate the similarity measure in DEMON which is based on the overlap between two communities. Fig. A 2 shows an example of a merged community containing two times more misclassified vertices than true members. It indicates clearly that a similarity measure capable of tracing the different importance of vertices in a merged community, such as the one used in PCMA, is essential for the effectiveness of the merger. The accuracy of OSLOM depends strongly on the number of iterations. We use the de- fault value r = 10 suggested in Ref. (Lancichinetti et al., 2011), unless specified otherwise. BIGCLAM and PCMA are shown to be sensitive to the intra-community edge density p. For PCMA, it is because p affects the existence of partial communities, which is a criterion for the applicability of PCMA (see Sec. 2.4). In the benchmark model, the probability p promotes partial communities. PCMA works well when hknni = [(hsi− 1)p− 1] p > 2 , (16) where (hsi−1)p is the expected number of neighbors of a member and hknni is the expected number of edges of a neighbor connecting to other neighbors of the member. The neighbors start to be strongly connected, i.e. partial communities emerge, when hknni > 2. From Fig. 3(a), PCMA performs better than OSLOM for p > 0.28, corresponding to hknni > 2.78 for the case of hsi = 40. Fig. 3(b) shows the dependence of the performance on hci, which controls the expected number of communities that a vertex belongs to. A larger hci corresponds to more edges connecting the communities and thus a denser and more complex network. The perfor- mance of DEMON is far worse than the other methods (similar to what is shown in Fig. 3(a)) and the result is not shown. For a system with n = 104 members, the accu- racy of OSLOM falls rapidly with increasing hci. For PCMA, the accuracy remains high throughout, with a slight drop due to the finite size of the network instead of hci. This is verified by the performance of PCMA in a bigger system of n = 105 (circles in Fig. 3(b)). Recall that many existing algorithms become invalid in problems that a vertex may belong to many communities, but PCMA handles them well. We also tested PCMA with the widely used LFR benchmark model (Lancichinetti et al., 2008). The results are shown in Fig. 3(c). In the LFR model, a vertex has a degree chosen from a distribution that follows a power-law of exponent τ1 in a range of degrees kmin 6 k 6 kmax corresponding to a mean degree hki. A tunable fraction of vertices are chosen to belong to more than one communities. They are the overlapping vertices. The remaining vertices have only one community. For a vertex of degree k, a parameter µ sets the fraction of the edges to be connected to vertices outside the community(ies) that the vertex belongs n o i t a m r o f n I l a u t u M d e z i l a m r o N 1.0 0.8 0.6 0.4 0.2 (a) DEMON OSLOM, r = 1 OSLOM, r = 10 BIGCLAM PCMA 0.0 0.15 0.20 0.25 p 0.30 0.35 1.0 0.9 0.8 0.7 0.6 0.5 0.4 (b) (c) 1.0 0.8 0.6 0.4 0.2 0.0 0.0 DEMON SLPA OSLOM BIGCLAM PCMA 0.2 0.4 0.6 0.8 1.0 Fraction of overlapping vertices OSLOM BIGCLAM PCMA, n = 104 PCMA, n = 105 1 2 3 4 5 6 hci Fig. 3. (Color online) Performance comparisons of DEMON, SLPA, OSLOM, BIGCLAM, and PCMA in a simple benchmark model and the LFR benchmark model. Unless stated otherwise, parameters of our simple benchmark model in (a) and (b) are: n = 104, hki = 20, p = 0.3, hsi = 40, hci = 3. Parameters of the LFR benchmark model in (c) are: n = 104, hki = 40, kmax = 100, µ = 0.3, τ1 = 2, τ2 = 1, cmin = 20, cmax = 100, each overlapping vertex has two communities. The thresholds of PCMA are given in Table A 2 in Appendix B. For (b), the number of partial communities set to be found in PCMA Step 1 is K = 10. For DEMON, the default value of the parameter ε = 0.25 is used. The number of iterations of OSLOM is set to r = 10. For SLPA, the program applies different thresholds ranging from 0.01 to 0.5 by default and we select the best result. BIGCLAM is informed of the actual number of communities generated by the benchmark models. Each data point is an average of 10 realizations. If not shown, the error bar is smaller than the size of the symbol. Z U 0 6 4 - 0 5 - F P R p c m a 9 A u g u s t 2 0 1 7 2 2 : 5 1 P a r t i a l C o m m u n i t y M e r g e r A l g o r i t h m 1 3 Z U 0 6 4 - 0 5 - F P R p c m a 9 A u g u s t 2 0 1 7 2 2 : 5 1 x e d n I a g e m O e r o c S 1 F 1.0 0.8 0.6 0.4 0.2 (a) DEMON OSLOM, r = 1 OSLOM, r = 10 BIGCLAM PCMA 0.0 0.15 0.20 0.25 0.30 0.35 1.0 0.8 0.6 0.4 0.2 DEMON OSLOM, r = 1 OSLOM, r = 10 BIGCLAM PCMA 0.0 0.15 0.20 0.25 p 0.30 0.35 1.0 0.9 0.8 0.7 0.6 0.5 0.4 1.0 0.9 0.8 0.7 0.6 0.5 0.4 (b) (c) 1 4 1.0 0.8 0.6 0.4 0.2 0.0 0.0 1.0 0.8 0.6 0.4 0.2 0.0 0.0 DEMON SLPA OSLOM BIGCLAM PCMA 0.2 0.4 0.6 0.8 1.0 DEMON SLPA OSLOM BIGCLAM PCMA 0.2 0.4 0.6 0.8 1.0 Fraction of overlapping vertices OSLOM BIGCLAM PCMA, n = 104 PCMA, n = 105 1 2 3 4 5 6 OSLOM BIGCLAM PCMA, n = 104 PCMA, n = 105 1 2 3 4 5 6 hci . . E l v i s H W X u a n d P a k M i n g H u i Fig. 3 (Cont.). (Color online) Performance comparisons of DEMON, SLPA, OSLOM, BIGCLAM, and PCMA in a simple benchmark model and the LFR benchmark model (continued). All parameters are the same as those stated in the caption of Fig. 3. ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 15 to. The remaining fraction (1 − µ) of edges are evenly divided among the communities, if the vertex is chosen to have multiple communities. As such, the community sizes also follow a power-law with an exponent τ2 within a range of communities sizes between cmin and cmin. The combinations of parameters in the LFR model give a class of tunable structures for the resulting networks. The parameters used in benchmarking are based on the empirical networks we studied. We use the mean degree hki = 40 of the two real social networks shown in Table 1. The selection of the mixing parameter µ and the range of community size is close to what we observed in the two networks. Fig. 3(c) shows OSLOM, SPLA, and PCMA work very well when there are very few overlapping vertices. When communities overlap more, PCMA achieved higher values of the NMI and F1 Score than the other four methods over a wide range of the fraction of overlapping vertices, except for the last data point in Fig. 3(c) in comparison with OSLOM. In the LFR model, the degree assignment does not distinguish single-community vertices from multi- community vertices. As a result, a vertex belonging to multiple communities has fewer edges connecting to each of its communities. In PCMA, however, members are expected to be connected to at least a certain fraction of the other members before establishing their membership. This leads to the gradual drop in PCMA's NMI with increasing number of overlapping vertices, which are members according to the benchmark model but may not be acknowledged by PCMA. We remark that it is actually not a problem of accuracy, but more about what a community should be. We also studied the time complexity of the methods numerically based on the LFR benchmark model (Lancichinetti et al., 2008). Calculations were performed on a work- station with Intel Xeon E5-2609 @ 2.40GHz (4 cores / 8 threads). The programs were allowed to use all threads if they were parallelized. Fig. 4 shows how the execution time scales with the network size. SLPA and PCMA are very efficient, while OSLOM and BIGCLAM are a few hundred times slower. DEMON is written in Python, which by nature is much slower than programs written in C/C++. In the log-log plot in Fig. 4, the slopes for SLPA, OSLOM, BIGCLAM, and PCMA are 1.09, 1.09, 1.20, and 0.99, respectively. It is, therefore, numerically verified that the time complexity of PCMA is O(n). In summary, the benchmark tests showed that PCMA is an efficient algorithm specifi- cally suitable for detecting communities in networks in which the vertices may belong to multiple communities. 4 Empirical Analysis Having established the efficiency and accuracy of PCMA, we tested it against two huge online social networks, Friendster (Yang & Leskovec, 2013a) and Sina Weibo. The basic information is listed in Table 1. Friendster is one of the earliest social network service websites, allowing people to maintain contacts and interact with each other. The net- work data of Friendster is downloaded from SNAP Datasets (Leskovec & Krevl, 2014). It comes with metadata groups (Hric et al., 2014), or the so called ground-truth commu- nities (Yang & Leskovec, 2013a; Yang & Leskovec, 2014), providing us with a reference to evaluate the accuracy of detection algorithms. Sina Weibo is a directed network like Twitter for fast information spreading and it also has characteristics of Facebook for in- teractions with friends. We focused on the embedded undirected friendship network with ZU064-05-FPR pcma 9 August 2017 22:51 16 Elvis H.W. Xu and Pak Ming Hui 104 103 102 101 s d n o c e s / e m T i 100 104 DEMON OSLOM SLPA BIGCLAM PCMA 105 106 Network Size 107 Fig. 4. (Color online) Comparison on time complexity. Tests are conducted on LFR benchmark model. The fraction of overlapping vertices is set to 50%. Other parameters are the same as those in Fig. 3. Each data point is an average over 10 realizations. Error bars are smaller than the size of the symbols. only reciprocal edges. The network we sampled from the Internet contains about 80 million vertices and 1.0 billion reciprocal edges, with only 1.2% of the edges being connected to vertices that are not sampled. The sampled network can thus be roughly regarded as the whole network. Both networks are huge and have very high values of the clustering coefficient. Detecting communities accurately within reasonable time in such huge networks is a great challenge for many detection algorithms. PCMA, however, successfully detected millions of commu- nities in both networks within 1 or 2 days, using only several ordinary workstations. The details of the parameters used in detection are given in Appendixes A and B. Table 1. Information of the two analysed huge social networks Dataset n m hki CWS c T1 Friendster Sina Weibo 65.6M 1806M 55.1 79.4M 1046M 26.4 0.205 0.155 1.6M 24.9h / node × 7 nodes 1.2M 17.5h / node × 7 nodes T2+3 14.2h 5.1h M stands for million, h stands for hour. n, m, hki, and CWS are the number of vertices, the number of edges, average degree, and the average local clustering coefficient, respectively. c is the number of communities detected by PCMA. T1 and T2+3 are the time spent for PCMA Step 1 and Step 2 & 3, respectively. Step 1 was set to repeat r = 10 times and pick the best results. It was parallelized on 7 computing nodes with each equipped with 2×Intel Xeon E5-2670 @ 2.60GHz. This step could be 10 times faster if r = 1 is used, just as we did in benchmarking. ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm δ y t i s n e d e g d e y t i n u m m o c - a r t n I 1.0 0.8 0.6 0.4 0.2 0.0 0 Sina Weibo (detected) 20 40 60 80 100 1.0 0.8 0.6 0.4 0.2 0.0 0 Friendster (detected) 20 40 60 80 100 1.0 0.8 0.6 0.4 0.2 0.0 0 Friendster (metadata groups) 20 40 60 80 100 17 1.0 0.8 0.6 0.4 0.2 0.0 Community Size Community Size Community Size Fig. 5. (Color online) Intra-community edge density δ is used to evaluate the quality of a community. Histograms of δ and community size are shown for the detected communities with size no less than tl in both social networks and the metadata groups of Friendster. To show the patterns clearly, the values in each vertical cut are rescaled by mapping the highest value to unity. The 0.96 million metadata groups are of low quality compared to the 1.6 million communities detected by PCMA in Friendster. 4.1 Detected Structural Communities v.s. Metadata Groups In this subsection, we show that the millions of communities detected by PCMA in both networks are of high quality, and the metadata groups should not be treated as the ground- truth of the structural communities, of which the definition is purely based on network topology. The number of metadata groups provided in Friendster dataset is about 0.96 million, while PCMA detected a lot more, 1.6 million communities. We calculated the Normalized Mutual Information (NMI) between them and the result was approximately 0.004. It means either PCMA failed to detect the communities or the metadata groups are not the true ground-truth of the structural communities we aim to detect. To figure it out, we adopted the intra-community edge density δ to evaluate the quality of the detected communities as well as the metadata groups. The density δ is defined as the number of edges within a community over the maximum number of possible edges there could be. Fig. 5 shows the results for communities detected in both networks, and the metadata groups of Friendster. Surprisingly, we find that the majority of the metadata groups have very low quality. For example, a group of size 20 with δ = 0.1 means each member knows only 1.9 other members on average. The group could not even be connected. On the contrary, PCMA successfully controlled the quality of the detected communities in both networks, as we can see that the densities of these communities are reasonably high and seem no lower than some specific value. This successfulness is rooted in the design of PCMA. Recall that g(C) introduced in Sec. 2.2 can roughly be regarded as δ and it is guaranteed to be no less than the threshold t fs used in PCMA Step 2. That means t fs effectively sets a soft lower bound of the intra-community edge density, i.e. δ ≈ g > t fs . In this analysis, we used t fs = 0.1. Fig. 5 also shows that some of the metadata groups are of high quality, but they seem not in the same place of the plot of the detected communities. One explanation is that these high quality groups are cores of communities. PCMA does not only find the core members of a community, but may also include peripheral members as long as δ remains relatively high compared to the given t fs . To verify this speculation, we screened about ZU064-05-FPR pcma 9 August 2017 22:51 18 0.23 million high quality groups with s > 10 and δ > 1/√s, where s is the group size, then calculated the recall score for each of them Elvis H.W. Xu and Pak Ming Hui R(G) = max C∈D G∩ C G , (17) where G represents one of the screened metadata groups, D is the set of the detected communities of Friendster. In contrast to the very low NMI, the average recall score hRi reached 0.7, meaning the detected communities already included on average 70% of each of the screened high quality groups. In fact, PCMA not only included these groups, but also detected a lot more high quality communities that are not presented in the metadata groups, as we can see in Fig. 6 that the number of detected communities of size above 20 is much greater than the number of metadata groups. We checked carefully whether some of the detected communities were duplicate by calculating the overlap between any pair of these communities. Only a tiny fraction of the pairs have overlap. Among them 86% and 8% of the overlaps are just 1 or 2 vertices, respectively. Thus the 1.6 million communities detected by PCMA are considered authentic and unique. 60000 50000 40000 30000 20000 10000 s e i t i n u m m o C f o r e b m u N 0 0 Metadata groups Detected communities Communities detected by PCMA but not presented in the metadata groups 20 40 60 80 100 Community Size Fig. 6. (Color online) The size distribution of the metadata groups and the structural communities detected by PCMA in Friendster dataset. The first 4 data points of the metadata groups staring from (3, 209764) are beyond the shown area of the figure. We conclude that most of the metadata groups of Friendster are of low quality or too small size, while PCMA detected a lot high quality communities that are not in them. The metadata groups may be taken as a reference, but not the ground-truth of the structural communities. 4.2 Significant Overlaps in Social Communities The detected communities also confirm the multiple memberships of vertices and thus the significant overlaps among communities. Fig. 7 gives an example of a complete community that is only partially revealed in the ego network in Fig. 1. The number on a vertex in ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 19 Fig. 7 gives the number of communities that the vertex belongs to. To illustrate the multiple memberships of vertices, we picked a vertex labeled 6 (the same vertex centered in Fig. 1) and visualized the 6 communities it belongs to in Fig. 8. For clarity, the vertex itself and the edges to its neighbors (vertices with deeper colors) are not shown. The purple community is the same community shown in Fig. 7. It overlaps with the other 5 communities through the picked vertex (not shown). In other words, the vertex acts as a bridge that connects its 6 communities. Most members of the community, just like the picked vertex, have multiple memberships. They make the community overlap with nearly 200 other communities while its size is only 54, resulting in the number of edges going out of the community (ex- community edges) 5139 to be much larger than the number of reciprocal edges within the community (intra-community edges) 702× 2. It is not an exceptional case, in fact more than 99% of the communities detected in both social networks are found to have more ex- community than intra-community edges. This confirms that detection algorithms based on concepts for disjoint or slightly overlapping communities do not work in social networks, and new algorithms that can handle multiple memberships of vertices, such as PCMA, are called. 13 13 6 4 6 2 1 3 6 3 1 2 4 3 1 4 6 6 6 7 4 1 3 3 3 5 5 22 3 9 15 6 4 4 2 3 7 4 4 6 2 3 3 2 1 1 4 5 3 3 3 2 6 3 Fig. 7. A real community consisting of 54 members identified by PCMA in Sina Weibo friendship network. It is the corresponding complete community of the purple partial community shown in Fig. 1. The label on a vertex gives the number of different communities that the vertex belongs to. The number of reciprocal intra-community edges (counted twice) is 702× 2, and the number of ex-community edges (not shown) connecting to the outside is 5139. We proposed and implemented a Partial Community Merger Algorithm specifically de- signed for detecting communities in large-scale networks in which a member may have 5 Summary ZU064-05-FPR pcma 9 August 2017 22:51 20 Elvis H.W. Xu and Pak Ming Hui Fig. 8. (Color online) The communities that the center vertex in Fig. 1 belongs to. For clarity, the vertex itself and the edges to its neighbors (vertices with deeper colors) are not shown. The vertex is a core member of 3 communities (blue, green, purple) as it is connected to a considerable number of their members. These deeper color members are just the 3 partial communities shown in Fig. 1 in the same color. PCMA not only reconstructed the complete communities of these 3 partial communities, but also found another 3 that cannot be seen in Fig. 1 of which the vertex is a peripheral member. The positions of the vertices calculated by an independent algorithm are in good agreement with the colors determined by PCMA. multiple memberships. The structure of these communities is signified by a large number of overlaps in members and thus a community may have many more edges connecting to the outside compared to those within the community. Such structures make many existing community detection algorithm invalid, but yet they often show up in real-world systems. Through PCMA, we provided a conceptual framework as well as a practical algorithm and significantly advanced the techniques in dealing with these systems. Details of imple- menting PCMA were discussed. We used two benchmark models and compared results with four algorithms to establish the efficiency and accuracy of PCMA. We also tested the method on two huge social networks and millions of high quality communities were detected. The metadata groups are of low quality compared to the detected and we showed ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 21 that they should not be considered as the ground-truth of the structural communities that detection algorithms usually aim to detect. We also verified that the multiple memberships of vertices and significant overlaps are extremely common in the detected communities. Thus new algorithms that can detect communities with these complex structures, such as PCMA, are essential and urgently needed. PCMA does not need a prior knowledge of the total number of communities to search for and it is capable of analyzing communities in large-scale networks in linear time. In addition to identifying the communities, PCMA also gives who the key members are in a community and how many different communities a member belongs to. The high accuracy and linear time complexity makes PCMA a promising tool for detecting communities with significant overlaps in huge social networks, which cannot be handled by most existing algorithms. We end with a few remarks. Although we described and implemented PCMA only for unweighted networks, the approach is flexible and it can be readily extended to treat weighted networks. Another extension is to properly tune the threshold t fs for exploring the hierarchical structure of communities. Like any other algorithm, PCMA also has its limitations. It is not designed to detect small communities and it will not work in networks that are too sparse. There is also the common problem among algorithms on distinguishing real communities from false ones. This is actually a deeper question because whether there really exists a clear boundary, i.e. a set of thresholds, for distinguishing "real communities" from "false ones" is questionable. A more practically approach would be to explore meth- ods of choosing the thresholds properly or constructing a credibility function involving g, l, and community size to make the detected communities more trustful. These quantities in the PCMA framework provide us with vast space for further improvement in post- processing and in-depth analysis of community structure. Finally, the source code of PCMA is released as free software under the GNU General Public License version 2 or any later version (Xu, 2016). Acknowledgements One of us (EHWX) gratefully acknowledges the support from the Research Grants Council of Hong Kong through a Hong Kong PhD Fellowship. We thank an anonymous reviewer for informative suggestions on related work in the computer science literature. A Searching for Partial Communities PCMA Step 1 is to search for partial communities in the ego network of each vertex. We adopt an efficient community detection algorithm proposed by Ball et al. (Ball et al., 2011) for the purpose. Starting from an ego network of size n, the algorithm takes the number K of communities to be found as an input. The output is an n × K matrix, with the K numbers in a row that signifies the belonging coefficients (Gregory, 2011) of a vertex for the K communities. For example, we set out to find K = 5 communities in an ego network, labelled by C1 to C5. Then each row has 5 numbers, e.g. 0.64, 0.29, 0, 0.07, 0 for the j-th row, denoting that the vertex j has a portion of 64% belonging to C1, 29% to C2, ZU064-05-FPR pcma 9 August 2017 22:51 22 Elvis H.W. Xu and Pak Ming Hui and 7% to C4. To convert the fuzzy assignment (Gregory, 2011) of members to definite assignment, we impose a threshold that a community carries a vertex j as its member only if the belonging coefficient of the vertex j for the community is above a certain value. If the threshold is 0.2, only communities C1 and C2 have the vertex j as a member. For the central vertex of the ego network, as the communities are its partial communities, it is treated as a default member of all the communities regardless of the threshold. Partial communities can then be derived from every ego network. We remark that although the number of partial communities in an ego network is not known in prior to the search, it can easily be estimated for small networks. An appropriate overestimation is necessary as isolated vertices in an ego network also need to be accommodated by some communities. Such overestimation is harmless as the false partial communities can be handled properly in the merger and post-processing steps that follow. It is reasonable to assume the number of partial communities to be proportional to the ego network size, optionally with an upper and a lower bound. The overestimation will not cause problem, as the true communities can be merged when they have a considerable overlap. For the example in Fig. 1, we set out to find 10 communities and obtained 3 apparent partial communities (colored purple, blue and green) and 2 possible ones (red and yellow). The green one actually consists of 3 highly overlapping communities which should be regarded as one. We merge a pair of partial communities if either one shares more than a certain fraction of the members of the other. It is important to note that PCMA does not require a high accuracy in this step of finding all the partial communities. Any error generated in this step can be greatly reduced by the mergers and post-processing step, as discussed in Sec. 2.3. For example, the detection algorithm we used in this step needs to try r = 10 to 100 random initial conditions to get relatively good results, as suggested by the authors of the algorithm (Ball et al., 2011). We used only one in benchmarking, yet PCMA still performed very well. Increasing the number of random initial conditions could get even better results, although with the im- provement not be much. For empirical analysis, we used r = 10 to get more accurate results. The parameters used in empirical analysis are summarized in Table A 1. For benchmarking, K = 5, , r = 1, b = 0.2, m = 0.3. Parameter c and d are not used. B Thresholds in PCMA Step 2 & 3 The thresholds used in PCMA Step 2 & 3 for both benchmarking and empirical analysis are summarized in Table A 2. For more information about the physical meanings and proper use of the thresholds, see Sec. 2.3 and Sec. 2.2. Here we briefly illustrate how the applied thresholds remove false communities and false members. Fig. A 1 shows the histograms for the detected communities as a function of their value of g and community size, under two different thresholds tl = 10 and 2. The quantity g is another community quality indicator in addition to the intra-community edge density δ. Usually a smaller community would have a higher g. Choosing a low threshold of tl = 2 gives an abnormal plunge in g at small community sizes as shown in Fig. A 1(a). The low threshold leads to many false communities that are merged only a few times, as discussed in Sec. 2.3. Raising tl from 2 to 10 successfully removes most false communities, as shown in Fig. A 1(b). And the number of communities detected in Friendster and Sina Weibo Table A 1. Parameters of PCMA Step 1 used in the empirical analysis Parameter Value Description K r b m c d - 10 0.2 0.2 0.05 10 The number of partial communities set to be found in a vertex's ego network is K = min{3 + k/10, 20}, where k is the degree of the vertex Repeat the detection of partial communities for r times, pick the best result A vertex is regarded as a member of a partial community if its belonging coefficient to this community is above b Merge partial communities of the same vertex if the overlap between two partial communities is above the threshold Discard partial communities of which the clustering coefficient (treat the community as a subnetwork) is below c Skip vertices with degree lower than d as it is less likely to find partial communities in these vertices' ego networks Table A 2. Thresholds used in PCMA Step 2 & 3 for both benchmarking and empirical analysis Threshold Value Description t fs t f0 tl tS′/l tS′ 0.1 4 10 0.1 2 A pair of partial communities can be merged only if the similarity fs between them is above t fs Used to suppress unwanted mergers of small partial communities A merged community must contain at least tl partial communities to be regarded as a real complete community The score S′ of a member (its own contribution excluded) must be greater than tS′/l · l The score S′ of a member (its own contribution excluded) must be no less than tS′ Z U 0 6 4 - 0 5 - F P R p c m a 9 A u g u s t 2 0 1 7 2 2 : 5 1 P a r t i a l C o m m u n i t y M e r g e r A l g o r i t h m 2 3 ZU064-05-FPR pcma 9 August 2017 22:51 24 Elvis H.W. Xu and Pak Ming Hui 0.5 0.4 g 0.3 0.2 0.1 0.4 g 0.3 0.2 0.1 (a) tl = 2 (b) tl = 10 Sina Weibo Sina Weibo Friendster Friendster 0 50 100 150 200 0 50 100 150 200 Community Size Community Size 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 Fig. A 1. (Color online) The histogram of communities as a function of their value of g and community size provides an alternative to inspect the quality of the detected communities. Each vertical cut gives the distribution of g for communities of the same size. The values in each cut are rescaled by mapping the highest value to unity. is reduced from 9.0 million to 1.6 million, 4.7 million to 1.2 million, respectively. This success is accompanied by the drawback that real communities with less than tl = 10 vertices are also removed. Note that there is no best answer to the value of tl because the boundary between true and false communities itself is indistinct. A more practically approach is to find a function involving g, l, and community size to evaluate the credibility of a detected community, instead of labelling them either true or false. We leave it to future work. For tS′/l and tS′ , there is no standard answer to which values are the best either. It depends on the network being analyzed, and one's subjective view of what a community is. Fig. A 2 illustrates a merged community that is the same community shown in Fig. 7 but with false members not removed. Since l = 54 and tS′/l = 0.1, only vertices with S′ > 6 are considered members (colored blue). As we can see in Fig. A 2, the thresholds successfully sift out the core of the community. It is, however, hard to say whether vertices in the periphery with S′ = 5 or 4 are members or not. In fact, there does not exist a clear boundary of the community. A better solution is to assign each vertex a belonging coefficient representing its degree of affinity to the community, e.g. S′/l, instead of forcing each vertex to be either in or not in the community. The quantities S′, l, g, and fs introduced in the PCMA framework have sound physical meanings and they provide us with vast space for further improvement in post-processing and in-depth analysis of community structure. ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 25 1 1 1 1 1 1 1 1 1 1 1 1 1 2 1 1 1 1 2 1 4 1 2 8 1 1 2 3 4 1 1 1 23 4 1 1 1 1 1 1 1 1 1 1 2 1 22 25 1 1 1 2 15 20 1 1 1 4 1 6 1 5 3 2 1 1 1 11 3 11 15 13 8 10 39 47 43 24 22 27 32 22 15 21 36 40 40 36 37 37 48 21 37 29 30 38 37 27 34 28 46 37 36 15 28 29 39 21 22 28 5 4 1 2 2 2 28 7 1 3 2 2 1 1 11 1 1 18 11 4 2 1 1 1 1 1 1 1 3 1 1 1 1 1 1 1 1 1 1 1 2 1 1 2 1 1 1 1 1 1 Fig. A 2. (Color online) A merged community with false members not removed. It is merged from l = 54 partial communities and has 160 vertices before post-processing. The size (area) of each vertex represents its degree in this subnetwork. The label on each vertex (zoom in to see the numbers) gives the score S′ of the vertex. The grey vertices with S′ < 6 fail to meet the threshold tS′/l = 0.1 so they are not considered members. The remaining 54 blue vertices are members of the community. References Ahn, Yong-Yeol, Bagrow, James P, & Lehmann, Sune. (2010). Link communities reveal multiscale complexity in networks. Nature, 466(7307), 761 -- 764. Ball, Brian, Karrer, Brian, & Newman, M. E. J. (2011). Efficient and principled method for detecting communities in networks. Physical Review E, 84(3), 036103. Baumes, Jeffrey, Goldberg, Mark, Krishnamoorthy, Mukkai, Magdon-Ismail, Malik, & Preston, Nathan. 2005 (Feb.). Finding communities by clustering a graph into overlapping subgraphs. Pages 97 -- 104 of: Proceedings of the IADIS International Conference on Applied Computing. Bianconi, G, Pin, P, & Marsili, M. (2009). Assessing the relevance of node features for network structure. Proceedings of the National Academy of Sciences of the United States of America, 106(28), 11433 -- 11438. Condon, Anne, & Karp, Richard M. (2001). Algorithms for graph partitioning on the planted partition model. Random Structures and Algorithms, 18(2), 116 -- 140. Coscia, Michele, Rossetti, Giulio, Giannotti, Fosca, & Pedreschi, Dino. (2012). DEMON: a Local- First Discovery Method for Overlapping Communities. Pages 615 -- 623 of: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, New York, USA: ACM Press. Coscia, Michele, Rossetti, Giulio, Giannotti, Fosca, & Pedreschi, Dino. (2014). Uncovering Hierarchical and Overlapping Communities with a Local-First Approach. ACM Transactions on Knowledge Discovery from Data, 9(1), 1 -- 27. ZU064-05-FPR pcma 9 August 2017 22:51 26 Elvis H.W. Xu and Pak Ming Hui Danon, Leon, D´ıaz-Guilera, Albert, Duch, Jordi, & Arenas, Alex. (2005). Comparing community structure identification. Journal of Statistical Mechanics: Theory and Experiments, Sept., P09008 -- P09008. Evans, T S, & Lambiotte, R. (2009). Line graphs, link partitions, and overlapping communities. Physical Review E, 80(1), 016105. Evans, T S, & Lambiotte, R. (2010). Line graphs of weighted networks for overlapping communities. The European Physical Journal B, 77(2), 265 -- 272. Fortunato, Santo. (2010). Community detection in graphs. Physics Reports, 486(3-5), 75 -- 174. Girvan, M, & Newman, M. E. J. (2002). Community structure in social and biological networks. Proceedings of the National Academy of Sciences of the United States of America, 99(12), 7821 -- 7826. Gregory, Steve. (2010). Finding overlapping communities in networks by label propagation. New Journal of Physics, 12(10), 103018. Gregory, Steve. (2011). Fuzzy overlapping communities in networks. Journal of Statistical Mechanics: Theory and Experiments, Feb., P02017. Hric, Darko, Darst, Richard K, & Fortunato, Santo. (2014). Community detection in networks: Structural communities versus ground truth. Physical Review E, 90(6), 062805. Lancichinetti, Andrea, Fortunato, Santo, & Radicchi, Filippo. (2008). Benchmark graphs for testing community detection algorithms. Physical Review E, 78(4), 046110. Lancichinetti, Andrea, Fortunato, Santo, & Kert´esz, J´anos. (2009). Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics, 11(3), 033015. Lancichinetti, Andrea, Radicchi, Filippo, & Ramasco, Jos´e J. (2010). Statistical significance of communities in networks. Physical Review E, 81(4), 046110. Lancichinetti, Andrea, Radicchi, Filippo, Ramasco, Jos´e J, & Fortunato, Santo. (2011). Finding Statistically Significant Communities in Networks. PLoS ONE, 6(4), e18961. Leskovec, Jure, & Krevl, Andrej. 2014 (June). SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data. Murray, Gabriel, Carenini, Giuseppe, & Ng, Raymond. 2012 (June). Using the omega index for evaluating abstractive community detection. Pages 10 -- 18 of: Proceedings of workshop on evaluation metrics and system comparison for automatic summarization. Palla, Gergely, Der´enyi, Imre, Farkas, Ill´es, & Vicsek, Tam´as. (2005). Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043), 814 -- 818. Radicchi, F, Castellano, C, Cecconi, F, Loreto, V, & Parisi, D. (2004). Defining and identifying communities in networks. Proceedings of the National Academy of Sciences of the United States of America, 101(9), 2658 -- 2663. Raghavan, Usha Nandini, Albert, R´eka, & Kumara, Soundar. (2007). Near linear time algorithm to detect community structures in large-scale networks. Physical Review E, 76(3), 036106. Rees, Bradley S, & Gallagher, Keith B. (2012). EgoClustering: Overlapping Community Detection via Merged Friendship-Groups. Pages 1 -- 20 of: The Influence of Technology on Social Network Analysis and Mining. Vienna: Springer Vienna. Seidman, Stephen B. (1983). Internal cohesion of ls sets in graphs. Social Networks, 5(2), 97 -- 107. Soundarajan, Sucheta, & Hopcroft, John E. (2015). Use of Local Group Information to Identify Communities in Networks. ACM Transactions on Knowledge Discovery from Data, 9(3), 1 -- 27. Xie, Jierui, Szymanski, Boleslaw K, & Liu, Xiaoming. (2011). SLPA: Uncovering Overlapping Communities in Social Networks via a Speaker-Listener Interaction Dynamic Process. Pages 344 -- 349 of: Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops. IEEE. Xie, Jierui, Kelley, Stephen, & Szymanski, Boleslaw K. (2013). Overlapping community detection in networks. ACM Computing Surveys, 45(4), 1 -- 35. ZU064-05-FPR pcma 9 August 2017 22:51 Partial Community Merger Algorithm 27 Xu, Elvis H. W. (2016). https://hwxu.net/research/pcma. Yang, Jaewon, & Leskovec, Jure. (2013a). Defining and evaluating network communities based on ground-truth. Knowledge and Information Systems, 42(1), 181 -- 213. Yang, Jaewon, & Leskovec, Jure. (2013b). Overlapping community detection at scale. Pages 587 -- 596 of: Proceedings of the 6th ACM International Conference on Web Search and Data Mining. ACM Press. Yang, Jaewon, & Leskovec, Jure. (2014). Structure and Overlaps of Ground-Truth Communities in Networks. ACM Transactions on Intelligent Systems and Technology, 5(2), 1 -- 35. Zhang, Pan. (2015). Evaluating accuracy of community detection using the relative normalized mutual information. Journal of statistical mechanics: Theory and experiments, 2015(11), P11006. ZU064-05-FPR pcma 9 August 2017 22:51
1610.01561
1
1610
2016-10-05T18:39:53
Summarizing Situational and Topical Information During Crises
[ "cs.SI", "cs.CL" ]
The use of microblogging platforms such as Twitter during crises has become widespread. More importantly, information disseminated by affected people contains useful information like reports of missing and found people, requests for urgent needs etc. For rapid crisis response, humanitarian organizations look for situational awareness information to understand and assess the severity of the crisis. In this paper, we present a novel framework (i) to generate abstractive summaries useful for situational awareness, and (ii) to capture sub-topics and present a short informative summary for each of these topics. A summary is generated using a two stage framework that first extracts a set of important tweets from the whole set of information through an Integer-linear programming (ILP) based optimization technique and then follows a word graph and concept event based abstractive summarization technique to produce the final summary. High accuracies obtained for all the tasks show the effectiveness of the proposed framework.
cs.SI
cs
Summarizing Situational and Topical Information During Crises Koustav Rudra IIT Kharagpur, India [email protected] Pawan Goyal IIT Kharagpur, India [email protected] Siddhartha Banerjee The Pennsylvania State University, USA [email protected] Niloy Ganguly IIT Kharagpur, India [email protected] Muhammad Imran Qatar Computing Research Institute, HBKU, Doha, Qatar [email protected] Prasenjit Mitra The Pennsylvania State University, USA∗ [email protected] ABSTRACT The use of microblogging platforms such as Twitter during crises has become widespread. More importantly, information dissemi- nated by affected people contains useful information like reports of missing and found people, requests for urgent needs etc. For rapid crisis response, humanitarian organizations look for situa- tional awareness information to understand and assess the sever- ity of the crisis. In this paper, we present a novel framework (i) to generate abstractive summaries useful for situational awareness, and (ii) to capture sub-topics and present a short informative sum- mary for each of these topics. A summary is generated using a two stage framework that first extracts a set of important tweets from the whole set of information through an Integer-linear programming (ILP) based optimization technique and then follows a word graph and concept event based abstractive summarization technique to produce the final summary. High accuracies obtained for all the tasks show the effectiveness of the proposed framework. CCS Concepts •Information systems → Information retrieval diversity; Infor- mation extraction; Clustering and classification; Summariza- tion; Web and social media search; Keywords: Disaster events; Twitter; situational information; clas- sification; summarization; topic search. 1. INTRODUCTION Microblogging platforms such as Twitter provide rapid access to situation-sensitive information that people post during mass con- vergence events such as natural disasters. Rapid crisis response can be aided by processing these tweets [22] in real-time. Different stake-holders (e.g. different humanitarian organizations) have dif- ferent informational needs. For example, to better understand the severity and status of an event, most of these organizations rely on situational awareness information. Some others look for informa- tion on a specific concern like reports of damage to key infrastruc- ture in the area such as airports, bridges, buildings, communication infrastructure, etc. Typically, the first step in extracting situational awareness in- formation from these tweets involves classifying them into differ- ent informational categories such as infrastructure damage, shelter ∗This work was done when the author was at Qatar Computing Research Institute, HBKU, Doha, Qatar. needs or offers, relief supplies, etc. For instance, one such applica- tion, AIDR [9], classifies Twitter messages into different categories in real time. However, even after the automatic classification step, each category still contains thousands of messages many of which are important. Additional in-depth analysis is required to create a coherent situational awareness summary for disaster managers to understand the situation, which can be rapidly changing. In this paper, we seek to extract important topical information from microblogging platforms and generate summaries for the iden- tified topics. For example, within the tweets categorized as infras- tructure damage related, the reader can examine the status of air- ports, buildings, bridges, etc. provided this information has been reported. Drilling down into sub-topics and examine the set of tweets from which the information was extracted, we must group tweets dealing with similar information into sets. These sets should be labeled with a concept name. Summarizing Messages in Disaster-related Categories: Sum- marizing tweets is significantly more challenging than summariz- ing news articles. The difficulty arises because tweets are often written in informal and non-standard language as opposed to the formal language used in news articles. To address the real-time nature of our application and the need for a more readable, more informative, and more easily understandable summary, we propose a novel two-step summarization process that uses a fast extractive summarization technique [5] followed by an abstractive summa- rization step that improves the information coverage and readability of the final summary. Rudra et al. used extractive summarization to summarize a set of tweets [20]. For example, consider the fol- lowing tweets collected during the Nepal earthquake in 2015: 1. Tribhuvan international airport closed after the quake 2. Airport closed after 7.9 Earthquake in Kathmandu An abstractive summary of these tweets would be as follows: Tribhuvan international airport closed after 7.9 earthquake in Kathmandu. Note that the lat- ter is more compact freeing up words that can be used for additional information coverage. Information coverage can be improved in a summary by includ- ing as many content words as possible. For example, Rudra et al. have showed that maximizing the coverage of content words pro- duces effective summaries of disasters [20]. However, we observed that many such content words are semantically similar and cap- turing one of those in final summary will suffice to provide ade- quate information coverage. Hence, in this work, we collate similar nouns and verbs to develop concept and event clusters. We propose a word-graph based abstractive summarization technique that com- bines information from semantically similar tweets (extracted in first step) and applies an ILP-based1 content word (numeral, loca- tion, concept, event) coverage method to generate the summary. Although abstractive summarization [16] produces more com- pact and informative sentences, the algorithms in general are time- consuming. Hence, if the abstractive approach is run over the entire incoming set of tweets, it may not be possible to produce the results in real-time (which is one of the important requirements during dis- asters). In order to circumvent this problem, first we extract a set of important tweets from the whole set using a fast but effective extractive summarization approach. In the second step, we use ab- stractive summarization to choose and rewrite the most important tweets among them, remove redundancy and improve the readabil- ity of the tweets. Identification and Summarization of Micro-topics: To provide information about events at a finer granularity such as when an air- port has been shut, or re-opened, school suspended, communication cut or restored etc. that happen during a crisis situation, our method first identifies micro-topics (i.e., small-scale events) and then gener- ates summaries for each of these micro-topics at a finer granularity level. In this work, we use the Nepal earthquake dataset [15] compris- ing of several million tweets collected and initially classified by the AIDR platform [9]. Our contribution lies in the two-step extractive- abstractive summarization approach (Section 4) that is efficient and yet generates better summaries with respect to information cover- age, diversity, coherence, and readability. Experimental results in Section 5 also confirm that our extracted topics and summaries re- lated to those topics outperform traditional LDA based methodolo- gies. Finally, we conclude our paper in Section 6. 2. RELATED WORK Real-time information posted by affected people on Twitter helps improve disaster relief operations [3, 8]. However, relief organiza- tions can plan more effectively if they have access to crucial infor- mation from the tweets [12]. Kedzie et al. [11] proposed an extractive summarization method to summarize disaster event-specific information from news arti- cles. In contrast, several researchers have attempted to utilize infor- mation from Twitter to retrieve important situational updates from millions of posts on disaster-specific events [21]. More recently, sophisticated methods for automatically generating summaries by extracting the most important tweets on the event [20] have been proposed. To generate summaries in real-time, a few approaches for online summarization of tweet streams have recently been pro- posed [20]. The methods mentioned above generate extractive summaries that are merely a collection of tweets. Ideally, we prefer an abstrac- tive summary composed of important content from tweets instead of the whole tweets. Such a summary should also be more readable than a collection of tweets. Furthermore, the summaries should not contain redundant information. To this end, Olariu [16] proposed a bigram word-graph-based summarization technique, which is ca- pable of handling online streams of tweets in real-time and also generates abstractive summaries. Each bigram represents a node in the graph and new words are added in real-time from incom- 1Henceforth we represent integer linear programming approach as ILP-based approach ing new tweets. However, the method does not consider POS-tag information of nodes and thus can spuriously fuse tweets having the same bigram but are otherwise unrelated. Furthermore, it is a general method that does not consider the typicality of disaster re- lated tweets, for example earlier Rudra et al [20] showed that during disasters content words (nouns, verbs, numerals) vary quite slowly compared to any other general events like sports, movies etc. In our proposed abstractive summarization framework, we have incorpo- rated such domain dependent features to make the summary more coherent, informative, and useful. Banerjee, Mitra, and Sugiyama proposed a graph-based abstractive summarization method on news articles [2]. Several new sentences are generated using a graph where words are nodes, edges are added between two consecutive words present in a sentence and an optimization problem is formu- lated that selects the best sentences from the new sentences to opti- mize the overall quality of the summary. The optimization problem ensures that redundant information is not conveyed in the final gen- erated summary. However, the graph construction and path genera- tion is computationally expensive and cannot be used in real-time. We combine the positive aspects of the above studies - (a) we employ extractive summarization to reduce the number of tweets, and on the reduced set run an algorithm adapated from the tech- nique proposed by Banerjee et al. [2] for tweet fusion (b) we use POS tags along with the words in each bigram to avoid spurious tweet fusions and (c) we employ disaster-specific content words to determine the importance of a disaster-related tweet [20]. Further, we also focus on template-based topic extraction and summarizing information over those topics. 3. DATASET AND CLASSIFICATION OF MES- SAGES We use the Nepal Earthquake 2015 Twitter data from CrisisNLP [10]. The dataset consists of 27 million messages from April 25th to April 27th obtained using different keywords (e.g. Nepal Earth- quake, NepalQuake, NepalQuakeRelief, NepalEarthquake, Kath- manduQuake, QuakeNepal, EarthquakeNepal, · · · , etc.). In this work, we selected AIDR [9] classified messages from three categories for which the machine confidence was ≥ 0.80. The selected classes and messages in each of the three classes are as fol- lows: 1. Missing, trapped, or found people: 10,751 2. Infrastruc- ture and utilities: 16,842 3. Shelter and supplies: 19,006 mes- sages. 4. AUTOMATIC SUMMARIZATION Given the machine-categorized messages by AIDR, in this section we present our two step automatic summarization approach to gen- erate summaries from each class. We consider the following key characteristics/objectives while developing an automatic summa- rization approach: 1. A summary should be able to capture most situational updates from the underlying data. That is, the summary should be rich in terms of information coverage. 2. As most of the messages on Twitter contain duplicate informa- tion, we aim to produce summaries with less redundancy while keeping important updates of a story. 3. Twitter messages are often noisy, informal, and full of grammat- ical mistakes. We aim to produce more readable summaries as compared to the raw tweets. 4. The system should be able to generate the summary in real-time, i.e., the system should not be heavily overloaded with computa- tions such that by the time the summary is produced, the utility of that information is marginal. The first three objectives can be achieved through abstractive summarization and near-duplicate detection, however, it is very dif- ficult to achieve that in real-time (hence violating the fourth con- straint). In order to fulfill these objectives, we follow an extractive- abstractive framework to generate summaries. We define our over- all summarization framework as CONcept based ABstractive Sum- marization (CONABS). In the first phase (extractive phase), we use the approach proposed by Rudra et al. [20] and select a subset of tweets that cover most of the information produced and then run abstractive summarization over that. We generate the paths using the extractive-abstractive framework proposed by Rudra et al [19]. Our goal is to select the best paths from these generated tweet paths with the objective of generating a readable and informative sum- mary. To this end, we formulate an ILP based technique that selects final paths and generates the summary. Concept and event extraction: Given that AIDR classified mes- sages into the categories mentioned above, we extract important concepts and events associated with them. For example, the 'infras- tructure' class contains information about building collapse, tem- ples and whether the airport is open or closed. We observed that such micro-level information mainly consists of two core nuggets, a noun part which we call as a concept (e.g., airport) and a verb part, which we call as an event (e.g., closed). In our summarization pro- cess, we capture information about these concepts by using nouns, because concepts are in general denoted by the nouns [14]. For this purpose, (i) extract all the nouns from the dataset, (ii) develop a complete undirected weighted graph where nouns are nodes and weight of the edge between two nouns is their semantic similarity score (we have used lin similarity measure), and (iii) run affinity clustering method to cluster semantically similar nouns (e.g., air- port, flight). Each of the identified clusters represents a particular concept. Ritter et al [18] proposed a method to extract events from tweets but this method takes significant amount of time to tag large stream of tweets. This creates a bottleneck in real-time summarization pro- cess. Hence, we cannot use their method directly in our proposed summarization approach. We observed that main verbs generally represent such events like 'collapsed', 'killed', 'injured', 'blocked'. We construct a complete undirected weighted graph by taking the verbs and apply clustering technique over the graph (similar to con- cept extraction). Each cluster of verbs represents one event. For ex- ample, verbs like 'injured', 'wounded' are clubbed into one cluster and represent one event. ILP Formulation For abstractive summarization phase, we redefine the content words. Content words consist of numerals, places (this is similar to that adopted during the extractive phase), concepts, and events. The ILP-based technique optimizes based upon three factors - (i) Pres- ence of content words: The formulation tries to maximize the num- ber of these parameters in the final summary which in turn takes care of diversity by reducing the probability of choosing the same content word multiple times. (ii) Informativeness of a path, i.e., finding importance of a path based on centroid-based ranking [17], and (iii) Linguistic Quality Score that captures the readability of a path using a trigram confidence score [7]. Table 1: Notations used in the summarization technique Notation L n m i j xi yj Length(i) I(i) LQ(i) Tj Ci Meaning Desired summary length (number of words) Number of tweet-paths considered for summariza- tion (in the time window specified by user) Number of distinct content words included in the n tweet-paths index for tweet-paths index for content words indicator variable for tweet-path i (1 if tweet-path i should be included in summary, 0 otherwise) indicator variable for content word j number of words present in tweet-path i Informativeness score of the tweet-path i Linguistic quality score of a tweet-path set of tweet-paths where content word j is present set of content words present in tweet-path i The summarization of L words is achieved by optimizing the fol- lowing ILP objective function, whereby the highest scoring tweet- paths are returned as output of summarization, The equations are as follow: max( n X LQ(i).I(i).xi + i=1 subject to the constraints m X j=1 yj) n X i=1 xi · Length(i) ≤ L xi ≥ yj, j = [1 · · · m] X i∈Tj yj ≥ Ci × xi, i = [1 · · · n] X j∈Ci (1) (2) (3) (4) where the symbols are as explained in Table 1. The objective func- tion considers both the number of tweet-paths included in the sum- mary (through the xi variables) as well as the number of important content-words (through the yj variables) included. The constraint in Eqn. 2 ensures that the total number of words contained in the tweet-paths that get included in the summary is at most the desired length L (user-specified) while the constraint in Eqn. 3 ensures that if the content word j is selected to be included in the summary, i.e., if yj = 1, then at least one tweet-path in which this content word is present is selected. Similarly, the constraint in Eqn. 4 ensures that if a particular tweet-path is selected to be included in the summary, then the content words in that tweet-path are also selected. We use the GUROBI Optimizer [6] to solve the ILP. After solv- ing this ILP, the set of tweet-paths i such that xi = 1, represent the summary at the current time. 4.1 Experimental Setup and Results In this section, we compare the performance of our proposed framework with state-of-the-art abstractive and disaster-specific sum- marization techniques. Given the AIDR classified messages from three classes, we perform date-wise split starting from 25th April to 27th April. Baseline approaches: We use three state-of-the-art summariza- tion approaches described below: 1. COWTS: an extractive summarization approach specifically de- signed for generating summaries from disaster-related tweets [20]. ) l l a c e r 1 − E G U O R ( e r o c s t n e m e v o r p m I 60 50 40 30 20 10 0 COWTS APSAL TOWGS Infrastructure Missing Shelter Classwise distribution Figure 1: Improvement in ROUGE-1 recall score (averaging over three days) by CONABS over baseline methods (COWTS, APSAL, TOWGS) 2. APSAL: an affinity clustering based summarization technique proposed by Kedzie et al. [11]. It mainly considers news ar- ticles and focuses on human-generated information nuggets to assign salience score to those news articles while generating summaries. 3. TOWGS: an online abstractive summarization approach pro- posed by Olariu [16]. It is designed for informal texts like tweets. They consider bigrams as nodes and build word graph using these nodes. To generate a summary, they start from most frequent bigrams to explore different paths. In our case, we modified it to generate event-specific summaries as it was orig- inally not proposed to do so. Evaluation using expert generated data We took summaries gen- erated by experts from the disaster management domain. During Nepal earthquake, UN OCHA (United Nations Office for the Co- ordination of Humanitarian Affairs) among other humanitarian or- ganizations used AIDR's output (i.e., machine classified messages) for their disaster response efforts. In this case, the experts were given the machine classified messages that they analyzed to gener- ate a situational awareness report for each informational category. We consider these reports as our gold standard summaries. Figure 1 shows the improvement by our method over baseline techniques in terms of ROUGE-1 recall score which basically in- dicates in percentage the amount of more (important) information covered in the generated summaries. We can see that CONABS performs significantly better compared to other three baselines - the improvement ranges from 10% to 40%. Evaluation using crowdsourcing: We perform crowdsourced eval- uation using the CrowdFlower 2 crowdsourcing platform. We take summaries generated from each class using our proposed method and all three baselines for each day-in total we use 9 summaries. A crowdsourcing task, in this case, consists of four summaries (i.e., one proposed and three from baseline methods) and the four crite- ria with their description (as described below) along with a scale from 1 (very bad) to 5 (very good) for each criterion. For each task, we asked five different annotators to read each summary carefully and provide scores for each criterion. The exact description of the crowdsourcing task is as follows: "The purpose of this task is to evaluate machine-generate sum- maries using tweets collected during the Nepal Earthquake hap- pened in 2015. Each task given below has 4 summaries of length 200 words generated by 4 different algorithms on the same set of tweets (thousands in this case) belonging to a particular topic. Given the summaries and their topic, we are interested in compar- ing them based on the following criteria: Information coverage, Diversity and Readability". 2http://www.crowdflower.com/ The definitions of various criteria we used in the task and discus- sion of the results are as follows: Information coverage corresponds to the richness of information a summary contains. For instance, a summary with more informa- tive sentences (i.e., crisis-related information) is considered better in terms of information coverage. Our proposed method is able to capture very good situational information/updates in case of In- frastructure and Missing classes for both of the days chosen while it performs fairly in the shelter class. In 4 cases, it performs bet- ter than the three competing techniques, and it performs equally well with COWTS, TOWGS, and APSAL in 3, 1, 1 cases respec- tively. Figure 2 shows the detailed ratings of users for 25th and 26th April 3. ) e g a r e v o c n o i t a m r o f n I ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(25th April) (a) 25th (info. coverage) ) e g a r e v o c n o i t a m r o f n I ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(26th April) (b) 26th (info. coverage) Figure 2: Results of the crowdsourcing based evaluation based on the information coverage Diversity corresponds to the novelty of sentences in a summary. A good summary should contain diverse informative sentences. While we do not apply any direct parameter in our ILP framework to control diversity, in our abstractive ILP method, we not only rely on the importance score of paths but also coverage of different content words, which helps in capturing information from various dimensions. This is also quite clear from Figure 3. In seven out of nine cases, CONABS generated summaries that are comparable to other baseline techniques. i ) y t i s r e v D ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(25th April) (a) 25th (info. diversity) i ) y t i s r e v D ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(26th April) (b) 26th (info. diversity) Figure 3: Results of the crowdsourcing based evaluation based on the information diversity Readability measures how easy it is to read the summary. A good summary should be easily readable, well formed, coherent, and have fewer grammatical errors. We used a linguistic quality score in our final ILP framework to generate coherent summaries. Our sys- tem chooses paths with higher linguistic scores. Summaries gen- erated by CONABS were rated to be equal or better than the other baselines in 8 (of nine) cases. Figure 4 shows that our summaries' lowest readability score was 3. Its performance is particularly good on 26th April where it is marked 4 (good) for all cases. CONABS performs as well or better than other baseline tech- niques in most of the cases. Table 2 shows summaries generated by CONABS and COWTS (both disaster-specific methodologies) from the same set of mes- 3We only keep two dates to maintain clarity and brevity Table 2: Summary of length 50 words(excluding #,@,RT,URLs), generated from the situational tweets of the infrastructure class (26th April) by (i) CONABS (proposed methodology), (ii) COWTS. Summary by CONABS Times of india live blog earthquake in katmandu , 25 04 2015. Chairs follow-up meeting to review situation following earthquake in decades. 5 commercial flights have landed in kathmandu was painted in 1850 ad. Iaf's c-130j aircraft carrying 55 passengers , including four infants , lands at delhi's palam airport. Nepal quake photos show historic buildings reduced to rubble as survivor search continues. Summary by COWTS #PM chairs follow-up meeting to review situation following #earth- quake in #Nepal @PMOlndia #nepalquake. @SushmaSwaraj @MEA- controlroom Plz open help desk at kathmandu airport. @Suvasit thanks for airport update. #NepalQuake. Pakistan Army Rescue Team comprising doctors, engineers & rescue workers shortly after arrival at #Kathmandu Airport http://t.co/6Cf8bgeort. RT @cnnbrk: Nepal quake photos show historic buildings reduced to rubble as survivor search continues. http://t.co/idVakR2QOT http://t.co/Z. ) y t i l i b a d a e R ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(25th April) (a) 25th (readability) ) y t i l i b a d a e R ( e r o c s r e s U 6 5 4 3 2 1 0 CONABS TOWGS COWTS APSAL Infrastructure Missing Shelter Classwise distribution(26th April) (b) 26th (readability) Figure 4: Results of the crowdsourcing based evaluation based on the readability sages (i.e tweets form infrastructure class posted on 26th April). The two summaries are quite distinct. We find that summary re- turned by COWABS is more informative and diverse in nature com- pared to COWTS. For instance, we can see the COWABS summary contains information about flights, damages of buildings, and infor- mation sources. In this approach, we have measured semantic LIN similarity based on wordnet for nouns and verbs. However, we observe that in case of verbs this similarity metric does not perform well. As a result, some unrelated verbs may be clustered and some important infor- mation may be missed in final summary. In future, we try to use better semantic similarity measures to resolve this problem. Time taken for summarization: As stated earlier, one of our pri- mary objectives is to generate the summaries in real time. Hence, we analyze the execution times of the various techniques. For infrastructure, missing, and shelter classes, our proposed method CONABS takes 25.947, 17.915, and 26.663 seconds on average (over three days) respectively, to generate the summaries. The time taken by CONABS is comparable with other real time summariza- tion methods like COWTS, and TOWGS. However, APSAL re- quires more time due to large nonnegative matrix factorization and computation of large similarity matrices. 5. IDENTIFICATION OF SUB-TOPICS AND SUMMARIZATION Following a major crisis, a number of small-scale sub-events such as 'power outage', 'bridge closure' etc. happen. Normal LDA based topic detection techniques do not capture micro-level sub-events. Moreover, according to UN OCHA, such LDA topics are too general to act upon [22]. In this section, we capture sub- events/topics from messages classified in a particular category (e.g. infrastructure damage). We define a sub-topic as a combination of a noun and a verb where noun represents a concept and verb represents an event (as described in the previous section). How- ever, in this section we seek dependency relations between nouns and verbs, which is important to declare some information as an event/topic. Table 3 provides examples of some sub-topic phrases from various AIDR classes. These sub-topics show important yet very specific events after the major earthquake crisis. For example, these include 'shut down of airports', 'resume of flight operation', emergency declared etc. Most of the existing topic detection methodologies represent top- ics as a bag of words. In our case we try to capture the semantics between nouns and events using dependency relationships. For in- stance, in Table 3, 'flight' is related to 'shut', and 'road' is related to 'crack'. To the best of our knowledge, no prior work on process- ing tweet streams during disasters has attempted to combine nouns and events to generate such micro-level topic phrases. Table 3: Popular topic phrases posted on the first day of the Nepal earthquake (Apr 25, 2015) Class Infrastructure Injured Missing Shelter Topic phrases 'service affect', 'shut flight', 'crack road', 'wa- ter report', 'topple tower' 'casualty grow', 'victim treat', 'hospital ac- commodate', 'man trap', 'casualty injure' 'family stuck', 'tourist strand', 'rescue loca- tion', 'database track', 'contact number' 'field clean', 'water equip', 'emergency de- clare', 'deploy transport', 'deploy aircraft' Assigning nouns to events: In the sub-topic extraction methodol- ogy, we have found that it is often non-trivial to associate nouns to the context of an event in a tweet. For example, the words 'says' and 'toppled' in the sentence '#China media says buildings toppled in #Tibet http://t.co/O7VSYWTGsk' were identified as events [18]. The noun 'building' is related to the term 'toppled' but it is not re- lated to the verb 'says'. Hence, ('building','toppled') forms a valid topic phrase whereas ('building','says') is not a topic phrase. It is observed that sometimes such nouns may not always appear prior or adjacent to the events in a tweet. For example, in 'India sent 4 Ton relief material, Team of doctors to Nepal', ('relief','sent') forms a valid topic phrase but the noun 'relief' appears after the event 'sent'. If a noun is directly associated/connected with an event (edge ex- ists between noun and event in dependency tree), we associate that noun with the event. We use POS tagger [4], event detector [18], and dependency parser [13] for tweets to extract the association information. Ranking topic phrases: In this part, we rank the identified topic phrases. We only keep those topic phrases for which its constituent noun and event occur more than a certain threshold value - in this case we set it as 10. Next, we compute Szymkiewicz-Simpson overlap score between noun (N) and event (E) as follows: • (Q3) Which method shows less redundant topics (M1 or M2); Overlap(N, E) = X ∩ Y min(X, Y ) (5) • (Q4) Which method generates more semantically meaningful topic (M1 or M2); where X indicates the set of tweets containing N and Y indicates the set of tweets containing E. Finally, we rank the topic phrases based on the similarity scores computed as per Equation 5. Summarizing topic phrases: After identifying topic phrases, we try to summarize the tweets corresponding to each of these topic phrases. Basically, we search the words present in topic phrases and retrieve those tweets that match. Finally, content words (nouns, numerals, verbs) based extractive summarization [20] technique is applied over the retrieved tweets to generate a summary for each of the identified topics. Table 4 provides examples of identified topic phrases and their summaries. Table 4: Popular topic phrases and its summary for topics posted on first day of Nepal Earthquake (25th April) Topic phrase Topic Summary communication cut @AlwaysActions: flight cancel China's #Tibet severely affected by #NepalEarthquake; houses collapsed, communications cut off #Nepal Flights to Kathmandu hit: Flight ser- vices to Kathmandu were today can- celled or put on ho; Kathmandu air- port closed Saturday after a strong earth- quake struck the country. All flights canceled. The micro-level topics and summaries can be useful for vari- ous stakeholders in a disaster scenario. For instance, Communi- cation cut can help government to plan, airline held, flight cancel can facilitate stranded foreigners to make proper departure plan- ning while medicine send may enable the relief agency to connect supply to demand center. Evaluating topic phrases: To measure the accuracy of our pro- posed method for topic phrases identification, we check what frac- tion of nouns are correctly associated with the corresponding events. For this purpose, we compared the accuracy of our algorithm with a simple baseline algorithm in which nouns occurring within a win- dow of 3 words on either side of the event were selected as being related to the event. Averaging over all the different classes (infras- tructure, missing, shelter), the baseline algorithm obtains precision of 0.72, whereas our method obtains precision of 0.95. Next, we evaluate the importance and utility of our identified topics. For this purpose, we performed user studies. For each day, we extract top ten topics based on our proposed methodology for each of the three classes. In a similar way, we identified ten top- ics using the LDA based topic summarization approach proposed by Arora et al [1]. Each topic is represented by two words hav- ing the highest probability of belonging to that topic. We use a crowdsource based evaluation methodology to judge the utility of our topic based summarization approach over the LDA based tech- nique. We asked five question to the workers on crowdflower as follows: • (Q1) Relevance of the generated topics to the high-level cate- gory. (on a scale: from 1 (not related at all) to 5 (highly related)); • (Q2) Which method provides more situational awareness (M1 or M2); • (Q5) Usefulness of topic keywords for situational awareness (scale:1- 5). By showing the top ten topics from both methods, we asked 15 different workers to answer each question. e r o c s e c n a v e e R l 4 3.5 3 2.5 2 1.5 1 0.5 0 PRO LDA Infrastructure Missing Shelter Classwise distribution(25th April) e r o c s s s e n e r a w a l a n o i t a u t i S 4 3.5 3 2.5 2 1.5 1 0.5 0 PRO LDA Infrastructure Missing Shelter Classwise distribution(25th April) (a) Relevance (b) Situational awareness Figure 5: Results of the crowdsourcing based evaluation based on the relevance and situational awareness (25th April) With reference to the relevance to the high-level topics (i.e., Q1) and usefulness of topic keywords (i.e., Q5), out of nine cases, our method performs better than the baseline in six cases and in rest of the three cases it is on par with the baseline. Figure 5 shows de- tailed ranking of users for 25th April for Q1 and Q2. For questions 2, 3, 4, and 5, our method performs better than the baseline in six cases which demonstrates utility of our proposed topic detection scheme during crisis scenario. 6. CONCLUSION A large number of tweets are posted during disaster events. For better situational awareness, a concise, categorical as well as multi- faceted representation of the tweets is necessary. We presented a novel framework to summarize information in crisis-related tweets in two different forms: (a) general situation update summary and (b) specific flash point activity reports thus producing pointed in- formation about a place and/or an event. To present such a diverse yet coherent picture, a deep understanding of the tweets posted dur- ing such scenario is necessary - we believe the series of innovations that have been undertaken in this work has been an outcome of thor- ough analysis of such tweets. We also have performed extensive evaluation using experts to determine the useful of our approach. In future, we will deploy the system so that it can be of help for any future disaster event. Acknowledgement K. Rudra was supported by a fellowship from Tata Consultancy Services. 7. REFERENCES [1] R. Arora and B. Ravindran. Latent dirichlet allocation based multi-document summarization. In Proc. AND, pages 91–97. ACM, 2008. [2] S. Banerjee, P. Mitra, and K. Sugiyama. Multi-document abstractive summarization using ilp based multi-sentence compression. In Proc. IJCAI, 2015. [3] H. Gao, G. Barbier, and R. Goolsby. Harnessing the crowdsourcing power of social media for disaster relief. Intelligent Systems, IEEE, 26(3):10–14, 2011. [4] K. Gimpel, N. Schneider, B. O'Connor, D. Das, D. Mills, J. Eisenstein, M. Heilman, D. Yogatama, J. Flanigan, and N. Smith, A. Part-of-speech tagging for twitter: Annotation, features, and experiments. In Proc. ACL, 2011. [5] V. Gupta and G. S. Lehal. A survey of text summarization extractive techniques. Journal of Emerging Technologies in Web Intelligence, 2(3):258–268, 2010. [6] Gurobi – The overall fastest and best supported solver available, 2015. http://www.gurobi.com/. [13] L. Kong, N. Schneider, S. Swayamdipta, A. Bhatia, C. Dyer, and N. A. Smith. A Dependency Parser for Tweets. In Proc. EMNLP, 2014. [14] L. Li and T. Li. An empirical study of ontology-based multi-document summarization in disaster management. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 44(2):162–171, 2014. [15] 2015 Nepal earthquake – Wikipedia, April 2015. http://en.wikipedia.org/wiki/2015_Nepal_earthquake. [7] K. Heafield. Kenlm: Faster and smaller language model [16] A. Olariu. Efficient online summarization of microblogging queries. In Proceedings of the Sixth Workshop on Statistical Machine Translation, pages 187–197. Association for Computational Linguistics, 2011. [8] M. Imran, C. Castillo, F. Diaz, and S. Vieweg. Processing social media messages in mass emergency: a survey. ACM Computing Surveys (CSUR), 47(4):67, 2015. [9] M. Imran, C. Castillo, J. Lucas, P. Meier, and S. Vieweg. AIDR: Artificial intelligence for disaster response. In Proceedings of the companion publication of the 23rd international conference on World wide web companion, pages 159–162, 2014. [10] M. Imran, P. Mitra, and C. Castillo. Twitter as a lifeline: Human-annotated twitter corpora for nlp of crisis-related messages. In Proceedings of the Tenth International Conference on Language Resources and Evaluation (LREC 2016), may 2016. [11] C. Kedzie, K. McKeown, and F. Diaz. Predicting salient updates for disaster summarization. In Proc. ACL, pages 1608–1617, Beijing, China, July 2015. [12] B. Klein, X. Laiseca, D. Casado-Mansilla, D. López-de Ipiña, and A. P. Nespral. Detection and extracting of emergency knowledge from twitter streams. In Ubiquitous Computing and Ambient Intelligence, pages 462–469. Springer, 2012. streams. In Proc. EACL, pages 236–240, 2014. [17] D. R. Radev, H. Jing, M. Sty´s, and D. Tam. Centroid-based summarization of multiple documents. Information Processing & Management, 40(6):919–938, 2004. [18] A. Ritter, Mausam, O. Etzioni, and S. Clark. Open domain event extraction from twitter. In KDD, 2012. [19] K. Rudra, S. Banerjee, N. Ganguly, P. Goyal, M. Imran, and P. Mitra. Summarizing situational tweets in crisis scenario. In Proceedings of the 27th ACM Conference on Hypertext and Social Media, pages 137–147. ACM, 2016. [20] K. Rudra, S. Ghosh, N. Ganguly, P. Goyal, and S. Ghosh. Extracting situational information from microblogs during disaster events: a classification-summarization approach. In Proc. CIKM, 2015. [21] S. Verma, S. Vieweg, W. J. Corvey, L. Palen, J. H. Martin, M. Palmer, A. Schram, and K. M. Anderson. Natural Language Processing to the Rescue? Extracting "Situational Awareness" Tweets During Mass Emergency. In Proc. AAAI ICWSM, 2011. [22] S. Vieweg, C. Castillo, and M. Imran. Integrating social media communications into the rapid assessment of sudden onset disasters. In Social Informatics, pages 444–461. Springer, 2014.
1507.01272
1
1507
2015-07-05T20:53:26
VEWS: A Wikipedia Vandal Early Warning System
[ "cs.SI", "physics.soc-ph" ]
We study the problem of detecting vandals on Wikipedia before any human or known vandalism detection system reports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a novel set of user editing patterns as features to classify some users as vandals. Our Wikipedia Transition Probability Matrix (WTPM) approach uses a set of features derived from a transition probability matrix and then reduces it via a neural net auto-encoder to classify some users as vandals. The VEWS approach merges the previous two approaches. Without using any information (e.g. reverts) provided by other users, these algorithms each have over 85% classification accuracy. Moreover, when temporal recency is considered, accuracy goes to almost 90%. We carry out detailed experiments on a new data set we have created consisting of about 33K Wikipedia users (including both a black list and a white list of editors) and containing 770K edits. We describe specific behaviors that distinguish between vandals and non-vandals. We show that VEWS beats ClueBot NG and STiki, the best known algorithms today for vandalism detection. Moreover, VEWS detects far more vandals than ClueBot NG and on average, detects them 2.39 edits before ClueBot NG when both detect the vandal. However, we show that the combination of VEWS and ClueBot NG can give a fully automated vandal early warning system with even higher accuracy.
cs.SI
cs
VEWS: A Wikipedia Vandal Early Warning System Srijan Kumar Computer Science Dep. University of Maryland UMIACS University of Maryland Francesca Spezzano V.S. Subrahmanian Computer Science Dep. University of Maryland College Park, 20742 MD, USA [email protected] College Park, 20742 MD, USA [email protected] College Park, 20742 MD, USA [email protected] 5 1 0 2 l u J 5 ] I S . s c [ 1 v 2 7 2 1 0 . 7 0 5 1 : v i X r a ABSTRACT We study the problem of detecting vandals on Wikipedia before any human or known vandalism detection system re- ports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a novel set of user editing patterns as features to classify some users as vandals. Our Wikipedia Transition Probabil- ity Matrix (WTPM) approach uses a set of features derived from a transition probability matrix and then reduces it via a neural net auto-encoder to classify some users as vandals. The VEWS approach merges the previous two approaches. Without using any information (e.g. reverts) provided by other users, these algorithms each have over 85% classifica- tion accuracy. Moreover, when temporal recency is consid- ered, accuracy goes to almost 90%. We carry out detailed experiments on a new data set we have created consisting of about 33K Wikipedia users (including both a black list and a white list of editors) and containing 770K edits. We describe specific behaviors that distinguish between vandals and non-vandals. We show that VEWS beats ClueBot NG and STiki, the best known algorithms today for vandalism detection. Moreover, VEWS detects far more vandals than ClueBot NG and on average, detects them 2.39 edits before ClueBot NG when both detect the vandal. However, we show that the combination of VEWS and ClueBot NG can give a fully automated vandal early warning system with even higher accuracy. Categories and Subject Descriptors H.2.8 [Database applications]: Data mining Keywords Wikipedia, vandal detection, behavior modeling, early de- tection Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD'15, August 11-14, 2015, Sydney, NSW, Australia. c(cid:13) 2015 ACM. ISBN 978-1-4503-3664-2/15/08 ...$15.00. DOI: http://dx.doi.org/10.1145/2783258.2783367. 1. INTRODUCTION With over 4.6M articles, 34M pages, 23M users, and 134K active users, English Wikipedia is one of the world's biggest information sources, disseminating information on virtually every topic on earth. Versions of Wikipedia in other lan- guages further extend its reach. Yet, Wikipedia is compro- mised by a relatively small number of vandals -- individuals who carry out acts of vandalism that Wikipedia defines as "any addition, removal, or change of content, in a deliberate attempt to compromise the integrity of Wikipedia" [1]. Van- dalism is not limited to Wikipedia itself, but is widespread in most social networks. Instances of vandalism have been re- ported in Facebook (vandalism of Martin Luther King, Jr.'s fan page in Jan 2011), WikiMapia and OpenStreetMaps [2]. There has been considerable work on identifying vandal- ized pages in Wikipedia. For instance, ClueBot NG [3], STiki [4], and Snuggle [5] use heuristic rules and machine learning algorithms to flag acts of vandalism. There is also linguistic work on finding suspicious edits by analyzing edit content [6, 7, 8, 9, 10]. Most of these works use linguistic features to detect vandalism. Our goal in this paper is the early identification of van- dals before any human or known vandalism detection system reports vandalism so that they can be brought to the atten- tion of Wikipedia administrators. This goes hand-in-hand with human reporting of vandals. But this information is not used in any of our three algorithms.1 This paper contains five main contributions. 1. We define a novel set of "behavioral features" that capture edit behavior of Wikipedia users. 2. We conduct a study showing the differences in behav- ioral features for vandals vs. benign users. 3. We propose three sets of features that use no human or known vandal detection system's reports of vandalism to predict which users are vandals and which ones are benign. These approaches use the behavioral features from above and have over 85% accuracy. Moreover, when we do a clas- sification using data from previous n months up to the cur- rent month, we get almost 90% accuracy. We show that our VEWS algorithm handily beats today's leaders in vandalism detection - ClueBot NG (71.4% accuracy) and STiki (74% 1Just for completeness, Section 4.3 reports on differences between vandals and benign users when reverts are considered. Our ex- periments actually show that using human or known vandalism detection system generated reversion information improves the accuracy of our approaches by only about 2%, but as our goal is early detection, VEWS ignores reversion information. accuracy). Nonetheless, VEWS benefits from ClueBot NG and STiki - combining all three gives the best predictions. 4. VEWS is very effective in early identification of van- dals. VEWS detects far more vandals (15,203) than ClueBot NG (12,576). On average, VEWS predicts a vandal after it makes (on average) 2.13 edits, while ClueBot NG needs 3.78 edits. Overall, the combination of VEWS and ClueBot NG gives a fully automated system without any human input to detect vandals (STiki has human input, so it is not fully automated). 5. We develop the unique UMDWikipedia data set that consists of about 33K users, about half of whom are on a white list, and half of whom are on a black list. Our work is closer in spirit to [14] which studies how hu- mans navigate through Wikipedia in search of information. They proposed an algorithm to predict the user's intended target page, given the click log. In contrast, we study users' edit patterns and differentiate between users based on the pages he/she has edited. Other studies look at users' web navigation and surfing behavior [15, 16] and why users re- visit certain pages [17]. By using patterns in edit histories and egocentric network properties, [18] proposes a method to identify the social roles played by Wikipedia users (substan- tive experts, technical editors, vandal fighters, and social networkers), but don't identify vandals. 2. RELATED WORK To date, almost all work on Wikipedia vandals has focused on the problem of identifying pages whose text has been vandalized. The first attempt to solve this problem came directly from the Wikipedia community with the develop- ment of bots implementing simple heuristics and machine learning algorithms to automatically detect page vandalism (some examples are ClueBot NG [3] and STiki [4]). The tools currently being used to detect vandalism on Wikipedia are ClueBot NG and STiki. ClueBot NG is the state-of-the-art bot being used in Wikipedia to fight vandal- ism. It uses an artificial neural network to score edits and reverts the worst-scoring edits. STiki [4] is another tool to help trusted users to revert vandalism edits using edit meta- data (editor's timestamp, user info, article and comment), user reputation score and textual features. STiki leverages the spatio-temporal properties of edit metadata to assign scores to each edit, and uses human or bot reverted edits of the user to incrementally maintain a user reputation score [7]. In our experiments, we show that our method beats both these tools in finding vandals. A number of approaches such as [6, 7, 8, 9, 11] (see [12] for a survey) use feature extraction (including some linguis- tic features) and machine learning and validate them on the PAN-WVC-10 corpus: a set of 32K edits annotated by hu- mans on Amazon Mechanical Turk. [8] builds a classifier by using the features computed by WikiTrust [13] which moni- tors edit quality, content reputation, and content-based au- thor reputation.2 By combining all the features (NLP, rep- utation and metadata) from [6, 8] and STiki tool [7], it is possible to obtain a classifier with better accuracy [9]. Past efforts differ from ours in at least one of the two re- spects: they i) predict whether an edit is vandalism, and not whether a user is a vandal, or ii) take into account factors that involve human input (such as number of user's edits re- verted). We have not used textual features at all (and there- fore, we do not rely on algorithms/heuristics that predict vandalism edits). However, we show that the combination of linguistic (from ClueBot NG and STiki) and non-linguistic features (from VEWS algorithm) gives the best classification results. Moreover, we show that a fully automated (with- out human input) effective vandal detection system can be created by combining VEWS and ClueBot NG. 2WikiTrust cannot be used to detect vandals immediately, as it requires a few edits made on the same article to judge an edit and modify the user reputation score. WikiTrust was discontinued as a tool to detect vandalism in 2012 due to poor accuracy and unreliability. 3. THE UMDWIKIPEDIA DATASET We now describe the UMDWikipedia dataset3 which cap- tures various aspects of the edits made by both vandals and benign users.4 The UMDWikipedia dataset consists of the following components. Black list DB. This consists of all 17,027 users that reg- istered and were blocked by Wikipedia administrators for vandalism between January 01, 2013 and July 31, 2014. We refer to these users as vandals. White list DB. This is a randomly selected list of 16,549 (benign) users who registered between January 01, 2013 and July 31, 2014 and who are not in the black list. Edit Meta-data DB. This database is constructed using the Wikipedia API [19] and has the schema (U ser, P age, T itle, T ime, Categories, M) A record of the form (u, p, t, t0, C, m) says that at time t0, user u edited the page p (which is of type m where m is either a normal page or a meta-page5), which has title t and has list C of Wikipedia categories attached to it.6 All in all, we have 770,040 edits: 160,651 made by vandals and 609,389 made by benign users. Edited article hop DB. This database specifies, for each pair (p1, p2) of pages that a user consecutively edited, the minimum distance in the Wikipedia hyper-link graph7 from p1 to p2. We used the code provided by [20]. Revert DB. Just for the one experiment we do at the very end, we use the edit reversion dataset provided by [21] which marks an edit "reverted" if it has been reverted within next 15 edits on the page. [22] suggests that 94% of the reverts are detected by the method used to create the dataset. Therefore, we use this dataset as ground truth to know whether the edit was reverted or not. Note that this information is not needed as a feature in our algorithm for prediction, but to analyze the property of reversion across vandals and benign users. Observe that Revert DB also con- tains the information whether the reversion has been made by ClueBot NG. We use this to compare with ClueBot NG. STiki DB. We use the STiki API [23] to collect STiki vandalism scores, and the raw features used to derive these 3The data set is available at http://www.cs.umd.edu/~vs/vews 4We only studied users with registered user names. 5Wikipedia pages can either be normal article pages or can be discussion or "talk" pages where users may talk to each other and discuss edits. 6Note that Wikipedia assigns a category to each article from a category tree -- this therefore labels each page with the set of categories to which it belongs. 7This is the graph whose vertices are pages and where there is an edge from page p1 to p2 if p1 contains a hyper-link to p2. Whether p2 is a meta-page or normal page. Time difference between the two edits: less than 3 minutes (very fast edit), less than 15 minutes (fast edit), more than 15 minutes (slow edit). Whether or not p2 is the first page ever edited by the user. Whether or not p2 is a page that has already been edited by the user before (p2 is a re-edit) and, if yes - Whether or not p1 is equal to p2 (i.e. were two consecutive edits by the same user applied to the same page); - Whether of not a previous edit of p2 by the user u has been reverted by any other Wikipedia user. Otherwise, p2 is a page edited for the first time by user u. In this case, we include the following data: - the minimum number of links from p1 and p2 in the Wikipedia hyper-link graph: more than 3 hops, at most 3 hops, or not reachable; - the number of categories p1 and p2 have in common: none, at least one, or null if category information is not available. Table 1: Features used in the edit_pair and user_log datasets to describe a consecutive edit (p1, p2) made by user u. behavior is not similar, we do a more in-depth analysis to distinguish between them. So, we perform a frequent itemset mining step on the edit_pair and user_log datasets. Figure 2 summarizes the results. 4.1 Similarities between Vandal and Benign User Behavior (w/o reversion features) scores (including the user reputation score). We use vandal- ism and user scores only to compare with STiki. Edit Pair and User Log Datasets. To analyze the properties of edits made by vandals and benign users, we create two additional datasets using the data in the UMDWikipedia dataset. Edit Pair Dataset. The edit_pair dataset contains a row for each edit (u, p1, p2, t), where u is a user id, (p1, p2) is a pair of Wikipedia pages that are consecutively edited by user u, and t is the time stamp of the edit made on p2. Note that p1 and p2 could be the same if the user makes two edits, one after another, on the same page. Each row contains the values of the features shown in Table 1 computed for the edit (u, p1, p2, t). These features describe the properties of page p2 with respect to page p1. User Log Dataset. The chronological sequence of each consecutive pair (p1, p2) of pages edited by the same user u corresponds to a row in this dataset. Each pair (p1, p2) is described by using the features from Table 1. This dataset is derived from the edit_pair dataset. It captures a host of tem- poral information about each user, suggesting how he/she navigated through Wikipedia and the speed with which this was done. 4. VANDAL VS. BENIGN USER BEHAVIORS In this section, we statistically analyze editing behaviors of vandals and benign users in order to identify behavioral similarities and differences. Figure 1 shows the distributions of different properties that are observed in the edit_pair dataset. Figures 1a- 1c show the percentage of users on the y-axis as we vary the number of edits, number of distinct pages edited and the percentage of re-edits on the x-axis. These three graphs show near identical behavior. Figures 1d- 1f show the percentage of edit pairs (u, p1, p2) on the y-axis as we vary time between edits, number of com- mon categories between edited pages p1 and p2 and number of hops between p1 and p2. The behavior of users in terms of time taken between edits is nearly identical. The last two graphs show somewhat different behaviors between vandals and benign users. Figure 1e shows that the percentage of edit pairs involving just one, two, or three common cate- gories is 2-3 times higher for benign users than for vandals. Likewise, figure 1f shows that for benign users, the percent- age of edit pairs involving exactly one hop is 1.5 times that of vandals, but the percentage of edit pairs involving 3-4 hops is much higher for vandals than for benign users. In all the histograms in Figure 1, the null hypothesis that the distribution for vandals and benign users have identical average has p-value > 0.05. As this fails to say that their and benign user behaviors. Figures 2a, 2b, and 2c show similarities between vandal • Both vandals and benign users are much more likely to re-edit a page compared to editing a new page. We see from Figure 2a that for vandals, the likelihood of a re-edit is 61.4% compared to a new edit (38.6%). Likewise, for benign users, the likelihood of a re-edit is 69.71% compared to a new edit (30.3%). • Both vandals and benign users consecutively edit the same page quickly. The two rightmost bars in Figure 2a show that both vandals and benign users edit the same page fast. 77% of such edit pairs (for vandals) occur within 15 minutes -- this number is 66.4% for benign users. In fact, over 50% of these edits occur within 3 minutes for vandals - the corresponding number for benign users is just over 40%. •Both vandals and benign users exhibit similar navigation patterns. 29% of successively edited pages (for both van- dals and benign users) are by following links only (no com- mon category and reachable by hyperlinks), about 5% due to commonality in categories only between the successively edited pages (at least one common category and not reach- able by hyperlinks), and 20-25% with commonality in both properties and linked. This is shown in Figure 2b. • In their first few edits, both vandals and benign users have similar editing behavior: Figure 2c shows just the first 4 edits made by both vandals and benign users. We see here that the percentage of re-edits and consecutive edits are almost the same in both cases. 4.2 Differences between Vandals and Benign User Behavior (w/o reversion features) tween vandals and benign users. We also identify several behaviors which differentiate be- • Vandals make faster edits than benign users. On aver- age, vandals make 35% of their edits within 15 minutes of the previous edit while benign users make 29.79% of their edits within 15 minutes (Figure 2d). This difference is sta- tistically significant with a p-value of 8.2 × 10−82. •Benign users spend more time editing a new (to them) page than vandals. Vandals make 70% of their edits to a page they have not edited before within 15 minutes of their last edit, while for benign users the number is 54.3% (Figure 2d). This may be because a benign user must absorb the content of a new page before making thoughtful edits, while a vandal (a) (b) (d) (e) (c) (f) Figure 1: Plots showing the distribution of different properties for UMDWikipedia and edit_pair datasets. knows what he wants to say in advance and just goes ahead and says it. • The probability that benign users edit a meta-page is much higher than the same probability in the case of vandals. Figure 2e shows that even in their very first edit, benign users have a 64.77% chance of editing a meta-page, while this is just 10.34% for vandals. If we look at the first 4 edits, the percentage of edits that are on meta-pages is 62% for benign users and just 11.1% for vandals. And if we look at all the edits, 40.72% of edits by normal users are on meta-pages, while only 21.57% of edits by vandals are on meta-pages. 4.3 Differences between Vandals and Benign User Behavior (including reversion) For the sake of completeness, we also analyze the data looking for differences between vandal and benign user be- havior when reverts are considered -- however these differ- ences are not considered in our vandal prediction methods. • Vandals make more edits driven by reversion than benign users. Whenever a vandal u re-edits a page p, in 34.36% of the cases, u's previous edit on p was reverted by others. This almost never occurs in the case of benign users -- the probability is just 4.8%. This suggests that benign users are much more accepting of reversions than vandals. •The probability that a re-edit by a benign user of a page is accepted, even if previous edits by him on the same page were reverted, is much higher than for vandals. Consider the case when a user edits a page p after some of his prior edits on p were reverted by other. If the user u is a benign user, it is more likely that his last edit is accepted. This suggests that the sequence of edits made by u were collaboratively edited by others with the last one surviving, suggesting that u's reverts were constructive and were part of a genuine collaboration. Among the cases when u re-edits a page after one of his previous edits on p has been reverted, 89.87% of these re-edits survive for benign users, while this number is only 32.2% for vandals. • Vandals involve themselves in edit wars much more fre- quently than benign users. A user u is said to participate in an edit war if there is a consecutive sequence of edits by u on the same page which is reverted at least two or three times (we consider both cases). Figure 2f shows that 27.9% of vandals make two pairs of consecutive edits because their previous edit was reverted, but only 13.41% of benign users do so. 12% of vandals make three such pairs of consecutive edits, compared to 2.9% in the case of benign users. • The probability that benign users discuss their edits is much higher than the probability of vandals doing so. In 31.3% of the cases when a benign user consecutively edits a page p twice (i.e. the user is actively editing a page), he then edits a meta page. With vandals, this probability is 11.63%. This suggests that benign editors discuss edits on a meta-page after an edit, but vandals do not (perhaps because doing so would draw attention to the vandalism). In addition there is a 24.41% probability that benign users will re-edit a normal Wikipedia page after editing a meta-page while this happens much less frequently for vandals (only 6.17% vandals do such edits). This indicates that benign users, after discussing relevant issues on meta pages, edit a normal Wikipedia page. • Benign users consecutively surface edit pages a lot. We define a surface edit by a user u on page p as: i) a consecu- tively edit on the same page p twice by u, and ii) the edit is not triggered by u's previous edit on p being reverted, and iii) made within 3 minutes of the previous edit by u. 50.94% benign users make at least one surface edit on a meta page, while only 8.54% vandals do so. On normal pages, both be- nign and normal users make such edits - there are 37.94% (a) Type of edit and time data overall edits (∆t_c is the elapsed time between edits on the same page). (b) For a consecutive edit (p1, p2), how users surf from p1 to the edit of a new page p2. (c) First 4 edits in users log. (d) Edit time. (e) Meta-pages editing. (f) Edit war (involves reversion). Figure 2: Analogies and differences between benign users and vandals. 5.1 Wikipedia Vandal Behavior (WVB) Approach such cases for benign users and 36.94% for vandals. Over all pages, 24.24% benign users make at least 3 consecutive sur- face edits not driven by reversion, but only 7.82% vandals do so. In conclusion: (i) Vandals make edits at a faster rate than benign users. (ii) Vandals are much less engaged in edits of meta pages, i.e. they are less involved in discussions with the community. 5. VANDAL PREDICTION In the following sections, we use the insights from the pre- vious section to classify vandals and benign users. Our van- dal prediction methods use multiple known classifiers (SVM, decision trees, random forest and k-nearest neighbors) with different sets of features. In the accuracies reported in this section, the results are computed with SVM, as it gives the highest accuracy as reported in Section 6 using a 10-fold cross validation. All features used for vandal prediction are behavior based and include no human generated revert infor- mation whatsoever. Thus, these approaches form an early warning system for Wikipedia administrators. WVB uses features derived from consecutive edits. These are found by frequent pattern mining of the user_log dataset. Specifically, we extract the frequent patterns on both benign and vandal user logs -- then, for each frequent pattern of be- nign users, we compute the frequency of the same pattern for vandals and vice versa. Finally, we select the patterns hav- ing significant frequency difference between the two classes. The resulting features are described below: 1. Consecutive re-edit, slowly (crs): whether or not the user edited the same page consecutively with a time gap exceeding 15 minutes. 2. Consecutive re-edit, very fast (crv): whether or not the user edited the same page consecutively and less than 3 minutes passed between the two edits. 3. Consecutive re-edit of a meta-page (crm): the number of times the user re-edited the same meta-page, con- secutively. 4. Consecutive re-edit of a non-meta-page (crn): whether or not the user re-edited the same non-meta-page, consecutively. 5. Consecutive re-edit of a meta-page, very fast (crmv): whether or not the user re-edited the same meta- page, consecutively, and less than 3 minutes passed between the two edits. 6. Consecutive re-edit of a meta-page, fast (crmf): whether or not the user re-edited the same meta-page, con- secutively, and 3 to 15 minutes passed between the two edits. 7. Consecutive re-edit of a meta-page, slowly (crms): whether or not the user re-edited the same meta-page, con- secutively, and more than 15 minutes passed between the two edits. 8. Consecutively re-edit fast and consecutively re- edit very fast (crf_crv): whether or not the following pattern is observed in the user log - the user re-edited the same article within 15 minutes, and later re-edited a (possi- bly different) article and less than 3 minutes passed between the second pair of edits. 9. First edit meta-page (fm): whether or not the first edit of the user was on a meta-page. This in itself is quite a distinguishing feature, because usually vandals first edit a non-meta page and benign users first edit a meta- page. Therefore, this becomes quite an important feature for distinguishing the two. 10. Edit of a new page at distance at most 3 hops, slowly (ntus): whether or not the user edited a new page (never edited by him before) p2 which is within 3 hops or less of the previous page p1 that he edited and either p1 or p2's category is unknown8 and the time gap between the two edits exceeds 15 minutes. 11. Edit of a new page at distance at most 3 hops slowly and twice (nts_nts): whether or not there are two occurrences of the following feature in the user log: Edit of a new page at distance at most 3 hops, slowly (nts), i.e. in a pair (p1, p2) of consecutive edits, whether or not the user edited a new page p2 (i.e. never edited before) such that p2 can be reached from p1 link-wise with at most 3 hops, and more than 15 minutes passed between the edit of p1 and p2. In predicting vandals, we do not use any feature involv- ing human identification of vandals (e.g. number of edits and reversion) because number of edits made has a bias to- wards benign users as they tend to perform more edits, while vandals perform fewer edits because they get blocked. Any feature that has a negative human intervention (number of reversions, number of warnings given to the user on a talk page, etc.) already indicates human recognition that a user may be a vandal. We explicitly avoid such features so that we provide Wikipedia administrators with a fully automated vandal early warning system. Feature importance: We compute the importance of the features described above by using the fact that the depth of a feature used as a decision node in a tree captures the rel- ative importance of that feature w.r.t. the target variable. Features at the top of the tree contribute to the final pre- diction decision of a larger fraction of inputs. The expected fraction of samples they contribute to can be used to esti- mate their importance. Figure 3 shows the importance of the different features for the classification task, which was computed by using a forest of 250 randomized decision trees (extra-trees [24]). The red bars in the plot show the fea- ture importance using the whole forest, with their variabil- 8This happens mostly for meta-pages though it can occasionally also happen for normal (non-meta) pages. Figure 3: Importance of features (w/o reversion). Figure 4: Percentage of vandals and benign users with particular features (w/o reversion). ity across the trees represented by the blue bars. From the figure, it is clear that the features - fm, ntus and crmv - are the three most descriptive features for the classes. These are shown in greater detail in Figure 4. Let us look into each of them one by one. • If the very first page edited by user u is a normal (non- meta) page, then u is much more likely to be a vandal (64.77%) than a benign user (10.34%). The f m feature tells us that when a user's first edit is on a normal page, the user is much more likely to be a vandal. • Benign users are likely to take longer to edit a new page than a vandal (ntus). The probability that a benign user takes more than 15 minutes to edit the next page in an edit pair (p1, p2) when p2 is within 3 hops of p1, and p1 or p2's category is unknown is much higher (54.82%) than for vandals (7.66%). This suggests that benign users take longer to edit pages than vandals, possibly because they are careful and anxious to do a good job. Moreover, as p1 or p2 have no categories, the page is more likely to be a meta-page. • Benign users are much more likely to re-edit the same meta-page quickly (within 3 minutes) than vandals. This usually happens when there is a minor mistake on the page, and the user edits to correct it. Note that this again has the feature that the edit was made on a meta page. Benign users are much more likely to make such edits (53.13%) than vandals (9.88%). The top three features indicate that editing meta versus normal Wikipedia pages is a strong indicator of whether the user is benign. Intuitively, vandals vandalize heavily accessed pages and so normal pages are their most common target. On the other hand, benign users interact and discuss issues with other users about the content of the edit, and this discussion is done on meta pages. Accuracy: Using an SVM classifier, the WVB approach obtains an accuracy of 86.6% in classifying Wikipedia users as vandals or benign on our entire user_log dataset. 5.2 Wikipedia Transition Probability Matrix (WTPM) Approach The Wikipedia Transition Probability Matrix (WTPM) captures the edit summary of the users. The states in WTPM correspond to the space of possible vectors of features asso- ciated with any edit pair (p1, p2) carried out by a user u. By looking at Table 1, we see that there are 2 options for whether p2 is a meta-page or not, 3 options for the time dif- ference between edits (p1, p2), and so forth. This gives us a total of 60 possible states. Example states include: consecu- tively re-edit a normal-page within 15 minutes (s1), or edit a new normal page p2 within 3 hops from p1 and no common categories within 3 minutes (s2), etc. k P The transition matrix T (u) of user u captures the prob- ability Tij(u) that user u goes from state si to sj. Tij = N(si,sj) N(si,sk), where N(si, sj) is the number of times the user went from state si to sj. This gives a (usually sparse) tran- sition matrix of size 60 × 60 = 3600. The intuition behind using WTPM as features for clas- sification is that the transition probability from one state to the other for a vandal may differ from that of a benign user. Moreover, the states visited by vandals may be dif- ferent from states visited by benign users (for example, it turns out that benign users are more likely to visit a state corresponding to "first edit on meta page", than vandals do). We create a compact and distributed representation of T (u) using an auto-encoder[25] -- this representation pro- vides the features for our SVM classifier. When doing cross- validation, we train the auto-encoder using the training set with input from both benign users and vandals. We then take the value given by the hidden layer for each input as the feature for training a classifier. For predicting output for the test set, we give each test instance as input to the auto- encoder and feed its representation from the hidden layer into the classifier. Note that the auto-encoder is trained only on the training set, and the representation for the test set is derived only from this learned model. Accuracy: With a neural net auto-encoder of 400 hidden units and with SVM as the classifier, the WTPM approach gives an accuracy of 87.39% on the entire dataset. 5.3 VEWS Algorithm The VEWS approach merges all the features used by both the WVB approach and the WTPM approach. The resulting accuracy with a SVM classifier slightly improves the accu- racy of classification to 87.82%. 6. VANDAL PREDICTION EXPERIMENTS We used the popularly used machine learning library called Scikit-learn [26] for our experiments and the deep learning library Theano [27] for training the auto-encoder. Experiment 1: Overall Classification Accuracy. Ta- ble 2 shows the overall classification accuracy of all three ap- proaches by doing a 10-fold cross validation using an SVM classifier, together with the true positive, true negative, false positive, and false negative rates. We see that TP and TN rates are uniformly high, and FP and FN rates are low, making SVM an excellent classifier. WVB 86.6% WTPM 87.39% VEWS 87.82% Accuracy TPR TNR FPR FNR 0.15 0.12 0.13 0.85 0.88 0.87 0.11 0.10 0.08 0.89 0.90 0.92 Table 2: Table showing the accuracy and statistical values de- rived from the confusion matrix for the three approaches, on the entire dataset and averaged over 10 folds (without reversion fea- tures). The positive and negative class represent benign and van- dal users, respectively. We use McNemar's paired test to check whether the three approaches produce different results. For all pairs among the three approaches, the null hypothesis that they produce the same results is rejected with p-value < 0.01, showing statistical significance. Overall, VEWS produces the best result even though it has slightly lower true positives and slightly more false negatives than WTPM. We also classified using the VEWS approach with deci- sion tree classifier, random forest classifier (with 10 trees) and k-nearest neighbors classifier (with k = 3) which gave classification accuracy of 82.82%, 86.62% and 85.4% respec- tively. We experimented with other classifiers as well, but they gave lower accuracy. Experiment 2: Improvement with Temporal Re- cency. The previous experiment's cross validation randomly selects samples from the entire dataset for training and val- idation. But in the real world, a vandal's behavior may be more closely related to other vandals' recent behavior. To check this, starting from April 2013, for each month m, we train our algorithms with data from all the users who started editing on Wikipedia within the previous three months, i.e. in months m − 3, m − 2 and m − 1. m is varied until July 2014. We then use the learned model to predict whether a user is vandal or benign among the users who made their first edit in month m. The variation of accuracy is shown in Figure 5. The highest accuracy of 91.66% is obtained with the VEWS approach, when predicting for users who started editing in January 2014 and training is done with users from October-December 2013. The average accuracy for the three approaches over all the time points is also shown in Figure 5. The most important observation from Figure 5 is that temporal classification accuracy for each approach is usually higher than the base accuracy shown in Table 2 and Figure 7 (described later in Experiment 4). We attribute this to the fact that in the previous experiment, we use cross-validation without considering temporal information when creating the folds. This experiment, on the other hand, predicts vandals based on what is learned during the previous three months. Figure 5 shows that the approaches are consistent over time in separating vandals from benign users. At all times, the approaches have at least 85% classification accuracy, with the exception of the case when using WVB during months May and June, 2013. Experiment 3: Varying Size of Training Set on Classification Accuracy. We designed an experiment to study the affect of varying the size of the training set, while maintaining the temporal aspect intact. So for testing on users who made their first edit in the month of July 2014, we train the classifier on edits made by users who started editing in the previous n months. We vary n from 1 to 12. This preserves the temporal aspect in training, similar to the previous experiment. The variation of accuracy is shown in Figure 6. There are two interesting observations: i) the Figure 5: Plot showing variation of accuracy when training on edit log of users who started editing within previous 3 months (without reversion features). The table reports the average accu- racy of all three approaches. Figure 6: Plot showing the change in accuracy by varying the training set of users who started editing Wikipedia at most n months before July 2014. The testing is done on users who started editing in July 2014. accuracy of WTPM and VEWS increases with the number of (training) months n. ii) In contrast, WVB's accuracy is hardly affected by the number of months of training data. This is because: (i) features in WVB are binary and (ii) fm, which is the most important feature in WVB, does not vary with time. Experiments 2 and 3 show strong temporal dependency of user behavior on prediction of vandals. This may be due to several factors: Wikipedia may change rules and policies that affect user behavior, real world events might trigger users to make similar edits and emulate similar behaviour, etc. Such behavior traits would be highlighted when observ- ing recent edits made by newly active users. Experiment 4: Effect of First k User Edits. We study the effect of the first-k edits made by the user on prediction accuracy which is averaged over 10 folds of the whole dataset. The solid lines in Figure 7 show the variation in accuracy when k is varied from 1 to 500. As there is little shift in classification accuracy when k > 20, the situation for k = 1, . . . , 20 is highlighted. We get an average accuracy of 86.6% for WVB, 87.39% for WTPM, and 87.82% for VEWS when k = 500. It is clear that the first edit itself (was the first edit made on a meta-page or not?) is a very strong classifier, with an accuracy of 77.4%. Accuracy increases fast when k is increased to 10 for all approaches, after which it flattens out. This suggests that a user's first few edits are very significant in deciding whether he/she is vandal or not. Considering reversion. Figure 7 also shows that accuracy does go up by about 2% when we allow our three algorithms to consider reversion information. Please note that this ex- periment is merely for completeness sake and our proposed algorithm does not depend on reversion at all. For this ex- periment, we added additional reversion-driven edit features to the features used by WVB, WTPM, and VEWS (and we called these approaches WVB-WR, WTPM-WR, and VEWS-WR, respectively). These features capture whether a user edited a page after his previous edit on that page was reverted. Specifically, we extend the features - crs, crv, crm, crn, crmv, crmf, crms and crf_crv - to now have two types of re-edits: one that is reversion driven and one that is not. Using reversion information would mean that a human or vandalism detection system has already flagged a poten- tial vandal. In contrast, our algorithms are able to predict vandals with high accuracy even without such input. Figure 7: Plot showing variation of accuracy with the number of first k edits. The outer plot focuses on the variation of k from 1 to 20. The inset plot shows variation of k from 1 to 500. Comparison with State-of-the-art tools. Here we evaluate our work against ClueBot NG [3] and STiki [4] as they are the primary tools currently used by Wikipedia to detect vandalism. We recall that these tools are designed to detect whether the content of an article has been vandalized or not, while we focus on detecting whether a user is a vandal or not. We show that VEWS handily beats both ClueBot NG and Stiki in the latter task. Interestingly, when we combine VEWS', ClueBot NG's and STiki's features, we get better accuracy than with either of them alone. All experiments are done using 10-fold cross validation and SVM as the classifier. Comparison with ClueBot NG. Given an edit, ClueBot NG [3] detects and reverts vandalism automatically. We could use ClueBot NG to classify a user as a vandal if he has made at least v vandalism edits (edits that were reverted by ClueBot NG). For comparing this heuristic with VEWS we use v = 1, 2, 3. Figure 8 shows that the maximum accuracy achieved by ClueBot NG is 71.4% (when v = 1) and accuracy decreases as v increases. Therefore, VEWS outperforms this use of ClueBot NG. When does VEWS Detect Vandals? Of 17,027 vandals in our dataset, VEWS detects 3,746 that ClueBot NG does not detect (i.e. where ClueBot NG does not revert any edits by this person). In addition, it detects 7,795 vandals before ClueBot NG -- on average 2.6 edits before ClueBot NG did. Figure 8: Plot showing the variation of accuracy for vandal de- tection by considering reversions made by ClueBot NG. Figure 10: Plot showing the variation of accuracy for vandal detection by considering article scores given by STiki. RULE: If the user makes 1 edit in first k that gets score > t, then the user is a vandal. In the second experiment, we say that a user is a vandal after making k edits if the maximum STiki score among these k edits is more than a threshold t.10 We vary the values of t from 0 to 1 and the results can be seen in Figure 10. We also did experiments for the case when we classify a user as a vandal if the maximum two and three scores are above t, which yielded lower accuracy scores. Combining VEWS, Cluebot NG and STiki. VEWS can be improved by adding linguistic and meta-data features from ClueBot NG and STiki. In addition to the features in VEWS, we add the following features: i) number of edits reverted11 by ClueBot NG until the kth edit, ii) user repu- tation score by STiki after the kth edit, and iii) maximum article edit score given by STiki until the kth edit (we also did experiments with the average article edit score instead of maximum, which gave similar results). Figure 11 shows the variation of average accuracy by using the first-k edits made by the user to identify it as a vandal. The accuracy of the VEWS-ClueBot combination is 88.6% (k = 20), which is higher than either of them alone. Observe that this com- bination does not consider any human input. The accuracy of the combination VEWS-ClueBot-STiki improves slightly to 90.8% (k = 20), but STiki considers human inputs while calculating its scores. 7. CONCLUSIONS In this paper, we develop a theory based on edit-pairs and edit-patterns to study the behavior of vandals on Wikipedia and distinguish these behaviors from those of benign users. We make the following contributions. 1. First, we develop the UMDWikipedia dataset which contains a host of information about Wikipedia users and their behaviors. 2. Second, we conduct a detailed analysis of behaviors that distinguish vandals from benign users. Notable dis- tinctions that do not involve revert information include: (a) We find that the first page edited by vandals is much more likely to be a normal page -- in contrast, benign users' first edits are much more likely to occur on meta-pages. 10We also tested using average instead of maximum with similar results. 11We allow these reverts to be considered as they are generated with no human input, so the resulting combination is still fully automated. Figure 9: Plot showing the variation of accuracy for vandal de- tection by considering kth REP_USER score given by STiki. In 210 cases, ClueBot NG detects a vandal edit 5.29 edits earlier (on average) than VEWS detects the vandal and there are 1,119 vandals that ClueBot NG detects but VEWS does not. Overall, when both detect the vandal, VEWS does it 2.39 edits (on average) before ClueBot NG does. Instead of reverts made by ClueBot NG, when we con- sider reverts made by any human or any known vandalism detection system, VEWS detects the vandal at least as early as its first reversion in 87.36% cases -- in 43.68% of cases, VEWS detects the vandal 2.03 edits before the first rever- sion. Thus, on aggregate, VEWS outperforms both humans and other vandalism detection system in early detection of vandals, though there are definitely a small number of cases (7.8%) on which ClueBot NG performs very well.9 Comparison with STiki. STiki provides a "probability of vandalism" score to each edit. STiki also maintains a user reputation score, which is developed by looking at the user's past edits (the higher the score, the higher the probability that the user is a vandal). We use both these scores sepa- rately to compare against STiki. We first consider a user to be a vandal if his STiki repu- tation score (REP_USER) after making the kth edit is at least t. Figure 9 shows the results of this experiment where we vary t from 0 to 1 in steps of 0.1. We also report the VEWS curve for comparison. We see that the STiki user rep- utation score to detect vandals has less than 60% accuracy and is handily beaten by VEWS. We do not test for values of t greater than 1 as accuracy decreases as t increases. 9We do not compare with STiki in this experiment, as it does not automatically revert edits. [9] B. T. Adler, L. de Alfaro, S. M. Mola-Velasco, P. Rosso, and A. G. West, "Wikipedia vandalism detection: Combining natural language, metadata, and reputation features," in CICLing, 2011, pp. 277 -- 288. [10] M. Potthast, B. Stein, and R. Gerling, "Automatic vandalism detection in wikipedia," in ECIR, 2008, pp. 663 -- 668. [11] M. Sumbana, M. GonÃğalves, R. Silva, J. Almeida, and A. Veloso, "Automatic vandalism detection in wikipedia with active associative classification," in TPDL, 2012, pp. 138 -- 143. [12] O. Ferschke, J. Daxenberger, and I. Gurevych, "A survey of nlp methods and resources for analyzing the collaborative writing process in wikipedia," in The People's Web Meets NLP. Springer, 2013, pp. 121 -- 160. [13] http://www.wikitrust.net/. [14] R. West and J. Leskovec, "Human wayfinding in information networks," in WWW, 2012, pp. 619 -- 628. [15] A. Cockburn and B. McKenzie, "What do web users do? an empirical analysis of web use," International Journal of human-computer studies, vol. 54, no. 6, pp. 903 -- 922, 2001. [16] L. D. Catledge and J. E. Pitkow, "Characterizing browsing strategies in the world-wide web," Computer Networks and ISDN systems, vol. 27, no. 6, pp. 1065 -- 1073, 1995. [17] E. Adar, J. Teevan, and S. T. Dumais, "Large scale analysis of web revisitation patterns," in SIGCHI. ACM, 2008, pp. 1197 -- 1206. [18] H. T. Welser, D. Cosley, G. Kossinets, A. Lin, F. Dokshin, G. Gay, and M. Smith, "Finding social roles in wikipedia," in iConference, 2011, pp. 122 -- 129. [19] https://www.mediawiki.org/wiki/API. [20] http://beta.degreesofwikipedia.com/. [21] A. Halfaker, http://datahub.io/dataset/english-wikipedia-reverts. [22] A. Kittur, B. Suh, B. A. Pendleton, and E. H. Chi, "He says, she says: Conflict and coordination in wikipedia," in SIGCHI, 2007, pp. 453 -- 462. [23] http://armstrong.cis.upenn.edu/stiki_api.php? [24] P. Geurts, D. Ernst, and L. Wehenkel, "Extremely randomized trees," Machine learning, vol. 63, no. 1, pp. 3 -- 42, 2006. Foundations and trends R(cid:13) in Machine Learning, vol. 2, no. 1, pp. 1 -- 127, 2009. [25] Y. Bengio, "Learning deep architectures for ai," [26] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, "Scikit-learn: Machine learning in Python," Journal of Machine Learning Research, vol. 12, pp. 2825 -- 2830, 2011. [27] J. Bergstra, O. Breuleux, F. Bastien, P. Lamblin, R. Pascanu, G. Desjardins, J. Turian, D. Warde-Farley, and Y. Bengio, "Theano: a CPU and GPU math expression compiler," in SciPy, Jun. 2010. Figure 11: Figure showing effect of adding STiki and ClueBot NG's features to our VEWS features. (b) We find that benign users take longer to edit a page than a vandal user. (c) We find that benign users are much more likely to re- edit the same page quickly (within 3 minutes) as compared to vandals, possibly because they wanted to go back and improve or fix something they previously wrote. These are just three major factors that allow us to differ- entiate between vandals and benign users. Many others are detailed in the paper providing some of the first behavioral insights that do not depend on reverts that differentiate be- tween vandals and benign users. 3. We develop three approaches to predict which users are vandals. Each of these approaches uses SVM with different sets of features. Our VEWS algorithm provides the best performance, achieving 87.82% accuracy. If in addition we consider temporal factors, namely that vandals next month are more likely to behave like vandals in the last few months, this accuracy goes up to 89.5%. Moreover, we show that the combination of VEWS and past work (ClueBot NG and STiki) increases accuracy to 90.8%, even without any human generated reversion information. Moreover, VEWS detects far more vandals than ClueBot NG. When both VEWS and ClueBot NG predict vandals, VEWS does it 2.39 edits (on average) before ClueBot NG does. Acknowledgements. Parts of this work were supported by ARO grants W911NF11103, W911NF1410358, and W911NF09102. 8. REFERENCES [1] http://en.wikipedia.org/wiki/Wikipedia:Vandalism. [2] P. Neis, M. Goetz, and A. Zipf, "Towards automatic vandalism detection in openstreetmap," ISPRS International Journal of Geo-Information, vol. 1, no. 3, pp. 315 -- 332, 2012. [3] http://en.wikipedia.org/wiki/User:ClueBot_NG. [4] http://en.wikipedia.org/wiki/Wikipedia:STiki. [5] http://en.wikipedia.org/wiki/Wikipedia:Snuggle. [6] S. M. Mola-Velasco, "Wikipedia vandalism detection through machine learning: Feature review and new proposals - lab report for pan at clef 2010." in CLEF, 2010. [7] A. G. West, S. Kannan, and I. Lee, "Detecting wikipedia vandalism via spatio-temporal analysis of revision metadata?" in EUROSEC, 2010, pp. 22 -- 28. [8] B. T. Adler, L. de Alfaro, and I. Pye, "Detecting wikipedia vandalism using wikitrust - lab report for PAN at CLEF 2010," in CLEF, 2010.
1702.07784
1
1702
2017-02-24T22:14:30
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying
[ "cs.SI", "cs.AI", "cs.CY" ]
Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online gaming world, it quickly spread across various social networking platforms, ultimately leading to many incidents of cyberbullying and cyberaggression. We focus on Twitter, presenting a measurement study of a dataset of 340k unique users and 1.6M tweets to study the properties of these users, the content they post, and how they differ from random Twitter users. We find that users involved in this "Twitter war" tend to have more friends and followers, are generally more engaged and post tweets with negative sentiment, less joy, and more hate than random users. We also perform preliminary measurements on how the Twitter suspension mechanism deals with such abusive behaviors. While we focus on Gamergate, our methodology to collect and analyze tweets related to aggressive and bullying activities is of independent interest.
cs.SI
cs
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying Despoina Chatzakou†, Nicolas Kourtellis‡, Jeremy Blackburn‡ Emiliano De Cristofaro(cid:93), Gianluca Stringhini(cid:93), Athena Vakali† †Aristotle University of Thessaloniki (cid:93)University College London [email protected], [email protected], [email protected] ‡Telefonica Research [email protected], [email protected], [email protected] 7 1 0 2 b e F 4 2 ] I S . s c [ 1 v 4 8 7 7 0 . 2 0 7 1 : v i X r a ABSTRACT Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of plat- forms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online gaming world, it quickly spread across various social net- working platforms, ultimately leading to many incidents of cyber- bullying and cyberaggression. We focus on Twitter, presenting a measurement study of a dataset of 340k unique users and 1.6M tweets to study the properties of these users, the content they post, and how they differ from random Twitter users. We find that users involved in this "Twitter war" tend to have more friends and fol- lowers, are generally more engaged and post tweets with negative sentiment, less joy, and more hate than random users. We also perform preliminary measurements on how the Twitter suspension mechanism deals with such abusive behaviors. While we focus on Gamergate, our methodology to collect and analyze tweets related to aggressive and bullying activities is of independent interest. 1. INTRODUCTION With the proliferation of social networking services and always- on always-connected devices, social interactions have increasingly moved online, as social media has become an integral part of peo- ple's every day life. At the same time, however, new instanti- ations of negative interactions have arisen, including aggressive and bullying behavior among online users. Cyberbullying, the digital manifestation of bullying and aggressiveness in online so- cial interactions, has spread to various platforms such as Twit- ter [23], Youtube [6], Ask.fm [14, 15], and Facebook [27]. Other community-based services such as Yahoo Answers [16], and online gaming platforms are not an exception [18]. Research has showed that bullying actions are often organized, with online users called to participate in hateful raids against other social network users [13]. The Gamergate controversy [17] is one example of a coordi- nated campaign of harassment in the online world. It started with a blog post by an ex-boyfriend of independent game developer Zoe Quinn, alleging sexual improprieties. 4chan boards like /r9k/ [1] and /pol/ [2], turned it into a narrative about "ethical" concerns in video game journalism and began organizing harassment cam- paigns [13]. It quickly devolved into a polarizing issue, involving sexism, feminism, and "social justice," taking place on social me- dia like Twitter [11]. Although held up as a pseudo-political move- ment by its adherents, there is substantial evidence that Gamergate is more accurately described as an organized campaign of hate and harassment [12]. What started as "mere" denigration of women in the gaming industry, eventually evolved into directed threats of violence, rape, and murder [29]. Gamergate came about due to a unique time in the digital world in general, and gaming in partic- ular. The recent democratization of video game development and distribution via platforms such as Steam has allowed for a new gen- eration of "indie" game developers who often have a more intimate relationship with their games and the community of gamers that play them. With the advent of ubiquitous social media and a com- munity born in the digital world, the Gamergate controversy pro- vides us a unique point of view into online harassment campaigns. Roadmap. In this paper, we explore a slice of the Gamergate con- troversy by analyizing 1.6M tweets from 340k unique users part of whom engaged in it. As a first attempt at quantifying this contro- versy, we focus on how these users, and the content they post, differ from random (baseline) Twitter users. We discover that Gamer- gaters are seemingly more engaged than random Twitter users, which is an indication as to how and why this controversy is still on going. We also find that, while their tweets appear to be aggres- sive and hateful, Gamergaters do not exhibit common expressions of online anger, and in fact primarily differ from random users in that their tweets are less joyful. The increased rate of engagement of Gamergate users makes it more difficult for Twitter to deal with all these cases at once, something reflected in the relative low sus- pension rates of such users. In the struggle to combat existing ag- gressive and bullying behaviors, Twitter recently took new actions and is now temporarily limiting users for abusive behavior [25]. Finally, we note that, although our work is focused on Gamergate in particular, our principled methodology to collect and analyze tweets related to aggressive and bullying activities on Twitter can be generalized and it is thus of independent interest. Paper Organization. Next section reviews related work, then Sec- tion 3 discusses our data collection methodology. In Section 4, we present the results of our analysis and lessons we learn from them. Finally, the paper concludes in Section 5. 2. RELATED WORK Previous research has studied and aimed at detecting offensive, abusive, aggressive, and bullying content on social media, includ- ing Twitter, YouTube, Instagram, Facebook and Ask.fm. Next, we cover related work on this type of behavior in general, as well as work related to the Gamergate case. Detecting abusive behavior. Chen et al. [6] aim to detect offensive content and potential offensive users by analyzing YouTube com- ments. Then, Hosseinmardi et al. [14, 15] turn to cyberbullying on Instagram and Ask.fm. Specifically, in [15], besides considering 1 available text information, they also try to associate the topic of an image (e.g., drugs, celebrity, sports, etc.) to possible cyberbullying events, concluding that drugs are highly associated with cyberbul- lying. Also, in a effort to create a suitable dataset for their analy- sis, at first the authors collected a large number of media sessions – i.e., videos and images along with comments – from Instagram public profiles, with a subset selected for labeling. To ensure that an adequate number of cyberbullying instances will be present in the dataset, they selected media sessions with at least one profan- ity word. Finally, they relied on the CrowdFlower crowdsourcing platform to determine whether or not such sessions are related with cyberbullying or cyberaggression. In [14] authors leveraged both likes and comments to identify negative behavior in the Ask.fm so- cial network. Here, their dataset was created by exploiting publicly accessible profiles, e.g. questions, answers, and likes. Other works aim to detect hate/abusive content on Yahoo Fi- nance. In [8], the authors use a Yahoo Finance dataset labeled over a 6-month period. Nobata et al. [20] gather a new dataset from Yahoo Finance and News comments: each comment is initially characterized as either abusive or clean (from Yahoo's in-house trained raters), with further analysis on the abusive comments spec- ifying whether they contain hate, derogative language, or profanity. They follow two annotation processes, with labeling performed by: (i) three trained raters, and (ii) workers recruited from Amazon Me- chanical Turk, concluding that the former is more effective. Kayes et al. [16] focus on a Community-based Question- Answering (CQA) site, Yahoo Answers, finding that users tend to flag abusive content posted in an overwhelmingly correct way, while in [7], the problem of cyberbullying is further decomposed to sensitive topics related to race and culture, sexuality, and in- telligence, using YouTube comments extracted from controver- sial videos. Hee et al. [27] also study specific types of cyber- bullying, e.g., threats and insults, on Dutch posts extracted from Ask.fm social media. They also highlight three main user behav- iors, harasser, victim, and bystander – either bystander-defender or bystander-assistant who support the victim or the harasser, respec- tively. Their dataset was created by crawling a number of seed sites from Ask.fm, with a limited number of cyberbullying instances. They complement the data with more cyberbullying related content by: (i) launching a campaign where people reported personal cases of cyberbullying taking place in different platforms, i.e., Facebook, message board posts and chats, and (ii) by designing a role-playing game involving a cyberbullying simulation on Facebook. Then, they ask manual annotators to characterize content as being part of a cyberbullying event, and indicate the author's role in such event, i.e., victim, harasser, bystander-defender, or bystander-assistant. Sanchez et al. [23] use Twitter messages to detect bullying in- stances and more specifically cases related to gender bullying. They use a distant supervision approach [10] to automatically label a set of tweets by using a set of abusive terms used to character- ize text as expressing negative or positive sentiment. The dataset is then used to train a classifier geared to finding inappropriate words in Twitter text and detect bullying – the hypothesis being that bul- lying instances most probably contain negative sentiment. Finally, in [3] the authors propose an approach suitable for detecting bul- lying and aggressive behavior on Twitter. They study the prop- erties of cuberbullies and aggressors and what distinguishes them from regular users. To perform their analysis, they build upon the CrowdFlower crowdsourcing tool to create a dataset where users are characterized as bullies, aggressors, spammers, or normal. Even though Twitter is among the most popular social networks, only a few efforts have focused on detecting abusive content on it. Here, we propose an approach for building a ground truth dataset, using Twitter as a source of information, which will contain a higher density of abusive content (mimicking real life abusive post- ing activity). Analysis of Gamergate. In our work, the hashtag #GamerGate serves as a seed word to build a dataset of abusive behavior, as Gamergate is one of the best documented large-scale instances of bullying/aggressive behavior we are aware of [17]. With individ- uals on both sides of the controversy using it, and extreme cases of cyberbullying and aggressive behavior associated with it (e.g., direct threats of rape and murder), #GamerGate is a relatively un- ambiguous hashtag associated with tweets that are likely to involve abusive/aggressive behavior. Prior work has also looked at Gamer- gate in somewhat related contexts. For instance, Guberman and Hemphill [11] used #GamerGate to collect a sufficient number of harassment-related tweets in an effort to study and detect toxic- ity on Twitter. Also, Mortensen [18] likens the Gamergate phe- nomenon to hooliganism, i.e., a leisure-centered aggression where fans are organized in groups to attack another group's members. 3. METHODOLOGY In this section, we present our methodology for collecting and processing a dataset of abusive behavior on Twitter. In this paper, we focus on the Gamergate case, however, our methodology can be generalized to other platforms and case studies. 3.1 Data Collection Seed keyword(s). The first step is to select one or more seed key- words, which are likely related to the occurrence of abusive inci- dents. Besides #GamerGate, good examples are also #BlackLives- Matter and #PizzaGate. In addition to such seed words, a set of hate- or curse-related words can also be used, e.g., words extracted from the Hatebase database (HB)1, to start collecting possible abu- sive texts from social media sources. Therefore, at time t1, the list of words to be used for filtering posted texts includes only the seed word(s), i.e., L(t1) =< seed(s) >. In our case, we focus on Twitter, and more specifically we build upon the Twitter Streaming API2 which gives access to 1% of all tweets. This returns a set of correlated information, either user- based, e.g., poster's username, followers and friends count, profile image, total number of posted/liked/favorite tweets, or text-based, e.g., the text itself, hashtags, URLs, if it is a retweeted or reply tweet, etc. The data collection process took place from June to August 2016. Initially, we obtained a 1% of the sample public tweets and parsed it to select all tweets containing the seed word #GamerGate, which are likely to involve the type of behavior, and the case study we are interested in. Dynamic list of keywords. In addition to the seed keyword(s), further filtering keywords are used to select abusive-related con- tent. The list of the additional keywords is updated dynamically in consecutive time intervals based on the posted texts during these intervals. Thus, in T = {t1, t2, ..., tn} the keywords list L(t) has the following form: L(ti) =< seed(s), kw1, kw2, kwN >, where kwj is the jth top keyword in time period ∆T = ti − ti−1. De- pending on the topic under examination, i.e., if it is a popular topic or not, the creation of the dynamic keywords list can be split to dif- ferent consecutive time intervals. To maintain the dynamic list of keywords for the time period ti−1 → ti, we investigate the texts posted in this time period. We extract N keywords found during that time, compute their frequency and rank them into a tempo- rary list LT (ti). We then adjust the dynamic list L(ti) with entries 1 https://www.hatebase.org/ 2 https://dev.twitter.com/streaming/overview 2 from the temporary list LT (ti) to create a new dynamic list that contains the up-to-date top N keywords along with the seed words. This new list is used in the next time period ti → ti+1 for the filtering of posted text. As mentioned, #GamerGate serves as a seed for a snowball sam- pling of other hashtags likely associated with cyberbullying and aggressive behavior. We include tweets with hashtags appearing in the same tweets as #GamerGate (the keywords list is updated on a daily basis). Overall, we reach 308 hashtags during the data collection period. A manual examination of these hashtags reveals that they do contain a number of hate words, e.g., #InternationalOf- fendAFeministDay, #IStandWithHateSpeech, and #KillAllNiggers. Random sample. To complement the dataset with cases that are less likely to contain abusive content, we also crawl a random sam- ple of texts over the same time period. In our case, we simply crawl a random set of tweets, which constitutes our baseline. Remarks. Overall, we have collected two datasets: (i) a random sample set of 1M tweets, and (ii) a set of 659k tweets which are likely to contain abusive behavior. We argue that the our data collection methodology provides sev- eral benefits with respect to performance. First, it allows for regular updates of the keyword list, hence, the collection of more up-to- date content and capturing previously unseen behaviors, keywords, and trends. Second, it lets us adjust the update time of the dynamic keywords list based on the observed burstiness of the topics under examination, thus eliminating the possibility of either losing new information or collecting repeatedly the same information. Finally, this process can be parallelized for scalability on multiple machines using a Map-Reduce script for computing top N keywords list. All machines maintain local top N keyword lists which are aggregated globally in a central controller, enabling the construction of a global dynamic top N keyword list that can be distributed back to the com- puting / crawling machines. 3.2 Data Processing We performed preprocessing of the data collected to produce a 'clean' dataset, free of noisy data. Cleaning. We remove stop words, URLs, numbers, and punctua- tion marks. Additionally, we perform normalization, i.e., we elimi- nate repeated letters and repetitive characters which users often use to express their feelings more intensely (e.g., the word 'hellooo' is converted to 'hello'). Spam removal. Even though extensive work has been done on spam detection in social media, e.g., [9, 24, 28], Twitter is still full of spam accounts [5], often using vulgar language and exhibiting behavior (repeated posts with similar content, mentions, or hash- tags) that could also be considered as aggressive or bullying. So, to eliminate part of this noise we proceeded with a first-level spam removal process by considering two attributes which have already been used as filters (e.g., [28]) to remove spam incidents: (i) the number of hashtags per tweet (often used for boosting the visibility of the posted tweets), and (ii) posting of (almost) similar tweets. To find optimal cutoffs for these heuristics, we study both the distribu- tion of hashtags and the duplication of tweets. Hashtags. The hashtags distribution shows that users tend to use from 0 to about 17 hashtags on average. With such information at hand, we test different cutoffs to set a proper limit, upon which the user could be characterized as spammer. After a manual inspection on a sample of posts, we set the limit to 5 hashtags, i.e., users with more than 5 hashtags, on average, are flagged as spammers, and their tweets are removed from the dataset. 3 Figure 1: Similarity distribution. Duplications. We also estimate the similarity of users' posts based on an appropriate similarity measure. In many cases, a user's tweets are (almost) the same, while only the listed mentioned users are modified. So, in addition to the previous presented cleaning pro- cesses, we also remove all existing mentions. We then proceed to compute the Levenshtein distance [19], which counts the minimum number of single-character edits needed to convert one string into another, averaging it out over all pairs of their tweets. Initially, for each user, we calculated the intra-tweet similarity, then we set to out estimate the average intra-tweets similarity. For a user with x tweets, we use a set of n similarity scores, where n = x(x − 1)/2. In the end, all users with intra-tweet similarity above 0.8 are ex- cluded from the dataset. Figure 1 shows that about 5% of the users have a high percentage of similar posts and which were removed. 4. RESULTS In this section, we present the results of our measurement- based characterization, comparing the baseline and the Gamergate (GG) related datasets across various dimensions, including user at- tributes, posting activity, content semantics, and Twitter account status. 4.1 How Active are Gamergaters? Account age. An underlying question about the Gamergate contro- versy is what started first: participants tweeting about it or Twitter users participating in Gamergate? In other words, did Gamergate draw people to Twitter, or were Twitter users drawn to Gamer- gate? In Figure 2a, we plot the distribution of account age for users in the Gamergate dataset and baseline users. For the most part, GG users tend to have older accounts (mean = 982.94 days, median = 788 days, ST D = 772.49 days). The mean, me- dian, and STD values for the random users are 834.39, 522, and 652.42 days, respectively. Based on a two-sample Kolmogorov- Smirnov test,3 the two distributions are different with a test statistic D = 0.20142 and p < 0.01. Overall, the oldest account in our dataset belongs to a GG user, while only 26.64% of baseline ac- counts are older than the mean value of the GG users. Figure 2a indicates that GG users were existing Twitter users drawn to the controversy. In fact, their familiarity with Twitter could be the rea- son that Gamergate exploded in the first place. Tweets and Hashtags. In Figure 2b, we plot the distribution of the number of tweets made by GG users and random users. GG users are significantly more active than random Twitter users (D = 0.352, p < 0.01). The mean, median, and STD values for the GG 3A statistical test to compare the probability distributions of differ- ent samples. (a) Account age distribution. (b) Posts distribution. (c) Hashtags distribution. Figure 2: CDF of (a) Account age, (b) Number of posts, and (c) Hashtags. (a) Favorites distribution. (b) Lists distribution. (c) URLs distribution. (d) Mentions distribution. Figure 3: CDF of (a) Number of Favorites, (b) Lists, (c) URLs, (d) Mentions. (random) users are 135,618 (49,342), 48,587 (9,429), and 185,997 (97,457) posts, resp. Figure 2c reports the CDF of the number of hashtags found in users' tweets for both GG and the random sample, finding that GG users use significantly (D = 0.25681, p < 0.01) more hashtags than random Twitter users. Other characteristics. Figures 3a and 3b show the CDFs of fa- vorites and lists declared in the users' profiles. We note that in the median case, GG users are similar to baseline users, but on the tail end (30% of users), GG users have more favorites and topi- cal lists declared than random users. Then, Figure 3c reports the CDF of the number of URLs found in tweets by both baseline and GG users. The former post fewer URLs (the median indicates a difference of 1-2 URLs, D = 0.26659, p < 0.01), while the lat- ter post more in an attempt to disseminate information about their "cause," somewhat using Twitter like a news service. Finally, Fig- ure 3d shows that GG users tend to make more mentions within their posts, which can be ascribed to the higher number of direct attacks compared to random users. Take aways. Overall, the behavior we observe is indicative of GG users' "mastery" of Twitter as a mechanism for broadcasting their ideals. They make use of more advanced features, e.g., lists, tend to favorite more tweets, and share more URLs and hashtags than random users. Using hashtags and mentions can draw attention to their message, thus GG users likely use them to disseminate their ideas deeper in the Twitter network, possibly aiming to attack more users and topical groups. 4.2 How Social are Gamergaters? Gamergaters are involved in what we would typically think of as anti-social behavior. However, this is somewhat at odds with the fact that their activity takes place primarily on social media. Aiming to give an idea of how "social" Gamergaters are, in Fig- (a) Friends distribution. (b) Followers distribution. Figure 4: CDF of (a) Number of Friends, (b) Followers. ures 4a and 4b, we plot the distribution of friends and followers for GG users vs baseline users. We observe that, perhaps surpris- ingly, GG users tend to have more friends and followers (D = 0.34 and 0.39, p < 0.01 for both). Although this might be somewhat counter-intuitive, the reality is that Gamergate was born on social media, and the controversy appears to be a clear "us vs. them" sit- uation. This leads to easy identification of in-group membership, thus heightening the likelihood of relationship formation. The ease of in-group membership identification is somewhat dif- ferent than polarizing issues in the real world where it may be diffi- cult to know a person's views on a polarizing subject, without actu- ally engaging them on the subject. In fact, people in real life might be unwilling to express their viewpoint because of social conse- quences. On the contrary, on social media platforms like Twitter, (pseudo-)anonymity often removes much of the inhibition people feel in the real world, and public timelines can often provide per- sistent and explicit expression of viewpoints. 4 (a) Emoticons distribution. (b) Uppercases distribution. (c) Sentiment distribution. (d) Joy distribution. Figure 5: CDF of (a) Emoticons, (b) Uppercases, (c) Sentiment, (d) Joy. 4.3 How Different is Gamergater's Content? Emoticons and Uppercase Tweets. Two common ways to express emotion in social media are emoticons and "shouting" by using all capital letters. Based on the nature of Gamergate, we would expect a relatively low number of emoticon usage, but many tweets that would be shouting in all uppercase letters. However, as we can see in Figures 5a and 5b, which plot the CDF of emoticon usage and all uppercase tweets, respectively, this is not the case. GG and random users tend to use emoticons at about the same rate (we are unable to reject the null hypothesis with D = 0.028 and p = 0.96). However, GG users tend to use all uppercase less often (D = 0.212, p < 0.01). As mentioned, GG users are savvy Twitter users, and generally speaking, shouting tends to be ignored. Thus, one explanation for this behavior is that GG users avoid such a simple "tell" as posting in all uppercase, to ensure their message is not so easily dismissed. Sentiment. In Figure 5c, we plot the CDF of sentiment of tweets. In both cases (GG and baseline) around 25% of tweets are posi- tive. However, GG users post tweets with a generally more nega- tive sentiment (D = 0.101, p < 0.01). In particular, around 25% of GG tweets are negative compared to only around 15% for base- line users. This observation aligns with the fact that the GG dataset contains a large proportion of offensive posts. We also compare the offensiveness score of tweets according to Hatebase, a crowdsourced list of hate words. Each word included in HB is scored on a [0, 100] scale, which indicates how hateful it is. Though the difference is slight, GG users use more hate words than random users (D = 0.006, p < 0.01). The mean and standard deviation values for HB score are 0.06 and 2.16 for the baseline users, while for the GG users they are 0.25 and 3.55, respectively. Finally, based on [4], we extract sentiment values for 6 differ- ent emotions: anger, disgust, fear, joy, sadness, and surprise. We note that of these, the 2-sample KS test is unable to reject the null hypothesis except for joy, as shown in Figure 5d (D = 0.089, p < 0.01). This is particularly interesting because it contradicts the narrative that Gamergaters are posting virulent content out of anger. Instead, GG users are less joyful, and this is a subtle but important difference: they are not necessarily angry, but they are apparently not happy. 4.4 Are Gamergaters Suspended More Often? A Twitter user can be in one of the following three statuses: ac- tive, deleted, or suspended. Typically, Twitter suspends an account (temporarily or even permanently, in some cases) if it has been hi- jacked/compromised, is considered spam/fake, or if it is abusive.4 4 https://support.twitter.com/articles/15790 Baseline Gamergate active 67% 86% deleted 13% 5% suspended 20% 9% Table 1: Status distribution. A user account is deleted if the user-owner of the account deacti- vates their account. In the following, we examine the differences among these three statuses with respect to GG and baseline users. To examine these differences, we focus on a sample of 33k users from both the GG and baseline datasets. From Table 1, we ob- serve that, in both cases, users tend to be suspended more often than deleting their accounts by choice. However, baseline users are more prone to be suspended (20%) or delete their accounts (13%) than GG users (9% and 5%, respectively). This seems to be in line with the behavior observed in Figure 2a, which shows that GG users have been in the platform for a longer period of time; some- what surprising given their exhibited behavior. Indeed, a small por- tion of these users may be spammers who are difficult to detect and filter out. Nevertheless, Twitter has made significant efforts to address spam and we suspect there is a higher presence of such ac- counts in the baseline dataset, since the GG dataset is very much focused around a somewhat niche topic. These efforts are less apparent when it comes to the bullying and aggressive behavior phenomena observed on Twitter in gen- eral [22, 26], and in our study of Gamergate users in particular. However, recently, Twitter has increased its efforts to combat the existing harassment cases, for instance, by preventing suspended users from creating new accounts [21], or temporarily limiting users for abusive behavior [25]. Such efforts constitute initial steps to deal with the ongoing war among the abusers, their victims, and online bystanders. 5. CONCLUSION This paper presented a first-of-its-kind effort to quantitatively an- alyze the Gamergate controversy. We collected 1.6M tweets from 340k unique users using a generic methodology (which can also be used for other platforms and other case studies). Although focused on a narrow slice of time, we found that, in general, users tweeting about Gamergate appear to be Twitter savvy and quite engaged with the platform. They produce more tweets than random users, and have more friends and followers as well. Surprisingly, we observed that, while expressing more negative sentiment overall, these users only differed significantly from random users with respect to joy. Finally, we looked at account suspension, finding that Gamergate 5 users are less likely to be suspended due to the inherent difficulties in detecting and combating online harassment activities. While we believe our work contributes to understanding large- scale online harassment, it is only a start. As part of future work, we plan to perform a more in-depth study of Gamergate, focusing on how it evolved over time. Overall, we argue that a deeper under- standing of how online harassment campaigns function can enable our community to better address them and propose detection tools as well as mitigation strategies. Acknowledgements. This work has been funded by the Euro- pean Commission as part of the ENCASE project (H2020-MSCA- RISE), under GA number 691025. 6. REFERENCES [1] Anonymous. "i dated zoe quinn". 4chan. https://archive.is/qrS5Q. [2] Anonymous. Zoe Quinn, prominent SJW and indie developer is a liar and a slut. 4chan. https://archive.is/QIjm3. [3] D. Chatzakou, N. Kourtellis, J. Blackburn, E. D. Cristofaro, G. Stringhini, and A. Vakali. Mean Birds: Detecting Aggression and Bullying on Twitter. arXiv preprint, arXiv:1702.06877, 2017. [4] D. Chatzakou, V. A. Koutsonikola, A. Vakali, and K. Kafetsios. Micro-blogging content analysis via emotionally-driven clustering. In ACII, 2013. [5] C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC, 2015. [6] Y. Chen, Y. Zhou, S. Zhu, and H. Xu. Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. In PASSAT and SocialCom, 2012. [7] K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. The Social Mobile Web, 11, 2011. [8] N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic, and N. Bhamidipati. Hate Speech Detection with Comment Embeddings. In WWW, 2015. [9] M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali. Nd-sync: Detecting synchronized fraud activities. In Advances in Knowledge Discovery and Data Mining, 19th Pacific-Asia Conference, 2015. [10] A. Go, R. Bhayani, and L. Huang. Twitter sentiment classification using distant supervision. Processing, 2009. [11] J. Guberman and L. Hemphill. Challenges in modifying existing scales for detecting harassment in individual tweets. In System Sciences, 2017. [12] A. Hern. Feminist critics of video games facing threats in 'gamergate' campaign. The Guardian, Oct 2014. https://www.theguardian.com/technology/2014/oct/23/ felicia-days-public-details-online-gamergate. [13] G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. A longitudinal measurement study of 4chan's politically incorrect forum and its effect on the web. arXiv preprint arXiv:1610.03452, 2016. [14] H. Hosseinmardi, R. Han, Q. Lv, S. Mishra, and A. Ghasemianlangroodi. Towards understanding cyberbullying behavior in a semi-anonymous social network. In IEEE/ACM ASONAM, 2014. [15] H. Hosseinmardi, S. A. Mattson, R. I. Rafiq, R. Han, Q. Lv, and S. Mishra. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In SocInfo, 2015. [16] I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F. Bonchi. The Social World of Content Abusers in Community Question Answering. In WWW, 2015. [17] A. Massanari. #gamergate and the fappening: How reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society, 2015. [18] T. E. Mortensen. Anger, fear, and games. Games and Culture, 2016. [19] G. Navarro. A Guided Tour to Approximate String Matching. ACM Comput. Surv., 33(1), 2001. [20] C. Nobata, J. Tetreault, A. Thomas, Y. Mehdad, and Y. Chang. Abusive Language Detection in Online User Content. In WWW, 2016. [21] Pham, Sherisse. Twitter tries new measures in crackdown on harassment. CNNtech, February 2017. http://money.cnn.com/2017/02/07/technology/ twitter-combat-harassment-features/. [22] Twitter trolls are now abusing the company's bottom line. http://www.salon.com/2016/10/19/ twitter-trolls-are-now-abusing-the-companys-bottom-line/, 2016. [23] H. Sanchez and S. Kumar. Twitter bullying detection. ser. NSDI, 12, 2011. [24] G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC, 2010. [25] A. Sulleyman. Twitter temporarily limiting users for abusive behaviour. Independent, February 2017. https://www.theguardian.com/technology/2014/oct/23/ felicia-days-public-details-online-gamergate. [26] The Guardian. Did trolls cost Twitter 3.5bn and its sale? https://www.theguardian.com/technology/2016/oct/18/ did-trolls-cost-twitter-35bn, 2016. [27] C. Van Hee, E. Lefever, B. Verhoeven, J. Mennes, B. Desmet, G. De Pauw, W. Daelemans, and V. Hoste. Automatic detection and prevention of cyberbullying. In Human and Social Analytics, 2015. [28] A. H. Wang. Don't follow me: Spam detection in Twitter. In SECRYPT, 2010. [29] N. Wingfield. Feminist critics of video games facing threats in 'gamergate' campaign. New York Times, Oct 2014. https://www.nytimes.com/2014/10/16/technology/ gamergate-women-video-game-threats-anita-sarkeesian. html. 6
1802.02996
1
1802
2018-02-08T18:25:22
A Longitudinal Study of Google Play
[ "cs.SI", "cs.CY" ]
The difficulty of large scale monitoring of app markets affects our understanding of their dynamics. This is particularly true for dimensions such as app update frequency, control and pricing, the impact of developer actions on app popularity, as well as coveted membership in top app lists. In this paper we perform a detailed temporal analysis on two datasets we have collected from the Google Play Store, one consisting of 160,000 apps and the other of 87,223 newly released apps. We have monitored and collected data about these apps over more than 6 months. Our results show that a high number of these apps have not been updated over the monitoring interval. Moreover, these apps are controlled by a few developers that dominate the total number of app downloads. We observe that infrequently updated apps significantly impact the median app price. However, a changing app price does not correlate with the download count. Furthermore, we show that apps that attain higher ranks have better stability in top app lists. We show that app market analytics can help detect emerging threat vectors, and identify search rank fraud and even malware. Further, we discuss the research implications of app market analytics on improving developer and user experiences.
cs.SI
cs
A Longitudinal Study of Google Play Rahul Potharaju∗, Mizanur Rahman†, Bogdan Carbunar† ∗Cloud and Information Services Lab, Microsoft †Florida International University 1 8 1 0 2 b e F 8 ] I S . s c [ 1 v 6 9 9 2 0 . 2 0 8 1 : v i X r a Abstract-The difficulty of large scale monitoring of app markets affects our understanding of their dynamics. This is particularly true for dimensions such as app update frequency, control and pricing, the impact of developer actions on app popularity, as well as coveted membership in top app lists. In this paper we perform a detailed temporal analysis on two datasets we have collected from the Google Play Store, one consisting of 160,000 apps and the other of 87,223 newly released apps. We have monitored and collected data about these apps over more than 6 months. Our results show that a high number of these apps have not been updated over the monitoring interval. Moreover, these apps are controlled by a few developers that dominate the total number of app downloads. We observe that infrequently updated apps significantly impact the median app price. However, a changing app price does not correlate with the download count. Furthermore, we show that apps that attain higher ranks have better stability in top app lists. We show that app market analytics can help detect emerging threat vectors, and identify search rank fraud and even malware. Further, we discuss the research implications of app market analytics on improving developer and user experiences. I. INTRODUCTION The revolution in mobile device technology and the emer- gence of "app markets", have empowered regular users to evolve from technology consumers to enablers of novel mobile experiences. App markets such as Google Play provide new mechanisms for software distribution, collecting software writ- ten by developers and making it available to smartphone users. This centralized approach to software distribution contrasts the desktop paradigm, where users obtain their software directly from developers. Developers and users play key roles in determining the impact that market interactions have on future technology. However, the lack of a clear understanding of the inner workings and dynamics of popular app markets, impacts both developers and users. For instance, app markets provide no information on the impact that developer actions will likely have on the success of their apps, or guidance to users when choosing apps, e.g., among apps claiming similar functionality. This situation is exploited however by fraudulent and mali- cious developers. The success of Google Play and the incentive model it offers to popular apps 1, make it an appealing target for fraudulent and malicious behaviors. Fraudulent developers have been shown to attempt to engineer the search rank of their apps [34], while malicious developers have been shown A preliminary version of this paper appears in ASONAM 2015. This research was supported in part by NSF grants 1527153, 1526494 and 1450619, and by DoD grant W911NF-13-1-0142. 1 Google offers financial incentives for contribution to app development, by making revenue sharing transparent for developers (70-to-30 cut, where developers get 70% of the revenue). to use app markets as a launch pad for their malware [26], [28], [33], [20]. Contributions. In this article we seek to shed light on the dynamics of Google Play, the most popular Android app market. We report results from one of the first characteristic studies on Google Play, using real-world time series data. To this end, we have developed iMarket, a prototype app market crawling system. We have used iMarket to collect data from more than 470,000 Google Play apps, and daily monitor more than 160,000 apps, over more than 6 months. We use this data to study two key aspects of Google Play. First, we seek to understand the dynamics of the market in general, from an application and developer perspective. For this, we evaluate the frequency and characteristics of app updates (e.g., their effects on bandwidth consumption), and use the results to determine if developers price their apps appropriately. We show that only 24% of the 160,000 app that we monitored have received an update within 6 months, and at most 50% of the apps in any category have received an update within a year from our observation period. We conclude that market inactivity has a significant impact on the price distribution. Therefore, while pricing is an important and complex task, relying on statistics computed on the entire population (as opposed to only active apps) may mislead de- velopers, e.g., to undersell their apps (§VI-A). Also, we show that typical app update cycles are bi-weekly or monthly. More frequently updated apps (under beta-testing or unstable) can impose substantial bandwidth overhead and expose themselves to negative reviews (§VI-C). To evaluate the developer impact, we first seek to verify our hypothesis that a few developers control the app market supply. Our analysis reveals however that developers that create many applications are not creating many popular applications. In- stead, we discovered that a few elite developers are responsible for applications that dominate the total number of downloads (§VII). Second, we evaluate the impact of developer actions on the popularity of their apps. We show that few apps frequently change prices, and with every subsequent software update, a developer is more likely to decrease the price. However, changing the price does not show an observable association with the app's download count(§VII). A second key aspect of Google Play that we study is the temporal evolution of top-k ranked lists maintained by the market. Top-k lists reveal the most popular applications in various categories. We show that a majority of apps in top-k app lists follow a "birth-growth-decline-death" process: they enter and exit from the bottom part of a list. Apps that attain higher ranks have better stability in top-k lists than apps that are at lower ranks (§VIII). Impact of the study. A longitudinal study of Google Play app metadata can provide unique information that is not available through the standard approach of capturing a single app snapshot. Features extracted from a longitudinal app analysis (e.g., permission, price, update, download count changes) can provide insights into fraudulent app promotion and malware indicator behaviors. For instance, spikes in the number of positive or negative reviews and the number of downloads received by an app can indicate app search optimization cam- paigns launched by fraudsters recruited through crowdsourcing sites. Frequent, substantial app updates may indicate Denial of Service (DoS) attacks, while permission changes can indicate benign apps turning malicious see § IX-A. Features extracted from a longitudinal app monitoring can be used to train supervised learning algorithms to detect such behaviors. In addition, a detailed longitudinal study of Google Play apps can improve developer and user experiences. For in- stance, app development tools can help developers optimize the success of their apps. Such tools can integrate predictions of the impact that price, permissions and code changes will have on the app's popularity, as well as insights extracted from user reviews. In addition, visualizations of conclusions, and analytics similar to the ones we perform in this paper, can help users choose among apps with similar claimed functionality. We include a detailed discussion of the applicability and future research directions in app market analytics in §IX. II. RELATED WORK This article extends our preliminary work [10] with iMarket, the market crawler we developed and used to collect the data, new scores to evaluate the evolution and variability of top-k lists and new experiments and evaluations. Viennot et al. [35] developed PlayDrone, a crawler to collect Google Play data. Their main finding is that Google Play developers often include secret key information in the released apps, making them vulnerable to attacks. They further analyze the data and show that Google Play content evolves quickly in time, that 25% of apps are clones, and that native experience correlates strongly to popularity. The analysis is performed over data collected for 3 non-contiguous months (May/June 2013 and November 2013). In contrast, our analysis is performed over apps monitored daily over more than 6 months. Furthermore, our analysis includes orthogonal app market dynamics dimensions, that include the frequency and cycles of app updates, the developer impact and control on the app market, and the dynamics of top-k lists. Zhong and Michahelles [40] analyze a dataset of Google Play transactions, and suggest that Google Play is more of a "Superstar" market (i.e., dominated by popular hit prod- ucts) than a "Long-tail" market (i.e., where unpopular niche products contribute to a substantial portion of popularity). In addition, Zhong and Michahelles [40] show that certain expensive professional apps attract disproportionately large sales. This is consistent with our finding that a few developers are responsible for the most popular apps. Moller et al. [29] use an app they posted on Google Play to study the correlation between published updates and their 2 actual installations. They show that 7 days after a security update is published, almost half of the app's users still use an older, vulnerable version. Liu et al. [25] use a dataset of 1,597 ranked mobile apps to conclude that the "freemium" strategy is positively associated with increased sales volume and revenue of the paid apps. Moreover, they show that free apps that rate higher contribute to higher revenue for the paid version. We note that our work studies a multitude of previously unanswered questions about Google Play, regarding app update frequency and pricing appropriateness, and the evolution of top-k lists. Petsas et al. [30] explored mobile app markets in the context of 4 providers, that do not include Google Play. They show that the distribution of app popularity deviates from Zipf, due in part to a strong temporal affinity of user downloads to app categories. They show that on the markets they studied, paid apps follow a different popularity distribution than free apps. In contrast, our work exclusively analyzes Google Play, the most popular Android app market. In addition, we focus on different dimensions: (i) app update frequency and its effect on app pricing and resource consumption, (ii) the control of the market and the effect of developer actions on the popularity of their apps and (iii) the evolution in time of top apps and top-k app lists. Xu et al. [39] use IP-level traces from a tier-1 cellular network provider to understand the behavior of mobile apps. They provide an orthogonal analysis of spatial and temporal locality, geographic coverage, and daily usage patterns. Security has been a theme in the large scale collection of mobile apps. Previous work includes malware detection [42], malware analysis [41], malicious ad libraries [19], vulner- ability assessment [15], overprivilege identication [16] and detection of privacy leaks [14]. While in this paper we focus on the different problem of understanding the dynamics of Google Play, we also introduce novel mobile app attacks. III. GOOGLE PLAY OVERVIEW App Distribution Channel: Google Play is the app distri- bution channel hosted by Google. Each app submitted by a developer gets an entry on the market in the form of a webpage, accessible to users through either the Google Play homepage or the search interface. This webpage contains meta-information that keeps track of information pertaining to the application (e.g., name, category, version, size, prices). In addition, Google Play lists apps according to several cate- gories, ranging from "Arcarde & Action" to "Weather". Users download and install apps of interest, which they can then review. A review has a rating ranging from 1 to 5. Each app has an aggregate rating, an average over all the user ratings received. The app's webpage also includes its usage statistics (e.g., rating, number of installs, user reviews). This information is used by users when they are deciding to install a new application. App Development: In order to submit apps to Google Play, an Android developer first needs to obtain a publisher account for a one-time fee of $25. The fee encourages higher quality prod- ucts and reduces spam [18]. Google does not limit the number SMARTPHONE MARKET http request raw app html page DISTRIBUTED CRAWLER Scheduler Request Queue Ban Detection Engine Loop Detection Engine + Server Rotator Proxy Rotator RESOURCE POOL Server Pool (700 machines) Proxy Pool (230 proxies) hundreds of thousands of raw html pages newly discovered packages PROCESSING ENGINE Map-Reduce Parser Assertion Checker/ Format Invalidator Raw HTML App Pages Formatted Daily Snapshot DATA MANAGEMENT Archived Storage raw html pages Backup Manager Database Engine SQL Database Fig. 1. Architecture of iMarket, the developed GooglePlay crawler. It consists of a distributed crawler, processing engine and data management components. of apps that can be submitted by developers. As a measure to reduce spam, Google recently started the Bouncer [3] service, which provides automated scanning of applications on Google Play for potential malware. Developers can sell their apps for a price of their choice, or distribute them for free. Permission Model: Android follows the Capability-based [24] security model. Each app must declare the list of capabilities (permissions) it requires in a manifest file called Android- Manifest.xml. When a user downloads an app through the Google Play website, the user is shown a screen that displays the permissions requested by the application. Installing the application means granting the application all the requested permissions i.e. an all-or-none approach. IV. DATA COLLECTION We use snapshot to refer to the entire state of the market i.e., it contains meta information of all apps. We first describe iMarket, our app market crawler, then describe the datasets that we collected from Google Play. A. The iMarket Crawler iMarket, our prototype market crawling system (see Figure 1 for an overview) consists of three main components. First, the Distributed Crawler component, which is responsible for crawling the target market and collecting information on various apps that are accessible from the current geographical location. We initially leveraged hundreds of foreign proxies to address challenge 3 above. However, we later decided to rely only on local US-based proxies for stability reasons. While this trades-off completeness for consistency, having continu- ous information about a few apps improves the accuracy of most statistical inference tasks compared to having discrete information about hundreds of thousands of apps. To seed our distributed crawler, we initially ran it using a list consisting of about 200 randomly hand-picked apps from different categories. To address Challenge 1, our app discovery process is designed as follows: After retrieving each page, the 3 "Similar Apps" portion of the raw HTML page is parsed to obtain a new list of packages. These packages are queued for crawling and simultaneously appended to the previous day's package list. We have also detected a ban detection engine in place that deactivates servers once it observes a threshold number of "404 Not Found" messages (Challenge 2) from the market provider. The second component, the "Processing Engine" contains a Map-Reduce Parser component that uses the map-reduce paradigm [13] to handle parsing of hundreds of thousands of raw HTML app pages. In the "map" stage, a chunk of files (≈10K) are mapped onto each of the 700 machines and a parser (written in Python) parses these HTML and extracts the meta information. In the "reduce" stage, these individual files are combined into a single file and de-duplicated to maintain data integrity. This stage takes ≈1-1.5 hours. After constructing the aggregate file, we address Challenge 3 using the assertion checker that takes a best-effort approach to ensure that all the information has been correctly parsed from the raw files. Note that despite our best-effort approach, our dataset still contained some missing information due to temporary unavailability/maintenance of servers. The third, "Data Management" component, archives the raw HTML pages (≈14 GB compressed/day) in a cloud storage to support any ad hoc processing for other tasks (e.g., analyzing HTML source code complexity) and subsequently removed from the main servers. To address Challenge 4, the formatted daily snapshot (≈200 MB/day) is then inserted into a database to support data analytics. We setup the relevant SQL Jobs to ensure that indexes are re-built every two days - this step significantly speeds up SQL queries. Our six months of archived raw files consume ≈7 TB of storage and the database consumes ≈400 GB including index files. V. DATA We used iMarket to collect two Google Play datasets, which we call dataset.2012 and dataset.14-15. A. Dataset.2012 We have used a total of 700 machines 2 for a period of 7.5 months (February 2012 - November 2012) to collect data from 470,000 apps. The first 1.5 months are the "warm up" interval. We do not consider data collected during this period for subsequent analysis. Instead, we focus on a subset of 160K apps for which we have collected the following data: GOOGPLAY-FULL: We used iMarket to take daily snapshots of Google Play store from April - November, 2012. For each app, we have daily snapshots of application meta-information consisting of the developer name, category, downloads (as a range i.e., 10-100, 1K-5K etc.), ratings (on a 0-5 scale), ratings count (absolute number of user ratings), last updated timestamp, software version, OS supported, file size, price, url and the set of permissions that the app requests. Figure 2(a) shows the distribution of apps by category. While overall, the 2We have used 700 machines, each with a different IP address and from a different subnet, in order to avoid getting banned during the crawling process. y r o g e t a C Weather Travel & Local Transportation Tools Sports Games Sports Social Shopping Racing Productivity Photography Personalization News & Magazines Music & Audio Medical Media & Video Lifestyle Libraries & Demo Health & Fitness Finance Entertainment Education Communication Comics Casual Cards & Casino Business Brain & Puzzle Books & Reference Arcade & Action 0 10000 20000 # Applications 30000 40000 50000 (a) 4 Free Paid Type Free Paid y r o g e t a C Weather Trivia Travel&Local Transportation Tools Sports Social Simulation Shopping Racing Productivity Photography Personalization News&Magazines Music&Audio Medical Media&Video Lifestyle Libraries&Demo Health&Fitness Finance Entertainment Education Communication Comics Casual Card&Casino Business Brain&Puzzle Books&Reference Arcade&Action 0 2000 # Applications 4000 (b) Fig. 2. Distribution of free vs. paid apps, by category, for (a) dataset.2012 and dataset.14-15. The number of free apps exceeds the number of paid ones especially in dataset.14-15. We conjecture that this occurs due to user tendency to install more free apps than paid apps. Since 2012, developers may have switched from a direct payment model for paid apps, to an ad based revenue model for free apps. y r o g e t a C Weather Travel & Local Transportation Tools Sports Games Sports Social Shopping Racing Productivity Photography Personalization News & Magazines Music & Audio Medical Media & Video Lifestyle Libraries & Demo Health & Fitness Finance Entertainment Education Communication Comics Casual Cards & Casino Business Brain & Puzzle Books & Reference Arcade & Action 0 11/24/2012 365 1 yr Age Since Last Update (in days) 1095 3 yrs 730 2 yrs y r o g e t a C Weather Travel & Local Transportation Tools Sports Social Shopping Racing Brain & Puzzle Productivity Photography Personalization News & Magazines Music & Audio Medical Media & Video Lifestyle Libraries & Demo Health & Fitness Finance Family Entertainment Education Communication Comics Casual Cards & Casino Business Books & Reference Arcade & Action 0 1465 4 yrs 100 200 Age Since Last Update (in days) 300 400 (a) (b) Fig. 3. Box and whiskers plot of the time distribution from the last update, by app category, for (a) dataset.2012: at most 50% of the apps in each category have received an update within a year and (b) dataset.14-15: at most 50% of the apps in each category have received an update within 35 days. This may occur since new apps are likely to have more bugs and receive more attention from developers. number of free apps exceed the number of paid apps, several popular categories such as "Personalization" and "Books & References" are dominated by paid apps. GOOGPLAY-TOPK: Google publishes several lists, e.g., Free (most popular apps), Paid (most popular paid), New (Free) (newly released free apps), New (Paid) (newly released paid) and Gross (highly grossing apps). Each list is divided into ≈20 pages, each page consisting of 24 apps. These lists are typically updated based on application arrival and the schedule of Google's ranking algorithms. Since we cannot be notified when the list changes, we took hourly snapshots of the lists. Our GOOGPLAY-TOPK consists of hourly snapshots of five top-k lists (≈ 3000 apps) from Jul-Nov, 2012 (≈2880 hours worth of data). B. Dataset.14-15 Further, we have used a dataset of more than 87,000 newly released apps that we have monitored over more than 6 months [32]. Specifically, we have collected newly released apps once a week, from Google Play's "New Release" links, to both free and paid apps. We have validated each app based on the date of the app's first review: we have discarded apps whose first review was more than 40 days ago. We have collected 87,223 new releases between July and October 2014, all having less than 100 reviews. We have then monitored and collected data from these 87,223 apps between October 24, 2014 and May 5, 2015. Specifically, for each app we captured "snapshots" of its Google Play metadata, twice a week. An app snapshot consists of values for all its time varying variables, e.g., the reviews, the rating and install counts, and the set of requested permissions. For each of the 2, 850, 705 reviews we have collected from the 87, 223 apps, we recorded the reviewer's name and id, date of review, review title, text, and rating. Figure 2(b) shows the distribution of apps by category. With the exception of the "Personalization" category, the number of free apps significantly exceeds the number of paid apps. We have observed that consistently through our collection effort, we identified fewer top paid than free new releases. One reason for this may be that users tend to install more free apps than paid apps. Thus, not only developers may develop fewer paid apps, but paid apps may find it hard to compete against free 5 versions. We note that free apps bring revenue through ads. Class # download % Dataset.2012 % Dataset.14-15 VI. POPULARITY AND STALENESS We first evaluate the fraction of apps that are active, and discuss the implications this can have on app pricing. We then classify apps based on their popularity, and study the distribution of per-app rating counts. Finally, we study the frequency of app updates for apps from various classes and the implications they can have on end-users. All the analysis pre- sented in this section is performed using GOOGPLAY-FULL. A. Market Staleness An important property of a market is its "activity", or how frequently are apps being maintained. We say that an app is stale if it has not been updated within the last year from the observation period, and active otherwise. The task of setting the app price is complex. However, rely- ing on statistics computed on the entire population, as opposed to only active apps, may mislead developers. For instance, given that the listing price of apps forms a key component of its valuation and sale, this becomes an important factor for fresh developers trying to enter the market. Specifically, the median price in our dataset is $0.99 when all apps are considered and $1.31 when considering only active apps. This confirm our intuition that developers that set their price based on the former value are likely to sell their apps at lower profits. Figure 3(a) shows the box and whiskers plot [8] of the per-app time since the last update, by app category, for dataset.2012. At most 50% of the apps in each category have received an update within a year from our observation period. For instance, most apps in Libraries & Demo have not been updated within the last 1.5 years. Some categories such as Arcade & Action, Casual, Entertainment, Books & Reference, Tools contain apps that are older than three years. Figure 3(b) plots this data for dataset.14-15. Many freshly uploaded apps were uploaded more recently: 50% apps in each category receive an update within 35 days, while apps in the "Social" and "Tools" categories received updates even within 15 days. This is natural, as new apps may have more bugs and receive more developer attention. Several reasons may explain the lack of updates received by many of the apps we monitored. First, some apps are either stable or classic (time-insensitive apps, not expected to change) and do not require an update. Other apps, e.g., e-books, wallpapers, libraries, do not require an update. Finally, many of the apps we monitored seemed to have been abandoned. Unpopular Popular Most-Popular 0 – 103 103 – 105 > 105 74.14 24.1 0.7 77.55 18.43 4.00 Popularity classes of apps, along with their distribution. Dataset.14-15 has a higher percentage of most-popular apps. TABLE I Table I shows the criteria for the 3 classes and the distri- bution of the apps in dataset.2012 and dataset.14-15 in these classes. The newly released apps have a higher percentage of unpopular apps, however, surprisingly, they also have a higher percentage of "most-popular" apps. This may be due to the fact that the newly released apps are more recent, coming at a time of higher popularity of mobile app markets, and maturity of search rank fraud markets (see § IX-A). Figure 4 (top) depicts the distribution of rating counts of apps from dataset.2012, split by categories. We observe that the Business and Comics categories do not have any apps in the Most-Popular class, likely because of narrow audiences. From our data, we observed that the median price of apps ($1.99) in these categories is significantly higher than the population ($1.31) indicating lower competition. The population in other categories is quite diverse with a number of outliers. For instance, as expected, "Angry Birds" and "Facebook" are most popular among the Most-Popular class for Arcade & Action and Social categories, respectively. On the other hand, the distribution is almost symmetric in case of Unpopular except Business and Medical categories where there are a number of outliers that are significantly different from the rest of the population. We found that these are trending apps - apps that are gaining popularity. For instance, the free app "Lync 2010" from "Microsoft Corporation" in Business has 997 ratings. In case of Popular, the distributions for most of the categories are symmetric and span roughly from 1, 000 to 100K ratings where 75% of apps have less than 10, 000 rating counts except Arcade & Action category. Figure 4 (bottom) shows the same distribution for the apps in dataset.14-15. We emphasize that the distribution is plotted over the ratings counts at the end of the observation interval. Since these are newer apps than those in dataset.2012, it is natural that they receive fewer ratings. We also observe that several categories do not have apps that are in the "most popular" category, including the "Business", "Libraries & Demo" and "Medical" categories. C. App Updates B. App Popularity We propose to use the download count to determine app popularity. Higher rating counts mean higher popularity but not necessarily higher quality (e.g., an app could attract many negative ratings). Including unpopular apps will likely affect statistics such as update frequencies: including unpopular apps will lead to a seemingly counter-intuitive finding, indicating that most apps do not receive any updates. Therefore, we classify apps according to their popularity into three classes, "unpopular", "popular" and "most-popular". Updates form a critical and often the last part of the software lifecycle [17]. We are interested in determining if mobile app developers prefer seamless updating i.e., if they push out releases within short time periods. Fig. 5(a) shows the distribution of the number of updates received by the apps in dataset.2012. Only 24% apps have received at least one update within our observation period - nearly 76% have never been updated. In contrast, Fig. 5(b) shows that 35% of the "fresh" apps in dataset.14-15 have received at least one update within our observation period. 6 1e+05 1e+05 1e+06 Ratings Count Most Popular 1e+04 Ratings Count Popular y r o g e t a C Weather Travel & Local Transportation Tools Sports Games Sports Social Shopping Racing Productivity Photography Personalization News & Magazines Music & Audio Medical Media & Video Lifestyle Libraries & Demo Health & Fitness Finance Entertainment Education Communication Comics Casual Cards & Casino Business Brain & Puzzle Books & Reference Arcade & Action y r o g e t a C Weather Travel&Local Transportation Tools Sports Social Shopping Racing Productivity Photography Personalization News&Magazines Music&Audio Medical Media&Video Lifestyle Libraries&Demo Health&Fitness Finance Family Entertainment Educational Education Communication Comics Casual Cards&Casino Business Brain&Puzzle Books&Reference Arcade&Action 10 Ratings Count Unpopular 1000 1e+03 0 Ratings Count Unpopular 1e+03 1e+03 Ratings Count Popular 5e+03 5e+03 5e+04 Ratings Count Most Popular 1e+05 Fig. 4. Per app category distribution of rating counts. (Top) Dataset.2012. The distribution is almost symmetric in the case of "unpopular" apps. The distributions for most of the categories are symmetric in the "popular" class and span roughly from 1, 000 to 100K ratings. The Business and Comics categories do not have any apps in the "most-popular" class. (Bottom) Dataset.14-15. We observe smaller rating counts compared with the apps in dataset.2012. This is natural, as these are new apps, thus likely to receive fewer ratings. We also note that while a few "Business", "Libraries & Demo" and "Medical" categories are unpopular and popular, none are most popular. ) y t i s n e d ( s n o i t a c i l p p A 1.00 0.75 0.50 0.25 0.00 0 1 ) y t i s n e d ( s n o i t a c i l p p A 0.6 0.4 0.2 0.0 9 10 0 1 2 3 4 5 6 7 8 9 0 1 1 1 2 1 4 1 − 3 1 6 1 − 5 1 8 1 − 7 1 0 2 − 9 1 5 2 − 1 2 0 3 − 6 2 0 4 − 1 3 0 6 − 1 4 6 4 1 − 1 6 Total Updates (b) s n o i t a c i l p p A # 1500 1000 500 0 1 2 2 8 Total Updates in last six months 3 6 4 5 7 (a) # of category changes 4 5 6 3 (c) Fig. 5. (a) Histogram of app updates for dataset.2012. Only 24% apps have received at least one update between April-November 2012. (b) Histogram of fresh app updates for dataset.14-15. Unlike the dataset.2012, 35% of the fresh apps have received at least one update, while 1 app received 146 updates! (c) Histogram of app category changes. 1.9% apps have received at least one category change between October 24, 2014 and May 5, 2015, while several have received 6 category changes. Several apps received more than 100 updates, with one app receiving 146 updates in a 6 months interval. We conjecture that this occurs because these are newly released apps, thus more likely to have bugs, and to receive attention from their developers. Figure 6 (top) plots the distribution of the update frequency of the apps from dataset.2012, across categories based on their popularity. As expected, Unpopular apps receive few or no updates. We observed that this is due to the app being new or abandoned by its developer. For instance, "RoboShock" from "DevWilliams" in Arcade & Action with good reviews from 4 users has received only one update on September 28, 2012 since its release in August 2011 (inferred from its first comment). Another app "Shanju" from "sunjian" in Social has not been updated since May 27, 2012 even though it received negative reviews. Outliers (e.g., "Ctalk" in the Social category) push out large number of updates (111). Popular apps are updated more frequently: 75% in each category receive 10 or fewer updates, while some apps average around 10-60 updates during our observation period. User comments associated with these apps indicate that the developer pushes out an update when the app attracts a negative review (e.g., "not working on my device!"). In the Most-Popular category, the population differs significantly. While some apps seldom push any updates, apps like "Facebook" (Social) have been updated 17 times. The lower number of updates of most popular apps may be due to testing: Companies that create very popular apps are more 7 30 90 0 20 Update Frequency Popular 40 60 0 10 20 Update Frequency Most Popular 60 Update Frequency Unpopular y r o g e t a C Weather Travel & Local Transportation Tools Sports Games Sports Social Shopping Racing Productivity Photography Personalization News & Magazines Music & Audio Medical Media & Video Lifestyle Libraries & Demo Health & Fitness Finance Entertainment Education Communication Comics Casual Cards & Casino Business Brain & Puzzle Books & Reference Arcade & Action y r o g e t a C Weather Travel&Local Transportation Tools Sports Social Shopping Racing Productivity Photography Personalization News&Magazines Music&Audio Medical Media&Video Lifestyle Libraries&Demo Health&Fitness Finance Family Entertainment Educational Education Communication Comics Casual Cards&Casino Business Brain&Puzzle Books&Reference Arcade&Action 0 30 0 20 40 Update Frequency Unpopular 60 0 50 Update Frequency Popular 100 150 0 20 Update Frequency Most Popular 40 The distribution of update frequency, i.e., the update count for each app per category. (Top) Dataset.2012. Unpopular apps receive few or no Fig. 6. updates. Popular apps however received more updates than most-popular apps. This may be due to most-popular apps being more stable, created by developers with well established development and testing processes. (Bottom) Dataset.14-15. We observe a similar update count distribution among unpopular apps to dataset.2012. Further, in the popular and most popular classes, most app categories tend to receive fewer updates than the dataset.2012 apps. However, a few apps receive significantly more updates, with several popular apps receiving over 100 updates. likely to enforce strict testing and hence may not need as many updates as other apps. To identify how frequently developers push these updates, we computed the average update interval (AUI) per app mea- sured in days (figure not shown). In Popular and Unpopular classes, 50% of apps receive at least one update within 100 days. The most interesting set is a class of Unpopular apps that receive an update in less than a week. For instance, the developer of "Ctalk" pushed, on average, one update per day totaling 111 updates in six months indicating development stage (it had only 50-100 downloads) or instability of the app. On the other hand, Most-Popular apps receive an update within 20 to 60 days. Figure 6 (bottom) shows the update frequency for the newly released apps of dataset.14-15. Compared to the apps in dataset.2012, new releases exhibit a similar update frequency distribution, with slightly lower third quartiles. However, a few newly released popular apps receive significantly more updates, some more than 100 updates. Updates, bandwidth and reputation. A high update fre- quency is a likely indicator of an on-going beta test of a feature or an unstable application. Such apps have the potential to consume large amounts of bandwidth. For instance, a music player "Player Dreams", with 500K-1M downloads, pushed out 91 updates in the last six months as part of its beta testing phase (inferred from app description). With the application size being around 1.8 MB, this app has pushed out ≈164 MB to each of its users. Given its download count of 500K- 1M, each update utilizes ≈0.87-1.71 TB of bandwidth. We have observed that frequent updates, especially when the app is unstable, may attract negative reviews. For instance, "Ter- remoti Italia" that pushed out 34 updates in the observation interval, often received negative reviews of updates disrupting the workflow. Furthermore, app market providers can use these indicators to inform users about seemingly unstable applications and also as part of the decision to garbage collect abandoned apps. D. App Category Changes In the fresh app dataset.14-15 we found app category change events, e.g., "Social" to "Communication", "Photography" to "Entertainment", between different game subcategories. Such category changes may enable developers to better position their apps and improve on their install and download count, as categories may overlap, and apps may stretch over multiple categories. Fig. 5(c) shows the distribution of the number of app category changes recorded over the 6 months in dataset.14-15. Only 1.9% of apps have received at least one category change. VII. DEVELOPER IMPACT In this section, we are interested in understanding what fraction of popular apps are being controlled by an elite set of developers and if there is a power-law effect in-place. Next, we analyze the impact that developer actions (e.g., changing the price, permissions etc.) can have on the app popularity. We use dataset.2012 for this analysis. A. Market Control To understand the impact that developers have on the mar- ket, we observe their number of apps, downloads, and review count. Figure 7 plots these distributions, all showing behavior consistent with a power-law distribution [27]. We display the maximum likelihood fit of a power-law distribution for each scatter plot as well [22], [11]. Figure 7(a) shows that a few developers have a large number of apps while many developers have few apps. However, the developers that post the most apps do not have the most popular apps in terms of reviews and download counts. Instead, Figure 7(b) shows that a few developers control apps that attract most of the reviews. Since Figure 7(c) shows an almost linear relation between review and download counts (1 review for each 300 downloads), we conclude that the apps developed by the controlling developers are popular. B. Price Dispersion Menu costs (incurred by sellers when making price changes) are lower in electronic markets as physical markets incur product re-labeling costs [23]. In app markets menu costs are zero. We now investigate if developers leverage this advantage i.e., if they adjust their prices more finely or frequently. Figure 8 shows a variation of the complementary cumulative distribution frequency (CCDF) of the number of price changes an app developer made during our observation period. Instead of probabilities, the y axis shows the square root of the number of apps with a number of price changes exceeding the value shown on the x axis. We observe that 5.14% of the apps (≈4000) have changed their price at least once. The tail (> 70 changes) is interesting - about 23 apps are frequently changing their prices. From our data, we observed that they are distributed as follows: Travel & Local (11), Sports (5), Business (2), Brain & Puzzle (2) and one in each of Education, Finance, and Medical. In this sample, "LogMeIn Ignition", developed by LogMeIn, has 10K-50K downloads and under- went 83 price changes (Min:$18.44, Max:$27.80, Avg:$26.01, Stdev:$2.01). The rest were either recently removed or are unpopular. Price dispersion is the spread between the highest and lowest prices in the market. In our dataset, we used the coefficient of variation (COV) [38], the ratio of standard deviation to the mean, to measure price dispersion. COV= 1 indicates a dispersal consistent with a Poisson process i.e., uniformly at random; COV> 1 indicates greater variability than would be expected with a Poisson process; and COV< 1 indicates less variation. In our dataset, we observed an average COV (computed for all apps) to be 2.45 indicating a non- negligible price dispersion, in agreement with results in the context of other electronic markets [9]. Figure 9 shows the STL decomposition [12] of the average price time series in the observation interval, for a periodicity of 8 D ↑ 0.18 -0.02 0.13 0.34 0.09 0.21 P ↓ 0.18 -1.00 0.09 0.89 0.89 0.94 P ↑ -0.02 -1.00 -0.23 0.72 0.51 0.76 RC ↑ SV ↑ TP ↓ 0.13 0.09 -0.23 0.73 0.65 0.70 0.34 0.89 0.72 0.73 0.99 1.00 0.09 0.89 0.51 0.65 0.99 -1.00 TP ↑ 0.21 0.93 0.76 0.70 1.00 -1.00 D ↑ P ↓ P ↑ RC ↑ SV ↑ TP ↓ TP ↑ TABLE II Yule association measure for pairs of attributes for dataset.2012. The sample size is the entire dataset for the observation interval. D is number of downloads, P is price, RC is review count, SV is software version number and TP is the total number of permissions. (↑) denotes an increasing attribute and (↓) denotes a decreasing one. one month. The gray-bar on the "monthly panel" (see Figure 9) is only slightly larger than that on the "data" panel indicating that the monthly signal is large relative to the variation in the data. In the "trend" panel, the gray box is much larger than either of the ones on the "data"/"monthly" panels, indicating the variation attributed to the trend is much smaller than the monthly component and consequently only a small part of the variation in the data series. The variation attributed to the trend is considerably smaller than the stochastic component (the remainders). We deduce that in our six month observation period this data does not exhibit a trend. C. Impact of Developer Actions Developers have control over several attributes they can leverage to increase the popularity of their apps, e.g., pricing, the number of permissions requested from users and the frequency of updates. In this section we investigate the relation between such levers and their impact on app popularity. For instance, common-sense dictates that a price reduction should increase the number of downloads an app receives. We study the association between app attribute changes. We define a random variable for increase or decrease of each attribute, and measure the association among pairs of variables. For example, let X be a variable for price increase. For each h day, app i tuple, we let X be a set of all of the app and day tuples where the app increased its price that day (relative to the previous day's value). For this analysis we consider 160K apps that have changed throughout our observation period, and we discard the remaining apps. We use the Yule measure of association[37] to quantify the association between two attributes, A and B: A∩B∗A∩B−A∩B∗A∩B A∩B∗A∩B+A∩B∗A∩B . A is the complement of A, i.e., each h day, app i tuple where the attribute does not occur, and A denote the cardinality of a set (in this case A). This association measure captures the association between the two attributes: zero indicates independence, +1 indicates perfectly positive association, and -1 perfectly negative association. Table II shows the measure values for all pairs of download count (D), price (P), review count (RC) and total number of permission (TP) attributes. Table II shows that a price decrease has a high association with changes in software version and permissions. However, similarly high associations are not observed with a price increase. Thus, when a developer is updating software or s r e p o e v e D l f o r e b m u N 10000 1000 100 10 1 1 10 100 Number of Applications 9 s r e p o e v e D l f o r e b m u N 10000 1000 100 10 1 s g n i t a R 1e+05 1e+03 1e+01 1000 1 10 100 1000 Number of Ratings 1e+02 1e+05 Downloads 1e+08 Fig. 7. axes are log-scaled. A linear curve was fitted with a slope of 0.00341 indicating that an application is rated once for about every 300 downloads. (a) Distribution of apps per developer. (b) Distribution of total reviews per developer. (c) Scatter plot of downloads vs. ratings in Google Play. Both (a) (b) (c) 8000 6000 4000 2000 1500 1000 500 300 100 ) e l a c s t r q s ( s n o i t a c i l p p A # 5.14% > 1 Change 0.64% > 10 Changes 0 5 10 15 20 25 30 35 0.13% > 40 Changes 0.09% > 70 Changes 45 40 Price Changes 50 55 60 65 70 75 80 85 90 95 Fig. 8. The (square root) of the number of apps whose number of price changes exceeds the value on the x axis. Only 5.14% of the apps had a price change, and 0.09% of the apps had more than 70 changes. Fig. 9. Monthly trend for the average app price. Over the 6 month observation interval, the average app price does not exhibit a monthly trend. permissions they are more likely to decrease the price than increase the price of an app. We observed that changing the price does not show sig- nificant association with the download or review counts. We randomly sampled 50 apps where this is happening and observe the following to be the main reasons. First, apps are initially promoted as free and a paid version is released if they ever become popular. However, in some cases, the feature additions are not significant (e.g., ads vs. no ads) and hence do not cause enough motivation for users to switch to the paid version. Second, with app markets offering paid apps for free as part of special offers (e.g., Thanksgiving deals), users may expect the app to be given out for free rather than take a discount of a few cents. VIII. TOP-K DYNAMICS Metric Description DEBUT HRS2PEAK PEAK TOTHRS EXIT RANKDYN Debut rank (rank when it first gets onto the list) Hours elapsed from debut until peak rank Highest rank attained during its lifetime on the list Total number of hours spent on the list Exit rank (rank during the last hour on the list) Total ranks occupied during its lifetime on the list Scores proposed to study the evolution of apps on Top-K lists. TABLE III in turn increases the app popularity. To analyze the dynamics of app in top-k lists, we have used the GOOGPLAY-TOPK dataset (see §V). Google keeps the ranking algorithms for the top-k lists secret. In this section we seek answers to several fundamental questions: How long will an app remain on a top- k list? Will an app's rank increase any further than its current rank? How long will it take for an app's rank to stabilize? A. Top-K App Evolution We investigate first whether apps follow the "birth-growth- decline-death" process (inverted bathtub curve [21]). Although every app's path may be unique, we can summarize its life on a top-k list using the metrics defined in Table III. This six-tuple captures a suite of interesting information contained in each app's list trajectory. To make these sum- maries comparable, we remove all applications for which we are unable to compute the DEBUT information. For instance, the set of applications obtained during the first hour of the crawl process are removed. Figures 10(a) and 10(b) show the histograms for the DEBUT and EXIT ranks, both indicating list positions, for the 3000 apps we monitored. Smaller numbers indicate better perfor- mance. The plots show that most apps entered and exited from the bottom part of the list (indicated by the high debut and exit ranks). This is consistent with the lifetime metaphor discussed earlier. However, a small number of apps entered the list highly ranked. For instance, in the Paid category, the best DEBUT was attained by "ROM Manager", by "Koushik Datta" that entered at #1 on August 14, 2012, and exited at rank #20 on October 6, 2012, occupying seven different ranks during its lifetime on the list. Another noteworthy DEBUT was attained by "Draw Something", by "OMGPOP" that entered at #2 on October 1, 2012, peaked to #1 on Oct 25, 2012 and exited at Nov 6, 2012 at #4. During its lifetime, the worst rank it achieved was #38. A higher position in Google's top-k lists (see §V) is desir- able and often attracts significant media attention [1] which Figure 10(c) shows the distribution of the peak rank achieved in top-k lists (PEAK) and Figure 11(a) shows the y c n e u q e r F 12.5 10.0 7.5 5.0 2.5 0.0 7.5 5.0 2.5 0.0 30 20 10 0 30 20 10 0 10.0 7.5 5.0 2.5 0.0 Free Gross New (Free) New (Paid) Paid y c n e u q e r F 30 20 10 0 15 10 5 0 100 75 50 25 0 80 60 40 20 0 15 10 5 0 0 0 DEBUT: App's debut rank (Binwidth = 1) 100 200 300 400 Free Gross y c n e u q e r F New (Free) New (Paid) Paid 400 100 200 300 EXIT: App's exit rank (Binwidth = 5) 75 50 25 0 80 60 40 20 0 200 100 0 200 150 100 50 0 90 60 30 0 10 Free Gross New (Free) New (Paid) Paid 0 PEAK: Peak rank during lifetime (Binwidth = 10) 100 200 300 400 (a) (b) (c) Fig. 10. Distributions of (a) DEBUT, (b) EXIT and (c) achieved PEAK rank. The y axis is the number of apps whose ranks correspond to the values on the x axis. Most apps entered and exited from the bottom of the list. The New (Free) and New (Paid) lists choose apps updated within the last 20 days. distribution of the number of hours required for apps to reach the peak (HRS2PEAK). Figure 11(b) shows the total number of hours spent by apps in the top-k lists (TOTHRS). Figure 11(c) shows the number of ranks achieved in a top-k list (RANKDYN): very few New (Free) and New (Paid) apps achieve more than 100 different ranks, with most apps achieving 50 or fewer. This differs significantly in the other top-k lists. Among the many apps with poor DEBUT and EXIT po- sitions, most had a short, uneventful life (i.e., low TOTHRS, poor PEAK, low HRS2PEAK), but several were able to reach a high peak position and/or remain for a long time. One entry, "PS Touch", by "Adobe", entered at #413 and has been on the "Gross" list for 2,403 hours (≈ 3 months, although it peaked only at #206. This app also took a remarkably slow journey (more than two months) to reach that peak and has occupied 137 distinct ranks. Also note that 67 apps attained their top rankings in their debut hour (i.e., HRS2PEAK = 1). Many of these apps stayed on the list for a very short time, but there are 6 apps that stayed for 100 - 1000 hours, 31 stayed for more than 1000 hours. Figure 11(b) shows that New (Free) and New (Paid) apps do not stay on the list for more than 500 hours (≈ 20 days) indicating that these lists may be taking into account all those applications which were last updated in the last 20 days. We have confirmed this hypothesis also by verifying that indeed the "last updated" field of these apps is within the last 20 days. From the same figure, for other lists, we also emphasize the presence of a long tail of apps that have been present for thousands of hours. We conclude that: (1) a majority of apps follows a "birth-growth-decline-death" process, as they enter/exit from the bottom part of a list, (2) most of the apps with modest DEBUT and EXIT values have a short, eventful life occupying many ranks quickly, and (3) the New (Free) and New (Paid) lists choose among apps that were updated within the last 20 days. B. Top-K List Variation We now characterize the changes in the rankings of the top- k items from the five lists over time. We use the Inverse Rank Measure to assess the changes over time in each of the rankings. This measure gives more weight Pages List-Type #items Top 24 Last 25 Gross Free Paid New (Free) New (Paid) Gross Free Paid New (Free) New (Paid) 57 44 74 128 125 205 186 150 449 485 Omean 23.8953 23.9539 23.8840 23.7974 23.8226 25.3765 25.6145 24.9245 25.1159 24.9245 Omin Mmean 0.9893 0.9970 0.9932 0.9867 0.9889 0.9692 0.9785 0.9780 0.9571 0.9780 18 21 11 15 13 1 10 12 5 2 Msd Of ∩l 12 16 4 0 0 0 4 4 0 0 0.0617 0.0238 0.0537 0.0742 0.0641 0.1299 0.1030 0.1029 0.1502 0.1687 Variability in top-k Lists. Omean, Omin and Of ∩l are the mean and min. overlap, and that between the first and last lists. TABLE IV to identical or near identical rankings among the top ranking items. This measure tries to capture the intuition that identical or near identical rankings among the top items indicate greater similarity between the rankings. Let us assume the following: kn is the list of top-k apps at time tn, σn(i) is the rank of app i in kn, Z is the set of items common to kn−1 and kn, S is the set of items in kn−1 but not in kn, T is the set of items in kn but not in kn−1. Then, the inverse rank measure is [7] defined as M (kn−1,kn) = 1 − N (kn−1 ,kn ) N max(kn−1 ,kn ) , where N (kn−1,kn) = Pi∈Z σn(i) + Pi∈S σn−1(i) − (kn−1+1) , and N max(kn−1,kn) = (kn+1) + Pi∈T Pkn−1 1 i=1 1 i=1 Figure 12(a) shows the variation of M kt1 ,kt2 for consecutive days in the month of September. Note that values above 0.7 indicate high similarity [7]. We observe that the lists are similar from day to day for Free list but this is not the case for Paid and Gross. Intuitively, this indicates that the effort to displace a free app seems to be higher than that of a paid app or the frequency with which the ranking algorithm is run on Free list is less than that of the Paid list. (kn+1) + Pkn σn−1(i) − 1 (kn−1+1) . 1 i − 1 σn(i) − i − 1 1 1 1 1 This intuition is difficult to verify without access to Google's ranking function. To compare the dynamics between the top-24 positions and bottom 25, we computed M kt1 ,kt2 , the amount of overlap between two subsequent lists for the two cases (see Table IV). In addition, we also computed the overlap between the first and the last lists obtained over the observation period. The overlap between the first and the last observed lists is zero in the case of the New(Free) and New(Paid) lists, due to the higher in-flow of apps in these lists. In all other cases (except Paid top-24 and last-25 cases), y c n e u q e r F 10 1 10 1 10 1 100 10 1 10 1 Free Gross New (Free) New (Paid) Paid y c n e u q e r F 100 50 0 150 100 50 0 150 100 50 0 150 100 50 0 150 100 50 0 11 Free Gross New (Free) New (Paid) Paid y c n e u q e r F 200 100 0 100 50 0 600 400 200 0 600 400 200 0 150 100 50 0 0 50 100 150 RANKDYN: Distinct ranks held (Binwidth = 10) Free Gross New (Free) New (Paid) Paid 0 HRS2PEAK: Hours to reach peak rank (Binwidth = 1) 250 500 750 1000 0 2500 TOTHRS: Total hours spent on list (Binwidth = 1) 1000 1500 2000 500 (a) (b) (c) Fig. 11. Distributions of (a) required HRS2PEAK, (b) spent TOTHRS and (c) RANKDYN over lifetime. The y axis displays the number of apps whose hours correspond to the values displayed on the x axis. New (Free) and New (Paid) apps do not stay on the list for more than 500 hours. While few New (Free) and New (Paid) apps achieve more than 100 different ranks, Gross list apps achieve an almost uniform distribution up to 125 different ranks. 1 50 100 200 400 1.0 0.8 0.6 0.4 0.2 1.0 0.8 0.6 0.4 0.2 1.0 0.8 0.6 0.4 0.2 1.0 0.8 0.6 0.4 0.2 1.0 0.8 0.6 0.4 0.2 ) M ( e r u s a e M k n a R e s r e v n I Free Gross New (Free) New (Paid) Paid s n o i t a c i l p p A 450 300 150 450 300 150 450 300 150 450 300 150 450 300 150 Sep 03 Sep 10 Sep 17 Timestamp Sep 24 Oct 01 0 100 (a) 300 400 200 Rank (b) Free Gross New (Free) New (Paid) Paid y t i s n e D 0.06 0.04 0.02 0.00 0.03 0.02 0.01 0.00 0.15 0.10 0.05 0.00 0.15 0.10 0.05 0.00 0.05 0.04 0.03 0.02 0.01 0.00 Free Gross New (Free) New (Paid) Paid 0 25 50 Lifetime (hours) 75 100 (c) Fig. 12. apps vs. ranks. (c) Lifetime of apps at various ranks. The average top-k list lifetime is longer for higher ranking than for lower ranking apps. (a) The Inverse Rank Measure vs. Timestamp. The Free list varies little from day to day, which is not the case for Paid and Gross. (b) Number of 250 200 150 100 50 0 i s w e v e R # 0 −10 −20 75 50 25 0 i s w e v e R # i s w e v e R # 0 100 200 Time (Days) 300 0 20 40 Time (Days) 60 0 100 200 Time (Days) 300 (a) (b) (c) Fig. 13. Review timeline of "fraud" apps: x axis shows time with a day granularity, y axis the number of daily positive reviews (red, positive direction) and negative reviews (blue, negative direction). Apps can be targets of both positive and negative search rank fraud campaigns: (a) The app "Daily Yoga- Yoga Fitness Plans" had days with above 200 positive review spikes. (b) "Real Caller" received suspicious negative review spikes from ground truth fraudster-controlled accounts. (c) "Crownit - Cashback & Prizes" received both positive and negative reviews from fraudster-controlled accounts. there is an overlap of at least 50%: apps continue to be popular for longer periods. In each list-type of last-25 cases, the low overlap values indicate that the list is highly dynamic and variable. Also, notice that Mmean for the top-24 is higher than that of the last-25 indicating that the top-24 is less dynamic in all cases expect New(Free) and New(Paid). Figure 12(b) shows the number of apps that occupy a rank position in 5 different list-types over our observation period. Note that a lower rank is preferred. For example, the 300th rank position in the New (Free) list is occupied by 441 applications. With the increase in rank, the rate of applications being swapped is increasing for each category indicating an increased churn – it is easier for apps to occupy as well as get displaced on high ranks. For Paid, Gross, and Free, the number of apps varies from 34 to 142, 30 to 173, and 43 to 163, respectively, from the 1st to the 400th rank. However, in the case of New (Free) and New(Paid) lists, the number of apps being swapped for a position is almost linearly increasing with the increase in rank. This is because all the applications in these two categories are new and the competition is higher compared to other list-types. Figure 12(c) shows the distribution of the lifetime of ap- plications that occupy a specific rank position. To evaluate the variation in the distributions we choose the 1st, 50th, 100th, 200th, and 400th rank positions. For each category, the average lifetime is longer for higher ranking apps then for lower ranking apps. We can clearly observe this phenomenon in the case of New (Free) and New (Paid). In both the cases, the lifetime of the apps at the lowest rank (i.e., 400th) is the lowest, i.e., ≈6 hours and it starts increasing with the increase in the ranks. We can attribute this effect to the frequently changing list of new apps and the relatively easier competitions to be on the top-400 lists. However, in case of Free apps, the average lifetime of apps on the 1st rank is 94.2 hours and decreases to 16.7 hours for the 400th rank. For Paid and Gross categories, the lifetime changes from 81.6 to 20.6 hours and 65.7 to 17.9 hours, respectively, for the rank 1 → 400. We attribute these effects to the stability of the apps in these lists. IX. RESEARCH IMPLICATIONS We now discuss the implications of longitudinal monitoring on security and systems research in Android app markets. A. Fraud and Malware Detection App markets play an essential role in the profitability of apps. Apps ranked higher in the app market become more pop- ular, thus make more money, either through direct payments for paid apps, or through ads for free apps. This pressure to succeed leads some app developers to tinker with app market statistics known to influence the app ranking, e.g., reviews, average rating, installs [5]. Further, malicious developers also attempt to use app markets as tools to widely distribute their malware apps. We conjecture that a longitudinal analysis of apps can reveal both fraudulent and malicious apps. In the following we provide supporting evidence. Search rank fraud. We have contacted Freelancer workers specializing in Google Play fraud, and have obtained the ids of 2,600 Google Play accounts that were used to write fraudulent reviews for 201 unique apps. We have analyzed these apps and found that fraudulent app search optimization attempts often produce suspicious review patterns. A longitudinal analysis of an app's reviews, which we call timeline, can reveal such patterns. For instance, Figure 13(a) shows the review timeline of "Daily Yoga- Yoga Fitness Plans", one of the 201 apps targeted by the 15 fraudster-controlled accounts. We observe several suspicious positive reviews spikes, some at over 200 reviews per day, in contrast with long intervals of under 50 daily positive reviews. We have observed that Google Play apps can also be the target of negative review campaigns, receiving nega- tive reviews from multiple fraudster-controlled accounts. Fig- ure 13(b) shows the timeline of such an app, "Real Caller", where we observe days with up to 25 negative reviews, but few positive reviews. While negative reviews are often associated with poor quality apps, these particular spikes are generated from the fraudster-controlled accounts mentioned above. We conjecture that negative review campaigns are sponsored by competitors. Further, we identified apps that are the target of both positive and negative reviews. Figure 13(c) shows the timeline of such an app, "Crownit - Cashback & Prizes". While 12 the app has received more positive reviews with higher spikes, its negative reviews and spikes thereof are also significant. App markets can monitor timelines and notify developers and their users when such suspicious spikes occur. In addition, our analysis has shown that several developers upload many unpopular apps (see §V II), while others tend to push frequent updates (§VI). We describe here vulnerabilities related to such behaviors. Scam Apps. We have identified several "productive" devel- opers, that upload many similar apps. Among them, we have observed several thousands of premium applications (priced around $1.99) that are slight variations of each other and have almost no observable functionality. Such apps rely on their names and description to scam users into paying for them, then fail to deliver. Each such app receives ≈500-1000 downloads, bringing its developer a profit of $1000-2000. Malware. While updates enable developers to fix bugs and push new functionality in a seamless manner, attack vectors can also leverage them. Such attack vectors can be exploited both by malicious developers and by attackers that infiltrate developer accounts. We posit that a motivated attacker can develop and upload a benign app, and once it gains popularity, push malware as an update. For instance, Table II shows that as expected, software version and total permissions are highly correlated. However, we found that in 5% of cases where permissions change, the software version does not change. On the iOS platform, Wang et al. [36] proposed to make the app remotely exploitable, then introduce malicious control flows by rearranging already signed code. We propose an Android variant where the attacker ramps up the permissions required by the app, exploiting the observation that a user is more likely to accept them, then to uninstall the app. To provide an intuition behind our conjecture, we introduce the concept of app permission timeline, the evolution in time of an app's requests for new permissions, or decisions to remove permissions. We have used VirusTotal [6] to test the apks of 7,756 randomly selected apps from the dataset.14-15. We have selected apps for which VirusTotal raised at least 3 flags and that have at least 10 reviews. Figure 14 shows the permission timeline of 3 of these apps, for both dangerous (red bars) and regular permissions (blue bars). For instance, the "Hidden Object Blackstone" app (Fig- ure 14(a)) has a quick succession of permission requests and releases at only a few days apart. While the app releases 2 dangerous permissions on November 14, 2014, it requests them again 1 day later, and requests 2 more a month and a half later. Similarly, the "Top Race Manager" app (Figure 14(b)) has very frequent permission changes, daily for the last 3. The "Cash Yourself" app (Figure 14(c)) requests 3 dangerous permissions on November 10 2014, followed by 1 dangerous permission in both December and January, then releases 1 dangerous permission 4 days later. Permission changes imply significant app changes. Frequent and significant permission changes, especially the dangerous ones may signal malware, or unstable apps. Market owners can decide to carefully scan the updates of such apps for malware, and notify developers that something went wrong with their updates, indicating potential account infiltration. 13 s n o i s s i m r e P # 6 3 0 −3 −6 s n o i s s i m r e P # 6 3 0 −3 −6 Type Dangerous Normal s n o i s s i m r e P # 6 3 0 −3 −6 2014−11−09 2014−11−12 2014−11−14 Date (a) 2014−11−15 2015−01−29 2014−11−09 2014−11−14 2014−11−25 2014−12−02 2014−12−11 2014−12−12 2014−12−13 Date (b) 2014−11−10 2014−12−15 Date 2015−01−30 2015−02−03 (c) Fig. 14. Permission timeline of 3 VirusTotal flagged apps, (a) "Hidden Object Blackstone", (b) "Top Race Manager", and (c) "Cash Yourself". The x axis shows the date when the permission changes occurred; the y axis shows the number of permissions that were newly requested (positive direction) or removed (negative direction). The red bars show dangerous permissions, blue bars regular permissions. We observe significant permission changes, even within days. B. App Market Ecosystem Analytics-driven Application Development. We envision a development model where insights derived from raw market- level data is integrated into the application development. Such a model is already adopted by websites such as Priceline [4] through their "Name Your Own Price" scheme where the interface provides users with hints on setting an optimal price towards a successful bid. We propose the extension of development tools like Google's Android Studio [2] with market-level analytics, including: • Median price: In §VI-A, we showed that developers may be settling down for lower profits. The development tools could provide developers them with hints on the optimal price for their app based on, e.g., the number of features, the price of active apps in the same category etc. • Application risk: Provide predictions on the impact of permissions and updates on reviews and download count. • App insights: Present actionable insights extracted from user reviews (e.g., using solutions like NetSieve [31]), including most requested feature, list of buggy features, features that crash the app. Enriching User Experience. We believe data-driven insights will be indispensable to enhance the end user experience: • Analytics based app choice: Visualize app price, update overhead, required permissions, reviewer sentiment to en- hance the user experience when choosing among apps with similar claimed functionality. For instance, develop scores for individual features, and even an overall "sorting" score based on user preferences. Scam apps (see §IX-A) should appear at the bottom of the score based sorted app list. • Analytics based app quarantine: We envision a quarantine based approach to defend against "update" attacks. An update installation is postponed until analytics of variation in app features indicates the update is stable and benign. To avoid a situation where all users defer installation, we propose a probabilistic quarantine. Each user can update the app after a personalized random interval after its release. In addition, while we believe that the Google Play market, the applications it hosts and developers we examined represent a large body of other third-party markets and their environ- ments, we do not intend to generalize our results to all the smartphone markets. The characteristics and findings obtained in this study are associated with the Google Play market and its developers. Therefore, the results should be taken with the market and our data collection methodology in mind. The goal of our discussion of permission and review time- lines was to provide early evidence that a longitudinal monitor- ing and analysis of apps in app markets can be used to identify suspicious apps. We leave for future work a detailed study of permission changes to confirm their statistical significance in detecting search rank fraud and malware. XI. CONCLUSION This article studies temporal patterns in Google Play, an in- fluential app market. We use data we collected from more than 160,000 apps daily over a six month period, to examine market trends, application characteristics and developer behavior in real-world market settings. Our work provides insights into the impact of developer levers (e.g., price, permissions requested, update frequency) on app popularity. We proposed future directions for integrating analytics insights into developer and user experiences. We introduced novel attack vectors on app markets and discussed future detection directions. XII. ACKNOWLEDGMENTS This research was supported in part by NSF grants CNS- 1527153, CNS-1526494 and CNS-1450619. REFERENCES [1] Angry Birds Star Wars tops App Store Chart in 2.5 hours. http://goo.gl/ioJWq. [2] Getting started with Android Studio. http://goo.gl/wgeUok. [3] Google Bouncer. http://goo.gl/QnC6G. [4] Priceline. http://priceline.com. [5] Google - Getting Discovered I/O 2013 on Google Play. X. LIMITATIONS This paper seeks to shed light on the dynamics of the Google app market and also provide evidence that a longitudinal monitoring of apps is beneficial for users, app developers and the market owners. However, our datasets were collected in 2012 and 2014-2015, and may not reflect the current trends of Google Play. www.youtube.com/watch?v=5Od2SuL2igA, 2013. [6] VirusTotal - Free Online Virus, Malware and URL Scanner. https://www.virustotal.com/, Last accessed on May 2015. [7] J. Bar-Ilan, M. Levene, and A. Lin. Some measures for comparing citation databases. Journal of Informetrics, 1(1):26–34, 2007. [8] Y. Benjamini. Opening the box of a boxplot. The American Statistician, 42(4):257–262, 1988. [9] E. Brynjolfsson and M. Smith. Frictionless commerce? a comparison of internet and conventional retailers. Management Science, 2000. [10] B. Carbunar and R. Potharaju. A longitudinal study of the google app market. In Proceedings of the IEEE/ACM ASONAM, 2015. [11] A. Clauset, C. Shalizi, and M. Newman. Power-law distributions in empirical data. Arxiv preprint arxiv:0706.1062, 2007. [12] R. Cleveland, W. Cleveland, J. McRae, and I. Terpenning. Stl: A Journal of seasonal-trend decomposition procedure based on loess. Official Statistics, 6(1):3–73, 1990. [13] J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Communications of the ACM, 51(1):107–113, 2008. [14] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of OSDI, 2010. [15] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX Conference on Security, 2011. [16] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proceedings of the ACM CCS, 2011. [17] C. Ghezzi, M. Jazayeri, and D. Mandrioli. Fundamentals of software engineering. Prentice Hall PTR, 2002. [18] Google. Developer Registration. http://goo.gl/wIwpa, 2012. [19] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In Proceedings of the ACM WiSec, 2012. [20] A. Greenberg. Malware Apps Spoof Android Market To Infect Phones. Forbes Security, 2014. [21] R. Jiang, P. Ji, and X. Xiao. Aging property of unimodal failure rate models. Reliability Engineering & System Safety, 79(1):113–116, 2003. [22] R. Johnson and D. Wichern. Applied multivariate statistical analysis. Prentice hall, 2002. [23] D. Levy, M. Bergen, S. Dutta, and R. Venable. The magnitude of menu costs: direct evidence from large us supermarket chains. The Quarterly Journal of Economics, 112(3):791–824, 1997. [24] H. M. Levy. Capability-Based Computer Systems. Butterworth- Heinemann, Newton, MA, USA, 1984. [25] C. Z. Liu, Y. A. Au, and H. S. Choi. An Empirical Study of the Freemium Strategy for Mobile Apps: Evidence from the Google Play Market. In Proceedings of ICICS, 2012. [26] Z. Miners. Report: Malware-infected Android apps spike in the Google Play store. PCWorld, 2014. [27] M. Mitzenmacher. A brief history of generative models for power law and lognormal distributions. Internet mathematics, 2004. [28] S. Mlot. Top Android App a Scam, Pulled From Google Play. PCMag, 2014. [29] A. Moller, F. Michahelles, S. Diewald, L. Roalter, and M. Kranz. Update behavior in app markets and security implications: A case study in google play. In Proceedings of the Intl. Workshop on Research in the Large, 2012. [30] T. Petsas, A. Papadogiannakis, M. Polychronakis, E. P. Markatos, and T. Karagiannis. Rise of the planet of the apps: A systematic study of the mobile app ecosystem. In Proceedings of the 2013 Conference on 14 Internet Measurement Conference, IMC '13, pages 277–290, New York, NY, USA, 2013. ACM. [31] R. Potharaju, N. Jain, and C. Nita-Rotaru. Juggling the jigsaw: Towards automated problem inference from network trouble tickets. In Proceedings of USENIX NSDI, 2013. [32] M. Rahman, M. Rahman, B. Carbunar, and D. H. Chau. FairPlay: Fraud In Proceedings of the SIAM and Malware Detection in Google Play. International Conference on Data Mining (SDM), 2016. [33] D. Roberts. How to spot fake apps on the Google Play store. Fortune, 2015. [34] E. Siegel. Fake Reviews in Google Play and Apple App Store. Appentive, 2014. [35] N. Viennot, E. Garcia, and J. Nieh. A measurement study of google play. In ACM SIGMETRICS Performance Evaluation Review, volume 42, pages 221–233. ACM, 2014. [36] T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on ios: When benign apps become evil. In Proceedings of USENIX Security, 2013. [37] M. J. Warrens. On association coefficients for 2x2 tables and properties that do not depend on the marginal distributions. volume 73, 2008. [38] E. Weber, S. Shafir, and A. Blais. Predicting risk sensitivity in humans and lower animals: risk as variance or coefficient of variation. Psychological Review; Psychological Review, 111(2):430, 2004. [39] Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman. Identifying diverse usage behaviors of smartphone apps. In Proceedings of ACM IMC, 2011. [40] N. Zhong and F. Michahelles. Google play is not a long tail market: An empirical analysis of app adoption on the google play app market. In Proceedings of the ACM SAC, 2013. [41] Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Proceedings of the IEEE S&P, 2012. [42] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of NDSS, 2012. Rahul Potharaju is a researcher at Microsoft. He focuses on building interactive query engines for big data. He earned his CS Ph.D. degree from Purdue University and CS Masters degree from Northwestern University. He is a recipient of the Motorola Engineering Excellence award in 2009, the Purdue Diamond Award in 2014, and the Microsoft Trustworthy Reliability Computing Award in 2013. Mizanur Rahman is a Ph.D. candidate at FIU. He has previously held various positions in KAZ Software, iAppDragon and Prolog Inc. His research interests include fraud detection in social networks and user experience. Bogdan Carbunar is an assistant professor in SCIS at FIU. He has held research positions within Motorola Labs. His interests include security and privacy for mobile and social networks. He holds a Ph.D. in CS from Purdue.
1811.03809
1
1811
2018-11-09T08:01:50
Football and Beer - a Social Media Analysis on Twitter in Context of the FIFA Football World Cup 2018
[ "cs.SI" ]
In many societies alcohol is a legal and common recreational substance and socially accepted. Alcohol consumption often comes along with social events as it helps people to increase their sociability and to overcome their inhibitions. On the other hand we know that increased alcohol consumption can lead to serious health issues, such as cancer, cardiovascular diseases and diseases of the digestive system, to mention a few. This work examines alcohol consumption during the FIFA Football World Cup 2018, particularly the usage of alcohol related information on Twitter. For this we analyse the tweeting behaviour and show that the tournament strongly increases the interest in beer. Furthermore we show that countries who had to leave the tournament at early stage might have done something good to their fans as the interest in beer decreased again.
cs.SI
cs
Football and Beer - a Social Media Analysis on Twitter in Context of the FIFA Football World Cup 2018 Roland Roller, Philippe Thomas, Sven Schmeier Language Technology Lab, DFKI, Berlin, Germany {firstname.surname}@dfki.de 8 1 0 2 v o N 9 ] I S . s c [ 1 v 9 0 8 3 0 . 1 1 8 1 : v i X r a Abstract In many societies alcohol is a legal and common recreational substance and socially accepted. Alcohol consumption often comes along with social events as it helps people to increase their sociability and to overcome their inhibitions. On the other hand we know that in- creased alcohol consumption can lead to seri- ous health issues, such as cancer, cardiovascu- lar diseases and diseases of the digestive sys- tem, to mention a few. This work examines al- cohol consumption during the FIFA Football World Cup 2018, particularly the usage of al- cohol related information on Twitter. For this we analyse the tweeting behaviour and show that the tournament strongly increases the in- terest in beer. Furthermore we show that coun- tries who had to leave the tournament at early stage might have done something good to their fans as the interest in beer decreased again. 1 Introduction Alcohol can lead to serious health issues. For in- stance, even though there is no apparent threshold, even one drink of alcohol per day on average can significantly increase the risk of cancer (Roerecke and Rehm, 2012). Studies have shown, that the exposure to media and commercial communications on alcohol is as- sociated with the likelihood that adolescents will start to drink alcohol, and with increased drinking amongst baseline drinkers (Anderson et al., 2009). In addition to that social events can have a influ- ence on drinking behaviour. In course of this Cur- tis et al. (2018) apply a Twitter analysis and show that topics such as sporting events, art and food- related festivals are positively correlated to alco- hol consumption on US county level. Various other studies have also explored alcohol-related content on social media, particu- larly Twitter. Abbar et al. (2015) carry out a food analysis on Twitter and identify weekly periodic- ities in context of daily volume of tweets men- tioning food. Moreover, authors show a correla- tion between state obesity and caloric value of food (also alcoholic beverages). Instead Culotta (2013) analyse alcohol sales volume in context of Twitter messages. Kershaw et al. (2014) investi- gate regional alcohol consumption patterns in the UK, while Hossain et al. (2016) explore alcohol consumption patterns in various areas in the US. Curtis et al. (2018) target the prediction of exces- sive drinking rates and Huang et al. (2017) exam- ine alcohol- and tobacco-related behaviourial pat- terns. And finally, Moreno et al. (2010) carry out a content analysis of adolescents on social media. This work examines alcohol consumption on Twitter in context of the FIFA Football World Cup 2018. We make use of the results of the above mentioned works, especially the observed correla- tion between people's behaviour on Twitter and in their real life in context of consumption. The study is carried out across all participating countries of the tournament and explores the influence of the event on the drinking behaviour of people. 2 Experimental Setup The FIFA World Cup 2018 was taking place from 14th of June until 15th of July. Within the group stage 32 participating teams were playing in 8 groups and completed 3 matches each. After that the two best teams of each group went to the knockout stage. A match usually lasts 90 minutes plus 15 minutes of break (≈2 hours). This work analyses the tweeting behaviours during a match. In the following a match is defined as a time pe- riod of one hour before kick-off and three hours after the kick-off. The hour before and after the game are included as supporters might express ex- citement for the game. 2.1 Data Collection Tweets over a period between 05/31/2018 and 07/23/2018 were collected, which covers the pe- riod of the tournament, but also two weeks before and one week after. As this work analyses mes- sages from all participating countries of the tour- nament, messages were crawled containing vari- ous emojis due to their language independence. The considered emojis are listed in Table 1. In the rest of the work we refer to them as BEER, WINE, SAKE and BALL. Table 1: Emojis used for Twitter crawling 2.2 Country Assignment In this work, Tweets are examined according to the different participating countries. As only a small number of Tweets contain country related infor- mation (8.63%), Tweets lacking this information had to be assigned automatically to the corre- sponding country of each user. A classifier was trained based on the approach of Thomas and Hen- nig (2018), which is able to detect the origin of a Tweet based on text and meta information. As sanity check, Tweets which actually con- tain information about its origin were compared to the automatically assigned country. On those messages the model achieves an accuracy of above 91%. 2.3 Preprocessing Collected Tweets were then mapped to small time intervals of one hour, according to the target la- bel (e.g. beer emoji). For instance a message sent on 06/27/2018 at 5:25 pm (UTC) and containing a beer emoji is assigned to its country, then assigned to the set of beer emoji Tweets, and finally mapped to the time interval 06/27/2018, 5:00 pm. All mes- sages of a particular label and a particular time in- terval are summed up. In this way a list for each target label is generated containing time intervals, country origin and number of relevant Tweets for this interval. For the following analysis these lists are used as input. One line is considered as TCF (time-country-frequency) triple. 3 Analysis In the following the different Tweets containing the target emojis are analysed in detail. All ex- aminations which include significance testing use one-sided paired t-test. 3.1 Outside the Tournament Figure 1 shows the average number of Tweets per day containing BEER emojis before/after the tour- nament from the participating countries. Partici- pants with less than 50 BEER Tweets per day are excluded, to show more meaningful results. We re- fer to this group as avg50. In average, more than half of the BEER Tweets per day come from Brazil and England together. Results show no direct cor- relation to the statistics Harmful use of alcohol1 of the WHO. The reasons for this can only be pos- sibly found out by a longterm analysis going fur- ther than pure statistics. In that list Brazil with 7.8 litres of pure alcohol per capita is actually ranked further to the end. Instead countries such as Ger- many (13.4), France (12.6), England (11.4) and Australia (10.6) would be ranked to the top. Figure 1: Average number of alcohol related (BEER) Tweets per day outside the tournament In order to draw a fair comparison to pure alco- hol per capita the number of active Twitter users must be taken into account. It turns out that di- viding the avg. BEER Tweets by the number of active Twitter users does not change much. Ar- gentina switches place with England, Saudi Ara- bia moves to the very end and Japan drops just in front of it. Columbia moves slightly up. Next mean is calculated for all BEER Tweets from avg50 for each day of the week. The re- sulting graph is presented in Figure 2 and visu- alises, similarly to Abbar et al. (2015), particular periodicities. Firstly single days can be recognised as small peaks. Moreover, towards the end of the week, peaks are slightly increased compared to the beginning of the week. Using this data it is for in- 1http://apps.who.int/gho/data/node. sdg.3-5-viz, accessed 19.07.2018 Japan. Figure 2: Mean of all alcohol related (BEER) Tweets before/after the tournament from avg50 stance possible to deduct, that people tweet sig- nificantly more about alcohol on the evening (from 4pm until 1am) (p<0.001). Moreover, the data also shows, that people tweet significantly more about alcohol at the weekend (Friday 4pm - Monday 6am) (p<0.001). in comparison to the rest of the week. 3.2 The Tournament In this subsection alcohol related Tweets during the tournament are examined. The first question to address is whether supporters of their national team tweet more during the match in comparison to other periods. Reference periods are the days after each match during the same time slots. The analysis shows that people from 19 coun- tries use BEER significantly more when their team is playing (p<0.05, 10 of them with p<0.001). Among the 13 other countries, only Japan and Saudi Arabia are from avg50. Interest- ingly Croatia, which reached the final, does not show any significant increase, but the general us- age of BEER is generally very low here. Consid- ering WINE Tweets, only Brazil, Poland and Bel- gium and for SAKE only Mexico show a signifi- cant increase in Tweets during the matches of their team (p<0.05). However the number of Tweets are low in comparison to BEER. Figure 3 presents an overview on how the tour- nament influences the average usage of BEER per day of avg50, while the team is in the tournament. France shows the largest increase of BEER Tweets per day in average of more than 107%, followed by Japan with 35%. The increase from Japan is surprising as Japanese people do not tweet sig- nificantly more during the matches of their team. Possible explanations might be that matches are broadcasted often late in the evening due to the time difference to Russia. For this reason people might meet up earlier, thus start drinking earlier. Another explanation can be just the fact that there is a high interest for the tournament in general in Figure 3: Increase of beer related Tweets per day during World Cup, until leaving the tournament Brazil instead shows 'only' an increase of 18%. Even with this small increase (in comparison to others) Brazil remains the country with the largest number of avg. BEER Tweets per day. Consid- ering all countries Morocco has the strongest in- crease (407.5%) and also the strongest decrease after leaving the tournament (-68.97%). On the other hand, outside the tournament Morocco has a very low number of BEER Tweets per day (0.48), so the increase might be not too serious. Interest- ingly only Peru shows a decrease during the tour- nament (-16.4%). Considering the avg50, Colom- bia and Brazil showed the strongest decrease when their team left the tournament with -18.81% and - 10.59% respectively. Generally the results show, that from almost all countries more alcohol related Tweets can be found during the tournament. Moreover, in most cases the avg. number of BEER Tweets decreases when the team leaves the tournament. However, in some cases an increase in Tweets can be de- tected. Senegal for instance increases the number of BEER Tweets up to 54%, followed by Uruguay (28%) and Australia (10%). 3.3 Top-5 Matches This subsection analyses the different matches of the tournament for popularity in terms of BEER and BALL. In order to have a fair comparison data is normalized first. The average number of Tweets of each country outside the tournament is sub- tracted from the number of Tweets during the tour- nament at a given time and day. Table 2 presents the Top-5 matches involving BEER and BALL. The table shows that more peo- ple use the football emoji than the beer emoji. In terms of BALL, the Top-5 list contains the final (France-Croatia), the opening (Russia-Saudi Ara- bia) and some other games involving recent Euro- pean and World Champions. Mexico-Sweden German-S. Korea Brazil-Belgium Serbia-Brazil Switzerland-C. Rica Nigeria-Iceland Brazil-Costa Rica # 1313 Portugal-Spain 1305 1250 France-Croatia Russia-S. Arabia 1104 Germany-Mexico 1092 France-Argentina # 5100 4637 4253 3798 3616 Table 2: Top-5 matches of the tournament in terms of beer and football emoji (normalized) From BEER perspective we find on the first and third palce matches which took place in par- allel. Considering that, the most popular single match was Brazil-Belgium in the Quarter Final. Ranked 4th is Nigeria-Iceland, which is surpris- ing, as both countries are not tweeting much about beer. Analysing the results in more detail reveals, that all 7 matches took place on a day Brazil played. Even though Tweets were normalized, the influence of Brazilian BEER Tweets before and af- ter a match of their team is enormous, so that even the Nigeria-Iceland match achieved a high rank. 4 Results This work presented a short analysis of alcohol related emojis in context of the FIFA football World Cup 2018. With the start of the tourna- ment we showed, that most countries strongly in- crease the number of Tweets containing beer emo- jis. As many people tweet less after their national team left the tournament, we draw the conclusion that leaving the tournament early, as Germany did, is the healthiest solution - unless you are Peru. We also showed that people of many participating teams of the tournament tweet significantly more about alcohol during a match of their team. Fur- thermore we presented the increase of alcohol re- lated Tweets during the tournament and the most popular games in terms of beer and football emo- jis. Finally we showed, that Brazil tweets by far the most about beer. Cheers! Acknowledgements This research was supported by the German Fed- eral Ministry of Economics and Energy (BMWi) through the project MACSS (01MD16011F). References Sofiane Abbar, Yelena Mejova, and Ingmar Weber. 2015. You tweet what you eat: Studying food con- In Proceedings of the sumption through twitter. 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pages 3197 -- 3206, New York, NY, USA. ACM. Peter Anderson, Avalon de Bruijn, Kathryn Angus, Ross Gordon, and Gerard Hastings. 2009. Impact of alcohol advertising and media exposure on ado- lescent alcohol use: A systematic review of longitu- dinal studies. Alcohol and Alcoholism, 44(3):229 -- 243. Aron Culotta. 2013. Lightweight methods to estimate influenza rates and alcohol sales volume from twit- ter messages. Language resources and evaluation, 47(1):217 -- 238. Brenda Curtis, Salvatore Giorgi, Anneke E. K. Buf- fone, Lyle H. Ungar, Robert D. Ashford, Jessie Hemmons, Dan Summers, Casey Hamilton, and H. Andrew Schwartz. 2018. Can twitter be used to predict county excessive alcohol consumption rates? PLOS ONE, 13(4):1 -- 16. Nabil Hossain, Tianran Hu, Roghayeh Feizi, Ann Marie White, Jiebo Luo, and Henry A. Kautz. 2016. Precise localization of homes and activities: Detecting drinking-while-tweeting pat- terns in communities. In Proceedings of the Tenth International Conference on Web and Social Me- dia, Cologne, Germany, May 17-20, 2016., pages 587 -- 590. Tom Huang, Anas Elghafari, Kunal Relia, and Rumi Chunara. 2017. High-resolution temporal represen- tations of alcohol and tobacco behaviors from so- cial media data. Proceedings of the ACM on human- computer interaction, 1(CSCW). Daniel Kershaw, Matthew Rowe, and Patrick Stacey. 2014. Towards tracking and analysing regional alco- hol consumption patterns in the uk through the use of social media. In Proceedings of the 2014 ACM conference on Web science, pages 220 -- 228. ACM. Megan A. Moreno, Leslie R. Briner, Amanda Williams, Libby Brockman, Leslie Walker, and Dimitri A. Christakis. 2010. A content analysis of displayed alcohol references on a social networking web site. Journal of Adolescent Health, 47(2):168 -- 175. Michael Roerecke and Jurgen Rehm. 2012. Alco- hol intake revisited: Risks and benefits. Current Atherosclerosis Reports, 14(6):556 -- 562. Philippe Thomas and Leonhard Hennig. 2018. Twit- ter Geolocation Prediction Using Neural Networks. In Language Technologies for the Challenges of the Digital Age, pages 248 -- 255, Cham. Springer Inter- national Publishing.
1610.03901
1
1610
2016-10-12T23:41:01
The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Friendship is a fundamental characteristic of human beings and usually assumed to be reciprocal in nature. Despite this common expectation, in reality, not all friendships by default are reciprocal nor created equal. Here, we show that reciprocated friendships are more intimate and they are substantially different from those that are not. We examine the role of reciprocal ties in inducing more effective peer pressure in a cooperative arrangements setting and find that the directionality of friendship ties can significantly limit the ability to persuade others to act. Specifically, we observe a higher behavioral change and more effective peer-influence when subjects shared reciprocal ties with their peers compared to sharing unilateral ones. Moreover, through spreading process simulation, we find that although unilateral ties diffuse behaviors across communities, reciprocal ties play more important role at the early stages of the diffusion process.
cs.SI
cs
The Role of Reciprocity and Directionality of Friendship Ties in Promoting Behavioral Change Abdullah Almaatouq(cid:63), Laura Radaelli, Alex Pentland, and Erez Shmueli Massachusetts Institute of Technology, 77 Massachusetts Ave, Cambridge, MA 02139, USA [email protected] Abstract. Friendship is a fundamental characteristic of human beings and usually assumed to be reciprocal in nature. Despite this common expectation, in reality, not all friendships by default are reciprocal nor created equal. Here, we show that reciprocated friendships are more in- timate and they are substantially different from those that are not. We examine the role of reciprocal ties in inducing more effective peer pressure in a cooperative arrangements setting and find that the directionality of friendship ties can significantly limit the ability to persuade others to act. Specifically, we observe a higher behavioral change and more effec- tive peer-influence when subjects shared reciprocal ties with their peers compared to sharing unilateral ones. Moreover, through spreading pro- cess simulation, we find that although unilateral ties diffuse behaviors across communities, reciprocal ties play more important role at the early stages of the diffusion process. Keywords: Social Networks; Contagion; Adoption; Reciprocity 1 Introduction Friendship is a fundamental characteristic of human relationships and individuals generally presume it to be reciprocal in nature. Despite this common expecta- tion [13], in reality not all friendships are reciprocal [16,14]. The implications of friendships on an individual's behavior depend as much on the identity of his friends as on the quality of friendships [15]. Among qualities of a relationship, reciprocity can substantially differentiate a friendship from many others. It is reasonable to think that relationships that are reciprocated are substantially different from those that are not [15]. Moreover, in recent years, peer-support programs are emerging as highly effective and empowering ways to leverage peer influence to support behavioral change [10]. One specific type of peer-support programs is the "buddy system," in which individuals are paired with another person (i.e., a buddy) who has the responsibility to support their attempt to change their behavior. Such a system has been used to shape people's behavior in various domains including smoking cessation [20], weight loss [23], diabetes management or alcohol misuse [22]. (cid:63) corresponding authors 6 1 0 2 t c O 2 1 ] I S . s c [ 1 v 1 0 9 3 0 . 0 1 6 1 : v i X r a 2 Almaatouq et. al. Consequently, the need to understand the factors that impact the level of in- fluence individuals exert on one another is of great practical importance. Recent studies have investigated how the effectiveness of peer influence is affected by different social and structural network properties, such as clustering of ties [5], similarity between social contacts [6], and the strength of ties [4]. However, how the effectiveness of social influence is affected by the reciprocity and direction- ality of friendship ties is still poorly understood. When analyzing self-reported relationship surveys from several experiments, we find that only about half of the friendships are reciprocal. These findings suggest a profound inability of people to perceive friendship reciprocity, perhaps because the possibility of non-reciprocal friendship challenges one's self-image. We further show that the asymmetry in friendship relationships has a large effect on the ability of an individual to persuade others to change their behavior. Moreover, we show that the effect of directionality is larger than the effect of the self-reported strength of a friendship tie [4] and thus of the implied 'social capital' of a relationship. Our experimental evidence comes through analysis of a fitness and physical activity intervention, in which subjects were exposed to different peer pressure mechanisms, and physical activity information was collected passively by smartphones. In this experiment, we find that effective behavioral change occurs when subjects share reciprocal ties, or when a unilateral friendship tie exists from the person applying the peer pressure to the subject receiving the pressure, but not when the friendship tie is from the subject to the person applying peer pressure. Our findings suggest that misperception of friendships' character for the ma- jority of people may result in misallocation of efforts when trying to promote a behavioral change. 2 Results 2.1 Reciprocity and Intimacy Despite the unique characteristics and importance of reciprocal friendships, reci- procity is implicitly assumed in very many scientific studies of friendship net- works: in their analysis they either mark two individuals as friends of each other, or as not being friends. However, not all friendships are reciprocal, as we proceed to demonstrate. We analyze surveys that were used to determine the closeness of relationships (i.e., friendships) among participants in the Friends and Family study. Each participant in the study scored other participants on a 0− 7 scale, where a score of 0 meant that the participant was not familiar with the other, and 7 that the participant was very close to the other. The self-reported closeness scores were then used to build the friendship network. Similar to [1], we considered only explicit friendship ties (closeness > 2). In this network, we consider a friendship tie to be "reciprocal" when both participants identify each other as friends. Alternatively, the tie is "unilateral" Directionality of Friendship Ties and Behavioral Change 3 when only one of the participants identifies the other as a friend. Figure 1 depicts the resulting network which consists of 122 nodes and 698 edges (i.e., explicit friendships), of which 315 are reciprocal (i.e., 45%) and 383 are unilateral (i.e., 55%). Surprisingly, more than half of the participants' friendship ties are not reciprocated, which indicates the non-intuitive observation that people are very vulnerable to misjudging their friendship relationships and implies that people are unable to perceive reciprocity [2]. We find this result to be consistent across many self-reported friendship net- works that we have analyzed: only 45% (315 out of 698) of friendships are re- ciprocal in the Friends and Family dataset [1], 34% (28 out of 82) in the Reality Mining dataset [9], 35% (555 out of 1596) in the Social Evolution dataset [17], and 49% (102 out of 208) in the Strongest Ties dataset [21]. The first three surveys were collected at an American university, and the fourth at a European university. Similarly, a previous study [24] in which adolescents were asked to nominate at most 10 of their best school friends (5 male and 5 female) found that only 64% of the reported friendships were indeed reciprocal. Our findings reinforce this finding by investigating multiple datasets from two continents, and by using complete nomination networks (in which each participant is asked about every other participant), resulting in an even more prominent lack of reciprocity. Finally, analyzing the closeness scores associated with the two types of ties in the Friends and Family friendship network reveals that participants that share a reciprocal friendship tend to score each other higher (on average) when compared to participants that share unilateral friendship. More specifically, the average closeness score of reciprocal ties (4.7) is almost one point higher than the average score of unilateral ties (3.9) and the difference is statistically significant (two- sample T-test p < 0.0001). 2.2 Induced peer pressure Social scientists have long suspected that reciprocal friendships are more inti- mate, provide higher emotional support, and form a superior resource of social capital when compared to those that are not reciprocated. This holds whether or not any party of the dyad is aware of the status of reciprocity embedded in their relationships [24]. However, we hypothesize that 'reciprocity' and 'directionality' of friendships may be critical factors in promoting peer influence, beyond the mere effect of the total tie 'strength' bound up in the relationship. To support our hypothesis, we investigate the FunFit experiment -- a fitness and physical activity experimental intervention -- conducted within the Friends and Family study population during October to December of 2010. The exper- iment was presented to participants as a wellness game to help them increase their daily activity levels. Subjects received an 'activity app' for their mobile phone which passively collected their physical activity data and showed the par- ticipants how their activity level had changed relative to their previous activity level, and the amount of money they had earned by being more active. 108 out of the 123 active Friends and Family subjects at that time elected to participate and 4 Almaatouq et. al. Fig. 1. Subfigure A depicts the undirected friendship nomination graph in the Friends and Family study, where nodes represent participants and edges represent friendship ties. Subfigure B shows the distribution of closeness scores for reciprocal and unilat- eral ties. ECDF and KDE of closeness scores are computed separately for unilateral ties (dashed line) and reciprocal ties (solid line). were allocated into three experimental conditions, allowing us to isolate different incentive mechanisms varying monetary reward, the value of social information, and social pressure/influence: -- Control: subjects were shown their own progress and were given a monetary reward based on their own progress in increasing physical activity relative to the previous week. -- Peer See: subjects were shown their own progress and the progress of two "buddies" in the same experimental group, and were given a monetary re- ward based on their own progress in increasing physical activity relative to the previous week. -- Peer Reward: subjects were shown their own progress and the progress of two "buddies" in the same experimental group, but their rewards de- pended only on the progress of the two "buddies". This condition realizes a social mechanism based on inducing peer-to-peer interactions and peer pressure [19]. However, for the purpose of our analysis in this section, we combine the samples from the two peer pressure treatments, as we are interested in peer pressure regardless of the incentive structure, and omit the control group. During the initial 23 days of the experiment (Oct 5 - Oct 27), denoted as P1, the baseline activity levels of the subjects were collected. The actual intervention period is denoted as P2. During the intervention period, the subjects were given feedback on their performance in the form of a monetary reward. The monetary p < 0.0001Cumulative Distribution FunctionCloseness ScoreKDE4020Participant Degree3357Friendship ScoreFriendship TypeReciprocalUnilateralAB Directionality of Friendship Ties and Behavioral Change 5 reward was calculated as a function of the subject's activity data relative to the previous week and was divided according to the subject's experimental condition (i.e., Peer See and Peer Reward). Note that the physical activity was measured passively by logging the smartphone accelerometer (as opposed to self-reported surveys) and the game was not designed as a competition, every subject had the potential to earn the maximal reward. A previously non-active participant could gain the same reward as a highly active one, while the highly active person would need to work harder. The results in [1] show that the two social conditions (i.e. Peer See and Peer Reward) do significantly better than the control group. Furthermore, the results suggest that there is a complex contagion effect [7], due to the reinforcement of the behavior from multiple social contacts [5,7], related to pre-existing social ties between participants. Our analysis here focuses on the role of reciprocity and directionality of friendship ties in this contagion process. In order to investigate the role of reciprocity and directionality of friend- ship ties in the contagion process, we performed a regression analysis in which the dependent variable was the change in physical activity between the post- intervention phase and the pre-intervention phase (i.e., the average daily physical activity in P2 divided by the average daily physical activity in P1). For our study, we refer to a participant whose behavior is being analyzed as "ego", and participants connected to the ego (i.e., experimental "buddies") are referred to as "alters". Because friendship nominations are directional, we studied the three possible types of friendships (from the prospective of the ego) as independent variables: an "ego perceived friend", in which an alter identifies an ego as a friend (i.e., incoming tie); an "alter perceived friend" in which an ego identifies an alter as a friend (i.e., outgoing tie); and a "reciprocal friend," in which the identification is bidirectional (i.e., reciprocal tie). Finally, we also included the tie strength (i.e., the sum of the closeness scores between an ego and his or her alters) as a control variable, which has been previously investigated as a moderator of the effect of social influence [4]. Figure 2 reports the effects found in our regression analysis (recall that the dependent variable in our model is the change in activity for the egos). We find that the reciprocity and directionality of a friendship have an effect on the amount of induced peer pressure, and these effects are much larger than the total tie strength. The strongest effect for both treatment groups (N = 76) in this study was found for the reciprocal factor (p < 0.01) even when controlling over the strength of the tie (the tie strength is weakly significant p = 0.07). That is, alters in reciprocal friendships have more of an effect on the ego than alters in other types of friendships. Interestingly, when the ego was perceived as a friend by the alters (i.e., in- coming edges from the alters to the ego), the effect was also found to be positive and significant (p < 0.05). On the other hand, no statistically significant effect was found when the alters were perceived as friends by the ego (i.e., outgoing edges from the ego to the alters). Therefore, the amount of influence exerted by 6 Almaatouq et. al. Fig. 2. Change in physical activity under experiment conditions shows that the type of friendship is relevant to the effectiveness of the induced peer pressure. The plot shows the mean effect size of the covariates (solid circles) and the 95% confidence intervals (bars). individuals on their peers in unilateral friendship ties seems to be dependent on the direction of the friendship. Unlike previous works on social contagion effects [8,11], which were conducted without peer-to-peer incentives, we find that influence does not flow from nomi- nated alter to nominating ego. Surprisingly, alter's perception of ego as a friend would increase alter's ability to influence ego's behavior when ego does not re- ciprocate the friendship. We attribute this difference to the fact that there is a peer-to-peer incentive mechanism, and therefore there are likely to be differences in communication when the alters believe the ego to be their friend versus when they do not. 2.3 Reciprocity and Global Adoption In order to understand the effect of reciprocal ties on global behavior adop- tion, we experimented with a variation of the classic epidemic spreading model, Susceptive-Infected (SI) model. We refer to this variant as the Bi-Directional Susceptive-Infected (BDSI) model. Unlike the classic SI in which behavior is transmitted along edges with a constant probability, the proposed BDSI model considers the direction in which behaviors can be transmitted with different probabilities based on the direction and type of edges -- i.e. prec for reciprocal edges and p+/p− for the two possible directions of unilateral edges. In order to observe the effects of reciprocal edges on diffusion, we employ an edge percolation process in which we measure the coverage (i.e., number of infected nodes), denoted by Z, and time to infect, denoted by T , when removing reciprocal and unilateral edges successively (i.e., perturbation F ). That is, F ReciprocalfriendAlter perceived friendEgo perceived friendTie strength Directionality of Friendship Ties and Behavioral Change 7 Fig. 3. Subfigure A demonstrates the effect of perturbation on the coverage and speed of adoption. Subfigure B illustrates how the coverage and speed decay faster when removing reciprocal edges in comparison with unilateral edges. is the percentage of edges removed in perturbation. We find the nature of the simulation results are qualitatively independent of the choice of prec, p+ and p− given that prec ≥ p+ ≥ p−. Figure 3 shows the behavior adoption coverage when simulating the BDSI model on the self-reported friendship network from the Friends and Family dataset. As can be seen in the figure, the coverage Z decays much faster when re- moving reciprocal edges (left figure) compared with removing the same amount of unilateral edges (right figure). Moreover, the difference in coverage ∆Z is af- fected remarkably by the removal of reciprocal edges most notably in the early stages of the diffusion process (e.g., T ∈ [5, 10]). This can be attributed to the rapid diffusion within a single community through reciprocal edges, correspond- ing to fast increases in the number of infected users in early stages of the diffusion process, followed by plateaus, corresponding to time intervals during which no 24681012141618200.000.050.100.150.200.250.300.350.400.4524681012141618200.00.20.40.60.81.0ReciprocalUnilateralA051015202500.10.20.30.40.5−0.15−0.1−0.0500.05 −0.12−0.1−0.08−0.06−0.04−0.020BTime, TPerturbation, FCoverage, ZTime, TPerturbation, F∆Coverage, ∆Z 8 Almaatouq et. al. new nodes are infected the behavior escapes the community (i.e., through the strength of weak tie [12]) to the rest of the network through unilateral edges. 3 Future Work & Discussion In this paper we have demonstrated the important role that reciprocity and directionality of friendship ties play in inducing effective social persuasion. We have also shown that the majority of individuals have difficulty in judging the reciprocity and directionality of their friendship ties (i.e., how others perceive them), and that this can be a major limiting factor for the success of cooperative arrangements such as peer-support programs. Finally, through spreading process simulation, the experimental results highlight the important role that reciprocal ties play in the spreading of behaviors at the early stages of the process. Previous studies have found that people tend to adopt the behaviors of peers that they are passively exposed to, with the explicit self-reported friends and intimate social acquaintances playing a peripheral role (e.g., [18,5]). Other stud- ies have shown that passive exposures to peer behavior can increase the chances of becoming obese [8,18], registering for a health forum Web site [5], signing up for an Internet-based diet diary [6], or adopting computer applications [3]. How- ever, our results suggest a fundamental difference between how social learning (i.e., passive exposure) and social persuasion (i.e., active engagement) spread behaviors from one person to another. The findings of this paper have significant consequences for designing inter- ventions that seek to harness social influence for collective action. This paper also has significant implications for research into peer pressure, social influence, and information diffusion as these studies have typically assumed undirected (recip- rocal) friendship networks, and may have missed the role that the directionality of friendship ties plays in social influence. References 1. Aharony, N., Pan, W., Ip, C., Khayal, I., Pentland, A.: Social fmri: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing 7(6), 643 -- 659 (2011) 2. Almaatouq, A., Radaelli, L., Pentland, A., Shmueli, E.: Are you your friends? friend' poor perception of friendship ties limits the ability to promote behav- ioral change. PLoS ONE 11(3), 1 -- 13 (03 2016), http://dx.doi.org/10.1371% 2Fjournal.pone.0151588 3. Aral, S., Walker, D.: Identifying influential and susceptible members of social net- works. Science 337(6092), 337 -- 341 (2012) 4. Aral, S., Walker, D.: Tie strength, embeddedness and social influence: A large scale networked experiment. Management Science (2014) 5. Centola, D.: The spread of behavior in an online social network experiment. science 329(5996), 1194 -- 1197 (2010) 6. Centola, D.: An experimental study of homophily in the adoption of health behav- ior. Science 334(6060), 1269 -- 1272 (2011) Directionality of Friendship Ties and Behavioral Change 9 7. Centola, D., Macy, M.: Complex contagions and the weakness of long ties1. Amer- ican Journal of Sociology 113(3), 702 -- 734 (2007) 8. Christakis, N.A., Fowler, J.H.: The spread of obesity in a large social network over 32 years. New England journal of medicine 357(4), 370 -- 379 (2007) 9. Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and ubiquitous computing 10(4), 255 -- 268 (2006) 10. Ford, P., Clifford, A., Gussy, K., Gartner, C.: A systematic review of peer-support programs for smoking cessation in disadvantaged groups. International journal of environmental research and public health 10(11), 5507 -- 5522 (2013) 11. Fowler, J.H., Christakis, N.A.: Dynamic spread of happiness in a large social net- work: longitudinal analysis of the framingham heart study social network. BMJ: British medical journal pp. 23 -- 27 (2009) 12. Granovetter, M.S.: The strength of weak ties. American journal of sociology pp. 1360 -- 1380 (1973) 13. Hartup, W.W.: Adolescents and their friends. New Directions for Child and Adolescent Development 1993(60), 3 -- 22 (1993), http://dx.doi.org/10.1002/cd. 23219936003 14. Hartup, W.W.: Adolescents and their friends. New Directions for Child and Ado- lescent Development 1993(60), 3 -- 22 (1993) 15. Hartup, W.W.: The company they keep: Friendships and their developmental sig- nificance. Child development 67(1), 1 -- 13 (1996) 16. Laursen, B.: Close friendships in adolescence. New Directions for Child and Ado- lescent Development 1993(60), 3 -- 32 (1993) 17. Madan, A., Cebrian, M., Moturu, S., Farrahi, K., Pentland, A.: Sensing the" health state" of a community. IEEE Pervasive Computing 11(4), 36 -- 45 (2012) 18. Madan, A., Moturu, S.T., Lazer, D., Pentland, A.S.: Social sensing: obesity, un- healthy eating and exercise in face-to-face networks. In: Wireless Health 2010. pp. 104 -- 110. ACM (2010) 19. Mani, A., Rahwan, I., Pentland, A.: Inducing peer pressure to promote cooperation. Scientific reports 3 (2013) 20. May, S., West, R.: Do social support interventions (buddy systems) aid smoking cessation? a review. Tobacco Control 9(4), 415 -- 422 (2000) 21. de Montjoye, Y.A., Stopczynski, A., Shmueli, E., Pentland, A., Lehmann, S.: The strength of the strongest ties in collaborative problem solving. Scientific reports 4 (2014) 22. Rotheram-Borus, M.J., Tomlinson, M., Gwegwe, M., Comulada, W.S., Kaufman, N., Keim, M.: Diabetes buddies peer support through a mobile phone buddy sys- tem. The Diabetes Educator 38(3), 357 -- 365 (2012) 23. Stock, S., Miranda, C., Evans, S., Plessis, S., Ridley, J., Yeh, S., Chanoine, J.P.: Healthy buddies: a novel, peer-led health promotion program for the prevention of obesity and eating disorders in children in elementary school. Pediatrics 120(4), e1059 -- e1068 (2007) 24. Vaquera, E., Kao, G.: Do you like me as much as i like you? friendship reciprocity and its effects on school outcomes among adolescents. Social Science Research 37(1), 55 -- 72 (2008)
1907.11620
1
1907
2019-06-12T09:24:04
Exploiting weak ties in trust-based recommender systems using regular equivalence
[ "cs.SI", "cs.IR" ]
User-based Collaborative Filtering (CF) is one of the most popular approaches to create recommender systems. CF, however, suffers from data sparsity and the cold-start problem since users often rate only a small fraction of available items. One solution is to incorporate additional information into the recommendation process such as explicit trust scores that are assigned by users to others or implicit trust relationships that result from social connections between users. Such relationships typically form a very sparse trust network, which can be utilized to generate recommendations for users based on people they trust. In our work, we explore the use of regular equivalence applied to a trust network to generate a similarity matrix that is used for selecting k-nearest neighbors used for item recommendation. Two vertices in a network are regularly equivalent if their neighbors are themselves equivalent and by using the iterative approach of calculating regular equivalence, we can study the impact of strong and weak ties on item recommendation. We evaluate our approach on cold-start users on a dataset crawled from Epinions and find that by using weak ties in addition to strong ties, we can improve the performance of a trust-based recommender in terms of recommendation accuracy.
cs.SI
cs
Exploiting weak ties in trust-based recommender systems using regular equivalence Tomislav Duricic Graz University of Technology Graz, Austria [email protected] Dominik Kowald Know-Center GmbH Graz, Austria [email protected] Emanuel Lacic Know-Center GmbH Graz, Austria [email protected] Elisabeth Lex Graz University of Technology Graz, Austria [email protected] ABSTRACT User-based Collaborative Filtering (CF) is one of the most popular approaches to create recommender systems. CF, however, suffers from data sparsity and the cold-start problem since users often rate only a small fraction of available items. One solution is to incor- porate additional information into the recommendation process such as explicit trust scores that are assigned by users to others or implicit trust relationships that result from social connections between users. Such relationships typically form a very sparse trust network, which can be utilized to generate recommendations for users based on people they trust. In our work, we explore the use of regular equivalence applied to a trust network to generate a similarity matrix that is used for selecting k-nearest neighbors used for item recommendation. Two vertices in a network are regularly equivalent if their neighbors are themselves equivalent and by us- ing the iterative approach of calculating regular equivalence, we can study the impact of strong and weak ties on item recommen- dation. We evaluate our approach on cold-start users on a dataset crawled from Epinions and find that by using weak ties in addition to strong ties, we can improve the performance of a trust-based recommender in terms of recommendation accuracy. Problem & objective. Ever since their introduction, user-based Collaborative Filtering (CF) approaches have been one of the most widely adopted and studied algorithms in the recommender systems literature [9]. CF is based on the intuition that those users, who have shown similar item rating behavior in the past, will likely give similar ratings to items in the future. The basis of CF is to retrieve the k-nearest neighbors of a target user for whom the recommendations are generated and to recommend items from these k neighbors, which were rated highly by them but have not yet been rated by the target user. An issue of CF is the cold-start user problem, i.e., novel users, who have rated zero or only a small number of items [10] and whose ratings cannot thus be exploited to find similar users. As a remedy, trust-based CF methods exploit trust statements expressed by users on platforms such as Epinions [7]. Such trust statements can be explicit, i.e., users assign trust scores to others or implicit, i.e., users engage in social connections with others ESCSS 2019, September 02-04, 2019, Zurich, Switzerland 2019. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00 https://doi.org/xx.xxx/xxxxxx.xxxxxx they trust. Based on explicit and implicit trust statements, we can generate trust networks and recommend items for users based on people they trust [6]. Since trust networks are often sparse, a particular property of trust, namely transitivity, can be exploited to propagate trust in the network by forming weak ties between users. In this way, new connections are established between users, who do not share a direct link, but are weakly connected via intermediary users [2, 7]. In our work, we focus on the first step of CF, i.e., finding the k- nearest neighbors. We explore the power of weak ties to find similar neighbors by utilizing a similarity measure from network science referred to as "Katz similarity" (KS) [8]. Although Katz himself never discussed it, KS captures regular equivalence of nodes in a network and can be applied in many different settings [4, 5]. Approach & method. Firstly, we utilize the trust connections to create an adjacency matrix where each entry represents a directed trust link between two users. Secondly, we apply the KS measure on the created trust adjacency matrix. More specifically, we calcu- late the pairwise similarities between users by using the iterative approach for calculating KS: lmax (lmax +1) = σ (αA)l (1) l =0 The iterative approach provides the possibility to set the maxi- mum used path length (lmax ). This approach effectively gives us the ability to define the maximum path length used for forming weak ties between users who are not directly connected. We use the resulting similarity matrix and apply various row normaliza- tion (L1, L2, max) and degree normalization techniques (in-degree, out-degree, and combined degree normalization) to get a better distribution of similarity values and better evaluation results con- cerning recommendation accuracy in return. Lastly, we apply an additional method to increase the similarity values derived from weak ties [1]: σboost = A + σnorm (2) where σnorm is calculated by setting the values of strong tie simi- larities in σ to 0, normalizing the resulting matrix and then setting them to 1. With this approach, we achieve that each entry in σboost has a similarity value of 1 between pairs of nodes for which there exists an explicit trust connection in A while also increasing the importance of similarity values derived from weak ties. We evalu- ate these approaches on the Epinions dataset presented in [7] and compare results for lmax = 1 (using only strong ties) and lmax = 2 (using strong ties in combination with weak ties derived from paths of length 2). Results & discussion. In our study, we evaluate 33 approaches for various combinations of lmax values and normalization tech- niques. We compare these approaches with three different baselines: MP (recommending most popular items), Trustexp (CF using trust connections for finding top k similar neighbors) and Trustjac (CF using Jaccard coefficient on explicit trust values for finding top k similar neighbors). However, in Table 1, we only report the results for a subset of these approaches that provide the most insightful findings. All of the evaluation results are reported for n = 10, i.e., for 10 recommended items. Approach lmax Degree norm. Row norm. Boost nDCG R P Trustexp Trustjac MP Combined Max Combined Max Combined L1 No degree L2 Combined Max N/A In degree No degree N/A 2 2 2 2 1 1 2 Yes No Yes Yes No No No .0224 .0176 .0134 .0303 .0295 .0273 .0257 .0213 .0161 .0036 .0296 .0219 .0202 .0425 .0422 .0358 .0340 .0289 .0243 .0057 .0110 .0087 .0070 .0117 .0113 .0106 .0106 .0106 .0087 .0020 KSPCMB KSPCM N KSPCL1B KSP N L2B KSN CM N KSN I N N KSP N N N Table 1: Evaluation results for a subset of the 33 evaluated KS-based CF approaches The Trustexp baseline uses only strong ties (explicit trust con- nections) for making recommendations and one of our main finding from the results of the conducted experiments is that by incorporat- ing weak ties using paths of maximum length 2 from the target node (i.e. similar to adding friends of friends into the neighborhood), we can improve the quality of the recommendations in terms of recom- mendation accuracy with the best approach being the KSPCMB. In the best performing approach, we set lmax to 2, apply combined de- gree (sum of in and out degrees) normalization, remove the strong ties, then perform max row normalization and then add the strong ties with the similarity value of 1. We also find that if we don't employ weak ties, i.e., lmax is set to 1, we achieve better results when we do not apply degree and row normalization (i.e., basi- cally the Trustexp baseline). However, if lmax is set to 2, we can observe improvements in almost all of the cases except when no row normalization is applied, e.g., in the case of KSP N N N . Finally, in Figure 1, we show the performance of all approaches listed in Table 1 in form of Recall-Precision plots for different num- ber of recommended items (i.e., n = 1 − 10). The results clearly show that the best performing algorithm (i.e., KSPCMB) again out- performs all of the other approaches also for a smaller number of recommended items (i.e., for n < 10). Figure 1: Recall-Precision plots of the described approaches for n = 1 − 10 recommended items. Conclusion & future work. In this paper, we explored the use of Katz similarity (KS), a similarity measure of regular equivalence in networks, for selecting k-nearest neighbors in a Collaborative Filtering (CF) algorithm for cold-start users. We used an iterative approach to compute KS since it provides the ability to restrict the length of paths in the network used for similarity calculation. Consequently, we can investigate weak ties of arbitrary length. We found that KS can be a useful measure for neighbor selection if used with degree normalization and row normalization. In summary, with our work, we aimed to shed light on how to exploit weak ties in social networks to increase the performance of trust-based recommender systems. For future work, we plan to run additional experiments using different values for lmax and to explore the use of recently popularized node embeddings (e.g., Node2Vec [3]) to identify weak ties between users. Keywords. Weak ties; Katz similarity; Trust-based recommenders REFERENCES [1] Tomislav Duricic, Emanuel Lacic, Dominik Kowald, and Elisabeth Lex. 2018. Trust-based collaborative filtering: tackling the cold start problem using regular equivalence. In Proceedings of the 12th ACM Conference on Recommender Systems. ACM, 446 -- 450. [2] Jennifer Ann Golbeck. 2005. Computing and applying trust in web-based social [9] J Ben Schafer, Dan Frankowski, Jon Herlocker, and Shilad Sen. 2007. Collaborative filtering recommender systems. In The adaptive web. Springer, 291 -- 324. [10] Andrew I Schein, Alexandrin Popescul, Lyle H Ungar, and David M Pennock. 2002. Methods and metrics for cold-start recommendations. In Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 253 -- 260. networks. Ph.D. Dissertation. [3] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 855 -- 864. [4] Ilire Hasani-Mavriqi, Dominik Kowald, Denis Helic, and Elisabeth Lex. 2018. Consensus dynamics in online collaboration systems. Computational social networks 5, 1 (2018), 2. [5] Denis Helic. 2014. Regular equivalence in informed network search. In Informa- tion and Communication Technology, Electronics and Microelectronics (MIPRO), 2014 37th International Convention on. IEEE, 1088 -- 1093. [6] Neal Lathia, Stephen Hailes, and Licia Capra. 2008. Trust-based collaborative filtering. In IFIP international conference on trust management. Springer, 119 -- 134. [7] Paolo Massa and Paolo Avesani. 2007. Trust-aware recommender systems. In Proceedings of the 2007 ACM conference on Recommender systems. ACM, 17 -- 24. [8] Mark Newman. 2010. Networks: An Introduction. Oxford University Press, Inc., New York, NY, USA. 217 -- 220 pages. 0.0050.0100.0150.0200.025Precision0.000.010.020.030.04RecallTrustexpTrustjacMPKSPCMBKSPCMNKSPCL1BKSPNL2BKSNCMNKSNINNKSPNNN
1905.04260
1
1905
2019-05-10T17:00:40
Check-It: A Plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web
[ "cs.SI", "cs.CL", "cs.CY" ]
Over the past few years, we have been witnessing the rise of misinformation on the Web. People fall victims of fake news during their daily lives and assist their further propagation knowingly and inadvertently. There have been many initiatives that are trying to mitigate the damage caused by fake news, focusing on signals from either domain flag-lists, online social networks or artificial intelligence. In this work, we present Check-It, a system that combines, in an intelligent way, a variety of signals into a pipeline for fake news identification. Check-It is developed as a web browser plugin with the objective of efficient and timely fake news detection, respecting the user's privacy. Experimental results show that Check-It is able to outperform the state-of-the-art methods. On a dataset, consisting of 9 millions of articles labeled as fake and real, Check-It obtains classification accuracies that exceed 99%.
cs.SI
cs
Check-It: A plugin for Detecting and Reducing the Spread of Fake News and Misinformation on the Web Demetris Paschalides, Chrysovalantis Christodoulou, Rafael Andreou, George Pallis, Marios D. Dikaiakos {dpasch01,cchris47,randre07,gpallis,mdd}@cs.ucy.ac.cy Computer Science Department, University of Cyprus Nicosia, Cyprus Alexandros Kornilakis, Evangelos Markatos {kornilak,markatos}@ics.forth.gr Department of Computer Science, University of Crete Heraklion, Crete, Greece 9 1 0 2 y a M 0 1 ] I S . s c [ 1 v 0 6 2 4 0 . 5 0 9 1 : v i X r a ABSTRACT Over the past few years, we have been witnessing the rise of mis- information on the Web. People fall victims of fake news during their daily lives and assist their further propagation knowingly and inadvertently. There have been many initiatives that are trying to mitigate the damage caused by fake news, focusing on signals from either domain flag-lists, online social networks or artificial intelli- gence. In this work, we present Check-It, a system that combines, in an intelligent way, a variety of signals into a pipeline for fake news identification. Check-It is developed as a web browser plugin with the objective of efficient and timely fake news detection, respecting the user's privacy. Experimental results show that Check-It is able to outperform the state-of-the-art methods. On a dataset, consisting of 9 millions of articles labeled as fake and real, Check-It obtains classification accuracies that exceed 99%. CCS CONCEPTS • Networks → Online social networks; • Computing method- ologies → Lexical semantics; Feature selection; Information ex- traction. KEYWORDS Web of Trust, Fake News Detection, News Content 1 INTRODUCTION Motivation and Problem: Misinformation is not a recent issue. As early as 1925, when news offices started to connect to each other via wire, the authenticity of information became a concern. Editors did not really know whether the news coming in through the wire was true or not. They could try to infer authenticity based on the source of the news, but still the concern remained: is this piece of news that just came over the wire true or not? Although the concern was there, the editors usually managed to find ways to mitigate it and reduce the intentional misinformation to the minimum possible: after all, the amount of news that came over the wire and could potentially Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. WI '19, October 14-17, 2019, Thessaloniki, Greece © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. ACM ISBN 978-1-4503-9999-9/18/06...$15.00 https://doi.org/10.1145/1122445.1122456 be misinformation was not that large. Unfortunately, the "tsunami" of social media engagement that has swept our lives over the past decade practically exploded the proliferation of misinformation including the associated distribution of fake news [2]. State of the Art and its Limitations: Despite the increasing interest in analyzing fake news in the Web and the development of tools to deal with fake news that had been previously identified, there has been very little work in automatic fake news detection tools. Currently people do not have the tools they need in order to filter out information they are not interested in. For example, if their friends share fake news from time to time, they do not have any way to tell the social media platform "I do not want the fake news my friends (probably) inadvertently propagate. Can you filter the fake news (not my friends!) out of my social feed? Or better yet, can you label the fake news as such? I will then do the filtering out." The main problem stems from the fact that it is difficult to develop classification algorithms to capture fake news. Researchers in [12] studied the feasibility of using a crowdsourcing platform to identify rumours and fake news in social media. According to their research outcomes, the annotators achieve high inter-annotator agreement. In [28], authors found that fake news posts in social media are usually provoking posts (i.e., tweets) from users who raise questions about these posts. In this direction, another approach that has been proposed is the development of browser plugins, such as the B.S. Detector1 and the FakerFact2, which flag content from fake news sources using a constantly-updated list of known fake news sites as a reference point. Approach and Contribution: The focus of our work is the de- tection of news content that is fabricated and can be verified to be false. In this paper, we present a plugin that fights disinformation using an automated approach. Our approach is inspired by the way we fight SPAM email messages. Indeed, to fight SPAM, computer scientists have developed SPAM filters: automated programs that scan all email messages of each user, categorize them as SPAM (trash email) or HAM (regular email) and filter the SPAM out of the users mailboxes. In this paper, we follow the exact same approach: we process all information (e.g. tweets, posts, web documents, etc.) that users see online and characterize them as misinformation or not. If we find misinformation we clearly label it so that the user will be warned that he should be careful before believing this current piece of news. For experimental studies, we have developed our system as a plug in for the popular web browsers, namely Google's Chrome and Mozilla's Firefox. However, our method is general and 1 http://bsdetecor.tech 2 https://www.fakerfact.org/ WI '19, October 14-17, 2019, Thessaloniki, Greece Paschalides et al. applicable to any browser. A key difficulty in our approach is to combine in an intelligent way a variety of signals in order to decide whether a piece of news is misinformation. Such signals include: the reputation of the person (account) posting the news, the repu- tation of the web site where the news is hosted, natural language processing features that characterize a fake news article etc. Using a deep learning approach, we combine all these features towards providing a rating that is timely and accurate. Another key aspect of our system is that it protects the privacy of user (GDPR compli- ant) since the plugin works locally on the user's browser without the need of external communication. We empirically evaluate our proposed method via extensive experiments on real-world datasets from Twitter and news articles, demonstrating that our approach significantly improves the performance on detecting and reducing the spread of fake news and misinformation on the Web. Specifi- cally, we showcase that our linguistic model, with the appropriate threshold, is able to achieve classification accuracies that exceed 99%. To evaluate our approach, we have trained our model with the Fake News Corpus which includes 9 million articles labeled as fake and real. To the best of our knowledge, this is the biggest corpus in the research community. Roadmap. The rest of this work is organized as follows. In Section 2 we describe related work from the literature. In Section 3 we describe our approach. In Section 4 we describe our experimental setup and detail the performance of our approach. In Section 5 we conclude this article. 2 RELATED WORK The task of fake news detection is similar to various other interest- ing challenges ranging from SPAM detection to rumor detection [12]. In recent years, researchers are seeking to better define and characterize misinformation and its place in the larger information ecosystem [19]. An important aspect of characterizing misinfor- mation is to understand how people perceive the credibility of information. People usually tend to believe news that confirm what they already know, or what they already believe to be true [24]. News that go contrary to their beliefs (no matter how true the news are), may be met with high degrees of resistance. Thus, presenting people with the facts does not necessarily change their minds - several people keep on believing the fake news. To make matters worse, repeating the fake news, even in the context of refuting them, just makes them stronger. Thus, it seems that we need to explore non-obvious approaches to fight misinformation [10]. Facebook is already partnering with fact-checking organizations. Facebook users are able to flag articles they suspect contain false information. These articles are then handed over to an independent evaluation centre. When a false story is identified, rather than being removed, it is tagged with a warning that it contains fake news and appears lower down in users feeds. Recently, Facebook will provide to social scientists unprecedented access to its data so that they can investigate how the spread of fake news on social media influences elections3. Another initiative aiming to help citizens make informed choices ahead of the 2017 French election is the First Draft News project CrossCheck, a collaborative verification programme involving technology firms including Facebook and 3https://www.nature.com/articles/d41586-019-01447-5 Google. The project sees journalists from across France working together to find and verify online content, including photos, videos, memes, comment threads and news sites. Similarly, Washington Post asked its readers to use the term "Fake News" so as to report the fake news. However, this term was used maliciously and it ended up being not so successful. Besides, some effort has also been done to detect fake news, including approaches that apply text- based methods[1] and fact-checking through knowledge graphs4. However, the current fact-checkers and crowdsourcing initiatives have limitations since they cannot cope with the high volume of misinformation generated online, and are usually disconnected from the Web browser, which is the medium used from users to read and share misinformation. A few early studies tried to detect fake news based on linguis- tic features extracted from the text of news stories [20],[21],[27]. Recent studies have also shown that social networking features play a very important role in detecting fake news [24]. Deep neural networks have been successfully applied to fake news detection [19],[20],[21]. Technical details regarding these approaches are presented in the evaluation section. However, all the existing ap- proaches are trying to solve the problem using only one signal of information (i.e., fact-checking web sites, linguistic features, social networking features). Most current studies on misinformation ei- ther focus on analysing the influence of the topology of the social network on the consumption and sharing of misinformation, or taking into account the linguistic characteristics. Also, most sys- tems tend to focus on the technical and not on the human aspects of the problem (i.e., the motivations of the users when generating and spreading misinformation). Our model is inspired from the SPAM detection research. Our system will assemble all sources of signal, and will combine them into one signal score. The score will reflect how confident we are that the story is fake (or not), and ex- plore relationships among news commentsfi topicality, temporality, sentiment, virality and quality. 3 CHECK-IT SYSTEM Check-It satisfies a series of user-centric functional requirements revolving around the user's data privacy, as listed below: • Preserve User Privacy: Check-It plugin should work lo- cally, on the user's web browser, without the need of external communication (i.e. a RESTful API). • Highly Confident Identification: Check-It labels a piece • Low Response Time: All the required resources, such as the flag-list and linguistic model, are efficiently loaded in the user's web browser. Also, the interconnected components of the plugin have been developed so as to have low response time. • Lightweight Computation: Asynchronous processing and parallelization is taken place so as to minimize the load of the plugin. of news as fake if it is highly confident about it. Thus, our main objective is: to provide a Web browser plugin that detects efficiently and timely the fake news articles respecting the user's privacy. 4http://www.breitbart.com/big-government/2017/08/23/ delingpole-all-of-recent-u-s-warming-has-been-faked-by-noaa Check-It: A plugin for Detecting Fake News and Misinformation on the Web WI '19, October 14-17, 2019, Thessaloniki, Greece Figure 1: Architectural diagram for the Check-It System. As depicted in Figure 1, Check-It system consists of four main components that function as a pipeline for fake news identification on the web. The Flag-list Matcher component matches domains of news articles to Known Fake News Domains and Fact Checks; the Fact Check Similarity component compares a piece of news against Known Fact Checked Articles labelled as fake from Fact Checking organizations, such as Politifact5 and Snopes6; the Online Social Network User Analysis component is responsible for analyzing user behavior in social networks and producing a User-Blacklist of fake news propagators; and lastly, the Linguistic Model component, an artificial intelligence model, has been trained on linguistic features, of the Fake News Corpus, for the detection of fake news articles. Check-It preserves the user's privacy, whilst providing the ap- propriate functionality and performance, by loading the required re- sources locally, on the user's device. These resources are combined in a Resource Package, which includes the Fake News Flag-lists, the Known Fact Checked Articles, the User-Blacklist and the binary- produced Linguistic Model. The Resource Package is available by the Check-It Server. The only communication between the Check-It Server and the user, is during the installation of the plugin, where the required resources are downloaded and installed on the user's end (user-blacklist, fake news flag-list, known fact checked articles, and linguistic model), and any critical updates on those resources. At the Check-It Plugin User Installment, the resources are loaded within the plugin, and assigned to their respective components. In addition to the Fact Check Similarity, Flag-list Matcher and User- Blacklist Checker, the Linguistic Model requires the features from the article's to be extracted. To this end, the JavaScript Feature Extraction Library was developed, responsible to capture the re- quired features from within the article, and use them as input to the Linguistic Model Binary. 3.1 Flag-list Matcher Some domain names are well known for spreading misinformation. Whether they do it on purpose, or for fun (such as satire), the infor- mation they provide is frequently not accurate and they should not be used as trusted sources of news. Currently there are several lists (which we call them flag-lists) with contain domain names that host sites known for spreading misinformation. These lists are typically established and maintained by researchers or volunteers whose aim is to warn Internet users by "flagging" information sources of dubious credibility. The "flagging" provides some explanation with respect to why a domain name is included in the flag-list. For exam- ple, the flag may be "fake news," which means that the site spreads misinformation, or "biased," which means that the site is known to promote a biased point of view. A non-exhaustive list of the flag- lists we have used includes Kaggle7, OpenSources8, Greek-Hoaxes9, and several others. Our system has been designed in order to be easily configurable with respect to the flag lists it takes into account. URL flag-lists and domain name checking is the simplest way for an initial, fast assessment of the trustworthiness of a news article. Unfortunately, flag-lists do not test the truthfulness of the article itself: they just comment on the reputation of the website publishing the article. In that respect, flag-lists can be very helpful as long as they identify sites that consistently engage in disinformation campaigns or in propaganda spreading, in which case they can easily flag articles hosted in dubious sites. Nevertheless, one might want to be able to reason about the credibility of articles hosted in dubious web sites. To further assess the validity of such articles we use (i) fact-checking web sites (section 3.2) and (ii) machine learning approaches (sections 3.3 and 3.4), as we describe below. 5https://www.politifact.com/ 6https://www.snopes.com/ 7https://www.kaggle.com/mrisdal/fake-news 8https://raw.githubusercontent.com/BigMcLargeHuge/opensources/master/sources/ sources.csv 9https://raw.githubusercontent.com/Ellinika-Hoaxes/Greek-Hoaxes-Detector/ master/data/data.json Online SocialNetwork User AnalysisLinguistic Model Training Fact CheckingSources KnownFactCheckedArticles UserBlacklistFake News Flag-listFakeNewsCorpusLinguisticModelBinaryOnline SocialNetworks Known Fake NewsDomainsResourcePackageJavaScript FeatureExtraction Library LinguisticModelBinaryFlag-list Matcher Fact CheckSimilarityUser-BlacklistChecker Fake News Flag-listKnownFactCheckedArticles UserBlacklistURL Entity User IDSuspiciousArticleOnline SocialNetworks Article's Domain Article's Content Article's Content Check-It ServerResource Package BuildCheck-It Plugin User Installment WI '19, October 14-17, 2019, Thessaloniki, Greece Paschalides et al. 3.2 Fact Check Similarity A number of Web sites currently in operation are dedicated to combating propaganda, misinformation, and hoaxes circulating on the Internet. These sites typically employ professional journalists (or even volunteers) who invest the time to research and comment on the truthfulness of articles shared on the web and on online social media, focusing primarily on evaluating the accuracy of articles or stories that become viral and receive increased user attention [22]. Once the truthfulness or falsehood of an article is established, these web sites publicize their findings and associated information (URL etc). Check-It capitalizes on fact-checking web sites, by cross checking every article processed by its plugin against a list of fact- checking web sites, generating an informative warning when an article happens to be found listed on these web sites. 3.3 Online Social Network User Analysis Since OSNs play an important role in the propagation of fake news [10], we have incorporated another signal in the Check-It toolkit. The idea behind the OSN signal is to provide a dynamic user-blacklist, matching user IDs with a falsity score, indicating the likelihood of a user to post fake news articles. The user-blacklist is dynamically generated by continuously processing OSN data and applying a DeGroot-based user probabilistic model [5] for the user falsity score calculation. DeGroot model is used since it introduces a simple mechanism of opinion propagation: every individual forms her opinion by averaging her own opinion with those of her friends. The process is repeated until all opinions converge. Although the mechanism is simple, it models sufficiently opinion diffusion and incorporates elaborate characteristics of the process [5]. Figure 2 presents the overall pipeline of the module and its components, which we describe in the next paragraphs. Figure 2: Architectural diagram for the social network sig- nal. The system design of Check-It facilitates integration with mul- tiple OSN platforms. Currently, we only support Twitter due its massive popularity and the ease-of-access to its data stream via the Twitter Streaming API10. In particular, our system consumes tweets from two sources: a) tweets from the general public and b) tweets containing URLs of known fake news domains. The output of the system is a User-Blacklist of fake news propagators. The Flag-list Matcher component is responsible to mark tweets that contain a URL entity and positively answer the following question: Does the URL originate from a suspicious domain? The tweets that have not been marked by the Flag-list Matcher are ordered in a timely manner and processed by the session-based model in groups of 1-hour sessions (Sessionizer task). A similar approach has been used in [24]. Then, each session is assigned to the Retweet Graph Generator, which is responsible for the creation of the retweet graph of the session. A retweet graph G = (V , E) consists of nodes u, v ∈ V depicting users and edges (u, v) ∈ E 10https://developer.twitter.com/en/docs/tweets/filter-realtime/overview (0) i representing the retweet action between users u and v. After the generation of the retweet graph, the User Probabilistic Model is applied in order to calculate the falsity score per user and produce the User-Blacklist. Initially, each user ui is assigned with a falsity score of p = 0. Next, we briefly present the user probabilistic model that is based on the DeGroot's Learning Model. Let A be the adjacency matrix of the retweet graph G. We have that A(u,v)=1 if u retweeted v. We create a transition matrix T by inverting the edges in A (as the influence flows from the retweeted user to the user who retweeted him or her), adding a self-loop to each of the nodes and then normalizing each row in A so it sums to 1 (meaning that each user is equally influenced by every user he or she retweets). Matrix T includes the weight a node adds on another based on the sharing of fake news articles. We then associate a = 1 to every user who posted a suspicious tweet falsity score p = 0 to all who did not. Lastly, we create new scores p(t) and p using the updating rule p(t) = T · p(t − 1). In summary, the falsity score of a user increases if that user posts or retweets a suspicious tweet (a tweet that contains a URL from the flag-list). (0) i (0) i 3.4 Linguistic Model The linguistic component analyzes the actual content of the news article. Check-It extracts from an article's headline and body spe- cific linguistic features, which have been widely used to detect fake news [7, 17, 25]. These features are used as input to a Deep Neural Network (DNN), which has been trained to predict the article's veracity. Rather than traditional machine learning, the deep learn- ing approach was used due to the performance amplification it can achieve in the detection of fake news [19, 26] as well as in other problems addressed with artificial intelligence techniques. Next, we present an overview of the article dataset, the different linguistic features, and the DNN model. 3.4.1 Dataset Overview. Online news articles can be collected from different sources, such as news agency homepages, search engines, and social media websites. However, the manual determination of the veracity of news is a challenging task, usually requiring annotators with domain expertise. Check-It makes use of Fake News Corpus11, an open source dataset composed of 9 million news articles. These articles originate from a curated list of 1001 domains collected from opensources.co. The entries are divided into 12 groups: fake news, satire, extreme bias, conspiracy theory, rumor mill, state news, junk science, hate news, clickbait, political, and credible. In the scope of Check-It, we focus solely on the fake news and credible categories of the dataset, consisting of 1 million and 2 million articles respectively. As the dataset describes, fake news is considered when originating from "sources that entirely fabricate information, disseminate deceptive content, or grossly distort actual news reports", whereas credible are "sources that circulate news and information in a manner consistent with traditional and ethical practices in journalism". Linguistic Features. Fake news detection on traditional news 3.4.2 media mainly relies on news content, such as the headline and the body of an article. We compute different linguistic features that can 11https://github.com/several27/FakeNewsCorpus Flag-list FilteredTweetsGeneralTweetsTweetsFake News MatcherSessionizer Retweet GraphGeneratorUserProbabilisticModelUser-Blacklist Check-It: A plugin for Detecting Fake News and Misinformation on the Web WI '19, October 14-17, 2019, Thessaloniki, Greece be found in the headline and body of articles, in order to extract discriminative characteristics for the detection of fake news. These features are extracted and fed to the DNN model via the JavaScript Feature Extraction Library at Check-It plugin User Installment (Figure 1. We group these features into 3 broad categories: stylistic, complexity and psychological. Stylistic Features: These are based on natural language pro- cessing to understand the syntax and text style of each article body and headline. Text style features include the frequency of stop- words, punctuation, quotes, negations and words that appear in all capital letters, whereas syntactical features include the frequency of Part-of-Speech tags in the text. Complexity Features: These are based on deeper natural lan- guage processing computations aiming at capturing the overall intricacy of an article or headline. This intricacy can be computed based on several word-level metrics that include readability indexes and vocabulary richness. Specifically, we compute the Gunning Fog, SMOG Grade, and Flesh-Kincaid grade level readability indexes. Each measure computes a grade level reading score based on the number of complex words (e.g. over 3 syllables). A higher index means a document takes a higher education level to read. Moreover, we compute the Type-Token Ratio, which can be defined as the number of unique words divided by the total number of words in the article. In order to capture the vocabulary richness of the content, we also compute the number of hapax legomenon and dis legomenon, which correspond to phrase that occurs only once and twice within a context. Psychological Features: The psychological features are based on the count of words found in expert dictionaries that are asso- ciated with different psychological processes. These dictionaries include the negative and positive opinion lexicon [11], and the moral foundation dictionary [4]. The sentiment score is computed via the AFINN sentiment lexicon [13], a list of English terms man- ually rated for valence. The AFINN sentiment score is defined as an integer number between -5 and +5, indicating the negative and positive score respectively. Feature Selection. The stylistic, complexity and psychologi- 3.4.3 cal features are extracted from both the headline and body of the articles in the dataset, summing in 534 features. Such a large num- ber of features results in an extensive model and deem the local execution as inadequate. In addition, unnecessary features can have side-effects during the model's training, decreasing training speed, model's interpretability, and generalization performance. In order to mitigate these issues, we proceed with a feature selection process to capture the 20 most descriptive features that facilitate the classi- fication of news articles into fake or reliable. Below, we describe the feature selection process that is applied: (1) Missing Values: Remove features with a high percentage of missing values e.g. 60%. Such features are not useful for the classification tasks as they do not carry any information, and can also affect the performance of the model. (2) Single Unique Values: Remove features with a single unique value, which have zero variance and have no contribution to the training of the model. (3) Collinear Features: Remove highly correlated features, which may lead to decreased generalization performance on the test set due to high variance and less model interpretability. These features are selected based on a specified correlation coefficient value (i.e., Pearson correlation coefficient). (4) Zero Importance: Calculate the importance of the remain- ing features according to a gradient boosting decision tree model, and remove features with zero importance. (5) Low Importance: This step builds on the feature impor- tance calculated in step (4), and its task is to remove features with low importance as they do not contribute to the to- tal predefined importance. Principal Components Analysis (PCA) is used, keeping only the required principal compo- nents so as to retain a certain percentage of the variance (i.e, 95%). The above feature selection process resulted in removing 134 fea- tures. From the remainder, the 20 most important were selected based on their importance scores, as extracted from step (4) (Table 1). These include the average number of stop-words in a sentence, the ratio of uppercase letters in the headline and the AFINN sentiment score. No. Feature 1 2 Total number of lines Avg. number of stop-words per sen- tence Ratio of uppercase letters Ratio of uppercase letters Avg. number of uppercase words per sentence Avg. number of characters per word Ratio of alphabetic letters Number of proper nouns (NP) Avg. number of sentences beginning with lowercase letter Avg. AFINN sentiment score Total number of characters Ratio of digits Avg. number of sentences beginning with uppercase letter Ratio of alphabetic letters Number of genitive markers (POS) Number of colon or ellipsis Total number of words beginning with uppercase letter Number of colon or ellipsis Avg. number of characters per word Avg. number of stop-words per sen- tence 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Score 0.0693 0.0185 Type Body Body 0.0177 Headline 0.0152 0.0142 Headline Body Body 0.0141 0.0139 Headline 0.0128 0.0126 Body Body Body 0.0123 0.0122 Headline 0.0122 0.0122 Body Body Body Body 0.0119 0.0116 0.0116 Headline 0.0113 Body Body 0.0102 0.0096 Headline 0.0094 Headline Table 1: Table with the 20 most important features as re- sulted from the feature selection process. 3.4.4 Deep Neural Network Model. Similar to the linguistic feature selection, the proposed DNN model is compliant to the functional requirements set at the beginning of the project. It is a prerequisite WI '19, October 14-17, 2019, Thessaloniki, Greece Paschalides et al. that the model is compatible with conventional user devices and modern web browsers, as it is available as a traditional web browser plugin. Additional requirements are the low response time, light- weight computations and high confidence for the output. In order to address these challenges, the proposed DNN model adopts the cone- like structure, referred to as the bottleneck principle, and is known to perform well with numerical features [6, 23]. The structure of the model is depicted in Figure 3. Before feeding the data into the DNN model, any categorical data are transformed into numerical, either via discretization or one-hot encoding, depending on the particulars of the input. As a result, each data entry is represented as a vector of numerical features. After the pre-processing, the data is used as input to the DNN model via the model's input layer. The next layer is a Batch Normalization Layer [8] which is re- sponsible for the normalization of the activations of the previous layer (input layer) at each batch. Neural networks work better when the input data have zero mean and unit variance, as this enables faster learning and higher overall accuracy. A Batch Normaliza- tion Layer can achieve this by transforming and maintaining the mean and variance of its input close to zero. Next, the normalized output enters a set of fully connected layers (dense layers) that form the bottleneck. Such a bottleneck has been shown to result in automatic construction of high-level features. In our implemen- tation, we experimented with multiple architectures, settling in a sequence of 5 layers that consist of 512, 256, 128, 64 and 32 neurons respectively. The final sequence is the one that provided the best results in our task. The units of the network are activated using the hyperbolic tangent activation function (tanh) since it is a better fit when working with standardized numerical data. Finally, in the DNN model's classification layer, one neuron per class is used with the softmax activation function to produce the probability pair of Pr eal and Pf ake, which correspond to the probability of the article being real or fake respectively. Figure 3: Architectural diagram for the deep neural network model used in the linguistic component. 4 EVALUATION For the evaluation of the Check-It plugin, we focus on the linguis- tic model and the user-blacklist generated by the Online Social Network User Analysis component. The Fake News Flag-lists and Known Fact Checked Articles are left out of the system evaluation since they provide us with 100% accurate results. The task of these components is to transfer facts from the knowledge experts, such as the news site reviewers, from which the curated list of fake news domains was collected, and fact checking organizations consisting of journalists, reporters and experts from related fields. 4.1 Linguistic Model Evaluation For the implementation of the linguistic model presented in Section 3.4, Python Keras12 has been used with Tensorflow13 as back-end. The training epochs for the model have been fixed at 100 with mini-batches of 128. During training, categorical cross-entropy [3] has been used as loss function and Adam [9] as the optimization function. Îďo prevent the model from over-fitting, an early stop- ping mechanism has been used. Early stopping is responsible for interrupting the training if the validation loss does not drop for 10 consecutive epochs. All the experiments were run in a stratified 3-fold cross validation, and executed on a Virtual Machine with Ubuntu 16.4, 16 VCPUs and 32GB of RAM. For the different param- eters and the sake of training time, we also used Google's Colab14, a 12 hour free subscription to a Google Cloud VM with 13 GB of RAM and a Tesla K80 GPU. Finally, in order to be compatible with the user's internet browser, the model was exported with Tensor- flow JS15. Tensorflow JS is a library for developing, training and exporting deep learning models in JavaScript, and deploying in the web browser. We compared our system against 3 state-of-the-art works [15, 20, 21]. Note that for a fair comparison we chose baselines that only consider news contents, similar to our approach.The selected datasets include Buzzfeed News (BF) and Politifact (PF), which are publicly available in the authors Github16 repository. For evaluation metrics, we use accuracy, precision, recall and F1 score. Shu et al. 2018 [21] utilize the BF and PF datasets in their work. The authors extracted news content features based on a combi- nation of the vector space model and rhetorical structure theory (RST) [18] and the Linquistic Inquiry and Word Count (LIWC) lex- icon [14], a widely used bundle of lexicons, that are able extract psycholignuistic features to capture deception within the articles. These features were used to train two separate SVM classifiers, namely SV MRST and SV MLIW C. Furthermore, Shu et al. 2018b [20], utilize the GC and PF datasets to train several models, in- cluding an SVM, Logistic Regression (LR), Naive Bayes (NB) and a Convolutional Neural Network (CNN), focusing on one-hot vec- tor representation of the data. Potthast et al. [15] train 4 different Random Forest (RF) classifiers that consider the style and topic of the articles, 2 of them being generic, namely GRFST Y LE and GRFT OP IC, and 2 of them considering the political orientation of the articles, namely ORFST Y LE and ORFT OP IC. The authors utilize the BF dataset, having information regarding the article's political orientation. Next, we present the overall results of the state-of-the-art and compare them with the performance of our model. Table 2 presents the results of the BF dataset and Table 3 presents the results of the PF dataset. As displayed in Tables 2 and 3, Check-It linguistic model outperforms the state-of-the-art works. Our DNN, based on the deep learning paradigm, does not depend on handcrafted features, it rather generates abstract features, able to better capture the writing style of fake news [16]. 12https://keras.io/ 13https://www.tensorflow.org/ 14https://colab.research.google.com/ 15https://www.tensorflow.org/js 16https://github.com/KaiDMML/FakeNewsNet/tree/master/dataset Input LayerBatch Normalization LayerDense Layer512 NeuronsDense Layer256 NeuronsDense Layer128 NeuronsDense Layer 64 NeuronsDense Layer32 NeuronsClassification LayerPrealPfake Check-It: A plugin for Detecting Fake News and Misinformation on the Web WI '19, October 14-17, 2019, Thessaloniki, Greece Model Reference Acc. Shu et al. 2018 [21] SV MLIW C 0.610 0.655 SV MRST GRFST Y LE 0.550 GRFT OP IC 0.520 ORFST Y LE 0.550 ORFT OP IC 0.580 F1 0.555 0.623 0.520 0.510 0.535 0.560 Check-It Model DN N 0.703 0.713 0.703 0.700 Table 2: Overall results on the comparison with the state-of- the-art for the Buzzfeed News (BF) dataset. R 0.561 0.628 0.525 0.515 0.540 0.555 P 0.602 0.683 0.520 0.515 0.535 0.555 Potthast et al. [15] Reference Shu et al. 2018 [21] F1 Acc. Model 0.544 0.571 SV MRST 0.615 SV MLIW C 0.637 0.659 0.580 SV M 0.633 0.642 LR 0.651 0.617 N B 0.629 0.583 CN N Check-It Model 0.722 0.725 0.725 0.722 DN N Table 3: Overall results on the comparison with the state-of- the-art for the Politifact (PF) dataset. R P 0.533 0.595 0.667 0.621 0.611 0.717 0.757 0.543 0.630 0.674 0.807 0.456 Shu et al. 2018b [20] million tweets contained URLs from known fake news domains. In terms of user accounts, we processed a total of 8.1 million unique users. The users are categorized, based on their calculated falsity score, into users with low score [0-0.25), medium score [0.25-0.50), high score [0.50-0.75) and ultra high score [0.75-1.0). As we move from a low score to an ultra high score, the probability of a user, to disseminate a fake article, is increased. Taking into account the daily tweeting frequencies of the users in each group, we compared them with the frequencies of tweets containing URLs of known fake news domains (fake URLs). Figure 6 depicts the frequencies of all the tweets and the tweets containing fake URLs. We see that users falling into the low falsity group have a large overall tweeting frequency with low frequency of tweets with fake URLs. Medium and high falsity groups present a rise on the frequency of tweets containing fake URLs. Users with ultra high falsity score seem to have lower overall frequency, but rather high frequency of tweets with fake URLs. Thus, the User-Blacklist consists of the users from the ultra high falsity group. The datasets used for this experiment was to merely compare our model to the existing state-of-the-art models. Training our model with datasets of a few hundred records like the above, does not meet the expectations of deep learning [3]. Thus, as described in Section 3.4.1, we trained on Fake News Corpus, a dataset with millions of articles from domains, labelled as fake and real. Our model is able to achieve an accuracy of 0.930, as well as 0.940 Precision, 0.937 Recall, and 0.937 F1 score. 4.1.1 Optimization. Despite the promising results, an error margin of 0.07 still exists. In order to reduce the error margin, we examined the number of false positives (FP) and true negatives (TN). Figure 5 depicts the number of FP and TN as a function of the threshold, starting from 0.50 to 0.99 with step of 0.01. To achieve the maximum confidence, we chose the threshold to be 0.99, which resulted to 0 FP (Figure 4). To test the generalization of our model and the per- formance with the adjusted threshold, an additional evaluation was made on several authoritative articles from news sources including "The Guardian", "New York Times", CNN and BBC. Specifically, 1158 articles were used as input to the DNN model with the adjusted threshold, from which only a single article was miss-classified as fake. 4.2 Online Social Network User Analysis Evaluation The task of Online Social Network User Analysis component is to build the User-Blacklist that includes the users that disseminate misinformation through social media. Our evaluation took place the time period from October 31st 2018 to December 2nd 2018, where we processed a total of 150 million tweets, from which 30 Figure 4: Confusion matrix of default classifications and classifications with threshold. Figure 5: Number of False Positives and True Negatives as Function of Threshold FakeReliableFakeFakeTReliableReliableTTruePredictedConfusion Matrix of Fake and Reliable ClassificationsDefault Classifications vs. Classifications with Threshold465017383493262367046325000 0 1000 2000 3000 4000 5000 6000 7000 0 1000 2000 3000 4000 5000 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1Number of ArticlesThreshold ValueNumber of False Positives and True Negatives as Function of ThresholdFalse PositivesTrue Negatives WI '19, October 14-17, 2019, Thessaloniki, Greece Paschalides et al. [10] David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Penny- cook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein, Emily A. Thorson, Duncan J. Watts, and Jonathan L. Zittrain. 2018. The science of fake news. Science 359, 6380 (2018), 1094 -- 1096. https://doi.org/10.1126/science. aao2998 arXiv:https://science.sciencemag.org/content/359/6380/1094.full.pdf [11] Bing Liu, Minqing Hu, and Junsheng Cheng. 2005. Opinion Observer: Analyzing and Comparing Opinions on the Web. In Proceedings of the 14th International Conference on World Wide Web (WWW '05). ACM, New York, NY, USA, 342 -- 351. https://doi.org/10.1145/1060745.1060797 [12] Richard McCreadie, Craig Macdonald, and Iadh Ounis. 2015. Crowdsourced Ru- mour Identification During Emergencies. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion). ACM, New York, NY, USA, 965 -- 970. https://doi.org/10.1145/2740908.2742573 [13] Finn Årup Nielsen. 2011. A new Evaluation of a word list for sentiment analysis in microblogs. CoRR abs/1103.2903 (2011). arXiv:1103.2903 http://arxiv.org/abs/ 1103.2903 [14] James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. 2015. The development and psychometric properties of LIWC2015. Technical Report. [15] Martin Potthast, Johannes Kiesel, Kevin Reinartz, Janek Bevendorff, and Benno Stein. 2017. A Stylometric Inquiry into Hyperpartisan and Fake News. CoRR abs/1702.05638 (2017). arXiv:1702.05638 http://arxiv.org/abs/1702.05638 [16] Hannah Rashkin, Eunsol Choi, Jin Yea Jang, Svitlana Volkova, and Yejin Choi. 2017. Truth of Varying Shades: Analyzing Language in Fake News and Political Fact- Checking. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Copenhagen, Denmark, 2931 -- 2937. https://doi.org/10.18653/v1/D17-1317 [17] Victoria Rubin, Niall Conroy, Yimin Chen, and Sarah Cornwell. 2016. Fake News or Truth? Using Satirical Cues to Detect Potentially Misleading News. In Proceedings of the Second Workshop on Computational Approaches to Deception Detection. Association for Computational Linguistics, San Diego, California, 7 -- 17. https://doi.org/10.18653/v1/W16-0802 [18] Victoria L. Rubin and Tatiana Lukoianova. [n. d.]. Truth and deception at the rhetorical structure level. Journal of the Association for Information Sci- ence and Technology 66, 5 ([n. d.]), 905 -- 917. https://doi.org/10.1002/asi.23216 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/asi.23216 [19] Natali Ruchansky, Sungyong Seo, and Yan Liu. 2017. CSI: A Hybrid Deep Model for Fake News Detection. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (CIKM '17). ACM, New York, NY, USA, 797 -- 806. https://doi.org/10.1145/3132847.3132877 [20] Kai Shu, Deepak Mahudeswaran, Suhang Wang, Dongwon Lee, and Huan Liu. 2018. FakeNewsNet: A Data Repository with News Content, Social Context and Dynamic Information for Studying Fake News on Social Media. CoRR abs/1809.01286 (2018). arXiv:1809.01286 http://arxiv.org/abs/1809.01286 [21] Kai Shu, Suhang Wang, and Huan Liu. 2017. Exploiting Tri-Relationship for Fake News Detection. CoRR abs/1712.07709 (2017). [22] James Thorne and Andreas Vlachos. 2018. Automated Fact Checking: Task Formulations, Methods and Future Directions. In Proceedings of the 27th Interna- tional Conference on Computational Linguistics. Association for Computational Linguistics, Santa Fe, New Mexico, USA, 3346 -- 3359. [23] Naftali Tishby and Noga Zaslavsky. 2015. Deep Learning and the Information Bottleneck Principle. CoRR abs/1503.02406 (2015). arXiv:1503.02406 http://arxiv. org/abs/1503.02406 [24] Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science 359, 6380 (2018), 1146 -- 1151. https://doi.org/10.1126/science. aap9559 arXiv:https://science.sciencemag.org/content/359/6380/1146.full.pdf [25] Yafang Wang, Gerard de Melo, and Gerhard Weikum. 2018. Five Shades of Untruth: Finer-Grained Classification of Fake News. 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2018), 593 -- 594. [26] Yaqing Wang, Fenglong Ma, Zhiwei Jin, Ye Yuan, Guangxu Xun, Kishlay Jha, Lu Su, and Jing Gao. 2018. EANN: Event Adversarial Neural Networks for Multi- Modal Fake News Detection. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &#38; Data Mining (KDD '18). ACM, New York, NY, USA, 849 -- 857. https://doi.org/10.1145/3219819.3219903 [27] Amy X. Zhang, Aditya Ranganathan, Sarah Emlen Metz, Scott Appling, Con- nie Moon Sehat, Norman Gilmore, Nick B. Adams, Emmanuel Vincent, Jen- nifer Lee, Martin Robbins, Ed Bice, Sandro Hawke, David Karger, and An Xiao Mina. 2018. A Structured Response to Misinformation: Defining and Annotat- ing Credibility Indicators in News Articles. In Companion Proceedings of the The Web Conference 2018 (WWW '18). International World Wide Web Confer- ences Steering Committee, Republic and Canton of Geneva, Switzerland, 603 -- 612. https://doi.org/10.1145/3184558.3188731 [28] Zhe Zhao, Paul Resnick, and Qiaozhu Mei. 2015. Enquiring Minds: Early Detec- tion of Rumors in Social Media from Enquiry Posts. In Proceedings of the 24th International Conference on World Wide Web (WWW '15). International World Wide Web Conference, Republic and Canton of Geneva, Switzerland, 1395 -- 1405. Figure 6: Tweeting frequencies of users that Check-It as- signed "Low", "Medium", "High" and "Ultra High" falsity scores. 5 CONCLUSION In this paper, we presented Check-It, a fake news detection system, developed as a web browser plugin. Check-it aims to take a bold step towards detecting and reducing the spread of misinformation on the Web. To do so, it empowers its users with the tools they need to identify fake news. The major challenge of fake news detection stems from newly emerged news on which existing approaches only showed unsatisfactory performance. In order to address this issue, we propose a pipeline based on a variety of signals, ranging from domain name flag-lists to deep learning approaches. Extensive experiments showcase that Check-It is effective and can outperform the state-of-the-art models. ACKNOWLEDGMENTS This work is supported by the Google DNI grant (Check-it). REFERENCES [1] Niall J. Conroy, Victoria L. Rubin, and Yimin Chen. 2015. Automatic Deception Detection: Methods for Finding Fake News. In Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Commu- nity (ASIST '15). American Society for Information Science, Silver Springs, MD, USA, Article 82, 4 pages. http://dl.acm.org/citation.cfm?id=2857070.2857152 [2] Miriam Fernandez and Harith Alani. 2018. Online Misinformation: Challenges and Future Directions. In Companion Proceedings of the The Web Conference 2018 (WWW '18). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, 595 -- 602. https://doi.org/10.1145/ 3184558.3188730 [3] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org. [4] Jesse Graham, Jonathan Haidt, and Brian Nosek. 2009. Liberals and Conservatives Rely on Different Sets of Moral Foundations. Journal of personality and social psychology 96 (06 2009), 1029 -- 46. https://doi.org/10.1037/a0015141 [5] Morris H. DeGroot. 1974. Reaching a Consensus. J. Amer. Statist. Assoc. 69 (03 1974), 118 -- 121. https://doi.org/10.2307/2285509 [6] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. CoRR abs/1512.03385 (2015). arXiv:1512.03385 http://arxiv.org/abs/1512.03385 [7] Benjamin D. Horne and Sibel Adali. 2017. This Just In: Fake News Packs a Lot in Title, Uses Simpler, Repetitive Content in Text Body, More Similar to Satire than Real News. CoRR abs/1703.09398 (2017). arXiv:1703.09398 http: //arxiv.org/abs/1703.09398 [8] Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. CoRR abs/1502.03167 (2015). arXiv:1502.03167 http://arxiv.org/abs/1502.03167 [9] Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimiza- tion. CoRR abs/1412.6980 (2014). arXiv:1412.6980 http://arxiv.org/abs/1412.6980 Daily Tweet Frequencies of Users - Overall Frequencies vs. Fake URLs 1 10 100 1000 0 5 10 15 20 25Tweet FrequenciesNumber of Users Users with Low Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with High Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with Medium Falsity ScoreOverallFake URLs 1 10 100 0 5 10 15 20 25 Users with Ultra High Falsity ScoreOverallFake URLs
1102.5046
3
1102
2013-01-02T23:59:15
An In-Depth Analysis of Stochastic Kronecker Graphs
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
Graph analysis is playing an increasingly important role in science and industry. Due to numerous limitations in sharing real-world graphs, models for generating massive graphs are critical for developing better algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the foundation of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization. Our goal is to provide a deeper understanding of the parameters and properties of this model so that its functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to most social networks and other real graphs) for common parameter choices.
cs.SI
cs
An In-Depth Analysis of Stochastic Kronecker Graphs C. SESHADHRI, Sandia National Laboratories ALI PINAR, Sandia National Laboratories TAMARA G. KOLDA, Sandia National Laboratories Graph analysis is playing an increasingly important role in science and industry. Due to numerous limita- tions in sharing real-world graphs, models for generating massive graphs are critical for developing better algorithms. In this paper, we analyze the stochastic Kronecker graph model (SKG), which is the founda- tion of the Graph500 supercomputer benchmark due to its favorable properties and easy parallelization. Our goal is to provide a deeper understanding of the parameters and properties of this model so that its functionality as a benchmark is increased. We develop a rigorous mathematical analysis that shows this model cannot generate a power-law distribution or even a lognormal distribution. However, we formalize an enhanced version of the SKG model that uses random noise for smoothing. We prove both in theory and in practice that this enhancement leads to a lognormal distribution. Additionally, we provide a precise analysis of isolated vertices, showing that the graphs that are produced by SKG might be quite different than intended. For example, between 50% and 75% of the vertices in the Graph500 benchmarks will be isolated. Finally, we show that this model tends to produce extremely small core numbers (compared to most social networks and other real graphs) for common parameter choices. Categories and Subject Descriptors: D.2.8 [Software Engineering]: Metrics -- complexity measures, per- formance measures; E.1 [Data]: Data Structures -- Graphs and Networks General Terms: Algorithms, Theory Additional Key Words and Phrases: graph models, R-MAT, Stochastic Kronecker Graphs (SKG), Graph500 1. INTRODUCTION The role of graph analysis is becoming increasingly important in science and industry be- cause of the prevalence of graphs in diverse scenarios such as social networks, the Web, power grid networks, and even scientific collaboration studies. Massive graphs occur in a variety of situations, and we need to design better and faster algorithms in order to study them. However, it can be difficult to access to informative large graphs in order to test our algorithms. Companies like Netflix, AOL, and Facebook have vast arrays of data but cannot share it due to legal or copyright issues1. Moreover, graphs with billions of vertices cannot be communicated easily due to their sheer size. As was noted in [Chakrabarti and Faloutsos 2006], good graph models are extremely important for the study and algorithmics of real networks. Such a model should be fairly easy to implement and have few parameters, while exhibiting the common properties of real networks. Furthermore, models are needed to test algorithms and architectures designed for large graphs. But the theoretical and research benefits are also obvious: gaining insight into the properties and processes that create real networks. The stochastic Kronecker graph (SKG) [Leskovec and Faloutsos 2007; Leskovec et al. 2010], a generalization of the recursive matrix (R-MAT) model [Chakrabarti et al. 2004], 1For example, Netflix opted not to pursue the Netflix Prize sequel due to concerns about lawsuits; see http://blog.netflix.com/2010/03/this-is-neil-hunt-chief-product-officer.html This work was funded by the applied mathematics program at the United States Department of Energy and performed at Sandia National Laboratories, a multiprogram laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Author's addresses: C. Seshadhri, A. Pinar, T. Kolda, Sandia National Laboratories, Livermore, CA 94551. 3 1 0 2 n a J 2 ] I S . s c [ 3 v 6 4 0 5 . 2 0 1 1 : v i X r a A:2 C. Seshadhri, A. Pinar, T. G. Kolda has been proposed for these purposes. It has very few parameters and can generate large graphs quickly. Indeed, it is one of the few models that can generate graphs fully in parallel. It has been empirically observed to have interesting real-network-like properties. We stress that this is not just of theoretical or academic interest -- this model has been chosen to create graphs for the Graph500 supercomputer benchmark [Graph500 Steering Committee 2012]. It is important to know how the parameters of this model affect various properties of the graphs. We stress that a mathematical analysis is important for understanding the inner working of a model. We quote Mitzenmacher [Mitzenmacher 2006]: "I would argue, however, that without validating a model it is not clear that one understands the underlying behavior and therefore how the behavior might change over time. It is not enough to plot data and demonstrate a power law, allowing one to say things about current behavior; one wants to ensure that one can accurately predict future behavior appropriately, and that requires understanding the correct underlying model." 1.1. Notation and Background We explain the SKG model and notation. Our goal is to generate a directed graph G = (V, E) with n = V nodes and m = E edges. The general form of the SKG model allows for an arbitrary square generator matrix and assumes that n is a power of its size. Here, we focus on the 2 × 2 case (which is equivalent to R-MAT), defining the generating matrix as (cid:20)t1 t2 (cid:21) where ⊗ denotes the Kronecker product operation. In practice, the matrix P is never formed explicitly. Instead, each edge is inserted as follows. Divide the adjacency matrix into four quadrants, and choose one of them with the corresponding probability t1, t2, t3, or t4. Once a quadrant is chosen, repeat this recursively in that quadrant. Each time we iterate, we end up in a square submatrix whose dimensions are exactly halved. After (cid:96) iterations, we reach a single cell of the adjacency matrix, and an edge is inserted. It should be noted that here we take a slight liberty in requiring the entries of T to sum to 1. In fact, the SKG model as defined in [Leskovec et al. 2010] works with the matrix mP , which is considered the matrix of probabilities for the existence of each individual edge (though it might be more accurate to think of it as an expected value). Note that all edges can be inserted in parallel. This is one of the major advantages of the SKG model and why it is appropriate for generating large supercomputer benchmarks. For convenience, we also define some derivative parameters that will be useful in subse- quent discussions. We let ∆ = m/n denote the average degree and let σ = t1 + t2 − 0.5 denote the skew. The parameters of the SKG model are summarized in Table I. 1.2. Our Contributions Our overall contribution is to provide a thorough study of the properties of SKG and show how the parameters affect these properties. We focus on the degree distribution, the number of (non-isolated nodes), the core sizes, and the trade-offs in these various goals. We give rigorous mathematical theorems and proofs explaining the degree distribution of SKG, a noisy version of SKG, and the number of isolated vertices. T = t3 t4 with t1 + t2 + t3 + t4 = 1 and min i ti > 0. We assume that n = 2(cid:96) for some integer (cid:96) > 0. For the sake of cleaner formulae, we assume that (cid:96) is even in our analyses. Each edge is inserted according to the probabilities defined by P = T ⊗ T ⊗ ··· ⊗ T , (cid:124) (cid:123)(cid:122) (cid:96) times (cid:125) Improving Stochastic Kronecker Graphs A:3 Table I: Parameters for SKG models Primary Parameters (cid:20)t1 t2 (cid:21) t3 t4 -- T = = generating matrix with t1 + t2 + t3 + t4 = 1 -- (cid:96) = number of levels (assumed even for analysis) -- m = number of edges Derivative Parameters -- n = 2(cid:96) = number of nodes -- ∆ = m/n = average degree -- σ = t1 + t2 − 0.5 = skew (1) Degree distribution: We provide a rigorous mathematical analysis of the degree distribution of SKG. The degree distribution has often been claimed to be power-law, or sometimes lognormal [Chakrabarti et al. 2004; Leskovec et al. 2010; Kim and Leskovec 2010]. Kim and Leskovec [Kim and Leskovec 2010] prove that the degree distribution has some lognormal characteristics. Groer et al. [Groer et al. 2011] give exact series expansions for the degree distribution, and express it as a mixture of normal distributions. This provides a qualitative explanation for the oscillatory behavior of the degree distribution (refer to Figure 1). Since the distribution is quite far from being truly lognormal, there has been no simple closed form expression that closely approximates it. We fill this gap by providing a complete mathematical description. We prove that SKG cannot generate a power law distri- bution, or even a lognormal distribution. It is most accurately characterized as fluctuating between a lognormal distribution and an exponential tail. We provide a simple formula that approximates the degree distribution. (2) Noisy SKG: It has been mentioned in passing [Chakrabarti et al. 2004] that adding noise to SKG at each level smoothens the degree distribution, but this has never been formal- ized or studied. We define a specific noisy version of SKG (NSKG). We prove theoretically and empirically that NSKG leads to a lognormal distribution. (We give some experimen- tal results showing a naive addition of noise does not work.) The lognormal distribution is important since it has been observed in real data [Bi et al. 2001; Pennock et al. 2002; Mitzenmacher 2003; Clauset et al. 2009]. One of the major benefits of our enhancement is that only (cid:96) additional random numbers are needed in total. Using Graph500 parame- ters, Figure 1 plots the degree distribution of a (standard) SKG and NSKG for two levels of (maximum) noise. We can clearly see that noise dampens the oscillations, leading to a lognormal distribution. We note that though the modification of NSKG is straightforward, the reason why it works is not. It involves an intricate mathematical analysis, which may be of theoretical interest in itself. (3) Isolated vertices: An isolated vertex is one that has no edges incident to it (and hence is not really part of the output graph). We provide a formula that accurately estimates the fraction of isolated vertices. We discover the surprising result that in the Graph500 benchmark graphs, 50-75% vertices are isolated; see Table II. This is a major concern for the benchmark, since the massive graph generated has a much reduced size. Furthermore, the average degree is now much higher than expected. (4) Core numbers: The study of k-cores is an important tool used to study the structure of social networks because it is a mark of the connectivity and special processes that generate these graphs [Chakrabarti and Faloutsos 2006; Kumar et al. 2010; Alvarez-Hamelin et al. 2008; Gkantsidis et al. 2003; Goltsev et al. 2006; Carmi et al. 2007; Andersen and Chellapilla 2009]. We empirically show how the core numbers have unexpected correlations with SKG parameters. We observed that for most of the current SKG parameters used for modeling A:4 C. Seshadhri, A. Pinar, T. G. Kolda Fig. 1: Comparison of degree distributions (averaged over 25 instances) for SKG and two noisy variations, using the T from the Graph500 Benchmark parameters with (cid:96) = 16. Table II: Expected percentage of isolated vertices and repeat edges, along with average degree of non-isolated nodes for the Graph500 benchmark. Excluding the isolated vertices results in a much higher average degree than the value of 16 that is specified by the bench- mark. (cid:96) % Isolated Nodes % Repeat Edges Avg. Degree 26 29 32 36 39 42 1.2 0.7 0.4 0.2 0.1 0.1 51 57 62 67 71 74 32 37 41 49 55 62 real graphs, max core numbers are extremely small (much smaller than most corresponding real graphs). We show how modifying the matrix T affects core numbers. Most strikingly, we observe that changing T to increase the max core number actually leads to an increase in the fraction of isolated vertices. 1.3. Influence on Graph500 benchmark Our results have been communicated to the Graph500 steering committee, who have found them useful in understanding the Graph500 benchmark. The oscillations in the degree distribution of SKG was a major concern for the committee. Our proposed NSKG model has been implemented in the current Graph500 code2. Our analysis also solves the mystery of isolated vertices and how they are related to the SKG parameters. Members of the steering committee had observed that the number of isolated vertices varied greatly with the matrix T , but did not have an explanation for this. 2The file generator/graph-generator.c in the most recent version as of July 2012 (2.1.4) has the implementa- tion, with a variable SPK NOISE LEVEL controlling the NSKG noise. Available at http://www.graph500. org/sites/default/files/files/graph500-2.1.4.tar.bz2 Improving Stochastic Kronecker Graphs A:5 1.4. Parameters for empirical study Throughout the paper, we discuss a few sets of SKG parameters. The first is the Graph500 benchmark [Graph500 Steering Committee 2012]. The other two are parameters used in [Leskovec et al. 2010] to model a co-authorship network (CAHepPh) and a web graph (WEBNotreDame). We list these parameters here for later reference. -- Graph500: T = [0.57, 0.19; 0.19, 0.05], (cid:96) ∈ {26, 29, 32, 36, 39, 42}, and m = 16 · 2(cid:96). -- CAHepPh: T = [0.42, 0.19; 0.19, 0.20], (cid:96) = 14, and m = 237, 010. -- WEBNotreDame3: T = [0.48, 0.20; 0.21, 0.11], (cid:96) = 18, and m = 1, 497, 134. 2. PREVIOUS WORK The R-MAT model was defined by Chakrabarti et al. [Chakrabarti et al. 2004]. The general and more powerful SKG model was introduced by Leskovec et al. [Leskovec et al. 2005] and fitting algorithms were proposed by Leskovec and Faloutsos [Leskovec and Faloutsos 2007] (combined in [Leskovec et al. 2010]). This model has generated significant interest and notably was chosen for the Graph500 benchmark [Graph500 Steering Committee 2012]. Kim and Leskovec [Kim and Leskovec 2010] defined the Multiplicative Attribute Graph (MAG) model, a generalization of SKG where each level may have a different matrix T . They suggest that certain configurations of these matrices could lead to power-law distributions. Since the appearance of the SKG model, there have been analyses of its properties. The original paper [Leskovec et al. 2010] provides some basic theorems and empirically show a variety of properties. Mahdian and Xu [Mahdian and Xu 2011] specifically study how the model parameters affect the graph properties. They show phase transition behavior (asymptotically) for occurrence of a large connected component and shrinking diameter. They also initiate a study of isolated vertices. When the SKG parameters satisfy a certain condition, the number of isolated vertices approaches n; however, their theorems do not help predict the number of isolated vertices for a given setting of SKG. In the analysis of the MAG model [Kim and Leskovec 2010], it is shown that the SKG degree distribution has some lognormal characteristics. (Lognormal distributions have been observed in real data [Bi et al. 2001; Pennock et al. 2002; Clauset et al. 2009]. Mitzenmacher [Mitzenmacher 2003] gives a survey of lognormal distributions.) Sala et al. [Sala et al. 2010] perform an extensive empirical study of properties of graph models, including SKG. Miller et al. [Miller et al. 2010] show that they can detect anomalies embedded in an SKG. Moreno et al. [Moreno et al. 2010] study the distributional properties of families of SKG. As noted in [Chakrabarti et al. 2004], the SKG generation procedure may give repeated edges. Hence, the number of edges in the graph differs slightly from the number of insertions (though, in practice, this is barely 1% for Graph500). Groer et al. [Groer et al. 2011] prove that the number of vertices of a given degree is asymptotically normally distributed, and provide algorithms to compute the expected number of edges in the graph (as a function of the number of insertions) and the expected degree distribution. 3. DEGREE DISTRIBUTION In this section, we analyze the degree distribution of SKG, which are known to follow a multinomial distribution. While an exact expression for this distribution can be written, this is unfortunately a complicated sum of binomial coefficients. Studying the log-log plots of the degree distribution, one sees a general heavy-tail like behavior, but there are large oscillations. The degree distribution is not monotonically decreasing. Refer to Figure 2 for some examples of SKG degree distributions (plotted in log-log scale). Groer et al. [Groer et al. 2011] show that the degree distribution behaves like the sum of Gaussians, giving some 3In [Leskovec et al. 2010], (cid:96) was 19. We make it even because, for the sake of presentation, we perform experiments and derive formulae for even (cid:96). A:6 C. Seshadhri, A. Pinar, T. G. Kolda intuition for the oscillations. Recent work of Kim and Leskovec [Kim and Leskovec 2010] provide some mathematical analysis explaining connections to a lognormal distribution. But many questions remain. What does the distribution oscillate between? Is the distribution bounded below by a power law? Can we approximate the distribution with a simple closed form function? None of these questions have satisfactory answers. Our analysis gives a precise explanation for the SKG degree distribution. We prove that the SKG degree distribution oscillates between a lognormal and exponential tail. We provide plots and experimental results to support more intuition for our theorems. The oscillations are a disappointing feature of SKG. Real degree distributions do not have large oscillations (to the contrary, they are monotonically decreasing), and more im- portantly, do not have any exponential tail behavior. This is a major issue both for modeling and benchmarking purposes since degree distribution is one of the primary characteristics that distinguishes real networks. In order to rectify the oscillations, we apply a certain model of noise and provide both mathematical and empirical evidence that this "straightens out" the degree distribution. This is discussed in §4. Indeed, small amounts of noise lead to a degree distribution that is predominantly lognormal. This also shows an appealing aspect of our degree distribution analysis. We can naturally explain how noise affects the degree distribution and give explicit bounds on these affects. We make a caveat here. Technically, the SKG model creates multigraphs, since there can be repeated edges. Our theorems and expressions will deal with degree distributions of this multigraph. Conventionally, this is reduced to a simple graph by removing repeated edges. Groer et al. [Groer et al. 2011] give details expressions and explanations relating the degree distributions on the multigraph and the induced simple graph. Our empirical results show that for a variety of parameters (including the Graph 500 setting), our theorems match the degree distribution of the underlying simple graph. Simple graphs are used in all empirical studies. 3.1. Notation The (cid:96)-bit binary representation of the vertices, numbered 0 to n− 1, provides a straightfor- ward way to partition the vertices. Specifically, each vertex has a binary representation and therefore corresponds to an element of the boolean hypercube {0, 1}(cid:96). We can partition the vertices into slices, where each slice consists of vertices whose representations have the same number of zeros4. Recall that we assume (cid:96) is even. For r ∈ [−(cid:96)/2, (cid:96)/2], we say that slice r, denoted Sr, consists of all vertices whose binary representations have exactly ((cid:96)/2 + r) zeros. These binary representations and slices are intimately connected with edge insertions in the SKG model. For each insertion, we are trying to randomly choose a source-sink pair. First, let us simply choose the first bit (of the representations) of the source and the sink. Note that there are 4 possibilities (first bit for source, second for sink): 00, 01, 10, and 11. We choose one of the combinations with probabilities t1, t2, t3, and t4 respectively. This fixes the first bit of the source and sink. We perform this procedure again to choose the second bit of the source and sink. Repeating (cid:96) times, we finally decide the source and sink of the edge. Note that as r becomes smaller, a vertex in an r-slice tends to have a higher degree. For a real number x, we use (cid:98)x(cid:101) to denote the closest integer to x. There are certain quantities that will be important in our analysis. These are summarized in Table III. Our results are fundamentally asymptotic in nature, so we explain the assumptions on T and the implicit assumptions of our results. We assume T to be a fixed matrix with the following conditions. All entries are positive and strictly less than 1. The number t1 is the 4There are usually referred to as the levels of the boolean hypercube. In the SKG literature, levels is used to refer to (cid:96), and hence we use a different term. Improving Stochastic Kronecker Graphs A:7 Table III: Parameters for Analysis of SKG models General Quantities -- τ = (1 + 2σ)/(1 − 2σ) -- λ = ∆(1 − 4σ2)(cid:96)/2 -- r ∈ {−(cid:96)/2, . . . , (cid:96)/2} denotes a slice index -- d denotes a degree (typically assumed < -- deg(v) = outdegree of node v -- Sr = set of nodes whose binary representation have exactly (cid:96)/2 + r zeros Quantities Associated with Degree d √ n) -- Xd = random variable for the number of vertices of outdegree d -- θd = ln(d/λ)/ ln τ -- Γd = (cid:98)θd(cid:101) (nearest integer to θd) -- γd = θd − Γd ∈ [0, 0.5] -- rd = (cid:98)θd(cid:99) (only interesting for rd < (cid:96)/2) -- δd = θd − rd largest entry, and min(t1 + t2, t1 + t3) > 1/2. This ensures that σ ∈ (0, 1/2), τ is positive and finite, and λ is non-zero. We want to note that these conditions are satisfied by all SKG parameters that have been used to generate realistic graph instances, to the best of our knowledge. Indeed, when σ = 1/2, the degree distribution is Poisson. We fix the matrix T and average degree ∆ > 1, and think of (cid:96) as increasing. The asymp- totics hold for an increasing (cid:96). Note that since n = 2(cid:96), this means that n and m are also increasing. We use o(1) as a shorthand for a quantity that is negligible as (cid:96) → ∞. Typically, this converges to zero rapidly as (cid:96) increases. Given two quantities or expressions A and B, A = (1 ± o(1))B will be shorthand for A ∈ [(1 − o(1))B, (1 + o(1))B]. As we mentioned earlier, all our results are for the SKG multigraph. For convenience, we will just refer to this a graph. 3.2. Explicit formula for degree distribution We begin by stating and explaining the main result of this section. To provide clean ex- pressions, we make certain approximations which are slightly off for certain regions of d and (cid:96) (essentially, when d is either too small or too large). Our main technical result is Lemma 3.2, which gives a tight expression for the degree distribution. A more interpretable version is given first as Theorem 3.1, which is stated as an upper bound. The remainder of the section gives a proof for this, which can be skipped if the reader is only interested in the results. This theorem expresses the oscillations between the lognormal and exponential tail. The lower order error terms in all the following are extremely small. We focus on outdegrees, but these theorems hold for indegrees as well. To make de- pendences clear, we remind the reader that the "free" variables are T, ∆, (cid:96). The first two are fixed to constants, and (cid:96) is increasing. Hence, the asymptotics are over (cid:96). All other parameters are functions of these quantities. We begin by giving a more digestible form of our main result, stated in Theorem 3.1. The more precise version is given in Lemma 3.2. A reader interested in the general message can skip Lemma 3.2. Theorem 3.1. Assume d ∈ [(e ln 2)(cid:96), n ]. If Γd ≥ (cid:96)/2, then E[Xd] is negligible, i.e., o(1); otherwise, if Γd < (cid:96)/2, then (up to an additive exponential tail) √ (cid:18)−dγ2 (cid:19)(cid:18) E[Xd] ≤ 1√ d exp d ln2 τ 2 (cid:96) (cid:96)/2 + Γd (cid:19) . A:8 C. Seshadhri, A. Pinar, T. G. Kolda (a) CAHepPh (b) WEBNotreDame (with (cid:96) = 18) (c) Graph500 (with (cid:96) = 16) Fig. 2: We plot the degree distribution of graphs generated using our three different SKG pa- rameter sets. We then plot the respective bounds predicted by Theorem 3.1 and Lemma 3.2. Observe how Theorem 3.1 correctly guesses the peaks and troughs of the degree distribu- tion. Lemma 3.2 is practically an exact match (except when the degree is below 2(cid:96) or, in Graph500, slight inaccuracies when the degree is too large). (cid:96) (cid:96)/2+Θ(ln d) (cid:96) (cid:96)/2+x (cid:96) (cid:96)/2+Γd by a function that oscillates between a lognormal and an exponential tail. Remark: This means that the expected outdegree distribution of a SKG is bounded above Note that Γd = (cid:98)ln(d/λ)/ ln τ(cid:101) = Θ(ln d). Hence (cid:0) (cid:0) and therefore(cid:0) (cid:1) can be thought of as (cid:1) represents an asymptotically normal distribution of x, (cid:1) is a lognormal distribution of d. This lognormal term is multiplied by (cid:1). The function (cid:0) d ln2 τ /2). By definition, γd ∈ [0, 1/2]. When γd is close to 0, then the exponential exp(−dγ2 term is almost 1. Hence the product represents a lognormal tail. On the other hand, when (cid:96) (cid:96)/2+Γd Improving Stochastic Kronecker Graphs A:9 γd is a constant (say > 0.2), then the product becomes an exponential tail. Observe that γd oscillates between 0 and 1/2, leading to the characteristic behavior of SKG. As θd becomes closer to an integer, there are more vertices of degree d. As it starts to have a larger frac- tional part, the number of vertices of degree d is bounded above by an exponential tail. Note that there are many values of d (a constant fraction) where γd > 0.2. Hence, for all these d, the degrees are bounded above by an exponential tail. As a result, the degree distribution cannot be a power law or a lognormal. The estimates provided by Theorem 3.1 for our three different SKG parameter sets are shown in Figure 2. Note how this simple estimate matches the oscillations of the actual degree distribution accurately. We provide a more complex expression in Lemma 3.2 that almost completely explains the degree distribution. Theorem 3.1 is a direct corollary of this lemma. In the following, the expectation is over the random choice of the graph. √ Lemma 3.2. For SKG, assume d ∈ [(e ln 2)(cid:96), n ]. If rd ≥ (cid:96)/2, E[Xd] is negligible; otherwise, we have 1 ± o(1) √ 2πd E[Xd] = (cid:26) exp (cid:18)−dδ2 d ln2 τ 2 (cid:19)(cid:18) (cid:19) (cid:18)−d(1 − δd)2 ln2 τ (cid:96) (cid:96)/2 + rd + exp (cid:19)(cid:18) (cid:96) (cid:19)(cid:27) . 2 (cid:96)/2 + rd + 1 We plot the bound given by this lemma in Figure 2. Note how it completely captures the behavior of the degree distribution (barring a slight inaccuracy for larger degrees of the Graph500 graph because we start exceeding the upper bound for d in Lemma 3.2). Theorem 3.1 can be derived from this lemma, as we show below. Proof. (of Theorem 3.1) Since δd = θd − (cid:98)θd(cid:99) = θd − rd, only one of δd and (1 − δd) is at most 1/2. In the former case, Γd = rd and in the latter case, Γd = rd + 1. Suppose that Γd = rd. Then, (cid:19) (cid:18)−d ln2 τ (cid:19)(cid:18) (cid:96) (cid:19) (cid:18)−d(1 − δd)2 ln2 τ (cid:19)(cid:18) exp (cid:96) ≤ exp 2 (cid:96)/2 + rd + 1 8 (cid:96)/2 + rd + 1 √ Note that this is a small (additive) exponential term in Lemma 3.2. So we just neglect it (and drop the leading constant of 1/ 2π) to get a simple approximation. A similar argument works when Γd = rd + 1. In the next section, we prove some preliminary claims which are building blocks in the proof of Lemma 3.2. Then, we give a long intuitive explanation of how we prove Lemma 3.2. Finally, in §3.5, we give a complete proof of Lemma 3.2. 3.3. Preliminaries We will state and prove some simple and known results in our own notation. This will give the reader some understanding about the various slices of vertices, and how the degree distribution is related to these slices. Our first claim computes the probability that a single edge insertion creates an outedge for node v. The probability depends only on the slice that v is in. Claim 3.3. For vertex v ∈ Sr, the probability that a single edge insertion in SKG produces an out-edge at node v is (1 − 4σ2)(cid:96)/2τ r n . pr = A:10 C. Seshadhri, A. Pinar, T. G. Kolda Proof. We consider a single edge insertion. What is the probability that this leads to an outedge of v? At every level of the insertion, the edge must go into the half corresponding to the binary representation of v. If the first bit of v is 0, then the edge should drop in the top half at the first level, and this happens with probability (1/2 + σ). On the other hand, if this bit is 1, then the edge should drop in the bottom half, which happens with probability (1/2 − σ). By performing this argument for every level, we get that (cid:18) 1 2 (cid:19)(cid:96)/2+r(cid:18) 1 (cid:19)(cid:96)/2−r − σ 2 pr = + σ (1 − 4σ2)(cid:96)/2 2(cid:96) · = (cid:19)r (cid:18) 1/2 + σ 1/2 − σ (1 − 4σ2)(cid:96)/2τ r n . = Our next lemma bounds the probability that a vertex v at slice r has degree d. Before √ that, we separately deal with slices where pr is very large. Essentially, we show that slices where pr ≥ 1/ m can be ignored. This allows for simpler calculations later on. √ Claim 3.4. Let R be the set {rpr ≥ 1/ any vertex in U has degree less than m} and U = (cid:83) √ √ m/2 is at most e−Ω( m). r∈R Sr. The probability that of v is X =(cid:80)m Proof. Consider a fixed v ∈ U . Let Xi be the indicator random variable for the ith √ edge insertion being incident to v. The Xis are i.i.d. with E[Xi] ≥ 1/ m. The out-degree of [Motwani and Raghavan 1995]), the probability that X ≤ √ m. By a multiplicative Chernoff bound (Theorem 4.2 m/8. The proof is completed by taking a union bound over all vertices in U and noting that ne−√ i=1 Xi and E[X] ≥ √ m/2 is at most e−√ √ m/8 = e−Ω( n). Our formula becomes slightly inaccurate when d becomes large, but as our figures show, it is not a major issue in practice. The previous claim implies that √ the expected number of vertices in U (as defined above) with degree d is vanishingly small. Therefore, we only need to focus on slices where pr ≤ 1/ m. Lemma 3.5. Let v be a vertex in slice r. Assume that pr ≤ 1/ √ √ m and d = o( n). Then m). √ We will set d = o( for SKG, λd d! (τ r)d . exp(λτ r) Pr[deg(v) = d] = (1 + o(1)) approximation, (1 − x)m(cid:48) (cid:1) = (1 ± o(1))md/d!. For x ≤ 1/ Proof. The probability that v has outdegree d is(cid:0)m (cid:1)pd we have(cid:0)m r(1 − pr)m−d. Since d = o( (cid:18) (1 − 4σ2)(cid:96)/2τ r (cid:18) (cid:19)d (cid:18)m (cid:19) (cid:0)∆(1 − 4σ2)(cid:96)/2(cid:1)d n), m and m(cid:48) ≤ m, we can use the Taylor series . Using Claim 3.3, we get − (1 − 4σ2)(cid:96)/2τ r(m − d) r(1 − pr)m−d = (1 ± o(1)) pd = (1 ± o(1))e−xm(cid:48) md d! (cid:19) exp τ rd √ √ n n d d d exp(−∆(1 − 4σ2)(cid:96)/2τ r) exp( d(1 − 4σ2)(cid:96)/2τ r ) n = (1 ± o(1)) = (1 ± o(1)) √ λd d! d! (τ r)d exp(λτ r) exp(dpr). m and d = o( √ Since pr ≤ 1/ 3.4. Understanding the degree distribution The following is a verbal explanation of our proof strategy and captures the essence of the math. n), dpr = o(1), completing the proof. It will be convenient to think of the parameters having some fixed values. Let λ = 1 and τ = e. (This can be achieved with a reasonable choice of T, (cid:96), ∆.) We begin by looking at the Improving Stochastic Kronecker Graphs A:11 different slices of vertices. Vertices in a fixed r-slice have an identical behavior with respect to the degree distribution. Lemma 3.5 uses elementary probability arguments to argue that the probability that a vertex in slice r has outdegree d is roughly Pr[deg(v) = d] = exp(dr − er) d! . (1) When r = Ω(ln d), the numerator will be less than 1, and the overall probability is O(1/d!). Therefore, those slices will not have many (or any) vertices of degree d. If r = O(ln d), the numerator is o(d!) and the probability is still (approximately) at most 1/d!. Observe that when r is negative, then this probability is extremely small, even for fairly small values of d. This shows that half of the vertices (in slices where the number of 1's is more than 0's) have extremely small degrees. It appears that the "sweet spot" is around r ≈ ln d. Applying Taylor approximations to appropriate ranges of r, it can be shown that a suitable approximation of the probability of a slice r vertex having degree d is roughly exp(−d(r− ln d)2). We can now show that the SKG degree distribution is bounded above by a lognormal tail. Only the vertices in slice r ≈ ln d have a good chance of having degree d. This means that the expected number of vertices (cid:1). Since the latter is asymptotically normally distributed as of degree d is at most(cid:0) (cid:96) (cid:96)/2+ln d a function of ln d, it (approximately) represents a lognormal tail. A similar conclusion was drawn in [Kim and Leskovec 2010], though their approach and presentation is very different from ours. This is where we significantly diverge. The crucial observation is that r is a discrete variable, not a continuous one. When r − ln d ≥ 1/3 (say), the probability of having degree d is at most exp(−d/9). That is an exponential tail, so we can safely assume that vertices in those slices have no vertices of degree d. Refer to Figure 3. Since ln d is not necessarily integral, it could be that for all values of r, r − ln d ≥ 1/3. In that case, there are (essentially) no vertices of degree d. For concreteness, suppose ln d = 100/3. Then, regardless of the value of r, r − ln d ≥ 1/3. And we can immediately bound the fraction of vertices that have this degree by the exponential tail, exp(−d/9). When ln d is close to being integral, then for r = (cid:98)ln d(cid:101), the r-slice (and only this slice) will contain many vertices of degree d. The quantity ln d − (cid:98)ln d(cid:101) fluctuates between 0 and 1/2, leading to the oscillations in the degree distribution. Let Γd = (cid:98)ln d(cid:101) and γd = Γd − ln d. Putting the arguments above together, we can get a very good estimate of the number of vertices of degree d. This quantity is essentially exp(−γ2 in Lemma 3.2. (cid:1), as stated in Theorem 3.1. A more nuanced argument leads to the bound dd)(cid:0) (cid:96)/2+Γd (cid:96) 3.5. Proof of Lemma 3.2 We break up the main argument into various claims. The first claim gives an expression for the expected number of vertices of degree d. This sum will appear to be a somewhat complicated sum of binomial coefficients. But, as we later show, we can deduce that most terms in this sum are actually negligible. Claim 3.6. Define g(r) = r ln τ − ln(d/λ). Then, for SKG, E[Xd] = 1 ± o(1) √ 2πd (cid:104) (cid:96)/2(cid:88) r=−(cid:96)/2 d(1 + g(r) − eg(r)) exp (cid:105)(cid:18) (cid:96) (cid:96)/2 + r (cid:19) . A:12 C. Seshadhri, A. Pinar, T. G. Kolda Fig. 3: Probability of nodes of degree d for various slices. The probability that a vertex of slice r has degree d is Gaussian distribution with a peak at ln d. The standard deviation is extremely small. Hence, if ln d is far from integral, no slice will have vertices of degree d. We then apply Stirling's approximation and the fact that Sr =(cid:0) (cid:96) Proof. Using Lemma 3.5 and linearity of expectation, we can derive a formula for E[Xd]. (cid:1). (cid:96)/2+r E[Xd] = (1 ± o(1)) λd d! r=−(cid:96)/2 (cid:96)/2(cid:88) (cid:96)/2(cid:88) (cid:19)d λd d! (cid:18) eλ r=−(cid:96)/2 (cid:96)/2(cid:88) (τ r)d exp(λτ r) (τ r)d exp(λτ r) Sr (cid:19) (cid:18) (cid:96) (cid:18) (cid:96) (cid:96)/2 + r (τ r)d d r=−(cid:96)/2 exp(λτ r) (cid:96)/2 + r (cid:19) . = (1 ± o(1)) 1 ± o(1) √ 2πd = Let us now focus on the quantity (cid:18) eλ (cid:19)d (τ r)d = exp(d + d ln λ + rd ln τ − d ln d − λτ r). d exp(λτ r) The term inside the exponent can be written as d + d(r ln τ − ln d + ln λ)− d(d/λ)−1τ r. This is d(1 + g(r) − eg(r)). Hence E[Xd] = 1 ± o(1) √ 2πd (cid:96)/2(cid:88) r=−(cid:96)/2 (cid:18) (cid:96) (cid:96)/2 + r (cid:19) . ed(1+g(r)−eg(r)) The key observation is that among the (cid:96) terms in the summation of Claim 3.6, few of them are the main contributors. All other terms sum up to a negligible quantity. We deal with this part in the following claim. We crucially use the assumption that d > (e ln 2)(cid:96). This ensures that the large slices (when r is small) do not contribute vertices of degree d. Improving Stochastic Kronecker Graphs A:13 Claim 3.7. Let R be the set of r such that g(r) ≥ 1. Then, for SKG, exp[d(1 + g(r) − eg(r))] (cid:18) (cid:96) (cid:19) (cid:96)/2 + r ≤ 1. (cid:88) r∈R Proof. For convenience, define h(r) = 1 + g(r)− eg(r). We will show (shortly) that when g(r) ≥ 1, h(r) ≤ −1/e. We assume d > (e ln 2)(cid:96), thus exp(d· h(r)) ≤ 2−(cid:96). Let R be the set of all r such that g(r) ≥ 1. We can easily bound the contribution of the indices in R to our total sum as (cid:88) (cid:18) (cid:96) (cid:19) ≤ 2−(cid:96)(cid:88) (cid:18) (cid:96) (cid:19) r∈R (cid:96)/2 + r ≤ 1. edh(r) r∈R (cid:96)/2 + r It remains to prove the bound on h(r). Set h(x) = 1 + x − ex, so h(r) = h(g(r)). We have two cases. -- g(r) ≥ 1: Since h(x) is decreasing when x ≥ 1, h(r) ≤ h(1) = −(e − 2) ≤ −1/e. -- g(r) ≤ −1: Since h(x) is increasing for x ≤ −1, h(r) ≤ h(−1) = −1/e. Now for the main technical part. The following claim with the previous ones complete the proof of Lemma 3.2. Claim 3.8. Define R as in Claim 3.7. Then, for SKG, (cid:88) r /∈R (cid:104) (cid:26) d(1 + g(r) − eg(r)) exp (cid:18)−dδ2 d ln2 τ 2 (1± o(1))· exp (cid:105)(cid:18) (cid:96) (cid:19)(cid:18) (cid:96) (cid:19) (cid:19) (cid:96)/2 + r = (cid:96)/2 + rd + exp (cid:18)−d(1 − δd)2 ln2 τ (cid:19)(cid:18) (cid:96) 2 (cid:96)/2 + rd + 1 (cid:19)(cid:27) . Proof. Since g(r) < 1, we can perform an important approximation. Using the expan- sion ex = 1 + x + x2/2 + Θ(x3) for x ∈ (0, 1), we bound h(r) = 1 + g(r) − e−g(r) = −g(r)2/2 + Θ(g(r)3) We request the reader to pause and consider the ramifications of this approximation. The coefficient multiplying the binomial coefficients in the sum is exp(−d(g(r))2), which is a Gaussian function of g(r). This is what creates the Gaussian-like behavior of the probability of vertices of degree d among the various slices. We now need to understand when g(r) is close to 0, since the corresponding terms will provide the main contribution to our sum. So for any d, some slices are "picked out" to have expected degree d, whereas others are not. This depends on what the value of g(r) is. Now on, it only requires (many) tedious calculations to get the final result. What are the different possible values of g(r)? We remind the reader that g(r) = r ln τ − ln(d/λ). Observe that rd = (cid:98)ln(d/λ)/ ln τ(cid:99) minimizes g(r) subject to g(r) < 0 and rd + 1 (which is the corresponding ceiling) minimizes g(r) subject to g(r) ≥ 0. For convenience, denote rd by rf (for floor) and rd + 1 by rc (for ceiling). Consider some r such that g(r) < 1. It is either of the form r = rc + s or rf − s, for integer s ≥ 0. We will sum up all the terms corresponding to the each set separately. For convenience, denote the former set of values of s's such that g(rc + s) < 1 by S1, and define S2 with respect to rf − s. This allows us to split the main sum into two parts, which we deal with separately. (cid:19) (cid:19) Case 1 (the sum over S1): d(1 + g(r) − eg(r)) exp (cid:104) (cid:88) s∈S1 (cid:105)(cid:18) (cid:18) (cid:96)/2 + rc + s (cid:96) (cid:19) = (1±o(1)) exp( −d(g(rc)2) 2 ) (cid:96) (cid:96)/2 + rc +(1±o(1)) s∈S1,s(cid:54)=0 s∈S1,s(cid:54)=0 (cid:88) exp(−d(g(rc + s)2)/2) (cid:18) ≤ (cid:88) (cid:18) For the last inequality, observe that (cid:0) (cid:88) (cid:105)(cid:18) d(1 + g(r) − eg(r)) = o exp (cid:96) s∈S2 (cid:104) (cid:88) (cid:104) (cid:96) (cid:19) (cid:19) (cid:96)/2 + rf + s (cid:105)(cid:18) (cid:96) (cid:18) (cid:96)/2 + r We substitute g(rc+s) = g(rc)+s ln τ into the second part, and show that we can bound this whole summation as an error term. Note that both s and ln τ are positive by construction. (cid:96) (cid:96)/2 + rc + s exp[−d(g(rc)2 + s2(ln τ )2)/2] ≤ exp(−d(g(rc)2)/2) exp(−ds2(ln τ )2/2) exp(−d(g(rc)2)/2) (cid:18) (cid:19) (cid:96) (cid:96)/2 + rc + s (cid:18) (cid:19) (cid:88) (cid:18) (cid:1) ≤ (cid:96)s(cid:0) s>0 (cid:96) (cid:96)/2 + rc (cid:96) (cid:96)/2+rc (cid:96) . (cid:96)/2 + rc + s (cid:19)(cid:19) (cid:1). Since d ≥ (cid:96), the exponential (cid:19) (cid:18) (cid:96) = (1 ± o(1)) exp(−d(g(rf )2)/2) (cid:96)/2 + rf decay of exp(Θ(−ds2)) completely kills this summation. have g(r) = g(rf ) − s ln τ . Applying the same calculations as above, Case 2 (the sum over S2): Now, we apply an identical argument for r = rf − s. We (cid:96)/2+rc+s A:14 C. Seshadhri, A. Pinar, T. G. Kolda −d(g(rc + s)2) 2 ) exp( (cid:18) (cid:19) (cid:96) (cid:96)/2 + rc + s (cid:88) s∈S1 s(cid:54)=0 Adding the bounds from both the cases, we conclude d(1 + g(r) − eg(r)) exp (cid:26) r /∈R = (1 ± o(1)) · exp(−dg(rf )2/2) (cid:96) (cid:96)/2 + rf (cid:19) + exp(−dg(rc)2/2) (cid:18) (cid:96) (cid:19)(cid:27) (cid:96)/2 + rc (2) We showed earlier that rf = rd and rc = rd + 1. We remind the reader that θd = ln(d/λ)/ ln τ , rd = (cid:98)θd(cid:99), and δd = θd − rd. Hence g(rf ) = g(θd) − δd ln τ = −δd ln τ . Since rc = rf + 1, g(rc) = ln τ + g(rf ) = (1 − δd) ln τ . We substitute in (2) to complete the proof. 4. ENHANCING SKG WITH NOISE: NSKG Let us now focus on a noisy version of SKG that removes the fluctuations in the degree distribution. We will refer to our proposed noisy SKG model as NSKG. The idea is quite simple. For each level i ≤ (cid:96), define a new matrix Ti in such a way that the expectation of Ti is just T . At level i in the edge insertion, we use the matrix Ti to choose the appropriate quadrant. Here is a formal description. For convenience, we will assume that T is symmetric. It is fairly easy to generalize to general T . Let b be our noise parameter such that b ≤ min((t1 + Improving Stochastic Kronecker Graphs A:15 Table IV: Parameters for NSKG -- b = noise parameter ≤ min((t1 + t4)/2, t2) -- µi = noise at level i = 1, . . . , (cid:96) (cid:34) -- Ti = t1 − 2µit1 t1+t4 t3 + µi t2 + µi t4 − 2µit4 t1+t4 = noisy generating matrix at level i = 1, . . . , (cid:96) (cid:35) (cid:34) t4)/2, t2). For level i, choose µi to be a uniform random number in the range [−b, +b]. Set Ti to be (cid:35) Ti = t1 − 2µit1 t1+t4 t3 + µi t2 + µi t4 − 2µit4 t1+t4 Note that Ti is symmetric, its entries sum to 1, and all entries are positive. This is by no means the only model of noise, but it is certainly convenient for analysis. Each level involves only one random number µi, which changes all the entries of T in a linear fashion. Hence, we only need (cid:96) random numbers in total. For convenience, we list out the noise parameters of NSKG in Table IV. In Figures 1, 4a, and 4b, we show the effects of noise. Observe how even a noise parameter as small as 0.05 (which is extremely small compared to the matrix values) significantly reduces the magnitude of oscillations. A noise of 0.1 almost removes the oscillations. (Even this noise is very small, since the standard deviation of this noise parameter is at most 0.06.) Our proposed method of adding noise dampens the undesirable exponential tail behavior of SKG, leading to a monotonic degree distribution. (a) CAHepPh (b) WEBNotreDame Fig. 4: The figures show the degree distribution of standard SKG and NSKG as the averages of 25 instances. Notice how effectively a noise of 0.1 straightens the degree distribution. A:16 C. Seshadhri, A. Pinar, T. G. Kolda 4.1. Why does noise help? Before we state our formal theorem, let us set some asymptotic notation that will allow for a more readable theorem. We will use the O(·) notation to suppress constant factors, where (for notational convenience) these constants may depend on the constants in the matrix T . As before, o(1) is a quantity that goes to zero as (cid:96) grows. Our formal theorem says that when the noise is "large enough," we can show that the degree distribution has at least a lognormal tail on average. This is a significant change from SKG, where many degrees are below an exponential tail. √ Theorem 4.1. Let noise b be set to c/ √ (cid:96) for positive c, such that c/ (cid:96) < min((t1 + t4)/2, t2). Then the expected degree distribution for NSKG is bounded below by a lognormal. Formally, when Γd ≤ (cid:96)/2 and d ≤ √ n, (cid:18) (cid:19) . E[Xd] ≥ ν(c) d (cid:96) (cid:96)/2 + Γd Here ν(c) is some positive function of c. (This is independent of (cid:96), so for constant c, ν(c) is a positive constant.) This bound tells us that as (cid:96) increases, we need less noise to get a lognormal tail. From a Graph 500 perspective, if we determine (through experimentation) that for some small (cid:96) a certain amount of noise suffices, the same amount of noise is certainly enough for larger (cid:96). We now provide a verbal description of the main ideas. Let us assume that λ = 1 and τ = e, as before. We focus our attention on a vertex v of slice r, and wish to compute the probability that it has degree d. Note the two sources of randomness: one coming from the choice of the noisy SKG matrices, and the second from the actual graph generation. We associate a bias parameter ρv with every vertex v. This can be thought of as some measure of how far the degree behavior of v deviates from its noiseless version. Actually, it is the random variable ln ρv that we are interested in. Intuitively, this can just be thought of as a Gaussian random variable with mean zero. The distribution of ρv is identical for all vertices in slice r. (Though it does not matter for our purposes, for a given instantiation of the noisy SKG matrices, vertices in the same slice can have different biases.) We approximate the probability that v has degree d by (refer to Claim 4.11) Pr[deg(v) = d] = exp(dr + d ln ρv − ρver)/d!. After some simplifications, this is roughly equal to exp(−d(r−ln d−ln ρv)2). The additional ln ρv will act as a smoothing term. Observe that even if ln d has a large fractional part, we could still get vertices of degree d. Suppose ln d = 10.5, but ln ρv happened to be close to 0.5. Then vertices in slice (cid:98)ln d(cid:101) would have degree d with some nontrivial probability. Contrast this with regular SKG, where there is almost no chance that degree d vertices exist. Think of the probability as exp(d(r − ln d − X)2), where X is a random variable. The expected probability will be an average over the distribution of X. Intuitively, instead of the probability just being exp(d(r − ln d)2) (in the case of SKG), it is now the average value over some interval. If the standard deviation of X is sufficiently large, even though exp(d(r−ln d)2) is small, the average of exp(d(r−ln d−X)2) can be large. Refer to Figure 5. We know that X is a Gaussian random variable (with some standard deviation σ). So we can formally express the (expected) probability that v has degree d as an integral, P (deg(v) = d τ = e, λ = 1) = exp(d(r − ln d − X)2) · e−X 2/2σ2 dX. This definite integral can be evaluated exactly (since it is just a Gaussian). Intuitively, this is roughly the average value of exp(d(r− ln d− X)2), where X ranges from −σ to +σ. Suppose (cid:90) +∞ −∞ Improving Stochastic Kronecker Graphs A:17 Fig. 5: The effect of noise. The underlying Gaussian curve is the same as one in Figure 3. Adding noise can be thought of as an average over the Gaussian. So the probability that a vertex from slice r has degree is the area of the shaded region. σ > 1. Since r ranges over the integers, there is always some r such that r − ln d < 1. For this value of r, the average of exp(d(r − ln d− X)2) over the range X ∈ [−1, +1] will have a reasonably large value. This ensures that (in expectation) many vertices in this slice r have degree d. This can be shown for all degrees d, and we can prove that the degree distribution is at least lognormal. This is an intuitive sketch of the proof. The random variable ln ρv is not exactly Gaussian, and hence we have to account for errors in such an approximation. We do not finally get a definite integral that can be evaluated exactly, but we can give good bounds for its value. 4.2. Preliminaries for analysis There are many new parameters we need to introduce for our NSKG analysis. Each of these quantities is a random variable that depends on the choice of the matrices Ti. We list them below. -- σi = t1 − 2µit1 -- αi = (1/2 + σi)/(1/2 + σ). It will be convenient to express this in terms of µi, replacing + t2 + µi − 0.5 = σ + µi(1 − 2t1 t1+t4 ). t1+t4 the dependence on σi. αi = (1/2 + σi)/(t1 + t2) = 1 − µi (t1 − t4) (t1 + t2)(t1 + t4) -- βi = (1/2 − σi)/(1/2 − σ). Performing a calculation similar to the one above, βi = (1/2 − σi)/(t3 + t4) = 1 + µi (t1 − t4) (t3 + t4)(t1 + t4) -- bα, bβ: We set Similarly, bα = bβ = b(t1 − t4) (t1 + t2)(t1 + t4) b(t1 − t4) (t3 + t4)(t1 + t4) = = 4bσ (1 + 2σ)(t1 + t4) 4bσ (1 − 2σ)(t1 + t4) A:18 C. Seshadhri, A. Pinar, T. G. Kolda Hence, αi is distributed uniformly at random in [1 − bα, 1 + bα], and βi is uniformly √ random in [1 − bβ, 1 + bβ]. Note that bα, bβ = Θ(c/ (cid:96)). -- ρv: Let v be represented as a bit vector (z1, . . . , zk). The bias for v is ρv = (cid:81) (cid:81) We need to bound the behavior of ln ρv, which is (cid:80) i:zi=1 βi. We set λv = λρv. 4.3. The behavior of ln ρv i:zi=0 αi i:zi=0 ln αi +(cid:80) i:zi=1 ln βi. Observe that this is a sum of independent random variables. By the Central Limit Theorem, we expect ln ρv to be distributed as a Gaussian, but we still need to investigate the variance of this distribution. Approximately (since bα and bβ are small), ln αi is uniformly random in [−bα, bα], so the variance of ln αi is Θ(b2 α) = Θ(1/(cid:96)). A similar statement holds for ln βi, and we bound the variance of ln ρv by Θ(1). So the probability density function (pdf) of ln ρv is roughly concentrated in a constant-sized interval of size 1 (around 0). This is what we will formally show in this section. We will need a pointwise convergence guarantee for the pdf of ln ρv. Throughout this section, we will use various functions of the form ν1(c), ν2(c), . . .. These are strictly positive constant functions of c (for c > 0), and are a convenient way of tracking dependences on c. The reader should interpret νa(c) to be some constant that depends on c (and T and ∆, which are fixed), but is independent of (cid:96). The main lemma of this section is the following. Lemma 4.2. Set (cid:98)τ = max(ln τ, 2). Let fv(x) be the pdf of ln ρv. For x ≤ (cid:98)τ , fv(x) ≥ ν1(c). We will first prove Lemma 4.2 as a direct result of two claims stated below. Then we will prove these claims in the subsequent subsections. The first claim, the more technical of the two, shows that ln ρv has a sufficiently large probability of attaining a constant value. Claim 4.3. There exists a constant C > (cid:98)τ , such that the probability that ln ρv lies in [(cid:98)τ , C] is at least ν2(c) and that of lying in [−C,−(cid:98)τ ] is also at least ν2(c). The next claim will be a consequence of the unimodularity of fv(x). Claim 4.4. For any x ∈ [x1, x2], fv(x) ≥ min(fv(x1), fv(x2)). Now for the proof of Lemma 4.2. 4.3.1. Proving Claim 4.3. We begin with notational setup. We fix some vertex v. For conve- x ∈ [x1, x2]. By Claim 4.4, for any such x, fv(x) = Ω(ν2(c)). Therefore, we can bound fv(x) ≥ ν1(c), for some positive function ν1. Proof. (of Lemma 4.2) By Claim 4.3, the probability that ln ρv lies in I := [−C,−(cid:98)τ ] is at least ν2(c). Therefore, (C −(cid:98)τ ) maxx∈I fv(x) ≥ ν2(c). Suppose the maximum is achieved at x1. This means that there exists x1 ∈ [−C,−(cid:98)τ ], fv(x1) = Ω(ν2(c)). Similarly, there exists some x2 ∈ [(cid:98)τ , C] such that fv(x2) = Ω(ν2(c)). Observe that for any x such that x ≤ (cid:98)τ , nience, define the variables (cid:98)αi (for all i ≤ (cid:96)). If zi = 0, set (cid:98)αi = αi and (cid:98)αi = βi otherwise. We can write ln ρv =(cid:80) i ln(cid:98)αi. The random variable (cid:98)αi is uniform in [1 − bi, 1 + bi], where bi is either bα or bβ appropriately. Set the zero mean random variable Xi = ln(cid:98)αi − E[ln(cid:98)αi]. -- The pdf of ln(cid:98)αi, denoted by hi(x), is given as follows. For x ∈ [ln(1 − bi), ln(1 + bi)], -- E[ln(cid:98)αi] = O(c2/(cid:96)), E[X 2 Proof. The pdf of (cid:98)αi is hα(x) = 1/2bα for x ∈ [1 − bα, 1 + bα] and zero otherwise. For any monotone function F (x), the pdf of F ((cid:98)αi) is given by dF −1(x)/dxh(x). Setting F as √ i ] = Θ(c2/(cid:96)), and E[Xi3] = O(cE[X 2 i ]/ hi(x) = ex/2bi, and zero otherwise. We have the following series of facts. Claim 4.5. (cid:96)). Improving Stochastic Kronecker Graphs A:19 the function ln, the pdf of ln αi, hi(x), is given by ex/2bα for x ∈ [ln(1− bα), ln(1 + bα)] and zero otherwise. E[ln(cid:98)αi] = (cid:90) ln(1+bi) (cid:12)(cid:12)(cid:12)ln(1+bi) ln(1−bi) ln(1−bi) (cid:90) ln(1+bi) ln(1−bi) − Using integration by parts, (cid:90) ln(1+bi) ln(1−bi) xexdx = [xex] exdx xhi(x)dx = (2bi)−1 xexdx (cid:90) ln(1+bi) ln(1−bi) = [(1 + bi) ln(1 + bi) − (1 − bi) ln(1 − bi)] − [(1 + bi) − (1 − bi)] = bi ln(1 − b2 i ) + ln(1 + bi) − ln(1 − bi) − 2bi Taking absolute values, (cid:12)(cid:12)(cid:12)(cid:90) ln(1+bi) ln(1−bi) (cid:12)(cid:12)(cid:12) ≤ bi ln(1 − b2 xexdx i ) + ln(1 + bi) − ln(1 − bi) − 2bi The first term is at most 2b3 i . For the second term, we need a finer Taylor approximation. ln(1 + bi) − ln(1 − bi) − 2bi ≤ (bi − b2 ln(1 + bi) − ln(1 − bi) − 2bi ≥ (bi − b2 i ) − (−bi − b2 i /2 − b3 i /2) − 2bi ≤ b3 i ) − 2bi ≥ −b3 i i All in all, E[ln(cid:98)αi] ≤ O(b2 i ) = O(c2/(cid:96)). i /2 + b3 i /2) − (−bi − b2 i ] = E[(ln(cid:98)αi)2] − (E[ln(cid:98)αi])2 (cid:90) ln(1+bi) E[X 2 E[(ln(cid:98)αi)2] = (2bi)−1 x2exdx ln(1−bi) To get an upper bound for this term, we use the following inequalities: ln(1 + bα) ≤ 2bα, i ). For a ln(1 − bα) ≥ −2bα, ex ≤ e. That gives E[(ln(cid:98)αi)2] ≤ e(2bi)−1(cid:82) 2bi−2bi lower bound, we use: ln(1 + bα) ≥ bα/2, ln(1 − bα) ≤ −bα/2, ex ≥ 1/e. Hence, E[(ln(cid:98)αi)2] ≥ (2ebi)−1(cid:82) bi/2 i for i ] ≤ i , which is much small than b2 For the final bound, we use a trivial estimate. We have E[Xi3] ≤ max(Xi)E[X 2 i ). Note that (E[ln(cid:98)αi])2 ≤ b4 sufficiently small bi. We conclude that E[X 2 −bi/2 x2dx = Ω(b2 i ) = Θ(c2/(cid:96)). x2dx = O(b2 i ] = Θ(b2 2biE[X 2 i ]. We now state the Berry-Esseen Theorem [Berry 1941; Esseen 1942], a crucial ingredient of our proof. This theorem bounds the convergence rate of a sum of independent random variables to a Gaussian. Theorem 4.6. [Berry-Esseen] Let X1, X2, . . . , X(cid:96) be independent random variables with E[Xi] = 0, E[X 2 i . Let F (x) denote the cumulative distribution function (cdf ) of S and Φ(x) be the cdf of the standard normal (the pdf is (2π)−1/2e−x2/2). Then, for an absolute constant C1 > 0, i ] = ξ2 i ξ2 i Xi/(cid:112)(cid:80) i , and E[Xi3] = ιi < ∞. Let S be the sum(cid:80) (cid:17)−3/2(cid:88) i Xi = (ln ρv−E[ln ρv])/(cid:112)(cid:80) i E[ln(cid:98)αi] = O(c2) and (cid:80) F (x) − Φ(x) ≤ C1 (cid:16)(cid:88) i E[X 2 ξ2 i ιi. i i sup Proof. (of Claim 4.3) We set X =(cid:80) E[ln ρv] = (cid:80) i E[ln(cid:98)αi] ≤(cid:80) x i E[X 2 i ]. By Claim 4.5, i ] = Θ(c2). Note that X is A:20 just an increasing linear function of ln ρv. Set function r(x) = (x − E[ln ρv])/(cid:112)(cid:80) r((cid:98)τ ) is some constant function of c, we can find a constant C such the r(C) is strictly larger than r((cid:98)τ ). Setting y1 = r((cid:98)τ ), y2 = r(C) and using the notation from Theorem 4.6, i E[X 2 i ], so X = r(ln ρv). For any interval I = [x1, x2], Pr[ln ρv ∈ I] = Pr[X ∈ [r(x1), r(x2)]]. Since C. Seshadhri, A. Pinar, T. G. Kolda Pr[X ∈ [y1, y2]] = F (y2) − F (y1) = Φ(y2) − Φ(y1) + (F (y2) − Φ(y2)) + (Φ(y1) − F (y1)) ≥ Φ(y2) − Φ(y1) − F (y2) − Φ(y2) − F (y1) − Φ(y1). √ √ By Claim 4.5 ιi = O(cξ2 i / i )−1/2 = O(1/ Since y1 < y2 and are constant functions of c, Φ(y2) − Φ(y1) ≥ ν3(c). By the Berry- i ιi. i = Θ(c2). So the Berry-Esseen bound is at most (cid:96)). By setting C to be a large enough constant, we can ensure We deduce that Pr[X ∈ [x1, x2]] ≥ ν2(c), for some positive function ν2. A similar proof Esseen theorem (Theorem 4.6), F (x2) − Φ(x2) + F (x1) − Φ(x1) ≤ 2C1((cid:80) 2C1c((cid:80) that Φ(y2) − Φ(y1) > 2C1c((cid:80) holds for [−C,−(cid:98)τ ]. (cid:96)) and (cid:80) i )−3/2(cid:80) i ξ2 i ξ2 i )−1/2. i (cid:96)ξ2 i (cid:96)ξ2 4.3.2. Proving Claim 4.4. We state some technical definitions and results about convolutions of unimodal functions. decreasing on (−∞, a) and non-increasing on (a,∞). if there exists an a ∈ R such that f is non- Definition 4.7. A pdf f (x) is unimodal A pdf f (x) is log-concave if Q := {x : f (x) > 0} is an interval and ln f (x) is a concave function (on the interval Q). A theorem of Ibragimov [Ibragimov 1956] gives some convolution properties of unimodal log-concave functions. Theorem 4.8. modal pdf. The convolution f ∗ g is also unimodal. [Ibragimov] Let f (x) be a unimodal log-concave pdf and g(x) be a uni- Claim 4.9. The pdf fv(x) is unimodal. Proof. We have ln ρv = (cid:80) i ln(cid:98)αi. By Claim 4.5, the pdf of ln(cid:98)αi is hi(x) = ex/2bi. Note that hi(x) is unimodal. Furthermore, ln hi(x) = x − ln 2bi, which is concave. Since ln ρv is the sum of independent random variables, the pdf fv(x) is the convolution of the individual pdfs. Repeated applications of Ibragimov's theorem (Theorem 4.8) tells us that fv(x) is unimodal. Proof. (of Claim 4.4) By the unimodality of fv, fv is either non-decreasing, non- increasing, or non-decreasing and then non-increasing in the interval [x1, x2]. Regardless of which case, for any y ∈ [x1, x2], f (y) ≥ min(f (x1), f (x2)). 4.4. Basic claims for NSKG We now reprove some of the basic claims for NSKG. Note that when we look at E[Xd], the expectation is over both the randomness in T and the edge insertions. We use T to denote the set of matrices T1, T2, . . . , T(cid:96). Conditioning on T simply means conditioning on a fixed choice of the noise. Claim 4.10. Let vertex v ∈ Sr. Choose the noise for NSKG at random, and let pv be the probability (conditioned on T) that a single edge insertion produces an out-edge at v. (Note that pv is itself a random variable, where the dependence on T is given by ρv.) (1 − 4σ2)(cid:96)/2τ rρv n . pv = Improving Stochastic Kronecker Graphs A:21 Proof. This is identical to the proof of Claim 3.3. Consider a single edge insertion. For an edge insertion to be incident to v, the edge must go into the half corresponding to the binary representation of v. If the ith bit of v is 0, then the edge should drop in the top half at this level, and this happens with probability (1/2 + σi). On the other hand, if this bit is 1, then the edge should drop in the bottom half, which happens with probability (1/2− σi). Let the bit representation of v be (z1, z2, . . . , z(cid:96)). Then, pv = (cid:18) 1 (cid:89) (cid:18) 1 2 i:zi=0 (cid:19) (cid:89) (cid:19)(cid:96)/2+r(cid:18) 1 i:zi=1 + σi = ρv + σ 2 2 (cid:19) (cid:19)(cid:96)/2−r − σi (cid:18) 1 2 − σ = = (cid:89) (cid:18) 1 2 αi + σ i:zi=0 ρv(1 − 4σ2)(cid:96)/2 (cid:19) − σ (cid:19) (cid:89) (cid:18) 1 (cid:18) 1/2 + σ (cid:19)r i:zi=1 βi 2 · (1 − 4σ2)(cid:96)/2τ rρv n . = 2(cid:96) √ 1/2 − σ √ m) and d = o( √ As before, we will assume that pv = o(1/ n). Even though pv is a random variable, the probability that it is larger than 1/ m can be neglected. (This was discussed in more detail before Lemma 3.5). We stress that in the following, the probability that v has outdegree d is itself a random variable. √ Claim 4.11. Let v be a vertex in slice r, d = o( n), and pv = o(1/ m). Then for √ NSKG, we have (λv)d Pr[deg(v) = dT] = (1 ± o(1)) Proof. We follow the proof of Lemma 3.5. We approximate(cid:0)m (cid:18)m (cid:19) √ by e−xm, for x = o(1/ n). This approximation is performed in the first step below. We remind the reader that λv = λρv. By Claim 4.10 and the above approximations, (cid:1) by md/d! and (1−x)m−d √ m) and d = o( (cid:19)m−d exp(λvτ r) d! · d (τ r)d 1 − (1 − 4σ2)(cid:96)/2τ rρv v(1 − pv)m−d = pd d (cid:19)d n d (cid:19)d(cid:18) (cid:18) (1 − 4σ2)(cid:96)/2τ rρv (cid:18)m (cid:19)(cid:18) (1 − 4σ2)(cid:96)/2τ rρv (cid:18) − (1 − 4σ2)(cid:96)/2τ rρvm md d! (cid:19) n n · · exp = (1 ± o(1)) n [∆(1 − 4σ2)(cid:96)/2ρv]dτ rd = (1 ± o(1)) = (1 ± o(1)) (λρv)d d! · d! (τ r)d exp(λρvτ r) . exp(−∆(1 − 4σ2)(cid:96)/2ρvτ r) 4.5. Bounds for degree distribution We complete the proof of Theorem 4.1. We break it down into some smaller claims. By and large, the flow of the proof is similar to that for the standard SKG. The main difference comes because the probabilities discussed in Claim 4.11 are random variables depending on the noise. The following claim is fairly straightforward, given the previous analysis of standard SKG. This is where we apply the Taylor approximations to show the Gaussian behavior depicted in Figure 3. A:22 C. Seshadhri, A. Pinar, T. G. Kolda Claim 4.12. Consider some setting of the NSKG noise. Define gv(r) = r ln τ−ln(d/λv). The expected number of vertices of degree d conditioned on T is E[XdT] = 1 ± o(1) √ 2πd (cid:96)/2(cid:88) (cid:88) exp(cid:2)−dgv(r)2/2(cid:3) r=−(cid:96)/2 v∈Sr Proof. By fixing some T, the λvs are fixed. We use Claim 4.11, linearity of expectation, and Stirling's approximation in the following. EG[Xd] = (cid:88) (cid:96)/2(cid:88) v∈Sr (cid:96)/2(cid:88) r=−(cid:96)/2 1 ± o(1) √ 2πd (1 ± o(1)) (cid:88) exp(λvτ r) (τ r)d λd v d! (cid:18) eλv (cid:19)d (τ r)d r=−(cid:96)/2 v∈Sr d exp(λvτ r) = exp(d + d ln λv + rd ln τ − d ln d − λvτ r). Choose a v ∈ Sr.(cid:18) eλv (cid:19)d d = (τ r)d exp(λvτ r) Define fv(r) = rd ln τ − λvτ r − d ln d + d ln λv + d, where r is an integer. We have r = (ln d − ln λv + gv(r))/ ln τ . fv(r) = d ln d − d ln λv + dgv(r) − egv(r)d − d ln d + d ln λv + d = d(1 + gv(r) − egv(r)). If gv(r) < 1, then we can approximate fv(r) = −d[gv(r)2/2 + Θ(gv(r)3)], and get exp(fv(r)) = (1 ± o(1)) exp(−dgv(r)2/2). This is analogous to the beginning of the proof of Claim 3.8. Suppose gv(r) ≥ 1. Then, arguing as in the proof of Claim 3.7, we deduce that exp(fv(r)) ≤ 2−(cid:96). The sum of all these terms over v is just a lower order term. So, we can substitute this by exp(−dgv(r)2/2). Hence, we can bound E[XdT] = 1 ± o(1) √ 2πd (cid:96)/2(cid:88) (cid:88) exp(cid:2)−dgv(r)2/2(cid:3) r=−(cid:96)/2 v∈Sr We now reach the main challenge of this proof. The quantity E[exp(−dgv(r)2/2)] is eval- uated by averaging over all noise. Note that the actual graph has no effect on this quantity. Lemma 4.13. Consider r = Γd = (cid:98)θd(cid:101). E[exp(−dgv(r)2/2)] ≥ ν4(c)√ d Proof. Define ξr,d = (r − θd) ln τ . Since θd = ln(d/λ)/ ln τ , gv(r) = r ln τ − ln(d/λv) = r ln τ − ln(d/λ) + ln ρv = ξr,d + ln ρv Hence, E[exp(−dgv(r)2/2)] = E[exp[−d(ln ρv + ξr,d)2/2]] Since we set r = (cid:98)θd(cid:101), ξr,d ≤ (ln τ )/2. Let us now evaluate the expectation. The pdf of ln ρv is denoted by fv. The expectation is given by an integral. To distinguish the d referring to degree, and the d referring to the infinitesimal, we shall use (d) in parenthesis for the We have ξr,d ≤ (ln τ )/2 and(cid:98)τ = max(2, ln τ ). Hence,(cid:98)τ + ξr,d ≥ 1 and −(cid:98)τ + ξr,d ≤ −1. −∞ E[exp(−dgv(r)2/2)] ≥ ν1(c) exp[−dx2/2](dx) − (cid:105) (cid:105) (dx) e−x2/2dx − 2 (cid:104)(cid:90) +∞ (cid:90) −1 − −∞ −∞ exp[−dx2/2] √ (cid:104)(cid:90) +∞ d) −∞ = (ν1(c)/ √ (cid:90) +∞ 1 (cid:90) +∞ √ d exp[−dx2/2](dx) (cid:105) e−x2/2dx Improving Stochastic Kronecker Graphs A:23 infinitesimal. We hope this slight abuse of notation will not create a problem, since our integrals are not too confusing. By Lemma 4.2, fv(x) ≥ ν1(c) for x ≤(cid:98)τ . E[exp(−dgv(r)2/2)] = exp[−d(x + ξr,d)2/2]fv(x)(dx) −∞ ≥ ν1(c) = ν1(c) (cid:90) +∞ (cid:90) (cid:98)τ (cid:90) (cid:98)τ +ξr,d −(cid:98)τ (cid:104)(cid:90) +∞ −(cid:98)τ +ξr,d (cid:90) −(cid:98)τ +ξr,d −∞ − = ν1(c) exp[−d(x + ξr,d)2/2](dx) exp[−dx2/2](dx) exp[−dx2/2](dx) − (cid:90) +∞ (cid:98)τ +ξr,d exp[−dx2/2](dx) exp[−dx2/2] (dx) bounded by (cid:82) +∞ The first integral is just √ term is at most 2e−d2/2/ ν4(c) such that E[exp(−dgv(r)2/2)] ≥ ν4(c)/ √ y √ d. 2π. The second is a tail probability of the standard Gaussian, e−x2/2dx < e−y2/2/y (Lemma 2, pg. 175 of [Feller 1968]). The second π (for sufficiently large d). Therefore, we can set function d < 2πd)(cid:80) Proof of Theorem 4.1. This is a direct consequence of the previous claims. Set r = Γd. By Claim 4.12 and linearity of expectation, E[Xd] = E[E[XdT]] ≥ ((1 − √ E[exp(−dgv(r)2/2)]. Lemma 4.13 tells us that E[exp(−dgv(r)2/2)] ≥ √ o(1))/ ν4(c)/ d. Hence, E[Xd] ≥ ν(c) (cid:1). v∈Sr (cid:0) (cid:96) d (cid:96)/2+Γd 4.6. Subtleties in adding noise One might ask why we add noise in this particular fashion, and whether other ways of adding noise are equally effective. Since we only need (cid:96) random numbers, it seems intuitive that adding "more noise" could only help. For example, we might add noise on a per edge basis, i.e., at each level i of every edge insertion, we choose a new random perturbation Ti of T . Interestingly, this version of noise does not smooth out the degree distribution, as shown in Figure 6. In this figure, the red curve corresponds to the degree distribution of the graph generated by NSKG with Graph500 parameters, (cid:96) = 26, and b = 0.1. The blue curve corresponds to generation by adding noise per edge. As seen in this figure, adding noise per edge has hardly any effect on the oscillations, while NSKG provides a smooth degree distribution curve. (These results are fairly consistent over different parameter choices.) It is crucial that we use the same noisy T1, . . . , T(cid:96) for every edge insertion. A:24 C. Seshadhri, A. Pinar, T. G. Kolda Fig. 6: Comparison of degree distribution of graphs generated by NSKG and by adding noise per edge for Graph500 parameters and (cid:96) = 26. 5. EXPECTED NUMBER OF ISOLATED VERTICES In this section, we give a simple formula for the number of isolated vertices in SKG. We focus on the symmetric case, where t2 = t3 in the matrix T . We assume that (cid:96) is even in the following, but the formula can be extended for (cid:96) being odd. The real contribution here is a clearer understanding of how many vertices SKG leaves isolated and how the SKG parameters affects this number. Theorem 5.1. Consider SKG with T symmetric and let I denote the number of isolated vertices. With probability 1 − o(1), I = (1 ± o(1)) exp(−2λτ r). (3) r=(cid:96)/2(cid:88) (cid:18) (cid:96) (cid:19) r=−(cid:96)/2 (cid:96)/2 + r Claim 5.2. Let qr be the probability that a single edge insertion produces an in-edge or out-edge incident to v ∈ Sr. Then, for SKG with T symmetric, qr = (1 ± o(1)) 2(1 − 4σ2)(cid:96)/2τ r . n Proof. Let Eo (resp. Ei) be the event that a single edge insertion is an in-edge (resp. out-edge) of v. We have qr = Pr(Eo) + Pr(Ei)− Pr(Eo ∪Ei). By Claim 3.3 and the symmetry to T , the first two probabilities are (1−4σ2)(cid:96)/2τ r . The last is the probability that the edge insertion leads to a self-loop at v. This is at most σ(cid:96) Pr(Eo). Since σ < 1, this is o(Pr(Eo)). n √ As before, we can assume that qr ≤ 1/ √ m. By Claim 3.4, if qr ≥ pr ≥ 1/ m, then with probability tending to 1, vertices in slice r are not isolated. Hence, we can ignore such vertices when computing estimates for I. √ Claim 5.3. Let v ∈ Sr and assume qr ≤ 1/ m. Then, for SKG with T symmetric, Proof. Using Claim 5.2 and (1 − x)m = (1 ± o(1))e−xm, for x ≤ 1/ √ m, Pr[v is isolated] = (1 ± o(1)) exp(−2λτ r). (1− qr)m = (1± o(1)) exp(−2(1± o(1))∆(1− 4σ2)(cid:96)/2τ r) = (1± o(1)) exp(−2(1± o(1))λτ r). For large (cid:96), this converges to exp(−2λτ r). Improving Stochastic Kronecker Graphs A:25 Proof of Theorem 5.1. By Claim 5.3 and linearity of expectation, the expected num- ber of isolated vertices is (1 ± o(1)) r=(cid:96)/2(cid:88) (cid:18) (cid:96) (cid:19) r=−(cid:96)/2 (cid:96)/2 + r exp(−2λτ r). To bound that actual number of isolated vertices, we use concentration inequalities for functions of independent random variables. Let Y denote the number of isolated vertices, and X1, X2, . . . , Xm be the labels of the m edge insertions. Note that all the Xi's are independent, and Y is some fixed function of X1, X2, . . . , Xm. Suppose we fix all the edge insertions and just modify one insertion. Then, the number of isolated vertices can change by at most c = 2. Hence, the function defining Y satisfies a Lipschitz condition. This means that changing a single argument of Y (some Xi) modifies the value of Y by at most a constant (c). By McDiarmid's inequality [McDiarmid 1989], (cid:18) − 22 c2m (cid:19) . Pr[Y − E[Y ] > ] < 2 exp √ m log m is o(1). The expected number of vertices is at least (cid:0) (cid:96) m log m, we get the probability that Y deviates from its expectation by more (cid:1) exp(−2λ), and (cid:96)/2 √ Setting  = √ than m log m is a lower order term with respect to this quantity. This completes the proof. The fraction of isolated vertices in a slice r is essentially exp(−λτ r). Note that τ is larger than 1. Hence, this is a decreasing function of r. This is quite natural, since if a vertex v has many zeros in its representation (higher slice), then it is likely to have a larger degree (and less likely to be isolated). This function is doubly exponential in r, and therefore decreases quickly with r. The fraction of isolates rapidly goes to 0 (resp. 1) as r is positive (resp. negative). 5.1. Effect of noise on isolated vertices The introduction of noise was quite successful in correcting the degree distribution but has little effect on the number of isolated vertices. This is not surprising, considering the noise affects fat tail behavior of the degree distribution. The number of isolated vertices is a different aspect of the degree distribution. The data presented in Table V clearly shows that the number of isolated vertices is quite resistant to noise. While there is some decrease in the number of isolated vertices, this quantity is very small compared to the total number of isolated vertices. We have observed similar results on the other parameter settings. Table V: Percentage of isolated vertices with different noise levels for the GRAPH500 parameters and (cid:96) = 26 Max. noise level (b) % isolated vertices 0 0.05 0.06 0.07 0.08 0.09 0.1 51.12 49.26 49.12 49.06 49.07 49.16 49.34 A:26 C. Seshadhri, A. Pinar, T. G. Kolda In addition to this empirical study, we can also give some mathematical intuition behind these observations. The equivalent statement of Claim 5.3 for NSKG is Pr[v is isolated] ≥ (1 − o(1)) exp(−2λτ r) = (1 − o(1))[exp(−2λτ r)]ρv The noiseless version of this probability is [exp(−2λτr)]. Note that the probability now is a random variable that depends on T , since ρv depends on the noise. Lemma 4.13 tells us that ln ρv lies mostly in the range [1 − c(cid:48)/ (cid:96)] (for constant c(cid:48)), and is concentrated close to 1. √ (cid:96), 1 + c(cid:48)/ √ We are mainly interested in the case when the probability that v is isolated is not van- ishingly small (is at least, say 0.01). As (cid:96) grows, ρv is close to being 1, and deviations are quite small. So, when we take the noiseless probability to the ρvth power, we get almost the same value. 5.2. Relation of SKG parameters to the number of isolated vertices: When λ decreases, the number of isolated vertices increases. Suppose we fix the SKG matrix and average degree ∆, and start increasing (cid:96). Note that this is done in the Graph500 benchmark, to construct larger and larger graphs. The value of λ decreases exponentially in (cid:96), so the number of isolated vertices will increase. Our formula suggests ways of counteracting this problem. The value of ∆ could be increased, or the value σ could be decreased. But, in general, this will be a problem for generating large sparse graphs using a fixed SKG matrix. When σ increases, then λ decreases and τ increases. Nonetheless, the effect of λ is much stronger than that of τ . Hence, the number of isolated vertices will increase as σ increases. In Table II, we compute the estimated number of isolated vertices in graphs for the Graph500 parameters. Observe how the fraction of isolated vertices consistently increases as (cid:96) is in- creased. For the largest setting of k = 42, only one fourth of the vertices are not isolated. 6. K-CORES IN SKG Structures of k-cores are an important part of social network analysis [Carmi et al. 2007; Alvarez-Hamelin et al. 2008; Kumar et al. 2010], as they are a manifestation of the com- munity structure and high connectivity of these graphs. Definition 6.1. Given an undirected graph G = (V, E), the subgraph induced by set S ⊆ V , is denoted by GS := (S, E(cid:48)), where E(cid:48) contains every edge of E that is completely contained in S. For an undirected graph, the k-core of G the largest induced subgraph of minimum degree k. The max core number of G is the largest k such that G contains a (non-empty) k-core. (These can be extended to directed versions: a k-out-core is a subgraph with min out-degree k.) A bipartite core is an induced subgraph with every vertex has either a high in-degree or out-degree. The former are called authorities and the latter are hubs. Large bipartite cores are present in web graphs and are an important structural component [Gibson et al. 1998; Kleinberg 1999]. Note that if we make the directed graph undirected (by simply removing the directions), then a bipartite core becomes a normal core. Hence, it is useful to compute cores in a directed graph by making it undirected. We begin by comparing the sizes of k-cores in real graphs, and their models using SKG [Leskovec et al. 2010]. Refer to Figure 7. We plot the size of the maximum k-core with k. The k at which the curve ends is the max core number. (For CAHepPh, we look at undirected cores, since this is an undirected graph. For WEBNotreDame, a directed graph, we look at out-cores. But the empirical observations we make holds for all other core versions.) For both our examples, we see how drastically different the curves are. By far the most important difference is that the curve for the SKG versions are extremely short. This means that the max core number is much smaller for SKG modeled graphs compared to their real counterparts. For the web graph WEBNotreDame, we see the presence of large cores, Improving Stochastic Kronecker Graphs A:27 Fig. 7: Core decompositions of real graphs and their SKG model. Observe that the max core of SKG is an order of magnitude smaller. probably an indication of some community structure. The maximum core number of the SKG version is an order of magnitude smaller. Minor modifications (like increasing degree, or slight variation of parameters) to these graphs do not increase the core sizes or max cores numbers much. This is a problem, since this is strongly suggesting that SKG do not exhibit localized density like real web graphs or social networks. If we wish to use SKG to model real networks, then it is imperative to understand the be- havior of max core numbers for SKG. Indeed, in Table VI, we see that our observation is not just an artifact of our examples. SKG consistently have very low max core number. Only for the peer-to-peer Gnutella graphs does SKG match the real data, and this is specifically for the case where the max core number is extremely small. For the undirected graph (the first three co-authorship networks), we have computed the undirected cores. The corresponding SKG is generated by copying the upper triangular part in the lower half to get a symmetric matrix (an undirected graph). The remaining graphs are directed, and we simply remove the direction on the edges and compute the total core. Our observations hold for in and out cores as well, and for a wide range of data. This is an indication that SKG is not generating sufficiently dense subgraphs. Table VI: Core sizes in real graphs and SKG version Graph CAGrQc CAHepPh CAHepTh CITHepPh CITHepTh P2PGnutella25 P2PGnutella30 SOCEpinions WEBNotreDame Real max core SKG max core 43 238 31 30 37 5 7 67 155 4 16 5 19 19 5 6 43 31 A:28 C. Seshadhri, A. Pinar, T. G. Kolda We focus our attention on the max core number of SKG. How does this number change with the various parameters? The following summarizes our observations. Empirical Observation 6.2. For SKG with symmetric T , we have the following ob- servations. (1 ) The max core number increases with σ. By and large, if σ < 0.1, max core numbers are extremely tiny. (2 ) Max core numbers grow with (cid:96) only when the values of σ are sufficiently large. Even then, the growth is much slower than the size of the graph. For smaller σ, max core numbers exhibit essentially negligible growth. (3 ) Max core numbers increase essentially linearly with ∆. Large max core numbers require larger values of σ. As mentioned in §5, increasing σ increases the number of isolated vertices. Hence, there is an inherent tension between in- creasing the max core number and decreasing the number of isolated vertices. For the sake of consistency, we performed the following experiments on the max core after taking a symmetric version of the SKG graph. Our results look the same for in and out cores as well. In Figure 8a, we show how increasing σ increases the max core number. We fix the values of (cid:96) = 16 and m = 6 × 216. (There is nothing special about these values. Indeed the results are basically identical, regardless of this choice.) Then, we fix t1 (or t2) to some value, and slowly increase σ by increasing t2 (resp. t1). We see that regardless of the fixed values of t1 (or t2), the max core consistently increases. But as long as σ < 0.1, max core numbers remain almost the same. In Figure 8b, we fix matrix T and average degree ∆, and only vary (cid:96). For WEB- NotreDame5, we have σ = 0.18 and for CA-HEP-Ph, we have σ = 0.11. For both cases, increasing (cid:96) barely increases the max core number. Despite increasing the graph size by 8 orders of magnitude, the max core number only doubles. Contrast this with the Graph500 setting, where σ = 0.26, and we see a steady increase with larger (cid:96). This is a predictable pattern we notice for many different parameter settings: larger σ leads to larger max core numbers as (cid:96) goes up. Finally, in Figure 8c, we see that the max core number is basically linear in ∆. 6.1. Effect of noise on cores Our general intuition is that NSKG mainly redistributes edges of SKG to get a smooth degree distribution, but does not have major effects on the overall structure of the graph. This is somewhat validated by our studies on isolated vertices and reinforced by looking at k-cores. In Figure 9, we plot the core decompositions of SKG and two versions on NSKG (b = 0.05 and b = 0.1). We observe that there are little changes in these decompositions, although there is a smoothening of the curve for Graph500 parameters. The problem of tiny cores of SKG is not mitigated by the addition of noise. 7. CONCLUSIONS For a true understanding of a model, a careful theoretical and empirical study of its prop- erties in relation to its parameters is imperative. This not only provides insight into why certain properties arise, but also suggests ways for enhancement. One strength of the SKG model is its amenability to rigorous analysis, which we exploit in this paper. We prove strong theorems about the degree distribution, and more significantly show how adding noise can give a true lognormal distribution by eliminating the oscillations in degree distributions. Our proposed method of adding noise requires only (cid:96) random numbers 5Even though the matrix T is not symmetric, we can still define σ. Also, the off diagonal values are 0.20 and 0.21, so they are almost equal. Improving Stochastic Kronecker Graphs A:29 (a) Varying σ (b) Varying (cid:96) (c) Varying ∆ Fig. 8: We plot the max core number against various parameters. In the first picture, we plot the max core number of an (symmetric) SKG graph with increasing σ. Next, we show how the max core number increases with (cid:96), the number of levels. Observe the major role that the matrix σ plays. For Graph500, σ is much larger than the other parameter sets. Finally, we show that regardless of the parameters, the max core number increases linearly with ∆. all together, and is hence cost effective. We want to stress that our major contribution is in providing both the theory and matching empirical evidence. The formula for expected number of isolated vertices provides an efficient alternative to methods for computing the full degree distribution. Besides requiring fewer operations to compute and being less prone to numerical errors, the formula transparently relates the expected number of isolated ver- tices to the SKG parameters. Our studies on core numbers establish a connection between the model parameters and the cores of the resulting graphs. In particular, we show that A:30 C. Seshadhri, A. Pinar, T. G. Kolda (a) GRAPH500 (b) WebNotreDame Fig. 9: We plot the core decomposition of SKG and NSKG (with 2 settings of noise) for the different parameters. Observe that there is only a minor change in core sizes with noise. (c) CAHepPH commonly used SKG parameters generate tiny cores, and the model's ability to generate large cores is limited. ACKNOWLEDGMENT We are grateful to David Gleich for the MATLAB BGL library as well as many helpful discussions. We thank Todd Plantenga for creating large SKG and NSKG instances, and for generating Figure 1. We also thank Jon Berry for checking our Graph500 predictions against real data, and also David Bader and Richard Murphy for discussions about the Graph500 benchmark. We acknowledge the inspiration of Jennifer Neville and Blair Sullivan, who inspired us with their different work on SKG during recent visits to Sandia. Improving Stochastic Kronecker Graphs A:31 REFERENCES Alvarez-Hamelin, J. I., Dall'Asta, L., Barrat, A., and Vespignani, A. 2008. K-core decomposition of internet graphs: hierarchies, self-similarity and measurement biases. Networks and Heterogenous Media 3, 2, 371 -- 393. Andersen, R. and Chellapilla, K. 2009. Finding dense subgraphs with size bounds. In Algorithms and Models for the Web-Graph. Springer, 25 -- 37. Berry, A. 1941. The accuracy of the gaussian approximation to the sum of independent variates. Trans- actions of the American Mathematical Society 49, 1, 122 -- 136. Bi, Z., Faloutsos, C., and Korn, F. 2001. The "DGX" distribution for mining massive, skewed data. In KDD '01. ACM, 17 -- 26. Carmi, S., Havlin, S., Kirkpatrick, S., Shavitt, Y., and Shir, E. 2007. A model of internet topology using k-shell decomposition. PNAS 104, 27, 11150 -- 11154. Chakrabarti, D. and Faloutsos, C. 2006. Graph mining: Laws, generators, and algorithms. ACM Com- puting Surveys 38, 1. Chakrabarti, D., Zhan, Y., and Faloutsos, C. 2004. R-MAT: A recursive model for graph mining. In SDM '04. 442 -- 446. Clauset, A., Shalizi, C. R., and Newman, M. E. J. 2009. Power-law distributions in empirical data. SIAM Review 51, 4, 661 -- 703. Esseen, C.-G. 1942. A moment inequality with an application to the central limit theorem. Skand. Aktua- rietidskr 39, 160 -- 170. Feller, W. 1968. An Introduction to probability theory and applications: Vol I 3rd Ed. John Wiley and Sons. Gibson, D., Kleinberg, J., and Raghavan, P. 1998. Inferring web communities from link topology. In HYPERTEXT '98. ACM, 225 -- 234. Gkantsidis, C., Mihail, M., and Zegura, E. W. 2003. Spectral analysis of internet topologies. In INFO- COM 2003. IEEE, 364 -- 374. Goltsev, A. V., Dorogovtsev, S. N., and Mendes, J. F. F. 2006. k-core (bootstrap) percolation on complex networks: Critical phenomena and nonlocal effects. Phys. Rev. E 73, 5, 056101. Graph500 Steering Committee. 2012. Graph 500 benchmark. Available at http://www.graph500.org/ specifications. Groer, C., Sullivan, B. D., and Poole, S. 2011. A mathematical analysis of the R-MAT random graph generator. Networks 58, 3, 159 -- 170. Ibragimov, I. A. 1956. On the composition of unimodal distributions. Theory of Probability and its Appli- cations / Volume 1 / Issue 2 1, 2, 255 -- 260. Kim, M. and Leskovec, J. 2010. Multiplicative attribute graph model of real-world networks. arXiv:1009.3499v2. Kleinberg, J. M. 1999. Authoritative sources in a hyperlinked environment. J. ACM 46, 5, 604 -- 632. Kumar, R., Novak, J., and Tomkins, A. 2010. Structure and evolution of online social networks. In Link Mining: Models, Algorithms, and Applications. Springer, 337 -- 357. Leskovec, J., Chakrabarti, D., Kleinberg, J., and Faloutsos, C. 2005. Realistic, mathematically tractable graph generation and evolution, using Kronecker multiplication. In PKDD 2005. Springer, 133 -- 145. Leskovec, J., Chakrabarti, D., Kleinberg, J., Faloutsos, C., and Ghahramani, Z. 2010. Kronecker graphs: An approach to modeling networks. J. Machine Learning Research 11, 985 -- 1042. Leskovec, J. and Faloutsos, C. 2007. Scalable modeling of real graphs using kronecker multiplication. In ICML '07. ACM, 497 -- 504. Mahdian, M. and Xu, Y. 2007. Stochastic kronecker graphs. In Algorithms and Models for the Web-Graph. Springer, 179 -- 186. Mahdian, M. and Xu, Y. 2011. Stochastic Kronecker graphs. Random Structures & Algorithms 38, 4, 453 -- 466. Conference version appeared as [Mahdian and Xu 2007]. McDiarmid, C. 1989. On the method of bounded differences. Surveys in Combinatorics 141, 148 -- 188. Miller, B., Bliss, N., and Wolfe, P. 2010. Subgraph detection using eigenvector L1 norms. In NIPS 2010. 1633 -- 1641. Mitzenmacher, M. 2003. A brief history of generative models for power law and lognormal distributions. Internet Mathematics 1, 2, 226 -- 251. Mitzenmacher, M. 2006. The future of power law research. Internet Mathematics 2, 4, 525 -- 534. A:32 C. Seshadhri, A. Pinar, T. G. Kolda Moreno, S., Kirshner, S., Neville, J., and Vishwanathan, S. V. N. 2010. Tied Kronecker product graph models to capture variance in network populations. In Proc. 48th Annual Allerton Conf. on Communication, Control, and Computing. 1137 -- 1144. Motwani, R. and Raghavan, P. 1995. Randomized Algorithms. Cambridge University Press. Pennock, D., Flake, G., Lawrence, S., Glover, E., and Giles, C. L. 2002. Winners don't take all: Characterizing the competition for links on the web. PNAS 99, 8, 5207 -- 5211. Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H., and Zhao, B. Y. 2010. Measurement-calibrated graph models for social network experiments. In WWW '10. ACM, 861 -- 870.
1801.06498
1
1801
2018-01-19T17:27:50
Optimal Active Social Network De-anonymization Using Information Thresholds
[ "cs.SI" ]
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considered where the attacker has partial prior knowledge of the group membership graph and receives noisy responses to its real-time queries. The victim's identity is assumed to be chosen randomly based on a given distribution which models the users' risk of visiting the malicious website. A de-anonymization algorithm is proposed which operates based on information thresholds and its performance both in the finite and asymptotically large social network regimes is analyzed. Furthermore, a converse result is provided which proves the optimality of the proposed attack strategy.
cs.SI
cs
Optimal Active Social Network De-anonymization Using Information Thresholds Farhad Shirani Department of Electrical and Computer Engineering New York University New York, New York, 11201 Email: [email protected] Siddharth Garg Department of Electrical and Computer Engineering New York University New York, New York, 11201 Email: [email protected] Elza Erkip Department of Electrical and Computer Engineering New York University New York, New York, 11201 Email: [email protected] 8 1 0 2 n a J 9 1 ] I S . s c [ 1 v 8 9 4 6 0 . 1 0 8 1 : v i X r a Abstract-In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query her social media activity for the purpose of de-anonymization using the minimum number of queries. A stochastic model of the problem is considered where the attacker has partial prior knowledge of the group membership graph and receives noisy responses to its real-time queries. The victim's identity is assumed to be chosen randomly based on a given distribution which models the users' risk of visiting the mali- cious website. A de-anonymization algorithm is proposed which operates based on information thresholds and its performance both in the finite and asymptotically large social network regimes is analyzed. Furthermore, a converse result is provided which proves the optimality of the proposed attack strategy. I. Introduction Preserving user privacy is a key obstacle to the continued digitalization of the society. Consumers increasingly view the ability to connect, communicate and collaborate over the inter- net without risking their personal information as an absolute necessity. Unfortunately, this is far from the case in practice. For instance, websites track users to serve them with targeted digital advertisements. More disturbingly, web tracking can be used by state actors to stifle individuals' free speech rights, or target vulnerable minority groups. As a result, there is an urgent need to understand and quantify web users' privacy risk, that is, what is the likelihood that users on the internet can be uniquely identified using their online fingerprints? A user's fingerprint is the set of attributes that reflect the user's web activities: websites the user has visited and social network groups that a user is a member of [1], [2], char- acteristics of the user's web browser (font size, for example) [3], and physical device features [4]. Fingerprinting based de- anonymization attacks build on the empirical observation that, for a large enough set of attributes, a user's fingerprints are unique. The challenge, from an attacker's standpoint, is that an unknown user's fingerprints may not be accurately or easily available; i.e., fingerprints may be noisy and the attacker may have to actively query user devices, one attribute at a time, to measure their fingerprint. However, an attacker may only be able to issue a limited number of queries to the user's device. Fig. 1: (Left) An example of a group membership bipartite graph. (Right) A user is to be de-anonymized based on partial fingerprints. Recently, Wondracek et al. [5] proposed a practical finger- printing attack strategy which uses the user's social media group memberships for the purposes of de-anonymization. In this strategy, the attacker runs a malicious website and seeks to de-anonymize users who visit the website. To this end, the attacker first uses a web gather to scrape the group memberships of users in the social network. This serves as the attacker's prior knowledge of the network which can be represented as a bipartite graph. This is shown in the left illustration in Figure 1. Note that the attacker's scanned version of the group membership graph might be different from the actual network graph because of users' privacy settings that act as a source of noise. When an unknown user visits the attacker's website, the attacker queries social network group memberships to find the user's identity. This is done by using browser history sniffing to ask questions of the form "is the webpage of social network group v in the user's browser history?" If yes, the attacker assumes that the user is a member of the social network group v, and if no then the attacker assumes the user is not a member of v. Of course, a user might be a member of a group they have not visited, or conversely, might not be a member of a group they have visited; consequently, the attacker's measurement is noisy. In this way, the attacker obtains the unknown user's partial fingerprint. This is shown in the right illustration in Figure 1. By matching the partial fingerprint in the two graphs, the unknown user is de-anonymized. Although effective, Wondracek et al.'s attack does not answer fundamental questions about the optimal number and type of group memberships to query, and the order in which to issue queries. Other fingerprinting attacks proposed in literature [5]–[10] have also adopted similar ad-hoc approaches without theoretical guarantees or analyses. In [11], we proposed a mathematical formulation for Won- dracek et al.'s browser history sniffing attack [5], introduced a new strategy by making analogies to channel coding, and quantified the amount of information the attacker obtains from each query. This formulation is summarized in Section II. We showed that under the assumption that users are equally likely to visit the attacker's website, the total number of queries required for de-anonymization grows logarithmically in the number of users. Furthermore, the coefficient of the logarithm is inversely proportional to the mutual information between the random variables corresponding to the edges in the two graphs in Figure 1. In [11], we assumed that the victim's index is distributed uniformly over the set of all user indices. However, internet users typically vary in terms of their activity levels on the web. More active users would be more likely to visit an attacker's website, resulting in a non-uniform distribution on the user index J. In this work, we propose an information- threshold-based de-anonymization strategy which builds upon the joint source-channel coding methods studied in [12]– [14] to devise fingerprinting attacks when the user distribution is not uniform. Roughly speaking, in the new strategy, the attacker would query the selected anonymous user's attributes sequentially and calculate the amount of information obtained, i.e. the amount of uncertainty regarding each user index based on previous query responses. The attack ends when the uncertainty is lower than a given threshold for one of the user indices. In this strategy, the user distribution only affects the initial information values. Furthermore, we provide a tight converse which proves that the strategy is optimal in terms of expected number of queries required for de-anonymization. The rest of the paper is organized as follows: In Section II, we provide the problem formulation. In Section III, we introduce and analyze the new attack strategy. Section IV in- cludes the converse result for active de-anonymization attacks. Section V concludes the paper. II. Problem Formulation In this section, we provide a rigorous formulation of the active fingerprinting problem. This is a generalization of the formulation provided in [11]. We model the group member- ships in the social network by a bipartite graph. The bigraph is defined below: Definition 1. An (n, m)-bigraph is a structure gn,m = (U,R,E), where (U(cid:83)R,E) is a graph such that U = n and V = m. The set V = U(cid:83)R is called the vertex set and is partitioned into two subsets: 1) the user set U = {u1, u2,··· , um}, and 2) the group set R = {r1, r2,··· , rn}. The set E ⊆ {(i, j)i ∈ [1, m], j ∈ [1, n]} is called the edge set. Definition 2. Let gn,m be an (n, m)-bigraph characterized by the triple (U,R,E), then, • For a group r j, j ∈ [1, n], the set E j = {i(i, j) ∈ E}, j ∈ [1, n] is called the set of members of r j. • For a user ui, i ∈ [1, m], the set Fi = { j(i, j) ∈ E}, i ∈ [1, m] is called the set of groups associated with ui. • The group signature of user ui is the vector Fi (Fi,1, Fi,2,··· , Fi,n), where = 1 0 if ui ∈ Ek, otherwise. Fi,k = = (Fi,n1 , Fi,n1+1,··· , Fi,n2) is called a • The vector Fn2 partial group signature of ui, where 1 ≤ n1 ≤ n2 ≤ n. i,n1 Definition 3. An (n, m, p)-random bigraph is a structure gn,m,p = (U,R,EEE), such that i) gn,m = (U,R,EEE) is an (n, m)- bigraph, and ii) The edge set EEE is generated randomly based on the distribution: P(EEE = E) = pE(1 − p)(nm−E), = (g0 n,m,PE0 ,E1 n,m,p0 , g1 n,m,p1), where i) gi where E ⊆ {(i, j)i ∈ [1, m], j ∈ [1, n]}. Definition 4. A correlated pair of random bigraphs (CPRB) n,m,pi , i ∈ {0, 1} is a pair g is an (n, m, pi)-random bigraph with P(Ei = 1) = pi, i ∈ {0, 1}, and ii) The edge sets EEEi, i ∈ {0, 1} are generated based on the (cid:16) joint probability distribution: if e0 = e1 P PE0(α)PE1(β), Otherwise where α, β ∈ {0, 1}2, e1, e2 ∈ {(i, j)i ∈ [1, m], j ∈ [1, n]}, and 1(·) is the indicator function. PE0,E1(α, β), 1(e0 ∈ EEE0) = α, 1(e1 ∈ E1E1E1) = β) (cid:17) = The following defines an active de-anonymization problem: Definition 5. An active de-anonymization problem is charac- terized by the quadruple (g YZ ), where n,m,p1) is a CPRB, the random variable g J[m] is defined on the alphabet J[m] = [1, m], and the variables n,m,PE0 ,E1 Y and Z are binary random variables. , PJ[m] , PUID YZ , PGM n,m,p0 , g1 n,m,PE0 ,E1 = (g0 In the above definition, g0 n,m,p0 represents the group mem- bership graph and g1 n,m,p1 represents the attacker's scanned graph. The random variable J[m] is the index of the user uJ[m] which is to be de-anonymized. For brevity, we write J instead of J[m] when there is no ambiguity. We assume a memoryless and time-invariant stochastic noise model for the responses to the attacker's queries. The variable Z represents the correct response to the attacker's query, where Z = 1 indicates a 'yes' response, and the variable Y represents the noisy response received by the attacker after making the query. As explained in [11], the set of possible queries is divided into two categories: i) User identity (UID): a UID query asks if the unknown victim uJ is user u j in the network, and ii) group Membership Queries (GM): a GM asks if the unknown YZ and PGM victim uJ is a member of the group ri. Hence, the conditional distributions PUID YZ are the distribution of the response received by the attacker given the correct response to the attacker's UID and GM queries, respectively. Due to practical considerations explained in [11], we assume that the responses to the UID queries are received noiselessly (i.e. PUID = I2, YZ where I2 is the unitary matrix). Loosely speaking, UID queries provide information regarding a single user index whereas GM queries provide information regarding all of the user indices in the corresponding group. As a result, it is often desirable to send GM queries when there is uncertainty among a large subset of user indices and UID queries when it is verified that the anonymous user is in a small subset of users. At time t ∈ N, the attacker uses the vector of prior responses Yt−1 and the scanned graph g1 n,m,p1 to choose the next query xt. An attack strategy provides the sequence of functions xt(Yt−1 n,m,p1). If the attacker sends the UID query corresponding to the user u j, we write xt = u j, and if it sends the GM query corresponding to the group ri, we write xt = ri. Definition 6. An attack strategy χ for the active de- YZ ) is defined anonymization problem (g n,m,PE0 ,E1 ×{0, 1}(t−1) → R∪U, t ∈ as a sequence of functions xt : g1 N. The random process Zt, t ∈ N is defined as the sequence of correct responses: YZ , PGM , PJ, PUID n,m,p1 , g1 1 1 if xt = ri & J ∈ E0 ri or xt = uJ, Zt = 0 Otherwise. The random process Yt, t ∈ N is the sequence of received responses. The Markov chains Yt ↔ Zt ↔ xt, Yt−1, Zt−1, t ∈ N hold. Furthermore, PUID YZ PGM YZ PYtZt = if xt ∈ U if xt ∈ R . 1 1 Finally, the random process Ut, t ∈ N is the sequence of expected responses based on the scanned graph g1 n,m,p1: if xt = ri & J ∈ E1 ri or xt = uJ, Ut = 0 Otherwise. The performance of an attack strategy is measured based on the average number of queries required for successful de- anonymization. Definition 7. For a given attack strategy characterized by χ = (xt(yt−1 ))t∈N, the number of queries required for successful de- anonymization is defined as Q (cid:44) min{t(xt, yt) = (uJ, 1)}. Definition 8. For the active de-anonymization problem YZ ), the minimum expected number of (g queries is defined as: YZ , PGM , PJ, PUID n,m,PE0 ,E1 1 ¯Q (cid:44) min xt:{0,1}(t−1)→R∪U,t∈N E(Q), , J and Yt, Zt, t ∈ N. where the expectations is over g n,m,PE0 ,E1 III. The Information Threshold Strategy In [11], we considered the de-anonymization problem under the assumption that the victim's index J, is distributed uniformly over the index set [1, m]. Here, we relax this assumption and consider the problem when the victim's index is distributed according to an arbitrary probability distribution PJ which is known a-priori to the attacker. This models the varying levels of risk averseness and risk tolerance for users over the network. More risk tolerant users are more likely to visit an attacker's website. Hence the corresponding user index is more likely to be de-anonymized. is The information threshold strategy (ITS) a de- anonymization strategy which operates by comparing the 'information value' of each user index with an information threshold. The information values represent the amount of uncertainty in each user index given the received query re- sponses. We provide bounds on the performance of the ITS for arbitrary PGM YX and PJ, and show that the expected number of queries is proportional to the user index entropy H(J) and is inversely proportional to the mutual information I(U; Y) between the random variables corresponding to the received and expected responses. When the index J is uniformly distributed, the first order performance (i.e. the coefficient of the logarithmic term for the expected number of queries) of the ITS is the same as that of the typical set strategy (TSS) in [11]. However, the ITS outperforms the TSS in the second order sense in the expected number of queries (i.e. the coefficient of the terms which are asymptotically smaller than the logarithmic term is improved.). We proceed to describe the strategy. Definition 9. For the pair of random variables (X, Y) defined on the probability space (X × Y, 2X×Y, PX,Y), where X and Y are finite sets, the information density is defined as: ∀(x, y) ∈ X × Y. iX;Y(x; y) = log PYX(yx) PY(y) , Let Ut, Yt and Zt be binary random processes defined in Definition 6. Fix  > 0 and l ∈ N. Also, define the joint distribution: PU,Y,Z(u, y, z) (cid:44) PZ(z)PE1E0(uz)PGM YZ (yz). (1) At the initial stage, the attacker forms an m-length vector of 'information values' corresponding to the vector of users (ui)i∈[1,m]. The initial information value for user j ∈ [1, m] is defined as: I0( j) (cid:44) log 1 PJ( j) . Once the vector of information values is formed, the attack progresses in l steps. In each step, the attacker sends group membership queries sequentially starting with the query cor- responding to the first group r1, and proceeding by increasing the group index. Hence, it makes queries regarding the values = (FJ,1, FJ,2,··· , FJ,τ∗) defined in Definition 2, where of Zτ∗ τ∗ is defined later. The attacker receives the noisy sequence of responses (Y1, Y2,··· , Yτ∗). The information value query number n(cid:48) is defined below: , Yn(cid:48) ) − I0( j), j ∈ [1, m], n(cid:48) ∈ [1, τ ∗], In(cid:48)( j) = iUn(cid:48) ;Yn(cid:48) (Un(cid:48) GM queries are concluded if there exists at least one index j for which the information value Iτ∗( j) is larger than the infor- mation threshold log 1  . More precisely, the attacker defines }, j ∈ [1, m], and the stopping time τ∗ = min j∈[1,m] τ j. The attacker then finds the user with the maximum information value: 1  τ j = min{n(cid:48) ≥ 0 : In(cid:48)( j) ≥ log (cid:98)J = argmax j∈[1,m]Iτ∗( j). Next, the attacker sends a UID query to verify that the user index is equal to (cid:98)J. In other words, it transmits xτ∗+1 = u(cid:98)J. The algorithms ends if the output yτ∗+1 = 1 is received. If the attacker fails to recover J in this step, it proceeds to the next step. In summary, the attack strategy in the first step is given below: rt ui(cid:98)J xt = if t ≤ τ∗, if t = τ∗ + 1. If the UID returns a negative response, in the next step, the attacker resets the information values to their initial values. It repeats the previous step for the next set of group indices. If the attack strategy reaches the lth step, all of the possible UID's are sent for all remaining users until the user is de- anonymized. The number of steps 'l(cid:48) is chosen such that the probability of reaching the lth step is small enough. We denote the number of queries in this attack strategy by QITS . The following theorem provides bounds on the expected number of queries: Theorem 1. For the ITS strategy: E(QITS ) ≤ 1 (1 − ) + imax + 1 m 2 l, (2) where imax (cid:44) maxu,y iU;Y(u; y), and PU,Y is defined in equation (1), provided that the number of groups 'n' satisfies  I(U; Y)  H(J) + log 1  H(J) + log 1  I(U; Y) log m , and l (cid:44)  +  < n. 1 (1 − )l Particularly, if  = log log m inequality + imax + 1 (3) log m log log m−log log log m , then the IV. Converse Theorems for Active De-anonymization In this section, we prove that the bound provided in The- orem 1 is tight in the first order sense (i.e. the coefficient of H(J) in Equation (4) cannot be improved.). To this end, we build upon the converse of Burnashev's reliability function for point-to-point communication over channels with noiseless feedback [12], [13], [15]. More specifically, for a given active de-anonymization strategy, we introduce a dual code for communication over a channel with feedback, and use the converse results in [12], [13], [15] to provide bounds on the optimal performance. In our analogy, the victim's index in the fingerprinting problem is analogous to the message which is to be sent over the channel with feedback and the queries are analogous to the channel inputs. The following provides the standard definition for a variable length code for a discrete memoryless channel with feedback. Definition 10. A (T, )-variable length code for the channel with feedback (U,Y, PYU) transmitting message J (with al- phabet J) is defined by: i) the common information V ∈ V shared between the encoder and decoder prior to the start functions (cid:98)Jn : V × Yn (cid:55)→ J, and iv) a non-negative integer- of the communication, ii) a sequence of encoding functions Un : V × J × Yn−1 (cid:55)→ U, n ∈ N, iii) a sequence of decoding by (cid:98)J = (cid:98)Jτ(V, Y τ). The average transmission time for a given code is  = P((cid:98)J (cid:44) J). code is defined as T = E(τ). The probability of error for the The reconstruction of the message at the decoder is given valued random variable τ. We use the following result: Lemma 1. [12] The average transmission time for a family of (Tn, n)-variable length block codes for the channel with noiseless feedback (U,Y, PYU) is lower-bounded by: Tn ≥ H(J) I(U; Y) + O(n), where n → 0 as n → ∞. The following provides a converse for the performance of , PJ[mt] , PUID active de-anonymization strategies: YZ ), t ∈ N be a Theorem 2. Let (g sequence of active de-anonymization problems where mt → ∞ as t → ∞ and nt is an arbitrary sequence. Consider the sequence of attack strategies χt, t ∈ N. Define ¯Qχt as the expected number of queries for successful de-anonymization for the strategy χt. Then, YZ , PGM nt,mt,PE0 ,E1 ¯Qχt ≥ H(J[mt]) I(U; Y) + O(log mt). E(QITS ) ≤ H(J[m]) I(U; Y) + O(log log m) holds, provided that H(J[m]) I(U; Y) log log m < n. (4) (5) Proof. Please refer to the appendix. Remark 1. In Theorem 1, we have assumed that the number of groups n satisfies: (cid:3)  H(J) + log 1  I(U; Y) 1 (1 − )  + + imax + 1 m 2 l < n. Proof. Please refer to the Appendix. (cid:3) V. Conclusion We have studied the active de-anonymization problem for general non-equiprobable user indices. We have introduced the ITS de-anonymization strategy which operates based on information thresholds. The new strategy measures the amount of uncertainty in the user indices given the received query responses. We have characterized the performance of the ITS both for social networks with a fixed, finite number of users as well as for asymptotically large social networks. Finally, we have provided a converse which shows the first-order optimality of the proposed approach. Appendix A. Proof of Theorem 1 index J in the ith step. We have the following: E (QITS ) = P (E1) E (QITSE1) + P The proof builds upon the method in [12]. Fix  > 0 and l ∈ N. Let τ j, τ∗, and (cid:98)J be defined as in Section III. Let Ei, i ∈ [1, l − 1] be the event that (cid:98)J is equal to the victim's (cid:92) (cid:17)  · m  l(cid:92)  + P  l−2(cid:92)  · m  l−2(cid:92)  l(cid:92) l−1(cid:88) (cid:92) (cid:16) (cid:17) E(cid:16) QITS l−2(cid:92)  E (cid:92) QITSEc (cid:92) (cid:16) (cid:17)  ((l − 1) E(τ E2 ∗) + l − 1) + P El−1 ∗) + 2) + ··· El−1 ∗) + 1) + P (cid:92) (cid:92) = P (E1) (E(τ + ··· (2E(τ El−1 + P + P Ec 1 Ec 1 Ec i Ec i Ec i Ec i E2 1 i=1 Ec i E2 i=1 i=1 i=1 2 i=1 2 (a)= i (1 − ) i−1 (E (τ i=1 1 (1 − ) = (E (τ ∗) + 1) + ∗) + 1) + 2 l−1, m m 2 l−1 (6) where (a) follows from the fact that the events Ei are mutually independent and equiprobable with P(Ei) = 1− , i ∈ [1, l− 1]. Next, we derive an upper-bound for E(τ∗). Proposition 1. The following bound on the expectation of τ∗ holds: E(τ ∗) ≤ H(J) + log 1  I(U; Y) + imax . Proof. First, note that E(τ∗) ≤ E(τJ) by definition of τ∗. So, it is enough to prove the upper bound on E(τJ). Fix j ∈ N. Let t = min{τJ, j}. Note that: E (It (J)) = E(cid:16)  t(cid:88) (a)= E iUt;Yt Ut; Yt(cid:17)(cid:17) − Io( j) (cid:16) (cid:17) − H (J) (cid:16) iU;Y U j; Y j (b)= I(U; Y)E(t) − H(J), j=1 where in (a) we have used the memoryless property of the network and (b) follows from the smoothing property of expectation and the fact that iU;Y (U; Y) is constant in j. Also, note that It(J) is an increasing function of t and at each step the increment is less than or equal to imax. It follows that: E (It (J)) ≤ E (It−1 (J)) + imax ≤ log 1  + imax, where we have used the fact that iU;Y(u, y) ≤ imax,∀u, y ∈ U×Y and that by the definition of τJ, we have It−1(J) ≤ log 1 since t − 1 < τJ. So, far we have shown that I(U; Y)E(t) − + imax,∀ j ∈ N. By the monotone convergence H(J) ≤ log 1 theorem it follows that I(U; Y)E(τJ) − H(J) ≤ log 1 + imax. (cid:3) This completes the proof of the proposition.    Applying the above proposition to Equation (6) gives: m 2 l−1. E (QITS ) ≤ 1 (1 − )  H (J) + log 1  I (U; Y) + 1 + imax  + + O(cid:0)log log m(cid:1) . log m , and l = E (QITS ) ≤ H (J) I (U; Y) Take  = log log m log m log log m−log log log m, then The bounds in (3) and (5) follow from the fact that from the ) ≤ l. This completes the proof Markov inequality, P(τ∗ > of Theorem 1. E(τ∗) l B. Proof of Theorem 2 We provide an outline of the proof. For the given attack strategy χn = (Xt)t∈N, we define the dual code for communica- tion over the channel with feedback (U,Y, PYU) which trans- mits the message J[m] as follows. At time t, assume that the sequence Yt−1 is noiselessly available at the transmitter through feedback. The encoder first calculates the query Xt(Yt−1) given the the attack strategy χn when the attacker is to de-anonymize the user index J[m]. If Xt is a GM query corresponding to the group rt, then Ut = 1(uJ[m] ∈ rt) is transmitted as the channel input. If Xt is a UID query corresponding to the user u(cid:98)J[m] next. If J[m] = (cid:98)J[m], the all-ones sequence of length trep is , then the transmitter uses a repetition code as described transmitted, and if J[m] (cid:44) (cid:98)J[m], the all-zeros sequence of length trep is transmitted, where trep will be determined later. The decoder uses a majority logic decoder for the repetition code to determine whether the response to the UID query is positive or not. By construction, the probability of error of this sequence of codes m is proportional to the probability of error of the repetition code since if the response to the UID query is positive and correctly decoded, then the transmission is succsessful. Hence, the probability of error approaches 0 as m → ∞ if trep = ω(log ( 1 )). Let Tm be the expected transmission time for this code. The statement of theorem follows from Lemma 1 by taking m = ω( 1 m m): ¯Qχn ≥ Tm + Θ(trep) ≥ H(J) I(U; Y) + O(log m). References [1] S. Kinsella, V. Murdock, and N. O'Hare. "i'm eating a sandwich in In Proceedings of the 3rd glasgow": Modeling locations with tweets. International Workshop on Search and Mining User-generated Contents, SMUC '11, pages 61–68, New York, NY, USA, 2011. ACM. [2] Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A content-based approach to geo-locating twitter users. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, pages 759–768, New York, NY, USA, 2010. ACM. [3] D. Gruss, D. Bidner, and S. Mangard. Practical memory deduplication attacks in sandboxed javascript. In European Symposium on Research in Computer Security, pages 108–122. Springer, 2015. [4] H. Kim, S. Lee, and J. Kim. Inferring browser activity and status through remote monitoring of storage usage. In Proceedings of the 32Nd Annual Conference on Computer Security Applications, ACSAC '16, pages 410– 421, New York, NY, USA, 2016. ACM. [5] G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A practical attack In 2010 IEEE Symposium on to de-anonymize social network users. Security and Privacy, pages 223–238, May 2010. [6] D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints–an In 2009 International Conference on Computational emerging threat. Science and Engineering, volume 3, pages 271–276, Aug 2009. [7] M. Jakobsson and S. Stamm. Invasive browser sniffing and countermea- In Proceedings of the 15th International Conference on World sures. Wide Web, WWW '06, pages 523–532, New York, NY, USA, 2006. ACM. [8] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, C. Kruegel, and S. Antipolis. Abusing social networks for automated user profiling. In In RAID, 2010. [9] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, pages 551–560. ACM, 2009. [10] M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social network as a side-channel. In in Proceedings of the ACM Conference on Computer and Communications Security (CCS, 2012. [11] F. Shirani, S. Garg, and E. Erkip. An information theoretic framework for active de-anonymization in social networks based on group mem- berships. In 2017 55rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept 2017. [12] V. Kostina, Y. Polyanskiy, and S. Verdu. Joint source-channel coding with feedback. IEEE Transactions on Information Theory, 63(6):3502– 3515, 2017. [13] M. V. Burnashev. Data transmission over a discrete channel with feedback. random transmission time. IProblems Inform. Transmission, 12(4):250–265, 1976. [14] C. E. Shannon. Coding theorems for a discrete source with a fidelity criterion. In IRE Nat. Conv. Rec., Pt. 4, pages 142–163. 1959. [15] P. Berlin, B. Nakiboglu, B. Rimoldi, and E. Telatar. A simple converse of burnashev's reliability function. IEEE Transactions on Information Theory, 55(7):3074–3080, 2009. [16] F. Shirani, S. Garg, and E. Erkip. Optimal Active Social Network De- anonymization Using Information Thresholds . arXiv preprint arXiv.org, 2018.
1804.09196
1
1804
2018-04-24T18:18:23
The quantitative measure and statistical distribution of fame
[ "cs.SI", "physics.soc-ph" ]
Fame and celebrity play an ever-increasing role in our culture. However, despite the cultural and economic importance of fame and its gradations, there exists no consensus method for quantifying the fame of an individual, or of comparing that of two individuals. We argue that, even if fame is difficult to measure with precision, one may develop useful metrics for fame that correlate well with intuition and that remain reasonably stable over time. Using datasets of recently deceased individuals who were highly renowned, we have evaluated several internet-based methods for quantifying fame. We find that some widely-used internet-derived metrics, such as search engine results, correlate poorly with human subject judgments of fame. However other metrics exist that agree well with human judgments and appear to offer workable, easily accessible measures of fame. Using such a metric we perform a preliminary investigation of the statistical distribution of fame, which has some of the power law character seen in other natural and social phenomena such as landslides and market crashes. In order to demonstrate how such findings can generate quantitative insight into celebrity culture, we assess some folk ideas regarding the frequency distribution and apparent clustering of celebrity deaths.
cs.SI
cs
Preprint - Ramirez and Hagen 8 1 0 2 r p A 4 2 ] I S . s c [ 1 v 6 9 1 9 0 . 4 0 8 1 : v i X r a The quantitative measure and statistical distribution of fame Edward D. Ramirez and Stephen J. Hagen* Physics Department, University of Florida, Gainesville Florida 32611-8440 USA * [email protected] Abstract Fame and celebrity play an ever-increasing role in our culture. However, despite the cultural and economic importance of fame and its gradations, there exists no consensus method for quantifying the fame of an individual, or of comparing that of two individuals. We argue that, even if fame is difficult to measure with precision, one may develop useful metrics for fame that correlate well with intuition and that remain reasonably stable over time. Using datasets of recently deceased individuals who were highly renowned, we have evaluated several internet-based methods for quantifying fame. We find that some widely-used internet-derived metrics, such as search engine results, correlate poorly with human subject judgments of fame. However other metrics exist that agree well with human judgments and appear to offer workable, easily accessible measures of fame. Using such a metric we perform a preliminary investigation of the statistical distribution of fame, which has some of the power law character seen in other natural and social phenomena such as landslides and market crashes. In order to demonstrate how such findings can generate quantitative insight into celebrity culture, we assess some folk ideas regarding the frequency distribution and apparent clustering of celebrity deaths. Introduction The phenomena of fame and celebrity are increasingly important in our culture. With the rapid expansion of electronic media, fame plays a growing role in commerce, media, and public affairs, as well as in legal and academic spheres [1]. Social media have boosted the visibility of celebrities of all kinds, allowing individuals to acquire or lose fame overnight [2]. Celebrity endorsements offer value to businesses, political campaigns and cultural organizations. Fame affects the economic value of names and trademarks [3], and it aids professional advancement in a variety of fields. Researchers have explored some aspects of fame, such as the psychological motives of the would-be famous [4] and sex bias in assessments of fame [5]. Several studies have also attempted to correlate the fame of well known individuals with measures of their professional achievement [6] [7] [8] [9] [10] [11], which is measured by different tools in different fields. Remarkably however, although fame clearly exists in degrees there is no consensus on its quantitative measure: researchers who have attempted to quantify fame have relied on a variety of ad hoc measures that have not themselves been evaluated or calibrated. One common such measure has been search engine results. Following Schulman's proposal [12] that an individual's fame is revealed by the number of web pages returned from an internet search for his/her name, many researchers have used Google hits to quantify fame. Google hits (denoted GH, the number of web pages returned in a Google 1/17 Preprint - Ramirez and Hagen search for an individual's name) has been used to quantify the fame of WWI flying aces [6] and chess masters [9] as well as physicists [10]. Similarly, some researchers have used Wikipedia data, including page views and other measures of Wikipedia presence, to quantify the fame of athletes [8] and historical figures [11] and to predict movie box office success [13]. Other social media tools have also been employed to measure attributes related to fame; one study used the number of Twitter followers [7] to gauge the social media visibility of a sampling of scientists. There are alternatives to using internet tools or social media to measure fame. Psychological researchers have studied how panels of human subjects judge the fame of well-known individuals [5] [14]. A recent "culturomics" study tracked the rise and fall of individuals' fame on historical time scales by measuring the frequency of their mention in a large database of digitized texts [2]. Some journalists regard the length of an individual's obituary, as well as its advance preparation, as indices of fame [15]. Nevertheless internet tools such as GH are convenient to use. Unfortunately, researchers have generally not attempted to validate these tools by testing whether they give results consistent with other measures or intuitive indicators of fame. It is remarkable that no metric has been tested for measuring a phenomenon that is unequally distributed and yet has demonstrable utility and economic value across fields. Furthermore, studies of fame have often failed to define it separately from related concepts such as celebrity, professional accomplishment, and media profile. This lack of precision hinders the quantitative study of fame and its accurate valuation. It also prevents serious assessment of common claims about celebrity and fame: The often-made assertions that an unusual number of famous individuals died within a given year [16], or that famous deaths occur in clusters [17], or that famous musicians die young [18], cannot be assessed unless fame can be quantified. This article aims to demonstrate that, starting from a clear definition of fame, internet-derived metrics of fame can be found that correlate with quantitative human judgments of fame, and that using these metrics one may gain insight into some of the statistical properties of fame. For clarity we begin by defining an individual's fame as his/her degree of renown, or state of being well known, to a population. We do not assume that the fame of an individual correlates with accomplishment as judged by that population, or that the metrics of accomplishment favored by that population are also metrics of fame. In contrast we define celebrity as the close media attention that is provided to the most famous individuals; thus a celebrity is one whose ordinary activities receive media attention. Fame and celebrity correlate, but they are not the same. These definitions accord with those of Drake and Miah [1], who described a celebrity as a mediated public persona. By our definition the fame of an individual can be measured as a snapshot taken from the perspective of a given population at a particular time. Metrics that gauge renown among different populations at different times may not agree completely. We do not attempt to measure the fame that individuals may have enjoyed in the past, or the peak fame that they achieved. Rather our approach is to study a diverse group of renowned individuals at one common time point in their career – the year following their death – and to quantify their fame at that time point. We do this by measuring their renown among a group of survey subjects. The survey data provides a baseline, quantitative fame score that we then compare against some plausible internet or social media metrics of fame. employed on a larger scale to evaluate the renown of many individuals. We then use one such metric to investigate some statistical properties of fame and demonstrate how these statistics can provide insight into some folk ideas regarding the frequency of famous deaths. In this way we identify metrics of fame that can be easily 2/17 Preprint - Ramirez and Hagen Methods Data sources We investigated the fame of deceased individuals only. This is in part because we intended to use the findings to test folk claims regarding the frequency of celebrity deaths. However we also sought to minimize concerns related to name ownership and consent among the individuals whose fame we were evaluating. We also limited our study to those who had died within the year or so prior to this investigation, so as to avoid having to devise corrections for possible changes in the fame of individuals after their death. We generated three lists (denoted NBC, Wiki, and NYT) of renowned individuals who died in 2016 or 2017. No individual appeared in more than one list. The NBC list consisted of 126 highly renowned individuals whose deaths occurred during the full year 2016 and received mention in NBC Online [19]. The Wiki list consisted of 78 names drawn at random from 642 individuals who (as of March 2017) were named on Wikipedia.org as having died during the month of January 2017 [20]. The NYT list consisted of two parts, totaling 147 individuals who were named in the New York Times online obituaries [21] as having died during two months in 2017; One part (NYT 1) is 75 individuals who died in February 2017, while the other part (NYT 2) is 72 individuals who died in June 2017. Survey metric (p ratings) In order to generate an intuitive and quantitative scale for fame, against which we could compare various other possible metrics for fame, we first used a survey, based on pairwise comparisons, to rank a list of twenty famous individuals according to their renown. The individuals named on the survey are listed in Table 1. They were selected on the basis of (1) having died during 2016, with their obituaries widely reported in news media, and therefore being plausibly described as famous; (2) spanning a sufficient range in renown that statistically significant differences in their rankings could emerge from the data analysis; (3) being known in fields for which the survey subjects likely possessed relevant general knowledge. Fifty undergraduate students at the University of Florida were recruited as subjects to complete the survey. Therefore the list in Table 1 is a sampling of major political and historical figures, top American athletes, stars of popular films and music, authors of books often read by students, and similar figures. The list excludes individuals associated with more specialized interests, such as cabinet secretaries, academics, playwrights, foreign athletes, classical musicians, and so forth. Each survey subject was presented with a list of fifty different pairs of names, drawn from the twenty names in Table 1. Each pair of names could be presented in either order (A : B or B : A). The survey subject was asked to indicate a preference within each pair by identifying the name about which he/she had greater knowledge. The subject could also select a "no preference" option if he/she felt equally knowledgeable about both names. The fifty pairings on each survey form were computer-selected at random from the 380 possible pairs that can be generated from twenty names. Each subject received a unique, randomized version of the survey. The list of names was limited to twenty so that each of the possible name pairs could be presented to multiple survey subjects, without requiring a survey of excessive length. Thus, with twenty names and fifty subjects, each being offered fifty comparisons, the survey offered each pair of names to approximately 13 subjects. If instead 40 names had been tested, then 1560 name pairings would be possible and either the number of subjects or the length of the survey would have had to increase fourfold to achieve the same coverage. Of the fifty name pairs offered to each subject, subjects responded with an average 3/17 Preprint - Ramirez and Hagen V W d t d E W d t d V W H G N G E W 3 3 8 , 0 5 2 0 0 0 , 0 0 3 , 9 6 0 0 0 , 0 8 2 9 0 9 , 0 1 3 7 5 , 0 1 1 0 0 0 , 0 0 8 , 9 3 0 0 0 , 9 4 1 5 7 9 , 3 1 7 0 1 , 9 9 1 0 0 0 , 0 0 0 , 8 6 7 0 0 0 , 0 2 5 , 2 2 0 1 , 0 1 6 1 5 , 6 3 5 8 6 , 3 1 5 6 5 , 7 4 4 0 9 , 5 1 6 9 , 3 0 1 5 , 9 1 4 8 3 , 5 2 5 6 , 3 8 8 0 , 3 4 3 9 , 3 8 5 4 , 0 1 6 3 2 , 1 1 0 8 5 , 2 7 0 3 , 8 0 0 7 , 2 5 7 3 , 3 1 7 7 , 3 1 4 5 , 1 9 7 5 , 2 5 8 5 , 1 1 6 6 7 6 5 9 1 1 1 0 2 4 2 9 3 3 2 2 1 4 1 2 4 0 1 9 2 1 3 9 7 9 4 4 6 2 6 , 2 4 0 0 0 , 0 0 2 , 3 1 0 0 2 , 3 2 5 5 4 , 4 4 0 0 0 , 0 0 3 , 6 3 0 0 0 , 2 1 1 0 9 6 , 7 1 1 0 0 0 , 5 8 5 6 6 5 , 2 3 0 0 0 , 0 0 6 , 9 5 0 0 0 , 2 6 0 0 1 , 5 1 3 1 8 , 5 1 1 0 0 0 , 0 0 0 , 3 0 4 0 0 0 , 2 3 4 5 1 6 , 2 7 0 0 0 , 0 0 0 , 5 2 1 0 9 9 , 8 1 1 0 0 0 , 0 0 3 , 7 2 3 8 0 , 5 8 0 0 0 , 0 0 6 , 0 1 7 9 2 , 6 0 2 0 0 0 , 1 3 6 0 0 0 , 4 8 0 0 9 , 5 9 0 0 4 , 0 2 0 0 5 , 1 2 4 4 1 , 6 6 1 0 0 0 , 0 0 5 , 0 3 0 0 0 , 0 2 2 , 1 0 5 9 , 9 0 1 0 0 0 , 0 4 5 7 3 5 , 3 3 0 0 0 , 0 6 5 , 6 4 9 5 , 1 1 0 0 0 , 0 0 6 , 8 7 3 3 2 , 7 1 6 1 8 , 3 1 3 8 7 , 6 1 2 5 8 , 8 2 1 0 0 0 , 0 7 9 , 8 0 0 0 , 0 7 3 , 4 0 0 0 , 9 5 4 0 0 0 , 5 5 3 0 0 0 , 3 1 0 6 9 , 8 0 0 5 , 1 4 0 8 4 , 1 0 7 1 , 7 0 0 7 , 6 0 2 2 , 3 4 6 6 , 3 3 3 9 , 1 6 6 6 , 3 3 9 1 , 4 5 2 0 , 7 0 2 9 , 3 7 3 0 , 2 3 0 3 , 2 1 7 0 , 3 0 3 5 , 1 3 1 2 , 4 7 3 6 , 5 9 9 3 , 1 0 4 0 , 1 0 2 0 0 . 0 1 8 0 0 . 0 6 1 0 2 / 5 1 / 2 9 5 9 1 / 4 / 1 y t i n a V 9 2 6 , 1 3 1 0 0 . 0 1 4 0 0 . 0 6 1 0 2 / 1 1 / 3 4 4 9 1 / 2 / 1 1 n o s r e m E h t i e K 5 2 5 6 3 7 2 1 0 0 . 0 8 3 0 0 . 0 6 1 0 2 / 2 2 / 3 0 7 9 1 / 0 2 / 1 1 g w a D e f i h P 0 1 0 0 . 0 9 2 0 0 . 0 6 1 0 2 / 2 / 5 7 4 9 1 / 0 1 / 1 r u k a h S i n e f A 3 0 . 0 3 0 . 0 3 0 . 0 p δ 2 1 0 . 0 1 1 0 . 0 0 1 0 . 0 7 0 0 . 0 7 0 0 . 0 7 0 0 . 0 6 0 0 . 0 6 0 0 . 0 4 0 0 . 0 4 0 0 . 0 3 0 0 . 0 3 0 0 . 0 3 0 0 . 0 8 1 . 0 6 1 0 2 / 3 / 6 2 4 9 1 / 7 1 / 1 i l A d a m m a h u M 7 1 . 0 6 1 0 2 / 5 2 / 1 1 6 2 9 1 / 3 1 / 8 o r t s a C l e d i F 7 1 . 0 6 1 0 2 / 1 2 / 4 8 5 9 1 / 7 / 6 e c n i r P 9 7 0 . 0 2 6 0 . 0 7 5 0 . 0 2 4 0 . 0 6 1 0 2 / 6 / 3 1 2 9 1 / 6 / 7 n a g a e R y c n a N 6 1 0 2 / 5 2 / 9 9 2 9 1 / 0 1 / 9 r e m l a P d l o n r A 6 1 0 2 / 5 1 / 1 6 4 9 1 / 1 2 / 2 n a m k c i R n a l A 6 1 0 2 / 9 1 / 2 6 2 9 1 / 8 2 / 4 e e L r e p r a H 0 4 0 . 0 6 1 0 2 / 5 2 / 2 1 3 6 9 1 / 5 2 / 6 l e a h c i M e g r o e G 7 3 0 . 0 6 1 0 2 / 8 / 2 1 1 2 9 1 / 8 1 / 7 n n e l G n h o J 6 3 0 . 0 6 1 0 2 / 8 2 / 2 1 2 3 9 1 / 1 / 4 s d l o n y e R e i b b e D 2 3 0 . 0 8 1 0 . 0 8 1 0 . 0 6 1 0 . 0 5 1 0 . 0 2 1 0 . 0 6 1 0 2 / 9 2 / 8 3 3 9 1 / 1 1 / 6 r e d l i W e n e G 6 1 0 2 / 0 1 / 6 4 9 9 1 / 2 1 / 3 e i m m i r G a n i t s i r h C 7 1 0 2 / 5 2 / 2 5 5 9 1 / 7 1 / 5 6 1 0 2 / 6 / 6 4 7 9 1 / 8 / 2 6 1 0 2 / 2 / 7 8 2 9 1 / 0 3 / 9 n o t x a P l l i B e c i l S o b m K i l e s e i W e i l E 6 1 0 2 / 8 2 / 8 0 5 9 1 / 7 / 1 l e i r b a G n a u J p D O D B O D s e m a N D I s l a u d i v i d n i d e n w o n e r y t n e w t r o f s c i r t e m e m a F . 1 e l b a T 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 0 0 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 1 0 2 4/17 Preprint - Ramirez and Hagen (and median) of 34 preferences and 16 "no preference" responses. 86% of subjects indicated a preference in at least half of the fifty pairs they were offered. Consequently, of the 2500 name pairs (50 subjects × 50 name pairs) offered to all subjects, 1679 elicited preferences and 821 elicited a "no preference" response from the subject. The preference data are provided in S1 Spreadsheet. The "no preference" response could indicate that the subject was equally familiar with both names (two very famous names), or that the subject was equally unfamiliar with both names (two less famous names). Regardless of its cause, a "no preference" response does not facilitate the ranking of those two particular names by renown. As the purpose of the survey was to differentiate the individuals by renown, the "no preference" responses were omitted from the subsequent data analysis. The effect of survey sample size, including these omitted "no preference" responses, on the robustness of the obtained ranking was tested through (1) a bootstrap error analysis, discussed below, and (2) a log likelihood test, discussed in Survey Results. We used a Bradley-Terry model [22] to convert the preference data to a quantitative measure of fame, assigning a rating pi to each individual i (i = 1 . . . 20) in Table 1. In the Bradley-Terry model, the strength scores or ratings pi and pj determine the probability that individual i defeats individual j in a single pairwise comparison: with P r(i defeats j) = pi pi + pj 20(cid:88) i=1 pi = 1. (1) (2) A maximum likelihood estimate for the twenty pi was extracted from the survey data by an iterative procedure [23] that rapidly converges to produce the optimal pi; that is, it find the pi for which the dataset is most probable. In addition, to test how robustly our particular dataset determined those pi, we performed ∼ 2000 bootstrap random samplings of the maximum likelihood estimation. The bootstrap method yields an estimate for confidence levels in model parameters, reflective of the size and the internal self-consistency of the dataset. The uncertainties δp in the reported pi are the 1 σ deviations obtained from the bootstrap test. Internet-based metrics of fame We then sought to test how other plausible metrics for fame correlate with the rankings obtained from the survey. Some possible metrics for fame are problematic as they are not universally applicable or cannot readily be measured or estimated for non-celebrities or for living individuals, or they are weighted toward people in certain professions, or they are controlled by gatekeepers. These include an individual's wealth, the length of his/her obituary or Who's Who entry, numbers of Twitter followers, etc. Instead we sought to evaluate metrics that were (1) available for a wide range of individuals of diverse profession and varying fame, (2) reflective of the opinion of a large population or audience, rather than the judgment of curators or gatekeepers, (3) regularly updated, and (4) readily accessible through the internet. Based on these criteria, we selected the following plausible, internet-derived metrics of fame (S2 Spreadsheet) and evaluated them for the individuals on the NYT, NBC and Wiki lists: • GH - the total current Google hits returned for the individual; • GN - the total current Google news items citing that individual; 5/17 Preprint - Ramirez and Hagen • WE - the total edits to date of the individual's Wikipedia page; • WV - the total Wikipedia page views to date. Most of the internet metrics for the names on the NYT, NBC and Wiki lists were assessed on March 8, 2017. The data for the NYT 2 list was assessed on July 12, 2017, and the Wikipedia page views (WV ) were recorded on June 29, 2017. Total current Google hits (GH ) was obtained by searching an individual's name in Google and counting the number of links returned. Total current Google news items (GN ) was obtained by searching an individual by name and profession in Google News and counting the number of links returned. For GN searches where the individual could be identified with more than one profession, the search that returned the most links was used. Total current Wikipedia page edits (WE ) were obtained from an individual's Wikipedia page through the "History" feature. To evaluate the temporal stability of these metrics we also retrieved time series data: W Et is the month-to-month time series of Wikipedia page edits, obtained from the Revision History Statistics of the Wikipedia page; GSt is the history of monthly Google searches, obtained from Google Trends; W Vt is the daily history of Wikipedia page views, using Wikipedia PageViews Analysis. Power law analysis We used a maximum likelihood method to assess whether metric WE exhibits a power law distribution in the three lists studied [24]. If x is a discrete random variable whose probability distribution p(x) for x ≥ xmin is a power law (Eq. 4) then the value of α for a dataset xi (i = 1 . . . n) is estimated by maximizing the logarithmic likelihood of the data (cid:88) xi≥xmin L = n log(C) − α log(xi) (3) As the data xi will not obey the power law below xmin, an estimate for xmin is also needed. For each name list we generated these estimates by minimizing the Kolmogorov-Smirnov distance between the cumulative distribution function (CDF) of the WE data and that of a perfect power law [24]. Data sharing Datasets are provided as supplemental information in S1 Spreadsheet and S2 Spreadsheet. Use of human subjects Undergraduate students completed the fame pi survey under protocol IRB201700835, which was approved as exempt by the University of Florida Institutional Review Board (Behavior/Nonmedical, IRB-02). Volunteer subjects were recruited in mid-June 2017, from public areas of the University of Florida campus. Each subject read an informed consent document and provided oral consent for participation. The written consent requirement was waived owing to the minimal risk and the fact that no sensitive or identifying information was collected from the subjects. 6/17 Preprint - Ramirez and Hagen Results and Discussion Survey results We used a Bradley-Terry model [22] to extract from the survey data a quantitative score of renown or fame for each of the individuals in Table 1. These scores are the p values that are shown in Table 1 and Fig. 1. The p of each individual is a measure of his/her degree of renown, as derived from the set of pairwise comparisons or preferences reported by all the survey subjects. The maximum likelihood method described in Methods identifies the unique, self-consistent set of p values for which the entire survey dataset of 1679 subject preferences is most probable, based on Eq. 1. The obtained p range over almost two orders of magnitude, from a maximum of 0.18 ± 0.03 to a minimum of 0.0029 ± 0.0009, indicating that the fame of the different individuals spans almost two decades, at least from the perspective of the subject population. To assess whether (a) the number of survey subjects and (b) the number of preferences reported by those subjects were both sufficiently large, we examined the robustness of the p values in Table 1 using two different statistical tests. First, as described in Methods, we applied a bootstrap random sampling to evaluate the confidence intervals in the p values, given our dataset. The bootstrap method is a model-free approach that takes account of the size of the dataset as well as any lack of knowledge of the true or theoretical distribution of the model parameters. As shown in Fig 1, the uncertainties δp determined from the bootstrap correspond to relative uncertainties δp/p of 10-30%. As the less famous names in Table 1 more frequently drew a "no preference" response from survey subjects, such names occur less often in the dataset; accordingly the bootstrap analysis finds a larger relative uncertainty δp/p for these names. The relative uncertainty increases about two-fold from the best known (δp/p (cid:39) 16% for p (cid:39) 0.2) to the least known (δp/p (cid:39) 30% for p (cid:39) 3 × 10−3) individuals. Nevertheless these relative uncertainties are still substantially smaller than most of the name-to-name differences in p values. This analysis shows that the survey dataset contains sufficient, self-consistent preference data to establish a robust ranking. As a second statistical test of our survey sample and the model obtained from it, we also compared the relative likelihood of our findings (Fig 1) to that of a null model for the same dataset. If for example the survey subjects are too few or are incompetent to rank the names usefully, then the relevant null model is one where the survey dataset contains too little information to support a significant ranking. In this null model all the names in Table 1 have equal p values, and either subject preference is equally likely for any name pair [22]. Comparing the likelihood Lmodel of our dataset under our model to its likelihood Lnull under the null model we find a very high log likelihood ratio log(Lmodel/Lnull) = 372. That is, our p values provide a 10161-fold better explanation of our dataset than does the null model. This is illustrated by Fig. 1, where roughly 78% of the 1679 preferences obtained from the survey have likelihood greater than 0.5, meaning that they are more likely than not, given our p values and Eq. 1. The high likelihood of the dataset, given the p values, demonstrates that the survey generated statistically significant, self-consistent information about the relative fame of the 20 individuals. Table 1 shows the fame measures p and δp, WE, GN, and GH for the twenty individuals who died in 2016, identified by name and dates of birth (DOB) and death (DOD). It also shows dW E/dt, the average WE added per month from the creation of the page through June 2017, and dW V /dt, the average WV per day from July 1 2015 to June 29 2017. 7/17 Preprint - Ramirez and Hagen Fig 1. Human subject ratings of fame. (A) Ratings p of the fame of the individuals in Table 1. Ratings were obtained by applying a Bradley-Terry ranking model (Eq. 1) to data from a survey in which subjects made pairwise comparisons of individuals listed in the table (Methods). White squares show uncertainty estimates δp (±1 σ) estimated from bootstrap analysis of survey data. (B) Histogram of likelihoods of the 1679 pairwise comparisons made by survey subjects, based on the p values of (A) and Eq. 1. Given the p, 78% of the comparisons have likelihood > 0.5. (C) Scatterplot showing relative uncertainties δp/p versus p for the individuals in (A). Testing correlation of fame metrics with p Therefore, using the individuals in Table 1 as a test population, we evaluated several plausible internet-derived metrics of fame by testing their correlation with the p values. Like the p values, the metrics GN, GH, WE and WV all range over several orders of magnitude. Fig. 2 compares them against pi in order of decreasing Pearson correlation coefficient R of a double logarithmic plot. WE and GN both show strong correlations, R = 0.83 and 0.70 respectively, with p. WE also has a nearly linear relationship with p, consistent with p ∝ WE1.2±0.2. Our data indicate that Google hits GH and Wikipedia page views WV are less reliable metrics of fame. WV has a moderate correlation with p, giving R = 0.52. GH has a weak correlation with p (R (cid:39) 0.6), leading to a log-log slope 0.33 ± 0.33 that is 8/17 Preprint - Ramirez and Hagen consistent with zero. Although GH has been regarded as an obvious metric of fame, the expansion of the internet may have made it less useful for distinguishing non-celebrities: A very high GH (∼ 106 − 107) does correlate with celebrity status, but many common names have GH ∼ 105 − 106 or higher, and therefore do not distinguish greater and lesser fame. Other flaws in GH have also been noted [25]. Overall we find that WE and to a lesser extent GN correlate sufficiently well with p values and with each other that they may serve as useful quantitative measures of fame. However, we regard GN and WE only as metrics of the current fame of individuals, measured at a particular instant. Although it is likely that some individuals were more famous in the past than at their death, we do not attempt to construct a model to estimate their fame at its peak or to correct for any decline. In addition these internet-based metrics are probably not useful for comparing the fame of individuals who died at different times in the past. Clearly an individual who died prior to the Wikipedia launch in 2001 is less likely to acquire WE than is a living person of otherwise comparable renown. Therefore in what follows we make no attempt to compare the fame of the recently deceased to that of individuals who died in earlier years. Fig 2. Correlations between quantitative measures of fame. Correlations between different quantitative measures of fame for the 20 individuals in Table 1. The survey metric p is compared with internet metrics WE (A), GN (B), GH (C), and WV (E). GN and WE are compared in (D). In each double logarithmic plot the slope of the best (least squares) fit line is indicated. Panels are presented in order of decreasing Pearson correlation R on the double log plot. Error bars for p are obtained from bootstrap analysis. Time dependence As an alternative to cumulative quantities such as total Wikipedia page edits we also evaluated some continuously varying indicators of fame, such as the monthly Wikipedia page edits W Et. Fig. 3 shows several years of data for W Et, W Vt and GSt (denoting time series for WE, WV and Google searches/Google Trends, respectively) for four individuals in Table 1. Although W Et is noisy its behavior is generally stable and similar for all four individuals, with a dynamic range of about 10-100. By contrast W Vt is subject to abrupt spikes associated with news events. For some individuals, especially 9/17 Preprint - Ramirez and Hagen ID 15 and ID 02 in Table 1, GSt and W Vt show strong weekly or annual periodicity, presumably due to regular cycles of student academic assignments. The instability of GSt and W Vt argues against the use of short-term snapshots of GS or WV as quantitative metrics of fame. Fig 3. Temporal fluctuation and cumulative values of internet metrics of fame. For four individuals in Table 1, the figures at left show (A) the variation in daily Wikipedia page views (W Vt) over a two year interval, (B) monthly Wikipedia page edits (W Et) over 13 years, (C) monthly Google searches, (GSt), over 13 years. GSt data for each individual are normalized to a maximum value of 100. For all 20 individuals in Table 1, the figures at right show (D) cumulative WV and (E) cumulative WE. The legends identify the individuals by their ID in Table 1. Fig. 3 also shows the accumulation of total WE and WV over a 1.5 y interval, for the individuals in Table 1. While an individual's WV may jump discontinuously when the individual's death is reported, WE generally changes more slowly and its relative ordering is largely stable over time. These data suggest that while both WV and WE inevitably increase over time, a rank ordering of individuals by WE changes slowly, as required for a useful quantitative measure of fame. As WE and GN both correlate reasonably well with p, we expect them to correlate with each other. The scatterplot of Fig. 4 shows that GN and WE correlate similarly in all three datasets (279 individuals). The data fall roughly along a curve that is more nearly quadratic (GN ∝ W E2) than linear, so that while GN spans more than six decades, WE spans about 3-4 decades. One possible interpretation of the nonlinear relationship is that WE, which is subject to the practical aspects of web editing, is unlikely to be smaller than about 10, and therefore has a floor value even though GN does not. Another possibility is that GN is more sensitive to celebrity (as defined herein) whereas WE is a better measure of fame, so that GN emphasizes more famous individuals at the expense of the less famous. Fig. 4C illustrates the relation between GN and W E for individuals of different professions. This and other analysis we conducted show no evidence that the correlation between WE and GN depends significantly on profession. The probability distribution for fame The survey-generated pi provide an intuitive and quantitative metric of fame. However the printed survey is impractical for evaluating the fame of larger numbers of individuals. Therefore we use WE, which appears to be a satisfactory alternative metric 10/17 Preprint - Ramirez and Hagen Fig 4. The correlation between GN and WE. The correlation between GN and WE, as measures of fame for the individuals in the three datasets (NBC, Wiki and NYT 1), is shown in three double-logarithmic plots. (A) The logarithms of GN and WE are reasonably well correlated, with a Pearson R = 0.71. (B) WE and GN show similar correlation in the three datasets, which sample different ranges of GN ; (C) WE and GN are shown with a color code that indicates the profession of the individuals. of fame, to investigate the statistical distribution of fame. Fig. 5A shows histograms of WE for individuals in the NYT, NBC and Wiki datasets. In each case the WE distribution is broad, spanning at least two decades, with a tail extending to very large WE. The tails raise the question of whether fame, like many other quantities in the social and natural sciences, obeys a power law distribution. Phenomena such as forest 11/17 Preprint - Ramirez and Hagen fires, earthquakes, and the sizes of cities, which lack an intrinsic size scale [26], often obey a power law: The probability that an event has magnitude x is given by p(x) = C xα ∞(cid:88) p(x) = 1 (4) (5) x=xmin for x > xmin. Here xmin is a cutoff, C is a normalization constant, and we have taken x as a discrete variable (like WE ). We tested our data for power law behavior by finding the power law model that best fit the cumulative distribution function (CDF) of each dataset. (The CDF is the function F (x) that gives the probability that any one measurement X exceeds x.) For each dataset we assumed that the WE data obey Eq 4 above a cutoff value of WE (Methods). As shown in Table 2, all three datasets give comparable values, α (cid:39) 1.9− 2.6, although with very different cutoff (xmin) values, indicative of the different selectivity of the three data sources. Fig. 5 illustrates the agreement by showing the cumulative distribution function (CDF) for WE and that of the corresponding, maximum-likelihood power law. Many apparent power laws are only approximate and do not withstand close statistical scrutiny [24]. Although the size of NYT and NBC datasets is insufficient to establish whether the power law is superior to other models for the distribution, these particular datasets do appear to show good agreement with the power law model. We note that our α values are consistent with the α = 1.9 − 2.1 that was estimated by a different method in a study of the fame of WWI flying aces [6]. Table 2. Results of fitting Eq. 4 and Eq. 6 to WE data Wiki NBC NYT xmin α ν a b 700-900 2.1 ± 0.1 1.5 ± 0.1 20-70 1.9 ± 0.1 1.7 ± .2 (cid:39) 0.00013 y (cid:39) 0.0079 y (cid:39) 0.0011 y (cid:39) 4 × 106 (cid:39) 8 × 106 220-240 2.6 ± 0.2 1.7 ± 0.1 (cid:39) 3 × 106 While the CDF gives the probability that any particular event exceeds a certain magnitude, it is often more useful to know the absolute frequency of events of a certain magnitude. For example in the case of earthquakes it is helpful to know how many events exceeding a given threshold occur each year. A cumulative frequency plot shows the frequency f (x) of events that have magnitude greater than or equal to x. For many natural power law phenomena the cumulative frequency plot obeys the empirical Gutenberg Richter law [26] f (x) = 1 a + xν/b (6) Here a and b set the overall scale of the frequency and define a threshold sensitivity in the dataset (similar to xmin above), while ν reflects the power law distribution of the underlying events. Fig. 6 shows the cumulative frequency plots for all three datasets, using WE as a fame measure and scaling the event numbers in the data up to equivalent annual rates. The parameters a and b, shown in Table 2, are highly variable 12/17 Preprint - Ramirez and Hagen Fig 5. Probability distributions for fame. Probability distributions for fame, as measured by WE, for individuals in the NBC, Wiki, and NYT (1 & 2) datasets. (A) Histogram showing, for each dataset, the distribution of reported deaths with respect to WE. (B) Cumulative distribution functions (CDF) with respect to WE are shown as the solid curves. CDF are evaluated using cutoff WE values of 35 (Wiki), 220 (NYT) and 800 (NBC). For each dataset, the optimal value of the power law exponent and cutoff (α and xmin respectively in Eq. 4 ) were evaluated as described in Methods [24], with results shown in Table 2. The dashed lines show the CDF for true power law distributions that have the same α and xmin as the data. as the different media sources apply different selectivity criteria in reporting obituaries. However as WE increases, all three datasets tend toward Gutenberg-Richter behavior with ν (cid:39) 1.5 − 1.7 (by least squares fit). It is interesting that all three curves indicate that ∼ 30 − 100 individuals with fame W E ≥ 103 die each year. Such information can yield quantitative insight into questions that arise perennially about the frequency of famous deaths [16] [17] [18]. For example, the so-called celebrity rule of three is a folk belief that deaths of celebrities occur in clusters, especially groups of three, spread over a few days [17]. A frequently mentioned example is the three days in June 23-25, 2009 during which the television personality 13/17 Preprint - Ramirez and Hagen Fig 6. Cumulative frequency of deaths versus fame. (A) Cumulative frequency (Gutenberg-Richter) plot of reported deaths versus fame. For each degree of fame (as measured by WE ), the plot shows the annualized rate at which deaths of equal or greater fame occur. Green, red, and blue symbols indicate the NBC, NYT (1 & 2) and Wiki datasets respectively. Dashed curves show least squares fit to Gutenberg-Richter expression, Eq. 6, giving ν = 1.5 − 1.7 (Table 2). (B) Date overlap (birthday-problem) probability versus death rate. Each curve gives the probability P that, if the indicated number of deaths occur at random during one year, there will be at least one instance where two (P2) or three (P3) of those deaths are separated by only ∆n days. Ed McMahon, the musician Michael Jackson and the actress Farrah Fawcett all died. Another striking example is the deaths of C.S. Lewis, Aldous Huxley, and John F. Kennedy, on November 22, 1963. The probability of such coincidences can be estimated from the data in Fig. 6 by defining a threshold for fame, referring to the Gutenberg-Richter plot, and then applying the familiar birthday problem in statistics: If the deaths of N individuals are randomly distributed throughout the year, then if N ≥ 23 the probability exceeds 50% that at least two deaths will occur on the same day. If the threshold for fame is W E ≥ 1000, the expected 30-100 deaths per year ensures that two famous deaths will occasionally coincide. The common statement of the celebrity rule of three does not require the deaths to occur on precisely the same day. If they may be separated by ∆n days, then as shown in Fig. 6 a 50% probability of two occurring in coincidence requires only N ≥ 14 (for ∆n = 1) or N ≥ 11 (∆n = 2) deaths per year. Among individuals of rather high fame, WE ≥ 2000 − 3000, at least one such coincidence appears likely each year. A three-person coincidence has 50% probability when N ≥ 88 (∆n = 0) or N ≥ 35 (∆n = 2): If ∆n ≤ 2 is considered a coincidence, then at least one cluster of three deaths with W E >∼ 1000 seems likely to occur in most years. Therefore, although Fig. 6 summarizes only one year of deaths, the data are sufficient to demonstrate that the apparent clustering of famous deaths is not an entirely false perception; rather the clustering is a statistical consequence of the rather large number of famous deaths that occur each year. Conclusion The application of statistical ideas has led productively to greater understanding of many aspects of human social dynamics, such as the evolution of opinion, cultural and linguistic behaviors [27]. Our results demonstrate that quantitative measures can plausibly be applied to fame, providing insight into this important cultural phenomenon and allowing detailed statistical investigation. We note however that, as fame has 14/17 Preprint - Ramirez and Hagen economic value, it would be preferable to measure fame using tools that (unlike WE ) are difficult to manipulate. For example, instead of using paper surveys to score fame, one could implement a larger scale, social-media based, electronic version of the pairwise comparison method. This would greatly expand the survey base, allowing more accurate evaluation of the fame of greater numbers of individuals, and especially less renowned individuals. Future investigators may wish to explore such approaches. Supporting information S1 Spreadsheet. Survey Responses The spreadsheet contains all individual responses to the fame survey. The first page contains the list of twenty deceased individuals of high renown, each identified by a number ID. Each of the 50 survey subjects was presented with 50 pairs of names from this list and asked to select the more familiar name in each pair. The second page contains the response data. The first column gives the subject number. The second and third columns indicate the ID of the winner (more familiar) and loser (less familiar) in each pairwise comparison of names. Because "No preference" responses have been removed, fewer than fifty responses are recorded for some subjects. S2 Spreadsheet. Fame metrics for individuals in the datasets The spreadsheet contains fame metrics for (1) the 20 individuals in Table 1; (2) the 126 individuals in the NBC dataset; (3) the 78 individuals in the Wiki dataset; (4) the 75 individuals in the NYT 1 dataset; (5) the 72 individuals in the NYT 2 dataset. It also contains (6) the occupation codes used in the data tables (2)-(4) above. References 1. Drake P, Miah A. The Cultural Politics of Celebrity. Cultural Politics. 2010;6(1):49–64. doi:10.2752/175174310X12549254318746. 2. Michel JB, Shen YK, Aiden AP, Veres A, Gray MK, , et al. Quantitative Analysis of Culture Using Millions of Digitized Books. Science. 2011;331(6014):176. 3. Jacoby J. Considering the Who, What, When, Where and How of Measuring Dilution. Santa Clara High Tech LJ. 2012;24:601–639. 4. Maltby J. An interest in fame: Confirming the measurement and empirical conceptualization of fame interest. British Journal of Psychology. 2010;101(3):411–432. doi:10.1348/000712609X466568. 5. Banaji MR, Greenwald AG. Implicit gender stereotyping in judgments of fame. Journal of personality and social psychology. 1995;68(2):181–198. doi:10.1037/0022-3514.68.2.181. 6. Simkin MV, Roychowdhury VP. A Mathematical Theory of Fame. Journal of Statistical Physics. 2013;151(1):319–328. doi:10.1007/s10955-012-0677-5. 7. Hall N. The Kardashian index: a measure of discrepant social media profile for scientists. Genome biology. 2014;15(7):424. doi:10.1186/s13059-014-0424-0. 8. Yucesoy B, Barabasi AL. Untangling performance from success. EPJ Data Science. 2016;5(1):17. doi:10.1140/epjds/s13688-016-0079-z. 15/17 Preprint - Ramirez and Hagen 9. Simkin MV, Roychowdhury VP. Chess players' fame versus their merit. Applied Economics Letters. 2015;22(18):1499–1504. doi:10.1080/13504851.2015.1042135. 10. Bagrow JP, Rozenfeld HD, Bollt EM, ben Avraham D. How famous is a scientist? Famous to those who know us. EPL (Europhysics Letters). 2004;67(4):511. 11. Yu AZ, Ronen S, Hu K, Lu T, Hidalgo C. Pantheon 1.0, a manually verified dataset of globally famous biographies. Scientific Data. 2016;3:150075. doi:doi:10.1038/sdata.2015.75. 12. Schulman E. Can Fame Be Measured Quantitatively? Annals of Improbable Research. 1999;5:16. 13. Mestyan M, Yasseri T, Kertesz J. Early Prediction of Movie Box Office Success Based on Wikipedia Activity Big Data. PLOS ONE. 2013;8(8):e71226. 14. Jacoby LL, Kelley C, Brown J, Jasechko J. Becoming Famous Overnight: Limits on the Ability to Avoid Unconscious Influences of the Past. Journal of personality and social psychology. 1989;56:326–338. doi:10.1037/0022-3514.56.3.326. 15. The Art of the Obituary. NPR. 2006; p. 1. doi:http://www.npr.org/templates/story/story.php?storyId=5353784;. 16. Crowther L. 2016's Celebrity Death Boom: The Surprising Final Analysis. Legacy. 2017; p. 1. doi:http://www.legacy.com/news/celebrity-deaths/year-in- review/article/2016s-celebrity-death-boom-the-surprising-final;. 17. Flippen A. No, Celebrity Deaths Do Not Come in Threes. The New York Times. 2014; p. 1. doi:https://www.nytimes.com/2014/08/15/upshot/no-celebrity-deaths- do-not-come-in-threes.html?mcubz=0;. 18. Wolkewitz M, Allignol A, Graves N, Barnett AG. Is 27 really a dangerous age for famous musicians? Retrospective cohort study. BMJ. 2011;343. 19. Celebrity Deaths in 2016: Some of the Many Famous Figures We Lost This Year. NBC News and The Associated Press. 2017; p. 1. doi:https://www.nbcnews.com/storyline/2016-year-in-review/look-back-all- famous-figures-who-died-2016-n698791;. 20. Deaths in January 2017. Wikipedia. 2017;doi:www.Wikipedia.org. 21. Obituaries Online. The New York Times. 2017;doi:https://www.nytimes.com/section/obituaries. 22. Bradley RA, Terry ME. Rank Analysis of Incomplete Block Designs: I. The Method of Paired Comparisons. Biometrika. 1952;39(3):324–345. doi:10.2307/2334029. 23. Hunter DR. MM algorithms for generalized Bradley-Terry models. AnnStatist. 2004;32(1):384–406. doi:10.1214/aos/1079120141. 24. Clauset A, Shalizi C, Newman M. Power-Law Distributions in Empirical Data. SIAM Review. 2009;51(4):661–703. doi:10.1137/070710111. 25. Matsuo Y, Tomobe H, Nishimura T. Robust Estimation of Google Counts for Social Network Extraction. In: Proceedings of the 22Nd National Conference on Artificial Intelligence - Volume 2. AAAI'07. AAAI Press; 2007. p. 1395–1401. Available from: http://dl.acm.org/citation.cfm?id=1619797.1619869. 16/17 Preprint - Ramirez and Hagen 26. Turcotte DL. Self-organized criticality. Reports on Progress in Physics. 1999;62(10):1377. 27. Castellano C, Fortunato S, Loreto V. Statistical physics of social dynamics. Reviews of Modern Physics. 2009;81(2):591–646. 17/17